Skip to content

Commit c2ed898

Browse files
authored
Merge pull request #213162 from MicrosoftDocs/main
Publish to live, Friday 4AM PST 9/30
2 parents b132f58 + ddcb9ce commit c2ed898

File tree

138 files changed

+2060
-2064
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

138 files changed

+2060
-2064
lines changed

.openpublishing.redirection.json

Lines changed: 17 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6308,6 +6308,21 @@
63086308
"redirect_url": "/azure/storage/blobs/storage-auth-abac",
63096309
"redirect_document_id": false
63106310
},
6311+
{
6312+
"source_path": "articles/storage/blobs/reference.md",
6313+
"redirect_url": "/azure/storage/blobs/storage-blobs-introduction",
6314+
"redirect_document_id": false
6315+
},
6316+
{
6317+
"source_path": "articles/storage/queues/reference.md",
6318+
"redirect_url": "/azure/storage/queues/storage-queues-introduction",
6319+
"redirect_document_id": false
6320+
},
6321+
{
6322+
"source_path": "articles/storage/files/reference.md",
6323+
"redirect_url": "/azure/storage/files/storage-files-introduction",
6324+
"redirect_document_id": false
6325+
},
63116326
{
63126327
"source_path_from_root": "/articles/storage/storage-client-side-encryption.md",
63136328
"redirect_url": "/azure/storage/common/storage-client-side-encryption",
@@ -21271,12 +21286,12 @@
2127121286
{
2127221287
"source_path_from_root": "/articles/storage/vs-storage-cloud-services-getting-started-queues.md",
2127321288
"redirect_url": "/azure/visual-studio/vs-storage-cloud-services-getting-started-queues",
21274-
"redirect_document_id": true
21289+
"redirect_document_id": false
2127521290
},
2127621291
{
2127721292
"source_path_from_root": "/articles/storage/vs-storage-cloud-services-getting-started-tables.md",
2127821293
"redirect_url": "/azure/visual-studio/vs-storage-cloud-services-getting-started-tables",
21279-
"redirect_document_id": true
21294+
"redirect_document_id": false
2128021295
},
2128121296
{
2128221297
"source_path_from_root": "/articles/storage/vs-storage-cloud-services-what-happened.md",

articles/active-directory/app-provisioning/customize-application-attributes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -204,7 +204,7 @@ Use the steps below to provision roles for a user to your application. Note that
204204
![Add SingleAppRoleAssignment](./media/customize-application-attributes/edit-attribute-singleapproleassignment.png)
205205
- **Things to consider**
206206
- Ensure that multiple roles are not assigned to a user. We cannot guarantee which role will be provisioned.
207-
207+
- SingleAppRoleAssignments is not compatible with setting scope to "Sync All users and groups."
208208
- **Example request (POST)**
209209

210210
```json

articles/active-directory/manage-apps/toc.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -212,9 +212,9 @@
212212
href: silverfort-azure-ad-integration.md
213213
- name: Single sign-on
214214
items:
215-
- name: Enable single sign-on with SAML
216-
href: add-application-portal-setup-oidc-sso.md
217-
- name: Enable Linked based single sign-on
215+
- name: Enable Single sign-on with SAML
216+
href: add-application-portal-setup-sso.md
217+
- name: Enable Linked single sign-on
218218
href: configure-linked-sign-on.md
219219
- name: Enable OpenID Connect based single sign-on
220220
href: add-application-portal-setup-oidc-sso.md

articles/active-directory/saas-apps/lusid-tutorial.md

Lines changed: 3 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 07/21/2022
12+
ms.date: 09/29/2022
1313
ms.author: jeedes
1414

1515
---
@@ -82,16 +82,10 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8282
b. In the **Reply URL** textbox, type a URL using the following pattern:
8383
`https://<CustomerDomain>.identity.lusid.com/sso/saml2/<ID>`
8484

85-
1. Click **Set additional URLs** and perform the following steps, if you wish to configure the application in **SP** initiated mode:
86-
87-
a. In the **Sign-on URL** text box, type a URL using the following pattern:
88-
`https://<CustomerDomain>.lusid.com/ `
89-
90-
b. In the **Relay State** text box, type a URL using the following pattern:
91-
`https://<CustomerDomain>.lusid.com/app/home`
85+
1. If you wish to configure the application in **SP** initiated mode, click **Set additional URLs** and type a URL in the **Relay State** text box using the following pattern: `https://<CustomerDomain>.lusid.com/app/home`
9286

9387
> [!Note]
94-
> These values are not real. Update these values with the actual Identifier, Reply URL, Sign on URL and Relay State URL. Contact [LUSID support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
88+
> These values are not real. Update these values with the actual Identifier, Reply URL, and Relay State URL. Contact [LUSID support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
9589
9690
1. LUSID application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
9791

28.3 KB
Loading
26.6 KB
Loading

articles/active-directory/saas-apps/zola-tutorial.md

Lines changed: 12 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 09/06/2022
12+
ms.date: 09/27/2022
1313
ms.author: jeedes
1414

1515
---
@@ -81,15 +81,18 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8181
a. In the **Reply URL** textbox, type the URL:
8282
`https://zola-prod.auth.eu-west-3.amazoncognito.com/saml2/idpresponse`
8383

84-
b. In the **Sign-on URL** textbox, type the URL:
85-
`https://app.zola.fr`
84+
b. In the **Sign-on URL** textbox, type the URL provided by Zola:
85+
`https://app.zola.fr?company=<MYCOMPANYID>`
8686

8787
c. In the **Relay State** textbox, type the URL:
88-
`https://app.zola.fr/version-test/dashboard-v2`
88+
`https://app.zola.fr/dashboard-v2`
8989

90-
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
90+
> [!NOTE]
91+
> The Sign-on URL value is not real. Update the value with the actual Sign on URL. Contact [Zola support team](mailto:[email protected]) to get the value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
9192

92-
![Screenshot shows the Certificate download link.](common/certificatebase64.png "Certificate")
93+
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
94+
95+
![Screenshot shows the Certificate download link.](common/metadataxml.png "Certificate")
9396

9497
1. On the **Set up Zola** section, copy the appropriate URL(s) based on your requirement.
9598

@@ -131,11 +134,11 @@ In this section, you create a user called Britta Simon at Zola. Work with [Zola
131134

132135
In this section, you test your Azure AD single sign-on configuration with following options.
133136

134-
* Click on **Test this application** in Azure portal. This will redirect to Zola Sign-on URL where you can initiate the login flow.
137+
* Click on **Test this application** in Azure portal. This will redirect to Zola Sign on URL where you can initiate the login flow.
135138

136-
* Go to Zola Sign-on URL directly and initiate the login flow from there.
139+
* Go to Zola Sign on URL directly and initiate the login flow from there.
137140

138-
* You can use Microsoft My Apps. When you click the Zola tile in the My Apps, this will redirect to Zola Sign-on URL. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
141+
* You can use Microsoft My Apps. When you click the Zola tile in the My Apps, this will redirect to Zola Sign on URL. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
139142

140143
## Next steps
141144

articles/azure-cache-for-redis/cache-retired-features.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: flang-msft
77
ms.author: franlanglois
88
ms.service: cache
99
ms.topic: conceptual
10-
ms.date: 09/29/2022
10+
ms.date: 09/30/2022
1111

1212
---
1313

@@ -23,11 +23,9 @@ On June 30, 2023, we'll retire version 4 for Azure Cache for Redis instances. Be
2323
We recommend that you upgrade your caches on your own to accommodate your schedule and the needs of your users to make the upgrade as convenient as possible.
2424

2525
The open-source Redis version 4 was released several years ago and is now retired. Version 4 no longer receives critical bug or security fixes from the community. Azure Cache for Redis offers open-source Redis as a managed service on Azure. To stay in sync with the open-source offering, we'll also retire version 4.
26-
<!-- Can we be more specific about when open-source Redis 4 was retired -->
27-
2826
Microsoft continues to backport security fixes from recent versions to version 4 until retirement. We encourage you to upgrade your cache to version 6 sooner, so you can use the rich feature set that Redis version 6 has to offer. For more information, See the Redis 6 GA announcement for more details.
2927

30-
To upgrade your version 4 Azure Cache for Redis instance, see our [Upgrade an existing Redis 4 cache to Redis 6](cache-how-to-version.md#upgrade-an-existing-redis-4-cache-to-redis-6. If your cache instances have geo-replication enabled, you’re required to unlink the caches before upgrade.
28+
To upgrade your version 4 Azure Cache for Redis instance, see [How to upgrade an existing Redis 4 cache to Redis 6](cache-how-to-upgrade.md). If your cache instances have geo-replication enabled, you’re required to unlink the caches before upgrade.
3129

3230
### Important upgrade timelines
3331

articles/azure-monitor/app/resource-manager-app-resource.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.reviewer: vitalyg
99

1010
# Resource Manager template samples for creating Application Insights resources
1111

12-
This article includes sample [Azure Resource Manager templates](../../azure-resource-manager/templates/syntax.md) to deploy and configure [classic Application Insights resources](../app/create-new-resource.md) and the new [preview workspace-based Application Insights resources](../app/create-workspace-resource.md). Each sample includes a template file and a parameters file with sample values to provide to the template.
12+
This article includes sample [Azure Resource Manager templates](../../azure-resource-manager/templates/syntax.md) to deploy and configure [classic Application Insights resources](../app/create-new-resource.md) and the new [workspace-based Application Insights resources](../app/create-workspace-resource.md). Each sample includes a template file and a parameters file with sample values to provide to the template.
1313

1414
[!INCLUDE [azure-monitor-samples](../../../includes/azure-monitor-resource-manager-samples.md)]
1515

@@ -136,7 +136,7 @@ resource component 'Microsoft.Insights/components@2020-02-02' = {
136136

137137
## Workspace-based Application Insights resource
138138

139-
The following sample creates a [workspace-based Application Insights resource](../app/create-workspace-resource.md). Workspace-based Application Insights are currently in **preview**.
139+
The following sample creates a [workspace-based Application Insights resource](../app/create-workspace-resource.md).
140140

141141
### Template file
142142

articles/azure-netapp-files/azure-netapp-files-network-topologies.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.service: azure-netapp-files
1212
ms.workload: storage
1313
ms.tgt_pltfrm: na
1414
ms.topic: conceptual
15-
ms.date: 09/28/2022
15+
ms.date: 09/29/2022
1616
ms.author: ramakk
1717
---
1818
# Guidelines for Azure NetApp Files network planning
@@ -87,7 +87,9 @@ The following table describes what’s supported for each network features confi
8787
| Dual stack (IPv4 and IPv6) VNet | No <br> (IPv4 only supported) | No <br> (IPv4 only supported) |
8888

8989
> [!IMPORTANT]
90-
> Conversion between Basic and Standard networking features in either direction is not currently supported. Additionally, you cannot create a Standard volume from the snapshot of a Basic volume.
90+
> Conversion between Basic and Standard networking features in either direction is not currently supported.
91+
>
92+
> Additionally, you can create Basic volumes from Basic volume snapshots and Standard volumes from Standard volume snapshots. Creating a Basic volume from a Standard volume snapshot is not supported. Creating a Standard volume from a Basic volume snapshot is not supported.
9193
9294
### Supported network topologies
9395

0 commit comments

Comments
 (0)