Skip to content

Commit a7dbebf

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into recommendations-update
2 parents e7249f1 + d767612 commit a7dbebf

File tree

442 files changed

+4368
-2399
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

442 files changed

+4368
-2399
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -883,6 +883,12 @@
883883
"url": "https://github.com/MicrosoftDocs/reusable-content",
884884
"branch": "main",
885885
"branch_mapping": {}
886+
},
887+
{
888+
"path_to_root": "azure-cosmos-db-mongodb-python-getting-started",
889+
"url": "https://github.com/Azure-Samples/azure-cosmos-db-mongodb-python-getting-started",
890+
"branch": "main",
891+
"branch_mapping": {}
886892
}
887893
],
888894
"branch_target_mapping": {

.openpublishing.redirection.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6358,6 +6358,11 @@
63586358
"redirect_url": "/azure/azure-cache-for-redis/scripts/create-manage-cache",
63596359
"redirect_document_id": false
63606360
},
6361+
{
6362+
"source_path_from_root": "/articles/storage/blobs/anonymous-read-access-client.md",
6363+
"redirect_url": "/azure/storage/blobs/anonymous-read-access-prevent",
6364+
"redirect_document_id": false
6365+
},
63616366
{
63626367
"source_path_from_root": "/articles/storage/common/storage-auth-abac-attributes.md",
63636368
"redirect_url": "/azure/storage/blobs/storage-auth-abac-attributes",
@@ -29356,12 +29361,12 @@
2935629361
},
2935729362
{
2935829363
"source_path_from_root": "/articles/availability-zones/az-overview.md",
29359-
"redirect_url": "/azure/reliablity/availability-zones-overview.md",
29364+
"redirect_url": "/azure/reliability/availability-zones-overview",
2936029365
"redirect_document_id": false
2936129366
},
2936229367
{
29363-
"source_path_from_root": "/articles/availability-zones/index.md",
29364-
"redirect_url": "/azure/reliablity/index.md",
29368+
"source_path_from_root": "/articles/availability-zones/index.yml",
29369+
"redirect_url": "/azure/reliability/index",
2936529370
"redirect_document_id": false
2936629371
},
2936729372
{

.whatsnew/.application-management.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@
1717
},
1818
"areas": [
1919
{
20-
"name": ".",
20+
"name": [ "."],
2121
"heading": "Azure Active Directory application management"
2222
}
2323
]

articles/active-directory/app-proxy/application-proxy-configure-native-client-application.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -112,6 +112,6 @@ After you edit the MSAL code with these parameters, your users can authenticate
112112

113113
## Next steps
114114

115-
For more information about the native application flow, see [Native apps in Azure Active Directory](../azuread-dev/native-app.md).
115+
For more information about the native application flow, see [mobile](../develop/authentication-flows-app-scenarios.md#mobile-app-that-calls-a-web-api-on-behalf-of-an-interactive-user) and [desktop](../develop/authentication-flows-app-scenarios.md#desktop-app-that-calls-a-web-api-on-behalf-of-a-signed-in-user) apps in Azure Active Directory.
116116

117117
Learn about setting up [Single sign-on to applications in Azure Active Directory](../manage-apps/sso-options.md#choosing-a-single-sign-on-method).

articles/active-directory/authentication/howto-authentication-temporary-access-pass.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -147,7 +147,7 @@ Users with a Temporary Access Pass can navigate the setup process on Windows 10
147147
For Azure AD Joined devices:
148148
- During the Azure AD Join setup process, users can authenticate with a TAP (no password required) to join the device and register Windows Hello for Business.
149149
- On already joined devices, users must first authenticate with another method such as a password, smartcard or FIDO2 key, before using TAP to set up Windows Hello for Business.
150-
- If the [Web sign-in](https://learn.microsoft.com/windows/client-management/mdm/policy-csp-authentication#authentication-enablewebsignin) feature on Windows is also enabled, the user can use TAP to sign into the device. This is intended only for completing initial device setup, or recovery when the user does not know or have a password.
150+
- If the [Web sign-in](/windows/client-management/mdm/policy-csp-authentication#authentication-enablewebsignin) feature on Windows is also enabled, the user can use TAP to sign into the device. This is intended only for completing initial device setup, or recovery when the user does not know or have a password.
151151

152152
For Hybrid Azure AD Joined devices:
153153
- Users must first authenticate with another method such as a password, smartcard or FIDO2 key, before using TAP to set up Windows Hello for Business.

articles/active-directory/authentication/howto-authentication-use-email-signin.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -153,7 +153,7 @@ With the policy applied, it can take up to 1 hour to propagate and for users to
153153
### PowerShell
154154

155155
> [!NOTE]
156-
> This configuration option uses HRD policy. For more information, see [homeRealmDiscoveryPolicy resource type](/graph/api/resources/homeRealmDiscoveryPolicy?view=graph-rest-1.0).
156+
> This configuration option uses HRD policy. For more information, see [homeRealmDiscoveryPolicy resource type](/graph/api/resources/homeRealmDiscoveryPolicy?view=graph-rest-1.0&preserve-view=true).
157157
158158
Once users with the *ProxyAddresses* attribute applied are synchronized to Azure AD using Azure AD Connect, you need to enable the feature for users to sign-in with email as an alternate login ID for your tenant. This feature tells the Azure AD login servers to not only check the sign-in identifier against UPN values, but also against *ProxyAddresses* values for the email address.
159159

articles/active-directory/azuread-dev/azure-ad-endpoint-comparison.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,9 @@ ms.service: active-directory
99
ms.subservice: azuread-dev
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 07/17/2020
12+
ms.date: 11/09/2022
1313
ms.author: ryanwi
14-
ms.reviewer: marsma, ludwignick
14+
ms.reviewer: ludwignick
1515
ms.custom: aaddev
1616
ROBOTS: NOINDEX
1717
---

articles/active-directory/develop/howto-authenticate-service-principal-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.subservice: develop
1010
ms.custom: aaddev, devx-track-azurepowershell
1111
ms.topic: how-to
1212
ms.tgt_pltfrm: multiple
13-
ms.date: 10/11/2021
13+
ms.date: 11/09/2022
1414
ms.author: ryanwi
1515
ms.reviewer: tomfitz
1616
---

articles/active-directory/develop/msal-logging-dotnet.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ The following code snippets are examples of such an implementation. If you use t
6565

6666
#### Log level from configuration file
6767

68-
It's highly recommended to configure your code to use a configuration file in your environment to set the log level as it will enable your code to change the MSAL logging level without needing to rebuild or restart the application. This is critical for diagnostic purposes, enabling us to quickly gather the required logs from the application that is currently deployed and in production. Verbose logging can be costly so it's best to use the *Information* level by default and enable verbose logging when an issue is encountered. [See JSON configuration provider](https://docs.microsoft.com/aspnet/core/fundamentals/configuration#json-configuration-provider) for an example on how to load data from a configuration file without restarting the application.
68+
It's highly recommended to configure your code to use a configuration file in your environment to set the log level as it will enable your code to change the MSAL logging level without needing to rebuild or restart the application. This is critical for diagnostic purposes, enabling us to quickly gather the required logs from the application that is currently deployed and in production. Verbose logging can be costly so it's best to use the *Information* level by default and enable verbose logging when an issue is encountered. [See JSON configuration provider](/aspnet/core/fundamentals/configuration#json-configuration-provider) for an example on how to load data from a configuration file without restarting the application.
6969

7070
#### Log Level as Environment Variable
7171

articles/active-directory/develop/msal-net-token-cache-serialization.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -280,7 +280,7 @@ You can also specify options to limit the size of the in-memory token cache:
280280

281281
#### Distributed caches
282282

283-
If you use `app.AddDistributedTokenCache`, the token cache is an adapter against the .NET `IDistributedCache` implementation. So you can choose between a SQL Server cache, a Redis cache, an Azure Cosmos DB cache, or any other cache implementing the [IDistributedCache](/dotnet/api/microsoft.extensions.caching.distributed.idistributedcache?view=dotnet-plat-ext-6.0) interface.
283+
If you use `app.AddDistributedTokenCache`, the token cache is an adapter against the .NET `IDistributedCache` implementation. So you can choose between a SQL Server cache, a Redis cache, an Azure Cosmos DB cache, or any other cache implementing the [IDistributedCache](/dotnet/api/microsoft.extensions.caching.distributed.idistributedcache?view=dotnet-plat-ext-6.0&preserve-view=true) interface.
284284

285285
For testing purposes only, you may want to use `services.AddDistributedMemoryCache()`, an in-memory implementation of `IDistributedCache`.
286286

0 commit comments

Comments
 (0)