Skip to content

Commit d956d6e

Browse files
authored
Merge pull request #295788 from MicrosoftDocs/main
3/5/2025 AM Publish
2 parents 104e9bc + b1b28bb commit d956d6e

File tree

40 files changed

+170
-330
lines changed

40 files changed

+170
-330
lines changed

articles/active-directory-b2c/identity-provider-apple-id.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -110,7 +110,7 @@ If the sign-in process is successful, your browser is redirected to `https://jwt
110110

111111
## Signing the client secret
112112

113-
Use the .p8 file you downloaded previously to sign the client secret into a JWT token. There are many libraries that can create and sign the JWT for you. Use the [Azure Function that creates a token](https://github.com/azure-ad-b2c/samples/tree/master/policies/sign-in-with-apple/azure-function) for you.
113+
Use the .p8 file you downloaded previously to sign the client secret into a JWT. There are many libraries that can create and sign the JWT for you. Use the [Azure Function that creates a token](https://github.com/azure-ad-b2c/samples/tree/master/policies/sign-in-with-apple/azure-function) for you.
114114

115115
1. Create an [Azure Function](../azure-functions/functions-create-function-app-portal.md).
116116
1. Under **Developer**, select **Code + Test**.
@@ -154,7 +154,7 @@ You need to store the client secret that you previously recorded in your Azure A
154154
1. Select **Policy Keys**, and then select **Add**.
155155
1. For **Options**, choose **Manual**.
156156
1. Enter a **Name** for the policy key. For example, "AppleSecret". The prefix "B2C_1A_" is added automatically to the name of your key.
157-
1. In **Secret**, enter the value of a token returned by the Azure Function (a JWT token).
157+
1. In **Secret**, enter the value of a token returned by the Azure Function (a JWT).
158158
1. For **Key usage**, select **Signature**.
159159
1. Select **Create**.
160160

articles/active-directory-b2c/session-behavior.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -317,9 +317,9 @@ The following example illustrates the JWT and SAML token issuers with single sig
317317
<ClaimsProvider>
318318
<DisplayName>Local Account SignIn</DisplayName>
319319
<TechnicalProfiles>
320-
<!-- JWT Token Issuer -->
320+
<!-- JWT Issuer -->
321321
<TechnicalProfile Id="JwtIssuer">
322-
<DisplayName>JWT token Issuer</DisplayName>
322+
<DisplayName>JWT Issuer</DisplayName>
323323
<Protocol Name="OpenIdConnect" />
324324
<OutputTokenFormat>JWT</OutputTokenFormat>
325325
...

articles/active-directory-b2c/troubleshoot.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -155,11 +155,11 @@ The following screenshot shows an example of the Application Insights trace log
155155

156156
![Screenshot of Azure AD B2C extension Azure AD B2C trace report.](./media/troubleshoot-custom-policies/vscode-extension-application-insights-report.png)
157157

158-
## Troubleshoot JWT tokens
158+
## Troubleshoot JWTs
159159

160-
For JWT token validation and debugging purposes, your can decode JWTs using a site like [https://jwt.ms](https://jwt.ms). Create a test application that can redirect to `https://jwt.ms` for token inspection. If you haven't already done so, [register a web application](tutorial-register-applications.md), and [enable ID token implicit grant](tutorial-register-applications.md#enable-id-token-implicit-grant).
160+
For JWT validation and debugging purposes, your can decode JWTs using a site like [https://jwt.ms](https://jwt.ms). Create a test application that can redirect to `https://jwt.ms` for token inspection. If you haven't already done so, [register a web application](tutorial-register-applications.md), and [enable ID token implicit grant](tutorial-register-applications.md#enable-id-token-implicit-grant).
161161

162-
![Screenshot of JWT token preview.](./media/troubleshoot-custom-policies/jwt-token-preview.png)
162+
![Screenshot of JWT preview.](./media/troubleshoot-custom-policies/jwt-token-preview.png)
163163

164164
Use **Run now** and `https://jwt.ms` to test your policies independently of your web or mobile application. This website acts like a relying party application. It displays the contents of the JSON web token (JWT) that your Azure AD B2C policy generates.
165165

articles/app-service/monitor-instances-health-check.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -143,11 +143,11 @@ function envVarMatchesHeader(headerValue) {
143143
144144
## Instances
145145

146-
Once Health check is enabled, you can restart and monitor the status of your application instances from the instances tab. The instances tab shows your instance's name and the status of that application's instance. You can also manually restart the instance from this tab.
146+
Once Health check is enabled, you can restart and monitor the status of your application instances from the instances tab. The instances tab shows your instance's name and the status of that application's instance. You can also manually do an advanced application restart from this tab by using the "Restart" button.
147147

148-
If the status of your application instance is "unhealthy," you can restart the instance manually by using the restart button in the table. Keep in mind that any other applications hosted on the same App Service plan as the instance will also be affected by the restart. If there are other applications using the same App Service plan as the instance, they're listed on the opening blade from the restart button.
148+
If the status of your application instance is "unhealthy," you can restart the worker process of the respective app manually by using the restart button in the table. This will not be affecting any of the other applications hosted on the same App Service plan. If there are other applications using the same App Service plan as the instance, they're listed on the opening blade from the restart button.
149149

150-
If you restart the instance and the restart process fails, you'll be given the option to replace the worker. (Only one instance can be replaced per hour.) This will also affect any applications using the same App Service plan.
150+
If you restart the instance and the restart process fails, you'll be given the option to replace the worker. (Only one instance can be replaced per hour.) This will affect any applications using the same App Service plan.
151151

152152
For Windows applications, you can also view processes via the Process Explorer. This gives you further insight on the instance's processes, including thread count, private memory, and total CPU time.
153153

articles/azure-cache-for-redis/cache-high-availability.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -132,10 +132,7 @@ Zone-redundant Enterprise and Enterprise Flash tier caches are available in the
132132

133133
#### Availability zone redeployment and migration
134134

135-
Currently, the only way to convert your cache from a non-AZ configuration to an AZ configuration is to redeploy the cache. To learn how to redeploy your current cache, see [Migrate an Azure Cache for Redis instance to availability zone support](/azure/reliability/migrate-cache-redis).
136-
137-
> [!NOTE]
138-
> Converting an existing resource from non-availability zone support to availability zone support is in Preview for Standard and Premium tier caches.
135+
In the Standard and Premium tiers, you can upgrade an existing resource to use zone redundancy. To learn how to upgrade your current cache, see [Migrate an Azure Cache for Redis instance to availability zone support](/azure/reliability/migrate-cache-redis).
139136

140137
## Persistence
141138

articles/azure-cache-for-redis/cache-how-to-zone-redundancy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ In this article, you learn how to configure a zone-redundant Azure Cache instanc
1616
> [!NOTE]
1717
> In regions that don't support zones, the option to enable zone redundancy is disabled. For a list of regions that support zones, see [Azure Cache for Redis - zones supported regions](cache-high-availability.md#regional-availability).
1818
19-
Azure Cache for Redis Standard (preview), Premium, and Enterprise tiers provide built-in redundancy by hosting each cache on two dedicated virtual machines (VMs). Even though these VMs are located in separate [Azure fault and update domains](/azure/virtual-machines/availability) and highly available, they're susceptible to data center-level failures. Azure Cache for Redis also supports zone redundancy in its Standard (preview), Premium, and Enterprise tiers. A zone-redundant cache runs on VMs spread across multiple [Availability Zones](../reliability/availability-zones-overview.md). It provides higher resilience and availability.
19+
Azure Cache for Redis Standard, Premium, and Enterprise tiers provide built-in redundancy by hosting each cache on two dedicated virtual machines (VMs). Even though these VMs are located in separate [Azure fault and update domains](/azure/virtual-machines/availability) and highly available, they're susceptible to data center-level failures. Azure Cache for Redis also supports zone redundancy in its Standard, Premium, and Enterprise tiers. A zone-redundant cache runs on VMs spread across multiple [Availability Zones](../reliability/availability-zones-overview.md). It provides higher resilience and availability.
2020

2121
## Prerequisites
2222

@@ -132,7 +132,7 @@ A Premium cache has one primary and one replica node by default. To configure zo
132132

133133
### Can I update my existing Standard or Premium cache to use zone redundancy?
134134

135-
- Yes, updating an existing Standard or Premium cache to use zone redundancy is supported in-place (Preview). Users can enable it by navigating to the **Advanced settings** on the Resource menu and selecting **Allocate Zones automatically** check-box followed by the save button. You can't disable zone redundancy once you enable it.
135+
- Yes, updating an existing Standard or Premium cache to use zone redundancy is supported in-place. Users can enable it by navigating to the **Advanced settings** on the Resource menu and selecting **Allocate Zones automatically** check-box followed by the save button. You can't disable zone redundancy once you enable it.
136136
- For more details, look into [Migrate an Azure Cache for Redis instance to availability zone support](/azure/reliability/migrate-cache-redis)
137137
- This can also be done by passing `ZonalAllocationPolicy` as `Automatic`in the request body while updating the cache. For more information regarding the update process using REST API, see [Update - ZonalAllocationPolicy](/rest/api/redis/redis/update#zonalallocationpolicy).
138138
- Updating `ZonalAllocationPolicy` to any other value than `Automatic`isn't supported.

articles/azure-functions/functions-how-to-azure-devops.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -202,7 +202,14 @@ variables:
202202
# Agent VM image name
203203
vmImageName: 'ubuntu-latest'
204204
205-
- task: AzureFunctionApp@1 # Add this at the end of your file
205+
- task: DownloadBuildArtifacts@1 # Add this at the end of your file
206+
inputs:
207+
buildType: 'current'
208+
downloadType: 'single'
209+
artifactName: 'drop'
210+
itemPattern: '**/*.zip'
211+
downloadPath: '$(System.ArtifactsDirectory)'
212+
- task: AzureFunctionApp@1
206213
inputs:
207214
azureSubscription: <Azure service connection>
208215
appType: functionAppLinux # default is functionApp

articles/azure-signalr/signalr-concept-internals.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -60,15 +60,15 @@ There are three steps to establish persistent connections between the client and
6060
```
6161
{
6262
"url":"https://test.service.signalr.net/client/?hub=chat&...",
63-
"accessToken":"<a typical JWT token>"
63+
"accessToken":"<a typical JWT>"
6464
}
6565
```
6666
- For ASP.NET SignalR, a typical redirect response looks like:
6767
```
6868
{
6969
"ProtocolVersion":"2.0",
7070
"RedirectUrl":"https://test.service.signalr.net/aspnetclient",
71-
"AccessToken":"<a typical JWT token>"
71+
"AccessToken":"<a typical JWT>"
7272
}
7373
```
7474

articles/azure-signalr/signalr-reference-data-plane-rest-api.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ A typical negotiation response has this format:
3939
```json
4040
{
4141
"url": "https://<service_name>.service.signalr.net/client/?hub=<hub_name>",
42-
"accessToken": "<a typical JWT token>"
42+
"accessToken": "<a typical JWT>"
4343
}
4444
```
4545

0 commit comments

Comments
 (0)