You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/overview-managed-identity.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -304,8 +304,8 @@ For .NET apps and functions, the simplest way to work with a managed identity is
304
304
See the respective documentation headings of the client library for information:
305
305
306
306
-[Add Azure Identity client library to your project](/dotnet/api/overview/azure/identity-readme#getting-started)
307
-
-[Access Azure service with a system-assigned identity](/dotnet/api/overview/azure/identity-readme#authenticating-with-defaultazurecredential)
308
-
-[Access Azure service with a user-assigned identity](/dotnet/api/overview/azure/identity-readme#specifying-a-user-assigned-managed-identity-with-the-defaultazurecredential)
307
+
-[Access Azure service with a system-assigned identity](/dotnet/api/overview/azure/identity-readme#authenticate-with-defaultazurecredential)
308
+
-[Access Azure service with a user-assigned identity](/dotnet/api/overview/azure/identity-readme#specify-a-user-assigned-managed-identity-with-defaultazurecredential)
309
309
310
310
The linked examples use [`DefaultAzureCredential`](/dotnet/api/overview/azure/identity-readme#defaultazurecredential). It's useful for the majority of the scenarios because the same pattern works in Azure (with managed identities) and on your local machine (without managed identities).
311
311
@@ -316,8 +316,8 @@ For Node.js apps and JavaScript functions, the simplest way to work with a manag
316
316
See the respective documentation headings of the client library for information:
317
317
318
318
-[Add Azure Identity client library to your project](/javascript/api/overview/azure/identity-readme#install-the-package)
319
-
-[Access Azure service with a system-assigned identity](/javascript/api/overview/azure/identity-readme#authenticating-with-defaultazurecredential)
320
-
-[Access Azure service with a user-assigned identity](/javascript/api/overview/azure/identity-readme#authenticating-a-user-assigned-managed-identity-with-defaultazurecredential)
319
+
-[Access Azure service with a system-assigned identity](/javascript/api/overview/azure/identity-readme#authenticate-with-defaultazurecredential)
320
+
-[Access Azure service with a user-assigned identity](/javascript/api/overview/azure/identity-readme#specify-a-user-assigned-managed-identity-with-defaultazurecredential)
321
321
322
322
The linked examples use [`DefaultAzureCredential`](/javascript/api/overview/azure/identity-readme#defaultazurecredential). It's useful for the majority of the scenarios because the same pattern works in Azure (with managed identities) and on your local machine (without managed identities).
323
323
@@ -330,8 +330,8 @@ For Python apps and functions, the simplest way to work with a managed identity
330
330
See the respective documentation headings of the client library for information:
331
331
332
332
-[Add Azure Identity client library to your project](/python/api/overview/azure/identity-readme#getting-started)
333
-
-[Access Azure service with a system-assigned identity](/python/api/overview/azure/identity-readme#authenticating-with-defaultazurecredential)
334
-
-[Access Azure service with a user-assigned identity](/python/api/overview/azure/identity-readme#authenticating-a-user-assigned-managed-identity-with-defaultazurecredential)
333
+
-[Access Azure service with a system-assigned identity](/python/api/overview/azure/identity-readme#authenticate-with-defaultazurecredential)
334
+
-[Access Azure service with a user-assigned identity](/python/api/overview/azure/identity-readme#authenticate-with-a-user-assigned-managed-identity)
335
335
336
336
The linked examples use [`DefaultAzureCredential`](/python/api/overview/azure/identity-readme#defaultazurecredential). It's useful for the majority of the scenarios because the same pattern works in Azure (with managed identities) and on your local machine (without managed identities).
337
337
@@ -342,8 +342,8 @@ For Java apps and functions, the simplest way to work with a managed identity is
342
342
See the respective documentation headings of the client library for information:
343
343
344
344
-[Add Azure Identity client library to your project](/java/api/overview/azure/identity-readme#include-the-package)
345
-
-[Access Azure service with a system-assigned identity](/java/api/overview/azure/identity-readme#authenticating-with-defaultazurecredential)
346
-
-[Access Azure service with a user-assigned identity](/java/api/overview/azure/identity-readme#authenticating-a-user-assigned-managed-identity-with-defaultazurecredential)
345
+
-[Access Azure service with a system-assigned identity](/java/api/overview/azure/identity-readme#authenticate-with-defaultazurecredential)
346
+
-[Access Azure service with a user-assigned identity](/java/api/overview/azure/identity-readme#authenticate-a-user-assigned-managed-identity-with-defaultazurecredential)
347
347
348
348
The linked examples use [`DefaultAzureCredential`](/azure/developer/java/sdk/identity-azure-hosted-auth#default-azure-credential). It's useful for the majority of the scenarios because the same pattern works in Azure (with managed identities) and on your local machine (without managed identities).
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/use-availability-zones.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,19 +1,19 @@
1
1
---
2
-
title: Use availability zones zonal placement for application high availability with Azure NetApp Files
2
+
title: Use availability zone placement for application high availability with Azure NetApp Files
3
3
description: Azure availability zones are highly available, fault tolerant, and more scalable than traditional single or multiple data center infrastructures.
4
4
services: azure-netapp-files
5
5
author: b-hchen
6
6
ms.service: azure-netapp-files
7
7
ms.topic: conceptual
8
-
ms.date: 05/22/2024
8
+
ms.date: 10/22/2024
9
9
ms.author: anfdocs
10
10
---
11
-
# Use availability zones zonal placement for application high availability with Azure NetApp Files
11
+
# Use availability zone placement for application high availability with Azure NetApp Files
12
12
13
13
Azure [availability zones](../availability-zones/az-overview.md#availability-zones) are physically separate locations within each supporting Azure region that are tolerant to local failures. Failures can range from software and hardware failures to events such as earthquakes, floods, and fires. Tolerance to failures is achieved because of redundancy and logical isolation of Azure services. To ensure resiliency, a minimum of three separate availability zones are present in all [availability zone-enabled regions](../availability-zones/az-overview.md#azure-regions-with-availability-zones).
14
14
15
15
>[!IMPORTANT]
16
-
> Availability zones are referred to as _logical zones_. Each data center is assigned to a physical zone. Physical zones are mapped to logical zones in your Azure subscription, and the mapping is different with different subscriptions. Azure subscriptions are automatically assigned this mapping when a subscription is created. Azure NetApp Files aligns with the generic logical-to-physical availability zone mapping for all Azure services for the subscription.
16
+
> Availability zones are referred to as _logical zones_. Each data center is assigned to a physical zone. [Physical zones are mapped to logical zones in your Azure subscription](/azure/reliability/availability-zones-overview#physical-and-logical-availability-zones), and the mapping is different with different subscriptions. Azure subscriptions are automatically assigned this mapping when a subscription is created. Azure NetApp Files aligns with the generic logical-to-physical availability zone mapping for all Azure services for the subscription.
17
17
18
18
Azure availability zones are highly available, fault tolerant, and more scalable than traditional single or multiple data center infrastructures. Azure availability zones let you design and operate applications and databases that automatically transition between zones without interruption. You can design resilient solutions by using Azure services that use availability zones.
Copy file name to clipboardExpand all lines: articles/cost-management-billing/manage/avoid-unused-subscriptions.md
+6-2Lines changed: 6 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.reviewer: mijeffer
6
6
ms.service: cost-management-billing
7
7
ms.subservice: billing
8
8
ms.topic: concept-article
9
-
ms.date: 10/08/2024
9
+
ms.date: 10/22/2024
10
10
ms.author: banders
11
11
# customer intent: As a billing administrator, I want to prevent my subscriptions from getting blocked or deleted.
12
12
---
@@ -16,7 +16,11 @@ ms.author: banders
16
16
Unused and abandoned subscriptions can increase potential security risks to your Azure account. To reduce this risk, Microsoft takes measures to secure, protect, and ultimately delete unused Azure subscriptions.
17
17
18
18
>[!NOTE]
19
-
> This article only applies to Microsoft Online Service Program (MOSP) and Cloud Solution Provider (CSP) subscriptions.
19
+
> This article only applies to the following subscription types:
20
+
> - Microsoft Online Service Program (MOSP)
21
+
> - Cloud Solution Provider (CSP)
22
+
> - Microsoft Customer Agreement (MCA) that you bought through the Azure website or Azure portal
23
+
> - Microsoft Customer Agreement (MCA) that you bought through a Microsoft representative
Copy file name to clipboardExpand all lines: articles/expressroute/expressroute-troubleshooting-arp-classic.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,8 +50,8 @@ The following section provides information about how to view the ARP tables that
50
50
## Prerequisites for using ARP tables
51
51
Ensure that you have the following before you continue:
52
52
53
-
* A valid ExpressRoute circuit that's configured with at least one peering. The circuit must be fully configured by the connectivity provider. You (or your connectivity provider) must configure at least one of the peerings (Azure private, Azure public, or Microsoft) on this circuit.
54
-
* IP address ranges that are used for configuring the peerings (Azure private, Azure public, and Microsoft). Review the IP address assignment examples in the [ExpressRoute routing requirements page](expressroute-routing.md) to get an understanding of how IP addresses are mapped to interfaces on your side and on the ExpressRoute side. You can get information about the peering configuration by reviewing the [ExpressRoute peering configuration page](expressroute-howto-routing-classic.md).
53
+
* A valid ExpressRoute circuit that's configured with at least one peering. The circuit must be fully configured by the connectivity provider. You (or your connectivity provider) must configure at least one of the peerings (Azure private or Microsoft) on this circuit.
54
+
* IP address ranges that are used for configuring the peerings (Azure private and Microsoft). Review the IP address assignment examples in the [ExpressRoute routing requirements page](expressroute-routing.md) to get an understanding of how IP addresses are mapped to interfaces on your side and on the ExpressRoute side. You can get information about the peering configuration by reviewing the [ExpressRoute peering configuration page](expressroute-howto-routing-classic.md).
55
55
* Information from your networking team or connectivity provider about the MAC addresses of the interfaces that are used with these IP addresses.
56
56
* The latest Windows PowerShell module for Azure (version 1.50 or later).
57
57
@@ -63,7 +63,7 @@ The following cmdlet provides the ARP tables for Azure private peering:
63
63
64
64
```azurepowershell
65
65
# Required variables
66
-
$ckt = "<your Service Key here>
66
+
$ckt = "<your Service Key here>"
67
67
68
68
# ARP table for Azure private peering--primary path
Copy file name to clipboardExpand all lines: articles/iot-central/core/concepts-private-endpoints.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Network security using private endpoints in IoT Central
3
3
description: Use private endpoints to limit and secure device connectivity to your IoT Central application instead of using public URLs.
4
4
author: dominicbetts
5
5
ms.author: dobett
6
-
ms.date: 05/22/2023
6
+
ms.date: 10/22/2024
7
7
ms.topic: conceptual
8
8
ms.service: azure-iot-central
9
9
services: iot-central
@@ -51,7 +51,7 @@ IoT Central creates multiple customer visible FQDNs as part of a private endpoin
51
51
52
52
:::image type="content" source="media/concepts-private-endpoints/visible-fqdns.png" alt-text="Screenshot from the Azure portal that shows the customer visible FQDNs.":::
53
53
54
-
The IoT Central private endpoint uses multiple IP addresses from your virtual network and subnet. Also, based on application's load profile, IoT Central [autoscales its underlying IoT Hubs](/azure/iot-central/core/concepts-scalability-availability) so the number of IP addresses used by a private endpoint may increase. Plan for this possible increase when you determine the size for the subnet.
54
+
The IoT Central private endpoint uses multiple IP addresses from your virtual network and subnet. Also, based on application's load profile, IoT Central [autoscales its underlying IoT Hubs](/azure/iot-central/core/concepts-scalability-availability) so the number of IP addresses used by a private endpoint might increase. Plan for this possible increase when you determine the size for the subnet.
55
55
56
56
Use the following information to help determine the total number of IP addresses required in your subnet:
Copy file name to clipboardExpand all lines: articles/iot-central/core/howto-create-organizations.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: iot-central
5
5
ms.service: azure-iot-central
6
6
author: dominicbetts
7
7
ms.author: dobett
8
-
ms.date: 06/14/2023
8
+
ms.date: 10/22/2024
9
9
ms.topic: how-to
10
10
---
11
11
@@ -99,7 +99,7 @@ Then select the permissions for the role.
99
99
100
100
## Invite users
101
101
102
-
After you've created your organization hierarchy and assigned devices to organizations, invite users to your application and assign them to organizations.
102
+
After you create your organization hierarchy and assigned devices to organizations, invite users to your application and assign them to organizations.
103
103
104
104
To invite a user, navigate to **Permissions > Users**. Enter their email address, the organization they're assigned to, and the role or roles they're a member of. The organization you select filters the list of available roles to make sure you assign the user to a valid role:
105
105
@@ -112,13 +112,13 @@ You can assign the same user to multiple organizations. The user can have a diff
When you invite a new user, you need to share the application URL with them and ask them to sign in. After the user has signed in for the first time, the application appears on the user's [My apps](https://apps.azureiotcentral.com/myapps) page.
115
+
When you invite a new user, you need to share the application URL with them and ask them to sign in. After the user signs in for the first time, the application appears on the user's [My apps](https://apps.azureiotcentral.com/myapps) page.
116
116
117
117
To access the application for the first time, an invited user must first navigate to the application using the link they receive from the administrator. The application isn't visible on the [My apps](https://apps.azureiotcentral.com/myapps) page on the Azure IoT Central site until then.
118
118
119
119
## Use organizations
120
120
121
-
After you've created your organization hierarchy, you can use organizations in areas of your application such as:
121
+
After you create your organization hierarchy, you can use organizations in areas of your application such as:
122
122
123
123
-[Organization dashboards](howto-manage-dashboards.md) that show information to users about devices in their organization.
124
124
-[Device groups](tutorial-use-device-groups.md) for devices in specific organizations.
@@ -139,7 +139,7 @@ To set the default organization, select **Settings** on the top menu bar:
139
139
140
140
## Add organizations to an existing application
141
141
142
-
An application may contain devices, users, and experiences such as dashboards, device groups, and jobs before you add an organization hierarchy.
142
+
An application might contain devices, users, and experiences such as dashboards, device groups, and jobs before you add an organization hierarchy.
143
143
144
144
When you start adding organizations, all existing devices, users, and experiences remain associated with the root organization in the application:
Copy file name to clipboardExpand all lines: articles/iot-central/core/howto-create-private-endpoint.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Create a private endpoint for Azure IoT Central
3
3
description: Learn how to create and configure a private endpoint to securely connect your devices to IoT Central over a private virtual network.
4
4
author: dominicbetts
5
5
ms.author: dobett
6
-
ms.date: 05/19/2023
6
+
ms.date: 10/22/2024
7
7
ms.topic: how-to
8
8
ms.service: azure-iot-central
9
9
services: iot-central
@@ -73,7 +73,7 @@ To see all the private endpoints created for your application:
73
73
74
74
### Use a custom DNS server
75
75
76
-
In some situations, you may not be able to integrate with the private DNS zone of the virtual network. For example, you may use your own DNS server or create DNS records using the host files on your virtual machines. This section describes how to get to the DNS zones.
76
+
In some situations, you might not be able to integrate with the private DNS zone of the virtual network. For example, you might use your own DNS server or create DNS records using the host files on your virtual machines. This section describes how to get to the DNS zones.
@@ -160,9 +160,9 @@ Update your device code to use the direct DPS endpoint.
160
160
161
161
- Don't use private link subdomain URLs to connect your devices to IoT Central. Always use the DPS URL shown in your IoT Central application after you create the private endpoint.
162
162
163
-
- Using Azure provided private DNS zones for DNS management. Avoid using your own DNS server because you would need to constantly update your DNS configuration to keep up as IoT Central autoscales its resources.
163
+
- Use Azure provided private DNS zones for DNS management. Avoid using your own DNS server because you would need to constantly update your DNS configuration to keep up as IoT Central autoscales its resources.
164
164
165
-
- If you create multiple private endpoints for same IoT Central resource, the DNS Zone may overwrite the FQDNs so you should add them again.
165
+
- If you create multiple private endpoints for same IoT Central resource, the DNS Zone might overwrite the FQDNs so you should add them again.
166
166
167
167
## Limitations
168
168
@@ -226,9 +226,9 @@ If you find an FQDN that doesn't match its corresponding IP address, fix your cu
226
226
DNS configuration can be overwritten if you create or delete multiple private endpoints for a single IoT Central application:
227
227
228
228
- In the Azure portal, navigate to the private endpoint resource.
229
-
- In the DNS section, make sure there are entries for all required resources: IoT Hubs, Event Hubs, DPS and IoT Central FQDNs.
229
+
- In the DNS section, make sure there are entries for all required resources: IoT Hubs, Event Hubs, DPS, and IoT Central FQDNs.
230
230
- Verify that the IPs (and IPs for other private endpoints using this DNS zone) are reflected in the A record of the DNS.
231
-
- Remove any A records for IPs from older private endpoints that have already been deleted.
231
+
- Remove any A records for IPs from older private endpoints that were previously deleted.
0 commit comments