Skip to content

Commit b9faf1b

Browse files
authored
Merge pull request #235788 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents a40d364 + b159b73 commit b9faf1b

File tree

12 files changed

+32
-11
lines changed

12 files changed

+32
-11
lines changed

articles/active-directory/external-identities/authentication-conditional-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ When an Azure AD organization shares resources with external users with an ident
4646

4747
The following diagram illustrates the authentication flow when an external user signs in with an account from a non-Azure AD identity provider, such as Google, Facebook, or a federated SAML/WS-Fed identity provider.
4848

49-
[ ![Diagram showing the Authentication flow for B2B guest users from an external directory.](media/authentication-conditional-access/authentication-flow-b2b-guests.png) ](media/authentication-conditional-access/authentication-flow-b2b-guests.png#lightbox))
49+
[ ![Diagram showing the Authentication flow for B2B guest users from an external directory.](media/authentication-conditional-access/authentication-flow-b2b-guests.png) ](media/authentication-conditional-access/authentication-flow-b2b-guests.png#lightbox)
5050

5151
| Step | Description |
5252
|--------------|-----------------------|

articles/active-directory/fundamentals/secure-external-access-resources.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ Both methods have drawbacks. For more information, see the following table.
3939
| Area of concern | Local credentials | Federation |
4040
|----|---|---|
4141
| Security | - Access continues after external user terminates<br> - UserType is Member by default, which grants too much default access | - No user-level visibility <br> - Unknown partner security posture|
42-
| Expense | - Password and multi-factor authentication (MFA) management<br> - Onboarding process<br> - Identity cleanup<br> - Overhead of running a separate directory | Small partners can't afford the infrastructure, lack expertise, and might user consumer email|
42+
| Expense | - Password and multi-factor authentication (MFA) management<br> - Onboarding process<br> - Identity cleanup<br> - Overhead of running a separate directory | Small partners can't afford the infrastructure, lack expertise, and might use consumer email|
4343
| Complexity | Partner users manage more credentials | Complexity grows with each new partner, and increased for partners|
4444

4545
Azure Active Directory (Azure AD) B2B integrates with other tools in Azure AD, and Microsoft 365 services. Azure AD B2B simplifies collaboration, reduces expense, and increases security.

articles/api-management/api-management-revisions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ You can set a revision as current using the Azure portal. If you use PowerShell,
4545

4646
## Revision descriptions
4747

48-
When you create a revision, you can set a description for your own tracking purposes. Descriptions aren't played to your API users.
48+
When you create a revision, you can set a description for your own tracking purposes. Descriptions aren't displayed to your API users.
4949

5050
When you set a revision as current you can also optionally specify a public change log note. The change log is included in the developer portal for your API users to view. You can modify your change log note using the `Update-AzApiManagementApiRelease` PowerShell cmdlet.
5151

articles/api-management/how-to-server-sent-events.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,11 +40,13 @@ Follow these guidelines when using API Management to reach a backend API that im
4040

4141
* **Avoid other policies that buffer responses** - Certain policies such as [`validate-content`](validate-content-policy.md) can also buffer response content and shouldn't be used with APIs that implement SSE.
4242

43+
* **Avoid logging request/response body for Azure Monitor and Application Insights** - You can configure API request logging for Azure Monitor or Application Insights using diagnostic settings. The diagnostic settings allow you to log the request/response body at various stages of the request execution. For APIs that implement SSE, this can cause unexpected buffering which can lead to problems. Diagnostic settings for Azure Monitor and Application Insights configured at the global/All APIs scope apply to all APIs in the service. You can override the settings for individual APIs as needed. For APIs that implement SSE, ensure you have disabled request/response body logging for Azure Monitor and Application Insights.
44+
4345
* **Disable response caching** - To ensure that notifications to the client are timely, verify that [response caching](api-management-howto-cache.md) isn't enabled. For more information, see [API Management caching policies](api-management-caching-policies.md).
4446

4547
* **Test API under load** - Follow general practices to test your API under load to detect performance or configuration issues before going into production.
4648

4749
## Next steps
4850

4951
* Learn more about [configuring policies](./api-management-howto-policies.md) in API Management.
50-
* Learn about API Management [capacity](api-management-capacity.md).
52+
* Learn about API Management [capacity](api-management-capacity.md).

articles/api-management/set-body-policy.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -100,6 +100,9 @@ The `set-body` policy can be configured to use the [Liquid](https://shopify.gith
100100
> [!IMPORTANT]
101101
> In order to correctly bind to an XML body using the Liquid template, use a `set-header` policy to set Content-Type to either application/xml, text/xml (or any type ending with +xml); for a JSON body, it must be application/json, text/json (or any type ending with +json).
102102
103+
> [!IMPORTANT]
104+
> Liquid templates use the request/response body in the current execution pipeline as their input. For this reason, liquid templates do not work when used inside a return-response policy. A return-response policy cancels the current execution pipeline and removes the request/response body. As a result, any liquid template used inside the return-response will receive an empty string as its input and will not produced the expected output.
105+
103106
### Supported Liquid filters
104107

105108
The following Liquid filters are supported in the `set-body` policy. For filter examples, see the [Liquid documentation](https://shopify.github.io/liquid/).
@@ -268,4 +271,4 @@ The following example uses the `AsFormUrlEncodedContent()` expression to access
268271

269272
* [API Management transformation policies](api-management-transformation-policies.md)
270273

271-
[!INCLUDE [api-management-policy-ref-next-steps](../../includes/api-management-policy-ref-next-steps.md)]
274+
[!INCLUDE [api-management-policy-ref-next-steps](../../includes/api-management-policy-ref-next-steps.md)]

articles/applied-ai-services/form-recognizer/concept-invoice.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -172,7 +172,7 @@ See how data, including customer information, vendor details, and line items, is
172172
| &bullet; French (fr) | France (fr) |
173173
| &bullet; Italian (it) | Italy (it)|
174174
| &bullet; Portuguese (pt) | Portugal (pt), Brazil (br)|
175-
| &bullet; Dutch (de) | Netherlands (de)|
175+
| &bullet; Dutch (nl) | Netherlands (nl)|
176176

177177
## Field extraction
178178

articles/azure-monitor/essentials/prometheus-remote-write-active-directory.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -226,7 +226,7 @@ This step is only required if you didn't enable Azure Key Vault Provider for Sec
226226
| Value | Description |
227227
|:---|:---|
228228
| `<CLUSTER-NAME>` | Name of your AKS cluster |
229-
| `<CONTAINER-IMAGE-VERSION>` | `mcr.microsoft.com/azuremonitor/prometheus/promdev/prom-remotewrite:prom-remotewrite-20221103.1`<br>This is the remote write container image version. |
229+
| `<CONTAINER-IMAGE-VERSION>` | `mcr.microsoft.com/azuremonitor/prometheus/promdev/prom-remotewrite:prom-remotewrite-20230323.1`<br>This is the remote write container image version. |
230230
| `<INGESTION-URL>` | **Metrics ingestion endpoint** from the **Overview** page for the Azure Monitor workspace |
231231
| `<APP-REGISTRATION -CLIENT-ID> ` | Client ID of your application |
232232
| `<TENANT-ID> ` | Tenant ID of the Azure Active Directory application |

articles/azure-monitor/essentials/prometheus-remote-write-managed-identity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -152,7 +152,7 @@ This step isn't required if you're using an AKS identity since it will already h
152152
| Value | Description |
153153
|:---|:---|
154154
| `<AKS-CLUSTER-NAME>` | Name of your AKS cluster |
155-
| `<CONTAINER-IMAGE-VERSION>` | `mcr.microsoft.com/azuremonitor/prometheus/promdev/prom-remotewrite:prom-remotewrite-20221103.1`<br>This is the remote write container image version. |
155+
| `<CONTAINER-IMAGE-VERSION>` | `mcr.microsoft.com/azuremonitor/prometheus/promdev/prom-remotewrite:prom-remotewrite-20230323.1`<br>This is the remote write container image version. |
156156
| `<INGESTION-URL>` | **Metrics ingestion endpoint** from the **Overview** page for the Azure Monitor workspace |
157157
| `<MANAGED-IDENTITY-CLIENT-ID>` | **Client ID** from the **Overview** page for the managed identity |
158158
| `<CLUSTER-NAME>` | Name of the cluster Prometheus is running on |

articles/bastion/kerberos-authentication-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ This article shows you how to configure Azure Bastion to use Kerberos authentica
1616

1717
## Considerations
1818

19-
* During Preview, the Kerberos setting for Azure Bastion can be configured in the Azure portal only.
19+
* During Preview, the Kerberos setting for Azure Bastion can be configured in the Azure portal only and not with native client.
2020
* VMs migrated from on-premises to Azure are not currently supported for Kerberos. 
2121
* Cross-realm authentication is not currently supported for Kerberos. 
2222
* Changes to DNS server are not currently supported for Kerberos. After making any changes to DNS server, you will need to delete and re-create the Bastion resource.

articles/healthcare-apis/azure-api-for-fhir/release-notes.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,12 @@ Azure API for FHIR provides a fully managed deployment of the Microsoft FHIR Ser
1818
> [!Note]
1919
> Azure Health Data services is the evolved version of Azure API for FHIR enabling customers to manage FHIR, DICOM, and MedTech services with integrations into other Azure Services. To learn about Azure Health Data Services [click here](https://azure.microsoft.com/products/health-data-services/).
2020
21+
## **April 2023**
22+
23+
**Fixed transient issues associated with loading custom search parameters**
24+
This bug fix address the issue, where the FHIR service would not load the latest SearchParameter status in event of failure.
25+
For more details, visit [#3222](https://github.com/microsoft/fhir-server/pull/3222)
26+
2127
## **November 2022**
2228

2329
**Fixed the Error generated when resource is updated using if-match header and PATCH**

0 commit comments

Comments
 (0)