Skip to content

Commit ace0934

Browse files
committed
Merge branch 'patch-5' of https://github.com/MikeRayMSFT/azure-docs into 240611-update-output-arc-data
2 parents 9a06e20 + 9429a6c commit ace0934

File tree

6 files changed

+16
-9
lines changed

6 files changed

+16
-9
lines changed

articles/active-directory-b2c/localization-string-ids.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -532,7 +532,7 @@ The following IDs are used for an [Microsoft Entra ID multifactor authentication
532532
| `UserMessageIfMaxAllowedCodeRetryReached` | Wrong code entered too many times, please try again later.|
533533
| `UserMessageIfServerError` | Cannot use MFA service, please try again later.|
534534
| `UserMessageIfThrottled` | Your request has been throttled, please try again later.|
535-
| `UserMessageIfWrongCodeEntered` |Wrong code entered, please try again.|
535+
| `UserMessageIfIncorrectOTPCodeEntered` |Wrong code entered, please try again.|
536536

537537
<a name='azure-ad-mfa-example'></a>
538538

@@ -684,4 +684,4 @@ This example shows localized messages for CAPTCHA display control.
684684
See the following articles for localization examples:
685685

686686
- [Language customization with custom policy in Azure AD B2C](language-customization.md)
687-
- [Language customization with user flows in Azure AD B2C](language-customization.md)
687+
- [Language customization with user flows in Azure AD B2C](language-customization.md)

articles/api-management/api-management-howto-api-inspector.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ Enable tracing by the following steps using calls to the API Management REST API
9090
{
9191
"credentialsExpireAfter": PT1H,
9292
"apiId": "<API resource ID>",
93-
"purposes: ["tracing"]
93+
"purposes": ["tracing"]
9494
}
9595
```
9696

articles/app-service/configure-common.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -212,10 +212,15 @@ At runtime, connection strings are available as environment variables, prefixed
212212
* MySQL: `MYSQLCONNSTR_`
213213
* SQLAzure: `SQLAZURECONNSTR_`
214214
* Custom: `CUSTOMCONNSTR_`
215-
* PostgreSQL: `POSTGRESQLCONNSTR_`
215+
* PostgreSQL: `POSTGRESQLCONNSTR_`
216+
* Notification Hub: `NOTIFICATIONHUBCONNSTR_`
217+
* Service Bus: `SERVICEBUSCONNSTR_`
218+
* Event Hub: `EVENTHUBCONNSTR_`
219+
* Document Db: `DOCDBCONNSTR_`
220+
* Redis Cache: `REDISCACHECONNSTR_`
216221

217222
>[!Note]
218-
> .NET apps targeting PostgreSQL should set the connection string to **Custom** as workaround for a [knows issue in .NET EnvironmentVariablesConfigurationProvider](https://github.com/dotnet/runtime/issues/36123)
223+
> .NET apps targeting PostgreSQL, Notification Hub, Service Bus, Event Hub, Document Db and Redis Cache should set the connection string to **Custom** as workaround for a [known issue in .NET EnvironmentVariablesConfigurationProvider](https://github.com/dotnet/runtime/issues/36123)
219224
>
220225
221226
For example, a MySQL connection string named *connectionstring1* can be accessed as the environment variable `MYSQLCONNSTR_connectionString1`. For language-stack specific steps, see:

articles/azure-arc/data/upload-logs.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ Example output:
4040

4141
```output
4242
{
43-
"customerId": "d6abb435-2626-4df1-b887-445fe44a4123",
43+
"customerId": "00000000-0000-0000-0000-000000000000",
4444
"eTag": null,
4545
"id": "/subscriptions/<Subscription ID>/resourcegroups/user-arc-demo/providers/microsoft.operationalinsights/workspaces/user-logworkspace",
4646
"location": "eastus",
@@ -93,8 +93,8 @@ Example output:
9393

9494
```output
9595
{
96-
"primarySharedKey": "JXzQp1RcGgjXFCDS3v0sXoxPvbgCoGaIv35lf11Km2WbdGFvLXqaydpaj1ByWGvKoCghL8hL4BRoypXxkLr123==",
97-
"secondarySharedKey": "p2XHSxLJ4o9IAqm2zINcEmx0UWU5Z5EZz8PQC0OHpFjdpuVaI0zsPbTv5VyPFgaCUlCZb2yEbkiR4eTuTSF123=="
96+
"primarySharedKey": "<primarySharedKey>==",
97+
"secondarySharedKey": "<secondarySharedKey>=="
9898
}
9999
```
100100

articles/storage/common/authorize-data-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ The following section briefly describes the authorization options for Azure Stor
8080

8181
- **Shared Key authorization**: Applies to blobs, files, queues, and tables. A client using Shared Key passes a header with every request that is signed using the storage account access key. For more information, see [Authorize with Shared Key](/rest/api/storageservices/authorize-with-shared-key/).
8282

83-
Microsoft recommends that you disallow Shared Key authorization for your storage account. When Shared Key authorization is disallowed, clients must use Microsoft Entra ID or a user delegation SAS to authorize requests for data in that storage account. For more information, see [Prevent Shared Key authorization for an Azure Storage account](shared-key-authorization-prevent.md).
83+
The storage account access key should be used with caution. Anyone who has the access key is able to authorize requests against the storage account, and effectively has access to all the data. Microsoft recommends that you disallow Shared Key authorization for your storage account. When Shared Key authorization is disallowed, clients must use Microsoft Entra ID or a user delegation SAS to authorize requests for data in that storage account. For more information, see [Prevent Shared Key authorization for an Azure Storage account](shared-key-authorization-prevent.md).
8484

8585
- **Shared access signatures** for blobs, files, queues, and tables. Shared access signatures (SAS) provide limited delegated access to resources in a storage account via a signed URL. The signed URL specifies the permissions granted to the resource and the interval over which the signature is valid. A service SAS or account SAS is signed with the account key, while the user delegation SAS is signed with Microsoft Entra credentials and applies to blobs only. For more information, see [Using shared access signatures (SAS)](storage-sas-overview.md).
8686

articles/virtual-network/what-is-ip-address-168-63-129-16.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,8 @@ The public IP address 168.63.129.16 is used in all regions and all national clou
3535

3636
By default DNS communication isn't subject to the configured network security groups unless targeted using the [AzurePlatformDNS](../virtual-network/service-tags-overview.md#available-service-tags) service tag. To block DNS traffic to Azure DNS through NSG, create an outbound rule to deny traffic to [AzurePlatformDNS](../virtual-network/service-tags-overview.md#available-service-tags). Specify **"Any"** as **"Source"**, **"*"** as **"Destination port ranges"**, **"Any"** as protocol and **"Deny"** as action.
3737

38+
Additionally, the IP address 168.63.129.16 does not support reverse DNS lookup. This means if you try to retrieve the Fully Qualified Domain Name (FQDN) using reverse lookup commands like `host`, `nslookup`, or `dig -x` on 168.63.129.16, you won't receive any FQDN.
39+
3840
- When the VM is part of a load balancer backend pool, [health probe](../load-balancer/load-balancer-custom-probe-overview.md) communication should be allowed to originate from 168.63.129.16. The default network security group configuration has a rule that allows this communication. This rule uses the [AzureLoadBalancer](../virtual-network/service-tags-overview.md#available-service-tags) service tag. If desired, this traffic can be blocked by configuring the network security group. The configuration of the block result in probes that fail.
3941

4042
## Troubleshoot connectivity

0 commit comments

Comments
 (0)