You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/v2-oauth2-implicit-grant-flow.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -66,6 +66,9 @@ If your application is a native client, the implicit flow isn’t a great fit. T
66
66
67
67
If you are developing a Web application that includes a backend, and consuming an API from its backend code, the implicit flow is also not a good fit. Other grants give you far more power. For example, the OAuth2 client credentials grant provides the ability to obtain tokens that reflect the permissions assigned to the application itself, as opposed to user delegations. This means the client has the ability to maintain programmatic access to resources even when a user is not actively engaged in a session, and so on. Not only that, but such grants give higher security guarantees. For instance, access tokens never transit through the user browser, they don’t risk being saved in the browser history, and so on. The client application can also perform strong authentication when requesting a token.
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/mondaycom-tutorial.md
+27-28Lines changed: 27 additions & 28 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,7 +55,6 @@ To configure the integration of monday.com into Azure AD, you need to add monday
55
55
1. In the **Add from the gallery** section, type **monday.com** in the search box.
56
56
1. Select **monday.com** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
57
57
58
-
59
58
## Configure and test Azure AD single sign-on for monday.com
60
59
61
60
Configure and test Azure AD SSO with monday.com using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in monday.com.
@@ -81,50 +80,50 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
81
80
82
81
1. On the **Basic SAML Configuration** section, if you have **Service Provider metadata file** and wish to configure in **IDP** initiated mode, perform the following steps:
c. After the metadata file is successfully uploaded, the **Identifier** and **Reply URL** values get auto populated in Basic SAML Configuration section.
91
+
c. After the metadata file is successfully uploaded, the **Identifier** and **Reply URL** values get auto populated in Basic SAML Configuration section.
93
92
94
-

93
+

95
94
96
-
> [!Note]
97
-
> If the **Identifier** and **Reply URL** values do not get populated automatically, then fill in the values manually. The **Identifier** and the **Reply URL** are the same and value is in the following pattern: `https://<your-domain>.monday.com/saml/saml_callback`
95
+
> [!Note]
96
+
> If the **Identifier** and **Reply URL** values do not get populated automatically, then fill in the values manually. The **Identifier** and the **Reply URL** are the same and value is in the following pattern: `https://<your-domain>.monday.com/saml/saml_callback`
98
97
99
98
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
In the **Sign-on URL** text box, type a URL using the following pattern:
102
+
In the **Sign-on URL** text box, type a URL using the following pattern:
104
103
`https://<YOUR_DOMAIN>.monday.com`
105
104
106
-
> [!NOTE]
107
-
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign-On URL. Contact [monday.com Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
105
+
> [!NOTE]
106
+
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign-On URL. Contact [monday.com Client support team](https://monday.com/contact-us/) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
108
107
109
108
1. monday.com application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
110
109
111
-

110
+

112
111
113
112
1. In addition to above, monday.com application expects few more attributes to be passed back in SAML response which are shown below. These attributes are also pre populated but you can review them as per your requirements.
114
113
115
-
| Name | Source Attribute|
116
-
| ---------------| --------------- |
117
-
| Email | user.mail |
114
+
| Name | Source Attribute|
115
+
|--|--|
116
+
| Email | user.mail |
118
117
| FirstName | user.givenname |
119
118
| LastName | user.surname |
120
119
121
120
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
139
138
1. Click **Create**.
@@ -150,7 +149,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
150
149
151
150
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
152
151
153
-

152
+

154
153
155
154
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
156
155
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
@@ -160,17 +159,17 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
160
159
161
160
1. To automate the configuration within monday.com, you need to install **My Apps Secure Sign-in browser extension** by clicking **Install the extension**.
1. After adding extension to the browser, click on **Setup monday.com** which will direct you to the monday.com application. From there, provide the admin credentials to sign into monday.com. The browser extension will automatically configure the application for you and automate steps 3-6.
166
165
167
-

166
+

168
167
169
168
1. If you want to setup monday.com manually, open a new web browser window and sign in to monday.com as an administrator and perform the following steps:
170
169
171
170
1. Go to the **Profile** on the top right corner of page and click on **Admin**.
>For more details refer [this](https://support.monday.com/hc/articles/360000460605-SAML-Single-Sign-on?abcb=34642) article
182
+
> [!NOTE]
183
+
> For more details refer [this](https://support.monday.com/hc/articles/360000460605-SAML-Single-Sign-on?abcb=34642) article
185
184
186
185
### Create monday.com test user
187
186
@@ -195,10 +194,10 @@ When you click the monday.com tile in the Access Panel, you should be automatica
195
194
196
195
## Additional resources
197
196
198
-
-[List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
197
+
-[List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
199
198
200
-
-[What is application access and single sign-on with Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
199
+
-[What is application access and single sign-on with Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
201
200
202
201
-[What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
203
202
204
-
-[Try monday.com with Azure AD](https://aad.portal.azure.com/)
203
+
-[Try monday.com with Azure AD](https://aad.portal.azure.com/)
Copy file name to clipboardExpand all lines: articles/azure-maps/how-to-search-for-address.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -222,5 +222,5 @@ If you have a set of coordinate locations to reverse geocode, you can use [Post
222
222
223
223
## Next steps
224
224
225
-
- Explore the [Azure Maps search service](https://docs.microsoft.com/rest/api/maps/search) API documentation.
226
-
- Learn about [Best practices](https://docs.microsoft.com/azure/azure-maps/how-to-use-best-practices-for-search).
225
+
- Explore the [Azure Maps Search Service REST API documentation](https://docs.microsoft.com/rest/api/maps/search).
226
+
- Learn about [Azure Maps Search Service best practices](https://docs.microsoft.com/azure/azure-maps/how-to-use-best-practices-for-search) and how to optimize your queries.
Copy file name to clipboardExpand all lines: articles/azure-monitor/platform/gateway.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -332,7 +332,7 @@ An error in step 3 means that the module wasn't imported. The error might occur
332
332
|`Get-OMSGatewayConfig`|Key |Gets the configuration of the service |`Get-OMSGatewayConfig`|
333
333
|`Set-OMSGatewayConfig`|Key (required) <br> Value |Changes the configuration of the service |`Set-OMSGatewayConfig -Name ListenPort -Value 8080`|
334
334
|`Get-OMSGatewayRelayProxy`||Gets the address of relay (upstream) proxy |`Get-OMSGatewayRelayProxy`|
335
-
|`Set-OMSGatewayRelayProxy`|Address<br> Username<br> Password |Sets the address (and credential) of relay (upstream) proxy |1. Set a relay proxy and credential:<br> `Set-OMSGatewayRelayProxy`<br>`-Address http://www.myproxy.com:8080`<br>`-Username user1 -Password 123` <br><br> 2. Set a relay proxy that doesn't need authentication: `Set-OMSGatewayRelayProxy`<br> `-Address http://www.myproxy.com:8080` <br><br> 3. Clear the relay proxy setting:<br> `Set-OMSGatewayRelayProxy` <br> `-Address ""`|
335
+
|`Set-OMSGatewayRelayProxy`|Address<br> Username<br> Password (secure string) |Sets the address (and credential) of relay (upstream) proxy |1. Set a relay proxy and credential:<br> `Set-OMSGatewayRelayProxy`<br>`-Address http://www.myproxy.com:8080`<br>`-Username user1 -Password 123` <br><br> 2. Set a relay proxy that doesn't need authentication: `Set-OMSGatewayRelayProxy`<br> `-Address http://www.myproxy.com:8080` <br><br> 3. Clear the relay proxy setting:<br> `Set-OMSGatewayRelayProxy` <br> `-Address ""`|
336
336
|`Get-OMSGatewayAllowedHost`||Gets the currently allowed host (only the locally configured allowed host, not automatically downloaded allowed hosts) |`Get-OMSGatewayAllowedHost`|
337
337
|`Add-OMSGatewayAllowedHost`|Host (required) |Adds the host to the allowed list |`Add-OMSGatewayAllowedHost -Host www.test.com`|
338
338
|`Remove-OMSGatewayAllowedHost`|Host (required) |Removes the host from the allowed list |`Remove-OMSGatewayAllowedHost`<br> `-Host www.test.com`|
Copy file name to clipboardExpand all lines: articles/azure-monitor/platform/partners.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -45,7 +45,7 @@ You can create JIRA tickets on Azure Monitor alerts.
45
45
46
46

47
47
48
-
Circonus is a microservices monitoring and analytics platform built for on premises or SaaS deployment. It is fully automatable API-Centric platform is more scalable and reliable than systems it monitors. Developed for the requirements of DevOps, Circonus delivers percentile-based alerts, graphs, dashboards, and machine-learning intelligence that enable business optimization. Circonus monitors your Microsoft Azure cloud resources and their applications in real time. You can use Circonus to collect and track metrics for the variables you want to measure for your resources and applications. With Circonus, you gain system-wide visibility into Azure's resource utilization, application performance, and operational health.
48
+
Circonus is the machine data intelligence expert, providing the only machine data intelligence platform capable of handling billions of metric streams in real time to drive unprecedented business insight and value. Use Circonus to collect, track, and visualize key metrics related to your Microsoft Azure setup. Gain system-wide visibility into Azure’s resource utilization, application performance, and operational health.
Copy file name to clipboardExpand all lines: articles/frontdoor/front-door-faq.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -115,6 +115,9 @@ A new Front Door creation or any updates to an existing Front Door takes about 3
115
115
116
116
Note - Custom SSL certificate updates take about 30 minutes to be deployed globally.
117
117
118
+
Any updates to routes or backend pools etc. are seamless and will cause zero downtime (if the new configuration is correct). Certificate updates are also atomic and will not cause any outage, unless switching from 'AFD Managed' to 'Use your own cert' or vice versa.
119
+
120
+
118
121
## Configuration
119
122
120
123
### Can Azure Front Door load balance or route traffic within a virtual network?
Copy file name to clipboardExpand all lines: includes/iot-hub-cli-version-info.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,8 +12,9 @@
12
12
> [!NOTE]
13
13
> This article uses the newest version of the Azure IoT extension, called `azure-iot`. The legacy version is called `azure-iot-cli-ext`.You should only have one version installed at a time. You can use the command `az extension list` to validate the currently installed extensions.
14
14
>
15
-
> Use `az extension remove azure-iot-cli-ext` to remove the legacy version of the extension.
16
-
> Use `az extension add -name azure-iot` to add the new version of the extension.
15
+
> Use `az extension remove --name azure-cli-iot-ext` to remove the legacy version of the extension.
17
16
>
18
-
> To see what extensions you have installed, use `az extension show `.
17
+
> Use `az extension add --name azure-iot` to add the new version of the extension.
18
+
>
19
+
> To see what extensions you have installed, use `az extension list`.
0 commit comments