Skip to content

Commit c77dfc6

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into rolyon-availability-zones-regions
2 parents 8fb8a58 + 66e5c91 commit c77dfc6

14 files changed

+46
-44
lines changed

articles/active-directory/develop/active-directory-configurable-token-lifetimes.md

Lines changed: 20 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: develop
1111
ms.workload: identity
1212
ms.topic: conceptual
13-
ms.date: 02/19/2020
13+
ms.date: 04/17/2020
1414
ms.author: ryanwi
1515
ms.custom: aaddev, identityplatformtop40
1616
ms.reviewer: hirsin, jlu, annaba
@@ -240,19 +240,25 @@ In this example, you create a policy that lets your users' sign in less frequent
240240
}')
241241
```
242242
243-
2. To create the policy, run the following command:
243+
1. To create the policy, run the following command:
244244
245245
```powershell
246246
$policy = New-AzureADPolicy -Definition @('{"TokenLifetimePolicy":{"Version":1, "MaxAgeSingleFactor":"until-revoked"}}') -DisplayName "OrganizationDefaultPolicyScenario" -IsOrganizationDefault $true -Type "TokenLifetimePolicy"
247247
```
248248
249-
3. To see your new policy, and to get the policy's **ObjectId**, run the following command:
249+
1. To remove any whitespace, run the following command:
250+
251+
```powershell
252+
Get-AzureADPolicy -id | set-azureadpolicy -Definition @($((Get-AzureADPolicy -id ).Replace(" ","")))
253+
```
254+
255+
1. To see your new policy, and to get the policy's **ObjectId**, run the following command:
250256
251257
```powershell
252258
Get-AzureADPolicy -Id $policy.Id
253259
```
254260
255-
2. Update the policy.
261+
1. Update the policy.
256262
257263
You might decide that the first policy you set in this example is not as strict as your service requires. To set your Single-Factor Refresh Token to expire in two days, run the following command:
258264
@@ -274,21 +280,21 @@ In this example, you create a policy that requires users to authenticate more fr
274280
$policy = New-AzureADPolicy -Definition @('{"TokenLifetimePolicy":{"Version":1,"AccessTokenLifetime":"02:00:00","MaxAgeSessionSingleFactor":"02:00:00"}}') -DisplayName "WebPolicyScenario" -IsOrganizationDefault $false -Type "TokenLifetimePolicy"
275281
```
276282
277-
2. To see your new policy, and to get the policy **ObjectId**, run the following command:
283+
1. To see your new policy, and to get the policy **ObjectId**, run the following command:
278284
279285
```powershell
280286
Get-AzureADPolicy -Id $policy.Id
281287
```
282288
283-
2. Assign the policy to your service principal. You also need to get the **ObjectId** of your service principal.
289+
1. Assign the policy to your service principal. You also need to get the **ObjectId** of your service principal.
284290
285291
1. Use the [Get-AzureADServicePrincipal](/powershell/module/azuread/get-azureadserviceprincipal) cmdlet to see all your organization's service principals or a single service principal.
286292
```powershell
287293
# Get ID of the service principal
288294
$sp = Get-AzureADServicePrincipal -Filter "DisplayName eq '<service principal display name>'"
289295
```
290296
291-
2. When you have the service principal, run the following command:
297+
1. When you have the service principal, run the following command:
292298
```powershell
293299
# Assign policy to a service principal
294300
Add-AzureADServicePrincipalPolicy -Id $sp.ObjectId -RefObjectId $policy.Id
@@ -305,13 +311,13 @@ In this example, you create a policy that requires users to authenticate less fr
305311
$policy = New-AzureADPolicy -Definition @('{"TokenLifetimePolicy":{"Version":1,"MaxInactiveTime":"30.00:00:00","MaxAgeMultiFactor":"until-revoked","MaxAgeSingleFactor":"180.00:00:00"}}') -DisplayName "WebApiDefaultPolicyScenario" -IsOrganizationDefault $false -Type "TokenLifetimePolicy"
306312
```
307313
308-
2. To see your new policy, run the following command:
314+
1. To see your new policy, run the following command:
309315
310316
```powershell
311317
Get-AzureADPolicy -Id $policy.Id
312318
```
313319
314-
2. Assign the policy to your web API. You also need to get the **ObjectId** of your application. Use the [Get-AzureADApplication](/powershell/module/azuread/get-azureadapplication) cmdlet to find your app's **ObjectId**, or use the [Azure portal](https://portal.azure.com/).
320+
1. Assign the policy to your web API. You also need to get the **ObjectId** of your application. Use the [Get-AzureADApplication](/powershell/module/azuread/get-azureadapplication) cmdlet to find your app's **ObjectId**, or use the [Azure portal](https://portal.azure.com/).
315321
316322
Get the **ObjectId** of your app and assign the policy:
317323
@@ -334,19 +340,19 @@ In this example, you create a few policies to learn how the priority system work
334340
$policy = New-AzureADPolicy -Definition @('{"TokenLifetimePolicy":{"Version":1,"MaxAgeSingleFactor":"30.00:00:00"}}') -DisplayName "ComplexPolicyScenario" -IsOrganizationDefault $true -Type "TokenLifetimePolicy"
335341
```
336342
337-
2. To see your new policy, run the following command:
343+
1. To see your new policy, run the following command:
338344
339345
```powershell
340346
Get-AzureADPolicy -Id $policy.Id
341347
```
342348
343-
2. Assign the policy to a service principal.
349+
1. Assign the policy to a service principal.
344350
345351
Now, you have a policy that applies to the entire organization. You might want to preserve this 30-day policy for a specific service principal, but change the organization default policy to the upper limit of "until-revoked."
346352
347353
1. To see all your organization's service principals, you use the [Get-AzureADServicePrincipal](/powershell/module/azuread/get-azureadserviceprincipal) cmdlet.
348354
349-
2. When you have the service principal, run the following command:
355+
1. When you have the service principal, run the following command:
350356
351357
```powershell
352358
# Get ID of the service principal
@@ -356,13 +362,13 @@ In this example, you create a few policies to learn how the priority system work
356362
Add-AzureADServicePrincipalPolicy -Id $sp.ObjectId -RefObjectId $policy.Id
357363
```
358364
359-
3. Set the `IsOrganizationDefault` flag to false:
365+
1. Set the `IsOrganizationDefault` flag to false:
360366
361367
```powershell
362368
Set-AzureADPolicy -Id $policy.Id -DisplayName "ComplexPolicyScenario" -IsOrganizationDefault $false
363369
```
364370
365-
4. Create a new organization default policy:
371+
1. Create a new organization default policy:
366372
367373
```powershell
368374
New-AzureADPolicy -Definition @('{"TokenLifetimePolicy":{"Version":1,"MaxAgeSingleFactor":"until-revoked"}}') -DisplayName "ComplexPolicyScenarioTwo" -IsOrganizationDefault $true -Type "TokenLifetimePolicy"

articles/azure-app-configuration/quickstart-feature-flag-spring-boot.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Add feature flags to Spring Boot apps and manage them using Azure A
44
author: lisaguthrie
55
ms.service: azure-app-configuration
66
ms.topic: quickstart
7-
ms.date: 04/13/2020
7+
ms.date: 04/18/2020
88
ms.author: lcozzens
99

1010
#Customer intent: As an Spring Boot developer, I want to use feature flags to control feature availability quickly and confidently.
@@ -52,9 +52,9 @@ Use the [Spring Initializr](https://start.spring.io/) to create a new Spring Boo
5252

5353
1. After you extract the files on your local system, your Spring Boot application is ready for editing. Locate *pom.xml* in the root directory of your app.
5454

55-
1. Open the *pom.xml* file in a text editor and add the following to the list of `<dependencies>`.:
55+
1. Open the *pom.xml* file in a text editor and add the following to the list of `<dependencies>`:
5656

57-
### Spring Cloud 1.1.x
57+
**Spring Cloud 1.1.x**
5858

5959
```xml
6060
<dependency>
@@ -73,7 +73,7 @@ Use the [Spring Initializr](https://start.spring.io/) to create a new Spring Boo
7373
</dependency>
7474
```
7575

76-
### Spring Cloud 1.2.x
76+
**Spring Cloud 1.2.x**
7777

7878
```xml
7979
<dependency>

articles/azure-app-configuration/quickstart-java-spring-app.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: maiye
88
editor: ''
99
ms.service: azure-app-configuration
1010
ms.topic: quickstart
11-
ms.date: 12/17/2019
11+
ms.date: 04/18/2020
1212
ms.author: lcozzens
1313

1414
#Customer intent: As a Java Spring developer, I want to manage all my app settings in one place.
@@ -139,25 +139,25 @@ Use the [Spring Initializr](https://start.spring.io/) to create a new Spring Boo
139139
1. Create a new file named `bootstrap.properties` under the resources directory of your app, and add the following lines to the file. Replace the sample values with the appropriate properties for your App Configuration store.
140140

141141
```CLI
142-
spring.cloud.azure.appconfiguration.stores[0].name= ${APP_CONFIGURATION_CONNECTION_STRING}
142+
spring.cloud.azure.appconfiguration.stores[0].connection-string=${APP_CONFIGURATION_CONNECTION_STRING}
143143
```
144144

145145
1. Set an environment variable named **APP_CONFIGURATION_CONNECTION_STRING**, and set it to the access key to your App Configuration store. At the command line, run the following command and restart the command prompt to allow the change to take effect:
146146

147147
```cmd
148-
setx APP_CONFIGURATION_CONNECTION_STRING "connection-string-of-your-app-configuration-store"
148+
setx APP_CONFIGURATION_CONNECTION_STRING "connection-string-of-your-app-configuration-store"
149149
```
150150

151151
If you use Windows PowerShell, run the following command:
152152

153153
```azurepowershell
154-
$Env:APP_CONFIGURATION_CONNECTION_STRING = "connection-string-of-your-app-configuration-store"
154+
$Env:APP_CONFIGURATION_CONNECTION_STRING = "connection-string-of-your-app-configuration-store"
155155
```
156156

157157
If you use macOS or Linux, run the following command:
158158

159159
```cmd
160-
export APP_CONFIGURATION_CONNECTION_STRING='connection-string-of-your-app-configuration-store'
160+
export APP_CONFIGURATION_CONNECTION_STRING='connection-string-of-your-app-configuration-store'
161161
```
162162

163163
## Build and run the app locally

articles/governance/blueprints/how-to/import-export-ps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -100,7 +100,7 @@ manually created blueprint definition in the [required folder structure](#folder
100100
you can import that blueprint definition to a different management group or subscription.
101101

102102
For examples of built-in blueprint definitions, see the
103-
[Azure Blueprint GitHub repo](https://github.com/Azure/azure-blueprints/tree/master/samples/builtins).
103+
[Azure Blueprint GitHub repo](https://github.com/Azure/azure-blueprints/tree/master/samples/001-builtins).
104104

105105
- **Name** [required]
106106
- Specifies the name for the new blueprint definition

articles/hdinsight/security-baseline.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -703,7 +703,7 @@ Optionally, if you have a Rapid7, Qualys, or any other vulnerability management
703703

704704
How to Install Rapid7 Agent Manually:
705705

706-
https://insightvm.help.rapid7.com/v1.0/docs/agent-installation-on-linux
706+
https://insightvm.help.rapid7.com/docs/install
707707

708708
How to install Qualys Agent Manually:
709709

articles/machine-learning/team-data-science-process/hive-criteo-walkthrough.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -428,7 +428,7 @@ For the **Import Data** module, the values of the parameters that are provided i
428428

429429
1. Choose "Hive query" for **Data Source**
430430
2. In the **Hive database query** box, a simple SELECT * FROM <your\_database\_name.your\_table\_name> - is enough.
431-
3. **Hcatalog server URI**: If your cluster is "abc", then this is simply: https://abc.azurehdinsight.net
431+
3. **Hcatalog server URI**: If your cluster is "abc", then this is simply: https:\//abc.azurehdinsight.net
432432
4. **Hadoop user account name**: The user name chosen at the time of commissioning the cluster. (NOT the Remote Access user name!)
433433
5. **Hadoop user account password**: The password for the user name chosen at the time of commissioning the cluster. (NOT the Remote Access password!)
434434
6. **Location of output data**: Choose "Azure"

articles/machine-learning/team-data-science-process/hive-walkthrough.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -715,7 +715,7 @@ To issue Hive queries in the [Import Data][import-data] module of Machine Learni
715715

716716
Here are some details about the [Import Data][import-data] module and the parameters to input:
717717

718-
**HCatalog server URI**: If the cluster name is **abc123**, then use: https://abc123.azurehdinsight.net.
718+
**HCatalog server URI**: If the cluster name is **abc123**, then use: https:\//abc123.azurehdinsight.net.
719719

720720
**Hadoop user account name**: The user name chosen for the cluster (not the remote access user name).
721721

articles/machine-learning/team-data-science-process/predictive-maintenance-playbook.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -461,6 +461,6 @@ Microsoft Azure offers learning paths for the foundational concepts behind PdM t
461461
| [Microsoft AI YouTube Webinars](https://www.youtube.com/watch?v=NvrH7_KKzoM&t=4s) | Public |
462462
| [Microsoft AI Show](https://channel9.msdn.com/Shows/AI-Show) | Public |
463463
| [LearnAI@MS](https://learnanalytics.microsoft.com) | Partners |
464-
| [Microsoft Partner Network](https://learningportal.microsoft.com) | Partners |
464+
| [Microsoft Partner Network](https://partner.microsoft.com/training/training-center) | Partners |
465465

466466
In addition, free MOOCS (massive open online courses) on AI are offered online by academic institutions like Stanford and MIT, and other educational companies.

articles/machine-learning/team-data-science-process/team-data-science-process-for-data-scientists.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ You can use the items in the following table to guide your own self-study. Read
5555
| Use Azure Machine Learning to create a predictive solution | [Azure Machine Learning](../overview-what-is-azure-ml.md) | Microsoft Azure Machine Learning uses AI for data wrangling and feature engineering, manages experiments, and tracks model runs. All of this works in a single environment and most functions can run locally or in Azure. You can use the PyTorch, TensorFlow, and other frameworks to create your experiments. In this article, we focus on a complete example of this process, using everything you’ve learned so far. | |
5656
| Use Power BI to visualize results | [Power BI](https://powerbi.microsoft.com/guided-learning/) | Power BI is Microsoft’s data visualization tool. It is available on multiple platforms from Web to mobile devices and desktop computers. In this article, you learn how to work with the output of the solution you’ve created by accessing the results from Azure storage and creating visualizations using Power BI. | [Complete this tutorial on Power BI.](https://powerbi.microsoft.com/documentation/powerbi-service-get-started/) Then connect Power BI to the Blob CSV created in an experiment run. |
5757
| Monitor your Solution | [Application Insights](../../azure-monitor/app/app-insights-overview.md) | There are multiple tools you can use to monitor your end solution. Azure Application Insights makes it easy to integrate built-in monitoring into your solution. | [Set up Application Insights to monitor an Application](https://cmatskas.com/visual-studio-code-integration-with-azure-application-insights/). |
58-
| | [Azure Monitor logs](../../log-analytics/log-analytics-overview.md) | Another method to monitor your application is to integrate it into your DevOps process. The Azure Monitor logs system provides a rich set of features to help you watch your analytic solutions after you deploy them. | [Complete this tutorial](https://docs.loganalytics.io/docs/Learn/Getting-Started/Getting-started-with-the-Analytics-portal) on using Azure Monitor logs. |
58+
| | [Azure Monitor logs](../../log-analytics/log-analytics-overview.md) | Another method to monitor your application is to integrate it into your DevOps process. The Azure Monitor logs system provides a rich set of features to help you watch your analytic solutions after you deploy them. | [Complete this tutorial](https://docs.microsoft.com/azure/azure-monitor/log-query/get-started-queries) on using Azure Monitor logs. |
5959
| Complete this Learning Path | | Congratulations! You’ve completed this learning path. |
6060

6161
## Next steps

0 commit comments

Comments
 (0)