Skip to content

Commit c6b9a46

Browse files
authored
Merge pull request #127344 from MicrosoftDocs/master
8/26 AM Publish
2 parents 927dd0e + 9543f13 commit c6b9a46

File tree

150 files changed

+2149
-1125
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

150 files changed

+2149
-1125
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8683,6 +8683,11 @@
86838683
"redirect_url": "/azure/application-gateway/tutorial-ingress-controller-add-on-new",
86848684
"redirect_document_id": false
86858685
},
8686+
{
8687+
"source_path": "articles/application-gateway/whats-new.md",
8688+
"redirect_url": "/azure/application-gateway/overview#whats-new",
8689+
"redirect_document_id": false
8690+
},
86868691
{
86878692
"source_path": "articles/application-insights/app-insights-azure-diagnostics.md",
86888693
"redirect_url": "/azure/azure-monitor/platform/diagnostics-extension-to-application-insights",
@@ -42443,6 +42448,11 @@
4244342448
"redirect_url": "/azure/azure-monitor/platform/resource-logs-blob-format",
4244442449
"redirect_document_id": false
4244542450
},
42451+
{
42452+
"source_path": "articles/azure-monitor/platform/template-workspace-configuration.md",
42453+
"redirect_url": "/azure/azure-monitor/samples/resource-manager-workspace",
42454+
"redirect_document_id": false
42455+
},
4244642456
{
4244742457
"source_path": "articles/advisor/advisor-alerts.md",
4244842458
"redirect_url": "/azure/advisor/advisor-alerts-portal",

articles/active-directory/develop/v2-howto-app-gallery-listing.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ OAuth 2.0 is an [industry-standard](https://oauth.net/2/) protocol for authoriza
9393

9494
### SAML 2.0 or WS-Fed
9595

96-
SAML is a mature, and widely adopted, single sign-on standard for web applications. To learn more about how Azure uses SAML, see [How Azure uses the SAML protocol](active-directory-saml-protocol-reference.md).
96+
SAML is a mature, and widely adopted, [single sign-on standard](https://www.oasis-open.org/standards#samlv2.0) for web applications. To learn more about how Azure uses SAML, see [How Azure uses the SAML protocol](active-directory-saml-protocol-reference.md).
9797

9898
Web Services Federation (WS-Fed) is an [industry standard](https://docs.oasis-open.org/wsfed/federation/v1.2/ws-federation.html) generally used for web applications that are developed using the .NET platform.
9999

articles/active-directory/fundamentals/active-directory-groups-create-azure-portal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ There are several group and membership types. The following information explains
2424

2525
### Group types:
2626
- **Security**. Used to manage member and computer access to shared resources for a group of users. For example, you can create a security group for a specific security policy. By doing it this way, you can give a set of permissions to all the members at once, instead of having to add permissions to each member individually. A security group can have users, devices, groups and service principals as its members and users and service principals as its owners. For more info about managing access to resources, see [Manage access to resources with Azure Active Directory groups](active-directory-manage-groups.md).
27-
- **Office 365**. Provides collaboration opportunities by giving members access to a shared mailbox, calendar, files, SharePoint site, and more. This option also lets you give people outside of your organization access to the group. An Office 365 group can have only users as its members. Both users and service principals can be owners of an Office 365 group. For more info about Office 365 Groups, see [Learn about Office 365 Groups](https://support.office.com/article/learn-about-office-365-groups-b565caa1-5c40-40ef-9915-60fdb2d97fa2).
27+
- **Microsoft 365**. Provides collaboration opportunities by giving members access to a shared mailbox, calendar, files, SharePoint site, and more. This option also lets you give people outside of your organization access to the group. An Microsoft 365 group can have only users as its members. Both users and service principals can be owners of an Microsoft 365 group. For more info about Office 365 Groups, see [Learn about Microsoft 365 Groups](https://support.office.com/article/learn-about-office-365-groups-b565caa1-5c40-40ef-9915-60fdb2d97fa2).
2828

2929
### Membership types:
3030
- **Assigned.** Lets you add specific users to be members of this group and to have unique permissions. For the purposes of this article, we're using this option.
@@ -73,7 +73,7 @@ You can create a basic group and add your members at the same time. To create a
7373

7474
## Turn on or off group welcome email
7575

76-
When any new Office 365 group is created, whether with dynamic or static membership, a welcome notification is sent to all users who are added to the group. When any attributes of a user or device change, all dynamic group rules in the organization are processed for potential membership changes. Users who are added then also receive the welcome notification. You can turn this behavior off in [Exchange PowerShell](https://docs.microsoft.com/powershell/module/exchange/users-and-groups/Set-UnifiedGroup?view=exchange-ps).
76+
When any new Microsoft 365 group is created, whether with dynamic or static membership, a welcome notification is sent to all users who are added to the group. When any attributes of a user or device change, all dynamic group rules in the organization are processed for potential membership changes. Users who are added then also receive the welcome notification. You can turn this behavior off in [Exchange PowerShell](https://docs.microsoft.com/powershell/module/exchange/users-and-groups/Set-UnifiedGroup?view=exchange-ps).
7777

7878
## Next steps
7979

articles/active-directory/saas-apps/confluencemicrosoft-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ As of now, following versions of Confluence are supported:
5858

5959
- Confluence: 5.0 to 5.10
6060
- Confluence: 6.0.1 to 6.15.9
61-
- Confluence: 7.0.1 to 7.6.1
61+
- Confluence: 7.0.1 to 7.7.2
6262

6363
> [!NOTE]
6464
> Please note that our Confluence Plugin also works on Ubuntu Version 16.04

articles/active-directory/saas-apps/jiramicrosoft-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ Use your Microsoft Azure Active Directory account with Atlassian JIRA server to
3232
To configure Azure AD integration with JIRA SAML SSO by Microsoft, you need the following items:
3333

3434
- An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
35-
- JIRA Core and Software 6.4 to 8.11.0 or JIRA Service Desk 3.0 to 4.8.0 should installed and configured on Windows 64-bit version
35+
- JIRA Core and Software 6.4 to 8.11.0 or JIRA Service Desk 3.0 to 4.11.1 should installed and configured on Windows 64-bit version
3636
- JIRA server is HTTPS enabled
3737
- Note the supported versions for JIRA Plugin are mentioned in below section.
3838
- JIRA server is reachable on internet particularly to Azure AD Login page for authentication and should able to receive the token from Azure AD
@@ -54,7 +54,7 @@ To get started, you need the following items:
5454
## Supported versions of JIRA
5555

5656
* JIRA Core and Software: 6.4 to 8.11.0
57-
* JIRA Service Desk 3.0.0 to 4.8.0
57+
* JIRA Service Desk 3.0.0 to 4.11.1
5858
* JIRA also supports 5.2. For more details, click [Microsoft Azure Active Directory single sign-on for JIRA 5.2](jira52microsoft-tutorial.md)
5959

6060
> [!NOTE]

articles/aks/developer-best-practices-pod-security.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ The following [associated AKS open source projects][aks-associated-projects] let
8080
8181
A managed identity for Azure resources lets a pod authenticate itself against Azure services that support it, such as Storage or SQL. The pod is assigned an Azure Identity that lets them authenticate to Azure Active Directory and receive a digital token. This digital token can be presented to other Azure services that check if the pod is authorized to access the service and perform the required actions. This approach means that no secrets are required for database connection strings, for example. The simplified workflow for pod managed identity is shown in the following diagram:
8282
83-
![Simplified workflow for pod managed identity in Azure](media/developer-best-practices-pod-security/basic-pod-identity.png)
83+
:::image type="content" source="media/developer-best-practices-pod-security/basic-pod-identity.svg" alt-text="Simplified workflow for pod managed identity in Azure":::
8484
8585
With a managed identity, your application code doesn't need to include credentials to access a service, such as Azure Storage. As each pod authenticates with its own identity, so you can audit and review access. If your application connects with other Azure services, use managed identities to limit credential reuse and risk of exposure.
8686
@@ -92,7 +92,7 @@ Using the pod identity project enables authentication against supporting Azure s
9292
9393
When applications need a credential, they communicate with the digital vault, retrieve the latest secret contents, and then connect to the required service. Azure Key Vault can be this digital vault. The simplified workflow for retrieving a credential from Azure Key Vault using pod managed identities is shown in the following diagram:
9494
95-
![Simplified workflow for retrieving a credential from Key Vault using a pod managed identity](media/developer-best-practices-pod-security/basic-key-vault.png)
95+
:::image type="content" source="media/developer-best-practices-pod-security/basic-key-vault.svg" alt-text="Simplified workflow for retrieving a credential from Key Vault using a pod managed identity":::
9696
9797
With Key Vault, you store and regularly rotate secrets such as credentials, storage account keys, or certificates. You can integrate Azure Key Vault with an AKS cluster using the [Azure Key Vault provider for the Secrets Store CSI Driver](https://github.com/Azure/secrets-store-csi-driver-provider-azure#usage). The Secrets Store CSI driver enables the AKS cluster to natively retrieve secret contents from Key Vault and securely provide them only to the requesting pod. Work with your cluster operator to deploy the Secrets Store CSI Driver onto AKS worker nodes. You can use a pod managed identity to request access to Key Vault and retrieve the secret contents needed through the Secrets Store CSI Driver.
9898
Binary file not shown.

0 commit comments

Comments
 (0)