Skip to content

Commit c5e4dec

Browse files
2 parents dc927df + bbb46e7 commit c5e4dec

File tree

58 files changed

+531
-534
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

58 files changed

+531
-534
lines changed

.openpublishing.redirection.json

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1701,6 +1701,26 @@
17011701
"redirect_url": "/azure/cognitive-services/bing-web-search/quickstarts/client-libraries?pivots=programming-language-python",
17021702
"redirect_document_id": false
17031703
},
1704+
{
1705+
"source_path": "articles/cognitive-services/Bing-Image-Search/image-search-sdk-quickstart.md",
1706+
"redirect_url": "/azure/cognitive-services/bing-image-search/quickstarts/client-libraries?pivots=programming-language-csharp",
1707+
"redirect_document_id": false
1708+
},
1709+
{
1710+
"source_path": "articles/cognitive-services/Bing-Image-Search/image-sdk-java-quickstart.md",
1711+
"redirect_url": "/azure/cognitive-services/bing-image-search/quickstarts/client-libraries?pivots=programming-language-java",
1712+
"redirect_document_id": false
1713+
},
1714+
{
1715+
"source_path": "articles/cognitive-services/Bing-Image-Search/image-search-sdk-node-quickstart.md",
1716+
"redirect_url": "/azure/cognitive-services/bing-image-search/quickstarts/client-libraries?pivots=programming-language-javascript",
1717+
"redirect_document_id": false
1718+
},
1719+
{
1720+
"source_path": "articles/cognitive-services/Bing-Image-Search/image-sdk-python-quickstart.md",
1721+
"redirect_url": "/azure/cognitive-services/bing-image-search/quickstarts/client-libraries?pivots=programming-language-python",
1722+
"redirect_document_id": false
1723+
},
17041724
{
17051725
"source_path": "articles/virtual-machines/linux/classic/rdma-cluster.md",
17061726
"redirect_url": "/azure/virtual-machines/linux/sizes-hpc#rdma-capable-instances",
@@ -6706,6 +6726,10 @@
67066726
"redirect_url": "/azure/logic-apps/logic-apps-using-sap-connector",
67076727
"redirect_document_id": true
67086728
},
6729+
{
6730+
"source_path": "articles/scheduler/get-started-portal.md",
6731+
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
6732+
},
67096733
{
67106734
"source_path": "articles/connectors/connectors-create-api-googledrive.md",
67116735
"redirect_url": "https://docs.microsoft.com/connectors/googledrive/",

articles/active-directory-b2c/relyingparty.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ The **SingleSignOn** element contains in the following attribute:
123123
| --------- | -------- | ----------- |
124124
| Scope | Yes | The scope of the single sign-on behavior. Possible values: `Suppressed`, `Tenant`, `Application`, or `Policy`. The `Suppressed` value indicates that the behavior is suppressed. For example, in the case of a single sign-on session, no session is maintained for the user and the user is always prompted for an identity provider selection. The `TrustFramework` value indicates that the behavior is applied for all policies in the trust framework. For example, a user navigating through two policy journeys for a trust framework is not prompted for an identity provider selection. The `Tenant` value indicates that the behavior is applied to all policies in the tenant. For example, a user navigating through two policy journeys for a tenant is not prompted for an identity provider selection. The `Application` value indicates that the behavior is applied to all policies for the application making the request. For example, a user navigating through two policy journeys for an application is not prompted for an identity provider selection. The `Policy` value indicates that the behavior only applies to a policy. For example, a user navigating through two policy journeys for a trust framework is prompted for an identity provider selection when switching between policies. |
125125
| KeepAliveInDays | Yes | Controls how long the user remains signed in. Setting the value to 0 turns off KMSI functionality. For more information, see [Keep me signed in](custom-policy-keep-me-signed-in.md). |
126-
|EnforceIdTokenHintOnLogout| No| Force to pass a previously issued ID token to the logout endpoint as a hint about the end user's current authenticated session with the client. Possible values: `false` (default), or `true`. For more infomation, see [Web sign-in with OpenID Connect](openid-connect.md). |
126+
|EnforceIdTokenHintOnLogout| No| Force to pass a previously issued ID token to the logout endpoint as a hint about the end user's current authenticated session with the client. Possible values: `false` (default), or `true`. For more information, see [Web sign-in with OpenID Connect](openid-connect.md). |
127127

128128

129129
## JourneyInsights

articles/active-directory-b2c/string-transformations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -370,7 +370,7 @@ Copies localized strings into claims.
370370
To use the GetLocalizedStringsTransformation claims transformation:
371371

372372
1. Define a [localization string](localization.md) and associate it with a [self-asserted-technical-profile](self-asserted-technical-profile.md).
373-
1. The `ElementType` of the `LocalizedString` element must set to `GetLocalizedStringsTransformationClaimType`.
373+
1. The `ElementType` of the `LocalizedString` element must be set to `GetLocalizedStringsTransformationClaimType`.
374374
1. The `StringId` is a unique identifier that you define, and use it later in your claims transformation.
375375
1. In the claims transformation, specify the list of claims to be set with the localized string. The `ClaimTypeReferenceId` is a reference to a ClaimType already defined in the ClaimsSchema section in the policy. The `TransformationClaimType` is the name of the localized string as defined in the `StringId` of the `LocalizedString` element.
376376
1. In a [self-asserted technical profile](self-asserted-technical-profile.md), or a [display control](display-controls.md) input or output claims transformation, make a reference to your claims transformation.

articles/active-directory/develop/scenario-daemon-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ Here are some examples of use cases for daemon apps:
4141
- Desktop applications (like Windows services on Windows or daemon processes on Linux) that perform batch jobs, or an operating system service that runs in the background
4242
- Web APIs that need to manipulate directories, not specific users
4343

44-
There's another common case where non-daemon applications use client credentials: even when they act on behalf of users, they need to access a web API or a resource under own their identity for technical reasons. An example is access to secrets in Azure Key Vault or an Azure SQL database for a cache.
44+
There's another common case where non-daemon applications use client credentials: even when they act on behalf of users, they need to access a web API or a resource under their own identity for technical reasons. An example is access to secrets in Azure Key Vault or an Azure SQL database for a cache.
4545

4646
Applications that acquire a token for their own identities:
4747

articles/aks/azure-files-dynamic-pv.md

Lines changed: 11 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -27,11 +27,13 @@ A storage class is used to define how an Azure file share is created. A storage
2727

2828
* *Standard_LRS* - standard locally redundant storage (LRS)
2929
* *Standard_GRS* - standard geo-redundant storage (GRS)
30+
* *Standard_ZRS* - standard zone redundant storage (GRS)
3031
* *Standard_RAGRS* - standard read-access geo-redundant storage (RA-GRS)
3132
* *Premium_LRS* - premium locally redundant storage (LRS)
33+
* *Premium_ZRS* - premium zone redundant storage (GRS)
3234

3335
> [!NOTE]
34-
> Azure Files support premium storage in AKS clusters that run Kubernetes 1.13 or higher.
36+
> Azure Files support premium storage in AKS clusters that run Kubernetes 1.13 or higher, minimum premium file share is 100GB
3537
3638
For more information on Kubernetes storage classes for Azure Files, see [Kubernetes Storage Classes][kubernetes-storage-classes].
3739

@@ -46,11 +48,10 @@ provisioner: kubernetes.io/azure-file
4648
mountOptions:
4749
- dir_mode=0777
4850
- file_mode=0777
49-
- uid=1000
50-
- gid=1000
51+
- uid=0
52+
- gid=0
5153
- mfsymlinks
52-
- nobrl
53-
- cache=none
54+
- cache=strict
5455
parameters:
5556
skuName: Standard_LRS
5657
```
@@ -161,7 +162,7 @@ Volumes:
161162

162163
## Mount options
163164

164-
The default value for *fileMode* and *dirMode* is *0755* for Kubernetes version 1.9.1 and above. If using a cluster with Kuberetes version 1.8.5 or greater and dynamically creating the persistent volume with a storage class, mount options can be specified on the storage class object. The following example sets *0777*:
165+
The default value for *fileMode* and *dirMode* is *0777* for Kubernetes version 1.13.0 and above. If dynamically creating the persistent volume with a storage class, mount options can be specified on the storage class object. The following example sets *0777*:
165166

166167
```yaml
167168
kind: StorageClass
@@ -172,17 +173,14 @@ provisioner: kubernetes.io/azure-file
172173
mountOptions:
173174
- dir_mode=0777
174175
- file_mode=0777
175-
- uid=1000
176-
- gid=1000
176+
- uid=0
177+
- gid=0
177178
- mfsymlinks
178-
- nobrl
179-
- cache=none
179+
- cache=strict
180180
parameters:
181181
skuName: Standard_LRS
182182
```
183183
184-
If using a cluster of version 1.8.0 - 1.8.4, a security context can be specified with the *runAsUser* value set to *0*. For more information on Pod security context, see [Configure a Security Context][kubernetes-security-context].
185-
186184
## Next steps
187185
188186
For associated best practices, see [Best practices for storage and backups in AKS][operator-best-practices-storage].
@@ -222,4 +220,4 @@ Learn more about Kubernetes persistent volumes using Azure Files.
222220
[kubernetes-rbac]: concepts-identity.md#role-based-access-controls-rbac
223221
[operator-best-practices-storage]: operator-best-practices-storage.md
224222
[concepts-storage]: concepts-storage.md
225-
[node-resource-group]: faq.md#why-are-two-resource-groups-created-with-aks
223+
[node-resource-group]: faq.md#why-are-two-resource-groups-created-with-aks

articles/app-service/app-service-web-tutorial-dotnetcore-sqldb.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ What you learn how to:
3636
To complete this tutorial:
3737

3838
* [Install Git](https://git-scm.com/)
39-
* [Install .NET Core](https://www.microsoft.com/net/core/)
39+
* [Install .NET Core SDK](https://dotnet.microsoft.com/download)
4040

4141
## Create local .NET Core app
4242

articles/azure-monitor/learn/dotnetcore-quick-start.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,10 +20,10 @@ This quickstart guides you through adding the Application Insights SDK to an exi
2020

2121
To complete this quickstart:
2222

23-
- [Install Visual Studio 2019](https://www.visualstudio.com/downloads/) with the following workloads:
23+
- [Install Visual Studio 2019](https://visualstudio.microsoft.com/downloads/?utm_medium=microsoft&utm_source=docs.microsoft.com&utm_campaign=inline+link&utm_content=download+vs2019) with the following workloads:
2424
- ASP.NET and web development
2525
- Azure development
26-
- [Install .NET Core 2.0 SDK](https://www.microsoft.com/net/core)
26+
- [Install .NET Core 2.0 SDK](https://dotnet.microsoft.com/download)
2727
- You will need an Azure subscription and an existing .NET Core web application.
2828

2929
If you don't have an ASP.NET Core web application, you can use our step-by-step guide to [create an ASP.NET Core app and add Application Insights.](../../azure-monitor/app/asp-net-core.md)

articles/azure-resource-manager/templates/deploy-to-management-group.md

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,18 +2,24 @@
22
title: Deploy resources to management group
33
description: Describes how to deploy resources at the management group scope in an Azure Resource Manager template.
44
ms.topic: conceptual
5-
ms.date: 03/02/2020
5+
ms.date: 03/06/2020
66
---
77

88
# Create resources at the management group level
99

10-
Typically, you deploy Azure resources to a resource group in your Azure subscription. However, you can also create resources at the management group level. You use management group level deployments to take actions that make sense at that level, such as assigning [role-based access control](../../role-based-access-control/overview.md) or applying [policies](../../governance/policy/overview.md).
10+
Typically, you deploy Azure resources to a resource group in your Azure subscription. However, you can also create resources at the:
11+
12+
* [subscription level](deploy-to-subscription.md)
13+
* management group level (covered in this article)
14+
* [tenant level](deploy-to-tenant.md)
15+
16+
You use management group level deployments to take actions that make sense at that level, such as assigning [role-based access control](../../role-based-access-control/overview.md) or applying [policies](../../governance/policy/overview.md).
1117

1218
## Supported resources
1319

1420
You can deploy the following resource types at the management group level:
1521

16-
* [deployments](/azure/templates/microsoft.resources/deployments)
22+
* [deployments](/azure/templates/microsoft.resources/deployments) - for nested templates that deploy to subscriptions or resource groups.
1723
* [policyAssignments](/azure/templates/microsoft.authorization/policyassignments)
1824
* [policyDefinitions](/azure/templates/microsoft.authorization/policydefinitions)
1925
* [policySetDefinitions](/azure/templates/microsoft.authorization/policysetdefinitions)

articles/azure-resource-manager/templates/deploy-to-subscription.md

Lines changed: 11 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,18 @@
22
title: Deploy resources to subscription
33
description: Describes how to create a resource group in an Azure Resource Manager template. It also shows how to deploy resources at the Azure subscription scope.
44
ms.topic: conceptual
5-
ms.date: 03/02/2020
5+
ms.date: 03/06/2020
66
---
77

88
# Create resource groups and resources at the subscription level
99

10-
Typically, you deploy Azure resources to a resource group in your Azure subscription. However, you can also create resources at the subscription level. You use subscription level deployments to take actions that make sense at that level, such as creating resource groups, or assigning [role-based access control](../../role-based-access-control/overview.md).
10+
Typically, you deploy Azure resources to a resource group in your Azure subscription. However, you can also create resources at the:
11+
12+
* subscription level (covered in this article)
13+
* [management group level](deploy-to-management-group.md)
14+
* [tenant level](deploy-to-tenant.md)
15+
16+
You use subscription level deployments to take actions that make sense at that level, such as creating resource groups, or assigning [role-based access control](../../role-based-access-control/overview.md).
1117

1218
To deploy templates at the subscription level, use Azure CLI, PowerShell, or REST API. The Azure portal doesn't support deployment in the subscription level.
1319

@@ -16,7 +22,7 @@ To deploy templates at the subscription level, use Azure CLI, PowerShell, or RES
1622
You can deploy the following resource types at the subscription level:
1723

1824
* [budgets](/azure/templates/microsoft.consumption/budgets)
19-
* [deployments](/azure/templates/microsoft.resources/deployments)
25+
* [deployments](/azure/templates/microsoft.resources/deployments) - for nested templates that deploy to resource groups.
2026
* [peerAsns](/azure/templates/microsoft.peering/peerasns)
2127
* [policyAssignments](/azure/templates/microsoft.authorization/policyassignments)
2228
* [policyDefinitions](/azure/templates/microsoft.authorization/policydefinitions)
@@ -83,12 +89,12 @@ For subscription-level deployments, there are some important considerations when
8389

8490
* The [resourceGroup()](template-functions-resource.md#resourcegroup) function is **not** supported.
8591
* The [reference()](template-functions-resource.md#reference) and [list()](template-functions-resource.md#list) functions are supported.
86-
* The [resourceId()](template-functions-resource.md#resourceid) function is supported. Use it to get the resource ID for resources that are used at subscription level deployments. Don't provide a value for the resource group parameter.
92+
* Use the [subscriptionResourceId()](template-functions-resource.md#subscriptionresourceid) function to get the resource ID for resources that are deployed at subscription level.
8793

8894
For example, to get the resource ID for a policy definition, use:
8995

9096
```json
91-
resourceId('Microsoft.Authorization/roleDefinitions/', parameters('roleDefinition'))
97+
subscriptionResourceId('Microsoft.Authorization/roleDefinitions/', parameters('roleDefinition'))
9298
```
9399

94100
The returned resource ID has the following format:
@@ -97,8 +103,6 @@ For subscription-level deployments, there are some important considerations when
97103
/subscriptions/{subscriptionId}/providers/{resourceProviderNamespace}/{resourceType}/{resourceName}
98104
```
99105

100-
Or, use the [subscriptionResourceId()](template-functions-resource.md#subscriptionresourceid) function to get the resource ID for a subscription level resource.
101-
102106
## Create resource groups
103107

104108
To create a resource group in an Azure Resource Manager template, define a [Microsoft.Resources/resourceGroups](/azure/templates/microsoft.resources/allversions) resource with a name and location for the resource group. You can create a resource group and deploy resources to that resource group in the same template.

0 commit comments

Comments
 (0)