Skip to content

Commit cfdbc82

Browse files
authored
Merge pull request #196987 from MicrosoftDocs/main
5/03 PM Publish
2 parents 87dec51 + 1f0c1f0 commit cfdbc82

File tree

224 files changed

+7622
-1660
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

224 files changed

+7622
-1660
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -897,6 +897,7 @@
897897
".openpublishing.redirection.healthcare-apis.json",
898898
".openpublishing.redirection.iot-hub.json",
899899
".openpublishing.redirection.key-vault.json",
900+
".openpublishing.redirection.sql-database.json",
900901
".openpublishing.redirection.security-benchmark.json",
901902
"articles/synapse-analytics/.openpublishing.redirection.synapse-analytics.json",
902903
".openpublishing.redirection.azure-web-pubsub.json",

.openpublishing.redirection.json

Lines changed: 30 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -23828,6 +23828,36 @@
2382823828
"redirect_url": "/rest/api/securityinsights/watchlists",
2382923829
"redirect_document_id": false
2383023830
},
23831+
{
23832+
"source_path_from_root": "/articles/sentinel/sap-deploy-solution.md",
23833+
"redirect_url": "/azure/sentinel/sap/deployment-overview",
23834+
"redirect_document_id": false
23835+
},
23836+
{
23837+
"source_path_from_root": "/articles/sentinel/sap-solution-detailed-requirements.md",
23838+
"redirect_url": "/azure/sentinel/sap/prerequisites-for-deploying-sap-continuous-threat-monitoring",
23839+
"redirect_document_id": false
23840+
},
23841+
{
23842+
"source_path_from_root": "/articles/sentinel/sap-solution-security-content.md",
23843+
"redirect_url": "/azure/sentinel/sap/sap-solution-security-content",
23844+
"redirect_document_id": false
23845+
},
23846+
{
23847+
"source_path_from_root": "/articles/sentinel/sap-solution-deploy-alternate.md",
23848+
"redirect_url": "/azure/sentinel/sap/sap-solution-deploy-alternate",
23849+
"redirect_document_id": false
23850+
},
23851+
{
23852+
"source_path_from_root": "/articles/sentinel/sap-solution-deploy-snc.md",
23853+
"redirect_url": "/azure/sentinel/sap/configure-snc",
23854+
"redirect_document_id": false
23855+
},
23856+
{
23857+
"source_path_from_root": "/articles/sentinel/sap-solution-log-reference.md",
23858+
"redirect_url": "/azure/sentinel/sap/sap-solution-log-reference",
23859+
"redirect_document_id": false
23860+
},
2383123861
{
2383223862
"source_path_from_root": "/articles/service-bus/index.md",
2383323863
"redirect_url": "/azure/service-bus-messaging/index",
@@ -24213,26 +24243,6 @@
2421324243
"redirect_url": "/azure/azure-sql/virtual-machines/windows/sql-server-on-azure-vm-iaas-what-is-overview",
2421424244
"redirect_document_id": false
2421524245
},
24216-
{
24217-
"source_path_from_root": "/articles/sql-database/index.md",
24218-
"redirect_url": "/azure/azure-sql/database/index",
24219-
"redirect_document_id": false
24220-
},
24221-
{
24222-
"source_path_from_root": "/articles/sql-database/sql-database-managed-instance-create-manage.md",
24223-
"redirect_url": "/azure/azure-sql/managed-instance/instance-create-quickstart",
24224-
"redirect_document_id": false
24225-
},
24226-
{
24227-
"source_path_from_root": "/articles/sql-database/sql-database-single-database.md",
24228-
"redirect_url": "/azure/azure-sql/database/sql-database-paas-overview",
24229-
"redirect_document_id": false
24230-
},
24231-
{
24232-
"source_path_from_root": "/articles/sql-database/sql-database-managed-instance.md",
24233-
"redirect_url": "/azure/azure-sql/managed-instance/sql-managed-instance-paas-overview",
24234-
"redirect_document_id": false
24235-
},
2423624246
{
2423724247
"source_path_from_root": "/articles/sql-data-warehouse/sql-data-warehouse-backups.md",
2423824248
"redirect_url": "/azure/sql-data-warehouse/backup-and-restore",

.openpublishing.redirection.sql-database.json

Lines changed: 2570 additions & 0 deletions
Large diffs are not rendered by default.

articles/active-directory/authentication/how-to-mfa-number-match.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use number matching in MFA notifications
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 03/18/2022
7+
ms.date: 05/03/2022
88
ms.author: justinha
99
author: mjsantani
1010
ms.collection: M365-identity-device-management
@@ -242,6 +242,7 @@ To enable number matching in the Azure AD portal, complete the following steps:
242242
>[!NOTE]
243243
>[Least privilege role in Azure Active Directory - Multi-factor Authentication](https://docs.microsoft.com/azure/active-directory/roles/delegate-by-task#multi-factor-authentication)
244244
245+
Number matching is not supported for Apple Watch notifications. Apple Watch need to use their phone to approve notifications when number matching is enabled.
245246

246247
## Next steps
247248

articles/aks/ingress-static-ip.md

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -146,8 +146,14 @@ Next, create a public IP address with the *static* allocation method using the [
146146

147147
---
148148

149-
> [!NOTE]
150-
> The above commands create an IP address that will be deleted if you delete your AKS cluster. Alternatively, you can create an IP address in a different resource group which can be managed separately from your AKS cluster. If you create an IP address in a different resource group, ensure the cluster identity used by the AKS cluster has delegated permissions to the other resource group, such as *Network Contributor*. For more information, see [Use a static public IP address and DNS label with the AKS load balancer][aks-static-ip].
149+
The above commands create an IP address that will be deleted if you delete your AKS cluster.
150+
151+
Alternatively, you can create an IP address in a different resource group which can be managed separately from your AKS cluster. If you create an IP address in a different resource group, ensure the following:
152+
153+
* The cluster identity used by the AKS cluster has delegated permissions to the resource group, such as *Network Contributor*.
154+
* Add the `--set controller.service.annotations."service\.beta\.kubernetes\.io/azure-load-balancer-resource-group"="<RESOURCE_GROUP>"` parameter. Replace `<RESOURCE_GROUP>` with the name of the resource group where the IP address resides.
155+
156+
For more information, see [Use a static public IP address and DNS label with the AKS load balancer][aks-static-ip].
151157

152158
Now deploy the *nginx-ingress* chart with Helm. For added redundancy, two replicas of the NGINX ingress controllers are deployed with the `--set controller.replicaCount` parameter. To fully benefit from running replicas of the ingress controller, make sure there's more than one node in your AKS cluster.
153159

@@ -167,8 +173,7 @@ The ingress controller also needs to be scheduled on a Linux node. Windows Serve
167173
168174
Update the following script with the **IP address** of your ingress controller and a **unique name** that you would like to use for the FQDN prefix.
169175

170-
> [!IMPORTANT]
171-
> You must update replace `<STATIC_IP>` and `<DNS_LABEL>` with your own IP address and unique name when running the command. The DNS_LABEL must be unique within the Azure region.
176+
Replace `<STATIC_IP>` and `<DNS_LABEL>` with your own IP address and unique name when running the command. The DNS_LABEL must be unique within the Azure region.
172177

173178
### [Azure CLI](#tab/azure-cli)
174179

articles/attestation/author-sign-policy.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ ms.author: mbaldwin
1010

1111

1212
---
13+
1314
# How to author an attestation policy
1415

1516
Attestation policy is a file uploaded to Microsoft Azure Attestation. Azure Attestation offers the flexibility to upload a policy in an attestation-specific policy format. Alternatively, an encoded version of the policy, in JSON Web Signature, can also be uploaded. The policy administrator is responsible for writing the attestation policy. In most attestation scenarios, the relying party acts as the policy administrator. The client making the attestation call sends attestation evidence, which the service parses and converts into incoming claims (set of properties, value). The service then processes the claims, based on what is defined in the policy, and returns the computed result.
@@ -134,3 +135,4 @@ After creating a policy file, to upload a policy in JWS format, follow the below
134135
## Next steps
135136
- [Set up Azure Attestation using PowerShell](quickstart-powershell.md)
136137
- [Attest an SGX enclave using code samples](/samples/browse/?expanded=azure&terms=attestation)
138+
- [Learn more about policy versions](policy-version-1-0.md)

0 commit comments

Comments
 (0)