Skip to content

Commit d641f7c

Browse files
Merge pull request #197535 from markingmyname/mysqlss2
[MySQL] Add ms.subservice to all Flexible and Single Server files (Bulk update)
2 parents 1500e5e + dec18e1 commit d641f7c

File tree

251 files changed

+314
-275
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

251 files changed

+314
-275
lines changed

articles/active-directory-b2c/custom-policy-developer-notes.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 04/30/2022
12+
ms.date: 12/09/2021
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -156,7 +156,7 @@ The following table summarizes the Security Assertion Markup Language (SAML) app
156156
| ------- | :--: | ----- |
157157
| [MFA using time-based one-time password (TOTP) with authenticator apps](multi-factor-authentication.md#verification-methods) | Preview | Users can use any authenticator app that supports TOTP verification, such as the [Microsoft Authenticator app](https://www.microsoft.com/security/mobile-authenticator-app).|
158158
| [Phone factor authentication](phone-factor-technical-profile.md) | GA | |
159-
| [Azure AD MFA authentication](multi-factor-auth-technical-profile.md) | GA | |
159+
| [Azure AD MFA authentication](multi-factor-auth-technical-profile.md) | Preview | |
160160
| [One-time password](one-time-password-technical-profile.md) | GA | |
161161
| [Azure Active Directory](active-directory-technical-profile.md) as local directory | GA | |
162162
| [Predicate validations](predicates.md) | GA | For example, password complexity. |
@@ -168,8 +168,8 @@ The following table summarizes the Security Assertion Markup Language (SAML) app
168168
| Feature | Custom policy | Notes |
169169
| ------- | :--: | ----- |
170170
| Azure portal | GA | |
171-
| [Application Insights user journey logs](troubleshoot-with-application-insights.md) | GA | Used for troubleshooting during development. |
172-
| [Application Insights event logs](analytics-with-application-insights.md) | GA | Used to monitor user flows in production. |
171+
| [Application Insights user journey logs](troubleshoot-with-application-insights.md) | Preview | Used for troubleshooting during development. |
172+
| [Application Insights event logs](analytics-with-application-insights.md) | Preview | Used to monitor user flows in production. |
173173

174174
## Responsibilities of custom policy feature-set developers
175175

articles/active-directory-b2c/deploy-custom-policies-devops.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 04/30/2022
12+
ms.date: 03/25/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---

articles/active-directory-b2c/multi-factor-auth-technical-profile.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 04/30/2022
12+
ms.date: 12/09/2021
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -18,6 +18,8 @@ ms.subservice: B2C
1818

1919
Azure Active Directory B2C (Azure AD B2C) provides support for verifying a phone number by using a verification code, or verifying a Time-based One-time Password (TOTP) code.
2020

21+
[!INCLUDE [b2c-public-preview-feature](../../includes/active-directory-b2c-public-preview.md)]
22+
2123
## Protocol
2224

2325
The **Name** attribute of the **Protocol** element needs to be set to `Proprietary`. The **handler** attribute must contain the fully qualified name of the protocol handler assembly that is used by Azure AD B2C:
@@ -166,9 +168,9 @@ The following example shows an Azure AD MFA technical profile used to verify the
166168

167169
In this mode, the user is required to install any authenticator app that supports time-based one-time password (TOTP) verification, such as the [Microsoft Authenticator app](https://www.microsoft.com/security/mobile-authenticator-app), on a device that they own.
168170

169-
During the first sign up or sign in, the user scans a QR code, opens a deep link, or enters the code manually using the authenticator app. To verify the TOTP code, use the [Begin verify OTP](#begin-verify-totp) followed by [Verify TOTP](#verify-totp) validation technical profiles.
171+
During the first sign-up or sign-in, the user scans a QR code, opens a deep link, or enters the code manually using the authenticator app. To verify the TOTP code, use the [Begin verify OTP](#begin-verify-totp) followed by [Verify TOTP](#verify-totp) validation technical profiles.
170172

171-
For subsequent sign ins, use the [Get available devices](#get-available-devices) method to check if the user has already enrolled their device. If the number of available devices is greater than zero, this indicates the user has enrolled before. In this case, the user needs to type the TOTP code that appears in the authenticator app.
173+
For subsequent sign-ins, use the [Get available devices](#get-available-devices) method to check if the user has already enrolled their device. If the number of available devices is greater than zero, this indicates the user has enrolled before. In this case, the user needs to type the TOTP code that appears in the authenticator app.
172174

173175
The technical profile:
174176

articles/active-directory-b2c/self-asserted-technical-profile.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 04/30/2022
12+
ms.date: 02/17/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -50,6 +50,8 @@ In a self-asserted technical profile, you can use the **InputClaims** and **Inpu
5050

5151
## Display claims
5252

53+
The display claims feature is currently in **preview**.
54+
5355
The **DisplayClaims** element contains a list of claims to be presented on the screen for collecting data from the user. To prepopulate the values of display claims, use the input claims that were previously described. The element may also contain a default value.
5456

5557
The order of the claims in **DisplayClaims** specifies the order in which Azure AD B2C renders the claims on the screen. To force the user to provide a value for a specific claim, set the **Required** attribute of the **DisplayClaim** element to `true`.
@@ -131,7 +133,7 @@ Use output claims when:
131133
- **Claims are output by output claims transformation**.
132134
- **Setting a default value in an output claim** without collecting data from the user or returning the data from the validation technical profile. The `LocalAccountSignUpWithLogonEmail` self-asserted technical profile sets the **executed-SelfAsserted-Input** claim to `true`.
133135
- **A validation technical profile returns the output claims** - Your technical profile may call a validation technical profile that returns some claims. You may want to bubble up the claims and return them to the next orchestration steps in the user journey. For example, when signing in with a local account, the self-asserted technical profile named `SelfAsserted-LocalAccountSignin-Email` calls the validation technical profile named `login-NonInteractive`. This technical profile validates the user credentials and also returns the user profile. Such as 'userPrincipalName', 'displayName', 'givenName' and 'surName'.
134-
- **A display control returns the output claims** - Your technical profile may have a reference to a [display control](display-controls.md). The display control returns some claims, such as the verified email address. You may want to bubble up the claims and return them to the next orchestration steps in the user journey.
136+
- **A display control returns the output claims** - Your technical profile may have a reference to a [display control](display-controls.md). The display control returns some claims, such as the verified email address. You may want to bubble up the claims and return them to the next orchestration steps in the user journey. The display control feature is currently in **preview**.
135137

136138
The following example demonstrates the use of a self-asserted technical profile that uses both display claims and output claims.
137139

articles/active-directory-b2c/technicalprofiles.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 04/30/2022
12+
ms.date: 11/30/2021
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -99,7 +99,7 @@ The **TechnicalProfile** element contains the following elements:
9999
| InputClaimsTransformations | 0:1 | A list of previously defined references to claims transformations that should be executed before any claims are sent to the claims provider or the relying party. |
100100
| InputClaims | 0:1 | A list of previously defined references to claim types that are taken as input in the technical profile. |
101101
| PersistedClaims | 0:1 | A list of previously defined references to claim types that will be persisted by the technical profile. |
102-
| DisplayClaims | 0:1 | A list of previously defined references to claim types that are presented by the [self-asserted technical profile](self-asserted-technical-profile.md). |
102+
| DisplayClaims | 0:1 | A list of previously defined references to claim types that are presented by the [self-asserted technical profile](self-asserted-technical-profile.md). The DisplayClaims feature is currently in preview. |
103103
| OutputClaims | 0:1 | A list of previously defined references to claim types that are taken as output in the technical profile. |
104104
| OutputClaimsTransformations | 0:1 | A list of previously defined references to claims transformations that should be executed after the claims are received from the claims provider. |
105105
| ValidationTechnicalProfiles | 0:n | A list of references to other technical profiles that the technical profile uses for validation purposes. For more information, see [Validation technical profile](validation-technical-profile.md).|

articles/active-directory-b2c/whats-new-docs.md

Lines changed: 1 addition & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "What's new in Azure Active Directory business-to-customer (B2C)"
33
description: "New and updated documentation for the Azure Active Directory business-to-customer (B2C)."
4-
ms.date: 05/04/2022
4+
ms.date: 04/04/2022
55
ms.service: active-directory
66
ms.subservice: B2C
77
ms.topic: reference
@@ -15,29 +15,6 @@ manager: CelesteDG
1515

1616
Welcome to what's new in Azure Active Directory B2C documentation. This article lists new docs that have been added and those that have had significant updates in the last three months. To learn what's new with the B2C service, see [What's new in Azure Active Directory](../active-directory/fundamentals/whats-new.md).
1717

18-
## April 2022
19-
20-
### New articles
21-
22-
- [Configure Asignio with Azure Active Directory B2C for multifactor authentication](partner-asignio.md)
23-
- [Set up sign up and sign in with Mobile ID using Azure Active Directory B2C](identity-provider-mobile-id.md)
24-
- [Find help and open a support ticket for Azure Active Directory B2C](find-help-open-support-ticket.md)
25-
26-
### Updated articles
27-
28-
- [Configure authentication in a sample single-page application by using Azure AD B2C](configure-authentication-sample-spa-app.md)
29-
- [Configure xID with Azure Active Directory B2C for passwordless authentication](partner-xid.md)
30-
- [Azure Active Directory B2C service limits and restrictions](service-limits.md)
31-
- [Localization string IDs](localization-string-ids.md)
32-
- [Manage your Azure Active Directory B2C tenant](tenant-management.md)
33-
- [Page layout versions](page-layout.md)
34-
- [Secure your API used an API connector in Azure AD B2C](secure-rest-api.md)
35-
- [Azure Active Directory B2C: What's new](whats-new-docs.md)
36-
- [Application types that can be used in Active Directory B2C](application-types.md)
37-
- [Publish your Azure Active Directory B2C app to the Azure Active Directory app gallery](publish-app-to-azure-ad-app-gallery.md)
38-
- [Quickstart: Set up sign in for a desktop app using Azure Active Directory B2C](quickstart-native-app-desktop.md)
39-
- [Register a single-page application (SPA) in Azure Active Directory B2C](tutorial-register-spa.md)
40-
4118
## March 2022
4219

4320
### New articles

articles/active-directory/verifiable-credentials/whats-new.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ manager: karenhoran
66
ms.service: active-directory
77
ms.subservice: verifiable-credentials
88
ms.topic: reference
9-
ms.date: 05/04/2022
9+
ms.date: 04/27/2022
1010
ms.custom: references_regions
1111
ms.author: barclayn
1212

@@ -18,10 +18,6 @@ ms.author: barclayn
1818

1919
This article lists the latest features, improvements, and changes in the Azure Active Directory (Azure AD) Verifiable Credentials service.
2020

21-
## May
22-
23-
We are expanding our service to all Azure AD customers! Verifiable credentials are now available to everyone with an Azure AD subscription (Free and Premium). Existing tenants that configured the Verifiable Credentials service prior to May 4, 2022 must make a [small change](verifiable-credentials-faq.md#updating-the-vc-service-configuration) to avoid service disruptions.
24-
2521
## April
2622

2723
Starting next month, we are rolling out exciting changes to the subscription requirements for the Verifiable Credentials service. Administrators must perform a small configuration change before **May 4, 2022** to avoid service disruptions. Follow [these steps](verifiable-credentials-faq.md?#updating-the-vc-service-configuration) to apply the required configuration changes.

articles/aks/use-kms-etcd-encryption.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ This article shows you how to enable encryption at rest for your Kubernetes data
1515
* Bring your own keys
1616
* Provide encryption at rest for secrets stored in etcd
1717

18-
For more details on using the KMS plugin, see [Encrypting Secret Data at Rest](https://kubernetes.io/docs/tasks/administer-cluster/kms-provider/).
18+
For more information on using the KMS plugin, see [Encrypting Secret Data at Rest](https://kubernetes.io/docs/tasks/administer-cluster/kms-provider/).
1919

2020
[!INCLUDE [preview features callout](./includes/preview/preview-callout.md)]
2121

@@ -62,11 +62,12 @@ az provider register --namespace Microsoft.ContainerService
6262
The following limitations apply when you integrate KMS etcd encryption with AKS:
6363

6464
* Disabling of the KMS etcd encryption feature.
65-
* Changing of key Id, including key name and key version.
65+
* Changing of key ID, including key name and key version.
6666
* Deletion of the key, Key Vault, or the associated identity.
67-
* KMS etcd encryption does not work with System-Assigned Managed Identity. The keyvault access-policy is required to be set before the feature is enabled. In addition, System-Assigned Managed Identity is not available until cluster creation, thus there is a cycle dependency.
67+
* KMS etcd encryption doesn't work with System-Assigned Managed Identity. The keyvault access-policy is required to be set before the feature is enabled. In addition, System-Assigned Managed Identity isn't available until cluster creation, thus there's a cycle dependency.
6868
* Using Azure Key Vault with PrivateLink enabled.
6969
* Using more than 2000 secrets in a cluster.
70+
* Managed HSM Support
7071
* Bring your own (BYO) Azure Key Vault from another tenant.
7172

7273

@@ -106,23 +107,23 @@ Use `az identity create` to create a User-assigned managed identity.
106107
az identity create --name MyIdentity --resource-group MyResourceGroup
107108
```
108109

109-
Use `az identity show` to get Identity Object Id.
110+
Use `az identity show` to get Identity Object ID.
110111

111112
```azurecli
112113
IDENTITY_OBJECT_ID=$(az identity show --name MyIdentity --resource-group MyResourceGroup --query 'principalId' -o tsv)
113114
echo $IDENTITY_OBJECT_ID
114115
```
115116

116-
The above example stores the value of the Identity Object Id in *IDENTITY_OBJECT_ID*.
117+
The above example stores the value of the Identity Object ID in *IDENTITY_OBJECT_ID*.
117118

118-
Use `az identity show` to get Identity Resource Id.
119+
Use `az identity show` to get Identity Resource ID.
119120

120121
```azurecli
121122
IDENTITY_RESOURCE_ID=$(az identity show --name MyIdentity --resource-group MyResourceGroup --query 'id' -o tsv)
122123
echo $IDENTITY_RESOURCE_ID
123124
```
124125

125-
The above example stores the value of the Identity Resource Id in *IDENTITY_RESOURCE_ID*.
126+
The above example stores the value of the Identity Resource ID in *IDENTITY_RESOURCE_ID*.
126127

127128
## Assign permissions (decrypt and encrypt) to access key vault
128129

@@ -148,7 +149,7 @@ Use [az aks update][az-aks-update] with the `--enable-azure-keyvault-kms` and `-
148149
az aks update --name myAKSCluster --resource-group MyResourceGroup --enable-azure-keyvault-kms --azure-keyvault-kms-key-id $KEY_ID
149150
```
150151

151-
Use below command to update all secrets. Otherwise, the old secrets are not encrypted.
152+
Use below command to update all secrets. Otherwise, the old secrets aren't encrypted.
152153

153154
```azurecli-interactive
154155
kubectl get secrets --all-namespaces -o json | kubectl replace -f -

articles/app-service/overview-arc-integration.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -202,7 +202,6 @@ If your extension was in the stable version and auto-upgrade-minor-version is se
202202

203203
### Application services extension v 0.13.0 (April 2022)
204204

205-
- Added support for Azure Functions v4 and introduces support for PowerShell functions
206205
- Added support for Application Insights codeless integration for Node JS applications
207206
- Added support for [Access Restrictions](app-service-ip-restrictions.md) via CLI
208207
- More details provided when extension fails to install, to assist with troubleshooting issues

articles/azure-monitor/app/convert-classic-resource.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,6 @@ Once the migration is complete, you can use [diagnostic settings](../essentials/
6363
> - If the retention setting for your Application Insights instance under **Configure** > **Usage and estimated costs** > **Data Retention** is enabled, then use that setting to control the retention days for the telemetry data still saved in your classic resource's storage.
6464
6565
- Understand [Workspace-based Application Insights](../logs/cost-logs.md#application-insights-billing) usage and costs.
66-
- Understand [Workspace-based resource changes](#workspace-based-resource-changes).
6766

6867
## Migrate your resource
6968

0 commit comments

Comments
 (0)