Skip to content

Commit a4d6f85

Browse files
authored
Merge pull request #198120 from MicrosoftDocs/main
5/12 PM Publish
2 parents cbb7224 + da44783 commit a4d6f85

File tree

191 files changed

+9134
-2232
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

191 files changed

+9134
-2232
lines changed

articles/active-directory/conditional-access/howto-conditional-access-apis.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,9 @@ Many of the following examples use tools like [Managed Identities](../managed-id
3131

3232
### PowerShell
3333

34+
> [!IMPORTANT]
35+
> Due to the planned deprecation of PowerShell modules (MSOL & AAD) after December 2022, no further updates are planned for these modules to support new Conditional Access features. See recent announcements for more information: https://aka.ms/AzureADPowerShellDeprecation. New Conditional Access features may not be available or may not be functional within these PowerShell modules as a result of this announcement. Please consider [migrating to Microsoft Graph PowerShell](https://aka.ms/MigrateMicrosoftGraphPowerShell). Additional guidance and examples will be released soon.
36+
3437
For many administrators, PowerShell is already an understood scripting tool. The following example shows how to use the [Azure AD PowerShell module](https://www.powershellgallery.com/packages/AzureAD) to manage Conditional Access policies.
3538

3639
- [Configure Conditional Access policies with Azure AD PowerShell commands](https://github.com/Azure-Samples/azure-ad-conditional-access-apis/tree/main/01-configure/powershell)

articles/active-directory/governance/access-reviews-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ Here are some example license scenarios to help you determine the number of lice
9999
| An administrator creates an access review of Group C with 50 member users and 25 guest users. Makes it a self-review. | 50 licenses for each user as self-reviewers.* | 50 |
100100
| An administrator creates an access review of Group D with 6 member users and 108 guest users. Makes it a self-review. | 6 licenses for each user as self-reviewers. Guest users are billed on a monthly active user (MAU) basis. No additional licenses are required. * | 6 |
101101

102-
\* Azure AD External Identities (guest user) pricing is based on monthly active users (MAU), which is the count of unique users with authentication activity within a calendar month. This model replaces the 1:5 ratio billing model, which allowed up to five guest users for each Azure AD Premium license in your tenant. When your tenant is linked to a subscription and you use External Identities features to collaborate with guest users, you'll be automatically billed using the MAU-based billing model. For more information, see Billing model for Azure AD External Identities.
102+
\* Azure AD External Identities (guest user) pricing is based on monthly active users (MAU), which is the count of unique users with authentication activity within a calendar month. This model replaces the 1:5 ratio billing model, which allowed up to five guest users for each Azure AD Premium license in your tenant. When your tenant is linked to a subscription and you use External Identities features to collaborate with guest users, you'll be automatically billed using the MAU-based billing model. For more information, see [Billing model for Azure AD External Identities](../external-identities/external-identities-pricing.md).
103103

104104
## Next steps
105105

articles/active-directory/governance/entitlement-management-overview.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -167,7 +167,10 @@ Here are some example license scenarios to help you determine the number of lice
167167
| Scenario | Calculation | Number of licenses |
168168
| --- | --- | --- |
169169
| A Global Administrator at Woodgrove Bank creates initial catalogs and delegates administrative tasks to 6 other users. One of the policies specifies that **All employees** (2,000 employees) can request a specific set of access packages. 150 employees request the access packages. | 2,000 employees who **can** request the access packages | 2,000 |
170-
| A Global Administrator at Woodgrove Bank creates initial catalogs and delegates administrative tasks to 6 other users. One of the policies specifies that **All employees** (2,000 employees) can request a specific set of access packages. Another policy specifies that some users from **Users from partner Contoso** (guests) can request the same access packages subject to approval. Contoso has 30,000 users. 150 employees request the access packages and 10,500 users from Contoso request access. | 2,000 employees + 500 guest users from Contoso that exceed the 1:5 ratio (10,500 - (2,000 * 5)) | 2,500 |
170+
| A Global Administrator at Woodgrove Bank creates initial catalogs and delegates administrative tasks to 6 other users. One of the policies specifies that **All employees** (2,000 employees) can request a specific set of access packages. Another policy specifies that some users from **Users from partner Contoso** (guests) can request the same access packages subject to approval. Contoso has 30,000 users. 150 employees request the access packages and 10,500 users from Contoso request access. | 2,000 employees need licenses, guest users are billed on a monthly active user basis and no additional licenses are required for them. * | 2,000 |
171+
172+
\* Azure AD External Identities (guest user) pricing is based on monthly active users (MAU), which is the count of unique users with authentication activity within a calendar month. This model replaces the 1:5 ratio billing model, which allowed up to five guest users for each Azure AD Premium license in your tenant. When your tenant is linked to a subscription and you use External Identities features to collaborate with guest users, you'll be automatically billed using the MAU-based billing model. For more information, see [Billing model for Azure AD External Identities](../external-identities/external-identities-pricing.md).
173+
171174

172175
## Next steps
173176

articles/active-directory/reports-monitoring/reference-azure-ad-sla-performance.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -55,8 +55,8 @@ For each month, we truncate the SLA attainment at three places after the decimal
5555
| --- | --- | --- |
5656
| January | | 99.999% |
5757
| February | 99.999% | 99.999% |
58-
| March | 99.568% | |
59-
| April | 99.999% | |
58+
| March | 99.568% | 99.999% |
59+
| April | 99.999% | 99.999% |
6060
| May | 99.999% | |
6161
| June | 99.999% | |
6262
| July | 99.999% | |
@@ -89,4 +89,4 @@ All incidents that seriously impact Azure AD performance are documented in the [
8989

9090
* [Azure AD reports overview](overview-reports.md)
9191
* [Programmatic access to Azure AD reports](concept-reporting-api.md)
92-
* [Azure Active Directory risk detections](../identity-protection/overview-identity-protection.md)
92+
* [Azure Active Directory risk detections](../identity-protection/overview-identity-protection.md)

articles/aks/security-controls-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Azure Policy Regulatory Compliance controls for Azure Kubernetes Service (AKS)
33
description: Lists Azure Policy Regulatory Compliance controls available for Azure Kubernetes Service (AKS). These built-in policy definitions provide common approaches to managing the compliance of your Azure resources.
4-
ms.date: 03/10/2022
4+
ms.date: 05/10/2022
55
ms.topic: sample
66
ms.service: container-service
77
ms.custom: subject-policy-compliancecontrols

articles/api-management/how-to-configure-local-metrics-logs.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -190,12 +190,12 @@ Now we have everything deployed and configured, the self-hosted gateway should r
190190

191191
Make some API calls through the self-hosted gateway, if everything is configured correctly, you should be able to view below metrics:
192192

193-
| Metric | Description |
193+
| Metric | Description |
194194
| ------------- | ------------- |
195-
| Requests | Number of API requests in the period |
196-
| DurationInMS | Number of milliseconds from the moment gateway received request until the moment response sent in full |
197-
| BackendDurationInMS | Number of milliseconds spent on overall backend IO (connecting, sending and receiving bytes) |
198-
| ClientDurationInMS | Number of milliseconds spent on overall client IO (connecting, sending and receiving bytes) |
195+
| requests_total | Number of API requests in the period |
196+
| request_duration_seconds | Number of milliseconds from the moment gateway received request until the moment response sent in full |
197+
| request_backend_duration_seconds | Number of milliseconds spent on overall backend IO (connecting, sending and receiving bytes) |
198+
| request_client_duration_seconds | Number of milliseconds spent on overall client IO (connecting, sending and receiving bytes) |
199199

200200
## Logs
201201

articles/api-management/security-controls-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Azure Policy Regulatory Compliance controls for Azure API Management
33
description: Lists Azure Policy Regulatory Compliance controls available for Azure API Management. These built-in policy definitions provide common approaches to managing the compliance of your Azure resources.
4-
ms.date: 03/10/2022
4+
ms.date: 05/10/2022
55
ms.topic: sample
66
author: dlepow
77
ms.author: danlep

articles/app-service/security-controls-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Azure Policy Regulatory Compliance controls for Azure App Service
33
description: Lists Azure Policy Regulatory Compliance controls available for Azure App Service. These built-in policy definitions provide common approaches to managing the compliance of your Azure resources.
4-
ms.date: 03/10/2022
4+
ms.date: 05/10/2022
55
ms.topic: sample
66
ms.service: app-service
77
ms.custom: subject-policy-compliancecontrols

articles/application-gateway/custom-error.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33,13 +33,13 @@ To create a custom error page, you must have:
3333

3434
- an HTTP response status code.
3535
- corresponding location for the error page.
36-
- error page should be internet accessible.
36+
- error page should be internet accessible and return 200 response.
3737
- error page should be in \*.htm or \*.html extension type.
3838
- error page size must be less than 1 MB.
3939

4040
You may reference either internal or external images/CSS for this HTML file. For externally referenced resources, use absolute URLs that are publicly accessible. Be aware of the HTML file size when using internal images (Base64-encoded inline image) or CSS. Relative links with files in the same location are currently not supported.
4141

42-
After you specify an error page, the application gateway downloads it from the storage blob location and saves it to the local application gateway cache. Then, that HTML page is served by the application gateway, whereas the externally referenced resources are fetched directly by the client. To modify an existing custom error page, you must point to a different blob location in the application gateway configuration. The application gateway doesn't periodically check the blob location to fetch new versions.
42+
After you specify an error page, the application gateway downloads it from the defined location and saves it to the local application gateway cache. Then, that HTML page is served by the application gateway, whereas the externally referenced resources are fetched directly by the client. To modify an existing custom error page, you must point to a different blob location in the application gateway configuration. The application gateway doesn't periodically check the blob location to fetch new versions.
4343

4444
## Portal configuration
4545

articles/applied-ai-services/form-recognizer/toc.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ items:
4848
href: how-to-guides/use-prebuilt-read.md
4949
- name: Use SDKs and the REST API (v2.1)
5050
href: how-to-guides/try-sdk-rest-api.md
51-
- name: Generate SAS tokens for Azure Blob containers
51+
- name: Create SAS tokens for Azure Blob storage
5252
href: generate-sas-tokens.md
5353
- name: Custom models
5454
items:
@@ -226,4 +226,4 @@ items:
226226
- name: Support and help options
227227
href: ../../cognitive-services/cognitive-services-support-options.md?context=/azure/applied-ai-services/form-recognizer/context/context
228228
- name: Privacy and cookies
229-
href: https://privacy.microsoft.com/en-US/privacystatement
229+
href: https://privacy.microsoft.com/en-US/privacystatement

0 commit comments

Comments
 (0)