Skip to content

Commit cf4d43b

Browse files
authored
Merge pull request #221686 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents fcd7e6b + 4ee0639 commit cf4d43b

File tree

5 files changed

+7
-4
lines changed

5 files changed

+7
-4
lines changed

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ Contributing to open source is more than just providing updates, it's also about
1010

1111
You've decided to contribute, that's great! To contribute to the documentation, you need a few tools.
1212

13-
#### Github
13+
#### GitHub
1414

1515
Contributing to the documentation requires a GitHub account. If you don't have an account, follow the instructions for [GitHub account setup](https://learn.microsoft.com/contribute/get-started-setup-github) from our contributor guide.
1616

articles/active-directory/conditional-access/terms-of-use.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -385,6 +385,9 @@ A: On the Terms of use blade, select the number under **Accepted**. You can also
385385
**Q: How long is information stored?**<br />
386386
A: The user counts in the terms of use report and who accepted/declined are stored for the life of the terms of use. The Azure AD audit logs are stored for 30 days.
387387

388+
**Q: Why do I see a different number of consents in the terms of use details overview versus the Azure AD audit logs?**<br />
389+
A: The terms of use details overview data is stored for the lifetime of that terms of use policy, while the Azure AD audit logs are stored for 30 days.
390+
388391
**Q: Why do I see a different number of consents in the terms of use details overview versus the exported CSV report?**<br />
389392
A: The terms of use details overview reflects aggregated acceptances of the current version of the policy (updated once every day). If expiration is enabled or a TOU agreement is updated (with re-acceptance required), the count on the details overview is reset since the acceptances are expired, thereby showing the count of the current version. All acceptance history is still captured in the CSV report.
390393

articles/api-management/import-container-app-with-oas.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ The wildcard operation allows the same requests to the backend service as the op
8585
> [!NOTE]
8686
> Products are associations of one or more APIs. You can include many APIs and offer them to developers through the developer portal. Developers must first subscribe to a product to get access to the API. When they subscribe, they get a subscription key that is good for any API in that product. If you created the API Management instance, you're an administrator and subscribed to every product by default.
8787
>
88-
> Each API Management instance comes with two sample products when createdgg:
88+
> Each API Management instance comes with two sample products when created:
8989
> * **Starter**
9090
> * **Unlimited**
9191

articles/communication-services/concepts/service-limits.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ Sending a high volume of messages has a set of limitations on the number of emai
8686
| **Name** | Limit |
8787
|--|--|
8888
|Number of recipients in Email|50 |
89-
|Attachment size - per message |10 MB |
89+
|Total email request size (including attachments) |10 MB |
9090

9191
### Action to take
9292
This sandbox setup is to help developers start building the application. You can gradually request to increase the sending volume once the application is ready to go live. Submit a support request to raise your desired sending limit if you require sending a volume of messages exceeding the rate limits.

articles/key-vault/general/rbac-migration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Azure RBAC has several Azure built-in roles that you can assign to users, groups
3636
Key Vault built-in roles for keys, certificates, and secrets access management:
3737
- Key Vault Administrator
3838
- Key Vault Reader
39-
- Key Vault Certificate Officer
39+
- Key Vault Certificates Officer
4040
- Key Vault Crypto Officer
4141
- Key Vault Crypto User
4242
- Key Vault Crypto Service Encryption User

0 commit comments

Comments
 (0)