Skip to content

Commit ac42b2d

Browse files
authored
Merge pull request #292390 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents d1b6033 + 8dd3190 commit ac42b2d

10 files changed

+11
-11
lines changed

articles/active-directory-b2c/add-api-connector-token-enrichment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -169,7 +169,7 @@ A claim provides temporary storage of data during an Azure AD B2C policy executi
169169
</ClaimType>
170170
```
171171
## Add the RESTful API technical profile
172-
A [Restful technical profile](restful-technical-profile.md) provides support for interfacing with your own RESTful service. Azure AD B2C sends data to the RESTful service in an `InputClaims` collection and receives data back in an `OutputClaims` collection. Find the **ClaimsProviders** element in your <em>**`TrustFrameworkExtensions.xml`**</em> file and add a new claims provider as follows:
172+
A [RESTful technical profile](restful-technical-profile.md) provides support for interfacing with your own RESTful service. Azure AD B2C sends data to the RESTful service in an `InputClaims` collection and receives data back in an `OutputClaims` collection. Find the **ClaimsProviders** element in your <em>**`TrustFrameworkExtensions.xml`**</em> file and add a new claims provider as follows:
173173
```xml
174174
<ClaimsProvider>
175175
<DisplayName>REST APIs</DisplayName>

articles/active-directory-b2c/add-api-connector.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -442,7 +442,7 @@ A claim provides temporary storage of data during an Azure AD B2C policy executi
442442

443443
## Add the RESTful API technical profile
444444

445-
A [Restful technical profile](restful-technical-profile.md) provides support for interfacing to your own RESTful service. Azure AD B2C sends data to the RESTful service in an `InputClaims` collection and receives data back in an `OutputClaims` collection. Find the **ClaimsProviders** element and add a new claims provider as follows:
445+
A [RESTful technical profile](restful-technical-profile.md) provides support for interfacing to your own RESTful service. Azure AD B2C sends data to the RESTful service in an `InputClaims` collection and receives data back in an `OutputClaims` collection. Find the **ClaimsProviders** element and add a new claims provider as follows:
446446

447447
```xml
448448
<ClaimsProvider>

articles/active-directory-b2c/custom-policy-reference-sso.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -291,7 +291,7 @@ To use the `SM-Saml-issuer` session management technical profile, add a referenc
291291
The `NoopSSOSessionProvider` session provider is used to suppress single sign on behavior. Technical profiles that use this type of session provider will always be processed, even when the user has an active session. This type of session provider can be useful to force particular technical profiles to always run, for example:
292292

293293
- [Claims transformation](claims-transformation-technical-profile.md) - To create, or transform claims that are later used to determine which orchestration steps to process or skip.
294-
- [Restful](restful-technical-profile.md) - Fetch updated data from a Restful service each time the policy runs. You can also call a Restful for extended logging, and auditing.
294+
- [RESTful](restful-technical-profile.md) - Fetch updated data from a RESTful service each time the policy runs. You can also call a RESTful for extended logging, and auditing.
295295
- [Self-asserted](self-asserted-technical-profile.md) - Force the user to provide data each time the policy runs. For example, verify emails with one-time pass-code, or ask the user's consent.
296296
- [Phonefactor](phone-factor-technical-profile.md) - Force the user to perform multifactor authentication as part of a "step up authentication" even during subsequent logons (single sign-on).
297297

articles/active-directory-b2c/identity-provider-google.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ To enable sign-in for users with a Google account in Azure Active Directory B2C
5151
1. In the **Authorized domains** section, enter *b2clogin.com*.
5252
1. In the **Developer contact information** section, enter comma separated emails for Google to notify you about any changes to your project.
5353
1. Select **Save**.
54-
1. Select **Credentials** in the left menu, and then select **Create credentials** > **Oauth client ID**.
54+
1. Select **Credentials** in the left menu, and then select **Create credentials** > **OAuth client ID**.
5555
1. Under **Application type**, select **Web application**.
5656
1. Enter a **Name** for your application.
5757
1. For the **Authorized JavaScript origins**, enter `https://your-tenant-name.b2clogin.com`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name`.

articles/api-management/api-management-howto-integrate-internal-vnet-appgateway.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ In the first setup example, all your APIs are managed only from within your virt
6161
* **Back-end server pool**: This server pool is the internal virtual IP address of API Management.
6262
* **Back-end server pool settings**: Every pool has settings like port, protocol, and cookie-based affinity. These settings are applied to all servers within the pool.
6363
* **Front-end port**: This public port is opened on the application gateway. Traffic that hits it gets redirected to one of the back-end servers.
64-
* **Listener**: The listener has a front-end port, a protocol (Http or Https, these values are case sensitive), and the Transport Layer Security (TLS) certificate name (if configuring TLS offload).
64+
* **Listener**: The listener has a front-end port, a protocol (HTTP or HTTPS, these values are case sensitive), and the Transport Layer Security (TLS) certificate name (if configuring TLS offload).
6565
* **Rule**: The rule binds a listener to a back-end server pool.
6666
* **Custom health probe**: Application Gateway, by default, uses IP address-based probes to figure out which servers in `BackendAddressPool` are active. API Management only responds to requests with the correct host header, so the default probes fail. You define a custom health probe to help the application gateway determine that the service is alive and should forward requests.
6767
* **Custom domain certificates**: To access API Management from the internet, create Domain Name System (DNS) records to map its host names to the Application Gateway front-end IP address. This mapping ensures that the Host header and certificate sent to API Management are valid. In this example, we use three certificates. They're for API Management's gateway (the back end), the developer portal, and the management endpoint.

articles/app-service/app-service-web-nodejs-best-practices-and-troubleshoot-guide.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -249,7 +249,7 @@ The `cnodeconstants` [source file](https://github.com/Azure/iisnode/blob/master/
249249

250250
Enable FREB for your application to see the win32 error code (be sure you enable FREB only on non-production sites for performance reasons).
251251

252-
| Http Status | Http Substatus | Possible Reason? |
252+
| HTTP Status | HTTP Substatus | Possible Reason? |
253253
| --- | --- | --- |
254254
| 500 |1000 |There was some issue dispatching the request to IISNODE – Check if node.exe was started. Node.exe could have crashed when starting. Check your web.config configuration for errors. |
255255
| 500 |1001 |- Win32Error 0x2 - App is not responding to the URL. Check the URL rewrite rules or check if your express app has the correct routes defined. - Win32Error 0x6d – named pipe is busy – Node.exe is not accepting requests because the pipe is busy. Check high cpu usage. - Other errors – check if node.exe crashed. |

articles/app-service/web-sites-monitor.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ You can increase or remove quotas from your app by upgrading your App Service pl
6060
> [!NOTE]
6161
> Metrics for an app include the requests to the app's SCM site(Kudu). This includes requests to view the site's logstream using Kudu. Logstream requests may span several minutes, which will affect the Request Time metrics. Users should be aware of this relationship when using these metrics with autoscale logic.
6262
>
63-
> **Http Server Errors** only records requests that reach the backend service (the worker(s) hosting the app). If the requests are failing at the FrontEnd, they are not recorded as Http Server Errors. The [Health Check feature](./monitor-instances-health-check.md) / Application Insights availability tests can be used for outside in monitoring.
63+
> **HTTP Server Errors** only records requests that reach the backend service (the worker(s) hosting the app). If the requests are failing at the FrontEnd, they are not recorded as HTTP Server Errors. The [Health Check feature](./monitor-instances-health-check.md) / Application Insights availability tests can be used for outside in monitoring.
6464
6565
Metrics provide information about the app or the App Service plan's behavior.
6666

articles/application-gateway/application-gateway-ilb-arm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ This article walks you through the steps to configure a Standard v1 Application
2929
* **Backend server pool:** The list of IP addresses of the backend servers. The IP addresses listed should either belong to the virtual network but in a different subnet for the application gateway or should be a public IP/VIP.
3030
* **Backend server pool settings:** Every pool has settings like port, protocol, and cookie-based affinity. These settings are tied to a pool and are applied to all servers within the pool.
3131
* **Frontend port:** This port is the public port that is opened on the application gateway. Traffic hits this port, and then gets redirected to one of the backend servers.
32-
* **Listener:** The listener has a frontend port, a protocol (Http or Https, these are case-sensitive), and the SSL certificate name (if configuring SSL offload).
32+
* **Listener:** The listener has a frontend port, a protocol (HTTP or HTTPS, these are case-sensitive), and the SSL certificate name (if configuring SSL offload).
3333
* **Rule:** The rule binds the listener and the backend server pool and defines which backend server pool the traffic should be directed to when it hits a particular listener. Currently, only the *basic* rule is supported. The *basic* rule is round-robin load distribution.
3434

3535
## Create an application gateway

articles/automation/troubleshoot/update-agent-issues.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -140,7 +140,7 @@ $endpoint = $jrdsEndpointLocationMoniker + “-jobruntimedata-prod-su1.azure-aut
140140
(Test-NetConnection -ComputerName $endpoint -Port 443 -WarningAction SilentlyContinue).TcpTestSucceeded
141141
```
142142

143-
### Https connection
143+
### HTTPS connection
144144
Simplifies the ongoing management of your network security rules. Allow the [prerequisite URLs](../automation-network-configuration.md#update-management-and-change-tracking-and-inventory).
145145

146146
After the network changes, you can either rerun the Troubleshooter or run the below commands to validate:
@@ -413,7 +413,7 @@ CheckResultMessageArguments :
413413
414414
RuleId : HttpsConnection
415415
RuleGroupId : connectivity
416-
RuleName : Https connection
416+
RuleName : HTTPS connection
417417
RuleGroupName : connectivity
418418
RuleDescription : Check if VM is able to make https requests.
419419
CheckResult : Passed

articles/sentinel/data-connectors/google-workspace-g-suite.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -135,7 +135,7 @@ To integrate with Google Workspace (G Suite) (using Azure Functions) make sure y
135135
3. In Scopes section, add **Admin SDK API** scope.
136136
4. In Test Users section, make sure the domain admin account is added.
137137
5. Go to ***APIs & Services*** -> ***Credentials*** and create OAuth 2.0 Client ID
138-
1. Click on Create Credentials on the top and select Oauth client Id.
138+
1. Click on Create Credentials on the top and select OAuth client Id.
139139
2. Select Web Application from the Application Type drop down.
140140
3. Provide a suitable name to the Web App and add http://localhost:8081/ as one of the Authorized redirect URIs.
141141
4. Once you click Create, download the JSON from the pop-up that appears. Rename this file to "**credentials.json**".

0 commit comments

Comments
 (0)