Skip to content

Commit dc29980

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into ds-qsrt1721106
2 parents 09f64a5 + 42bbe9f commit dc29980

30 files changed

+803
-101
lines changed

articles/active-directory/conditional-access/howto-conditional-access-policy-azure-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Conditional Access policies are powerful tools, we recommend excluding the follo
3636

3737
## Create a Conditional Access policy
3838

39-
The following steps will help create a Conditional Access policy to require those assigned administrative roles to perform multi-factor authentication.
39+
The following steps will help create a Conditional Access policy to require those with access to the [Microsoft Azure Management](concept-conditional-access-cloud-apps.md#microsoft-azure-management) app to perform multi-factor authentication.
4040

4141
1. Sign in to the **Azure portal** as a global administrator, security administrator, or Conditional Access administrator.
4242
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.

articles/active-directory/manage-apps/configure-single-sign-on-non-gallery-applications.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ When you [add a gallery app](add-gallery-app.md) or a [non-gallery web app](add-
2121
> [!NOTE]
2222
> Adding a gallery app? Find step-by-step setup instructions in the [list of SaaS app tutorials](../saas-apps/tutorial-list.md)
2323
24-
To configure SAML single sign-on for a non-gallery application without writing code, you need to have a subscription along with an Azure AD Premium license and the application must support SAML 2.0. For more information about Azure AD versions, visit [Azure AD pricing](https://azure.microsoft.com/pricing/details/active-directory/).
24+
To configure SAML single sign-on for a non-gallery application without writing code, you need to have an Azure AD subscription and the application must support SAML 2.0. For more information about Azure AD versions, visit [Azure AD pricing](https://azure.microsoft.com/pricing/details/active-directory/).
2525

2626
## Before you begin
2727

articles/active-directory/users-groups-roles/roles-create-custom.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -135,6 +135,9 @@ $roleAssignment = New-AzureADMSRoleAssignment -ResourceScope $resourceScope -Rol
135135
}
136136
```
137137
138+
> [!Note]
139+
> The "templateId": "GUID" is an optional parameter being sent in the body depending on requirement. If you have a requirement for creating multiple different custom role with common parameters , it is best to create a template and define a templateId . You can generate a templateId beforehand using the powershell cmdlet (New-Guid).Guid .
140+
138141
1. Create the role assignment.
139142
140143
HTTP request to create a custom role definition.
@@ -155,6 +158,7 @@ $roleAssignment = New-AzureADMSRoleAssignment -ResourceScope $resourceScope -Rol
155158
}
156159
```
157160
161+
158162
## Assign a custom role scoped to a resource
159163
160164
Like built-in roles, custom roles are assigned by default at the default organization-wide scope to grant access permissions over all app registrations in your organization. But unlike built-in roles, custom roles can also be assigned at the scope of a single Azure AD resource. This allows you to give the user the permission to update credentials and basic properties of a single app without having to create a second custom role.

articles/azure-arc/kubernetes/use-gitops-connected-cluster.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ This getting started guide will walk you through applying a set of configuration
2727

2828
## Create a configuration
2929

30-
- Example repository: <https://github.com/slack/cluster-config>
30+
- Example repository: <https://github.com/Azure/arc-k8s-demo>
3131

3232
The example repository is structured around the persona of a cluster operator who would like to provision a few namespaces, deploy a common workload, and provide some team-specific configuration. Using this repository creates the following resources on your cluster:
3333

articles/batch/TOC.yml

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -91,6 +91,12 @@
9191
href: batch-aad-auth-management.md
9292
- name: Securely access Key Vault with Batch
9393
href: credential-access-key-vault.md
94+
95+
- name: Using certificates with Batch
96+
href: batch-certificates.md
97+
- name: Using application packages
98+
href: batch-application-packages.md
99+
94100
- name: Copy files and applications to pool nodes
95101
items:
96102
- name: Copying applications and data to pool nodes

articles/batch/batch-certificates.md

Lines changed: 41 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
---
2+
title: Using certificates - Azure Batch
3+
description: Use certificates to enable authentication of applications
4+
services: batch
5+
documentationcenter: .net
6+
author: LauraBrenner
7+
manager: evansma
8+
editor: ''
9+
10+
ms.assetid: 63d9d4f1-8521-4bbb-b95a-c4cad73692d3
11+
ms.service: batch
12+
ms.topic: article
13+
ms.tgt_pltfrm:
14+
ms.workload: big-compute
15+
ms.date: 02/17/2020
16+
ms.author: labrenne
17+
ms.custom: seodec18
18+
19+
---
20+
# Using certificates with Batch
21+
22+
Currently the main reason to use certificates with Batch is if you have applications running in Pools that need to authenticate with an endpoint.
23+
24+
If you don't already have a certificate, you can create a self-signed certificate using the
25+
`makecert` command-line tool.
26+
27+
## Upload certificates manually through the Azure portal
28+
29+
1. From the Batch account you want to upload a certificate to, select **Certificates** and then select **Add**.
30+
31+
2. Upload the certificate with a .pfx or .cer extension.
32+
33+
Once uploaded, the certificate is added to a list of certificates, and you can verify the thumbprint.
34+
35+
Now when you create a Batch pool, you can navigate to Certificates within the pool and assign the certificate you uploaded to that pool.
36+
37+
## Next steps
38+
39+
Batch has a certificate API, [AZ batch certificate create](https://docs.microsoft.com/cli/azure/batch/certificate?view=azure-cli-latest#az-batch-certificate-create)
40+
41+
For information on using Key Vault, see [Securely access Key Vault with Batch](credential-access-key-vault.md).
44.8 KB
Loading

articles/governance/policy/assign-policy-template.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "Quickstart: New policy assignment with templates"
33
description: In this quickstart, you use a Resource Manager template to create a policy assignment to identify non-compliant resources.
4-
ms.date: 03/16/2020
4+
ms.date: 05/21/2020
55
ms.topic: quickstart
66
ms.custom: subject-armqs
77
---
@@ -29,7 +29,7 @@ _Audit VMs that do not use managed disks_. For a partial list of available built
2929

3030
The template used in this quickstart is from [Azure Quickstart templates](https://azure.microsoft.com/resources/templates/101-azurepolicy-assign-builtinpolicy-resourcegroup/).
3131

32-
:::code language="json" source="~/quickstart-templates/101-azurepolicy-assign-builtinpolicy-resourcegroup/azuredeploy.json" range="1-36" highlight="26-34":::
32+
:::code language="json" source="~/quickstart-templates/101-azurepolicy-assign-builtinpolicy-resourcegroup/azuredeploy.json" range="1-30" highlight="20-28":::
3333

3434
The resource defined in the template is:
3535

articles/remote-rendering/concepts/components.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,20 @@ lightComponent.Destroy();
3434
lightComponent = null;
3535
```
3636

37+
```cpp
38+
// create a point light component
39+
ApiHandle<AzureSession> session = GetCurrentlyConnectedSession();
40+
41+
ApiHandle<PointLightComponent> lightComponent = session->Actions()->CreateComponent(ObjectType::PointLightComponent, ownerEntity)->as<PointLightComponent>();
42+
43+
// ...
44+
45+
// destroy the component
46+
lightComponent->Destroy();
47+
lightComponent = nullptr;
48+
```
49+
50+
3751
A component is attached to an entity at creation time. It cannot be moved to another entity afterwards. Components are explicitly deleted with `Component.Destroy()` or automatically when the component's owner entity is destroyed.
3852
3953
Only one instance of each component type may be added to an entity at a time.

articles/remote-rendering/concepts/entities.md

Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,13 @@ CutPlaneComponent cutplane = (CutPlaneComponent)entity.FindComponentOfType(Objec
3636
CutPlaneComponent cutplane = entity.FindComponentOfType<CutPlaneComponent>();
3737
```
3838

39+
```cpp
40+
ApiHandle<CutPlaneComponent> cutplane = entity->FindComponentOfType(ObjectType::CutPlaneComponent)->as<CutPlaneComponent>();
41+
42+
// or alternatively:
43+
ApiHandle<CutPlaneComponent> cutplane = *entity->FindComponentOfType<CutPlaneComponent>();
44+
```
45+
3946
### Querying transforms
4047
4148
Transform queries are synchronous calls on the object. It is important to note that transforms queried through the API are local space transforms, relative to the object's parent. Exceptions are root objects, for which local space and world space are identical.
@@ -49,6 +56,13 @@ Double3 translation = entity.Position;
4956
Quaternion rotation = entity.Rotation;
5057
```
5158

59+
```cpp
60+
// local space transform of the entity
61+
Double3 translation = *entity->Position();
62+
Quaternion rotation = *entity->Rotation();
63+
```
64+
65+
5266
### Querying spatial bounds
5367

5468
Bounds queries are asynchronous calls that operate on a full object hierarchy, using one entity as a root. See the dedicated chapter about [object bounds](object-bounds.md).
@@ -74,6 +88,21 @@ metaDataQuery.Completed += (MetadataQueryAsync query) =>
7488
};
7589
```
7690

91+
```cpp
92+
ApiHandle<MetadataQueryAsync> metaDataQuery = *entity->QueryMetaDataAsync();
93+
metaDataQuery->Completed([](const ApiHandle<MetadataQueryAsync>& query)
94+
{
95+
if (query->IsRanToCompletion())
96+
{
97+
ApiHandle<ObjectMetaData> metaData = *query->Result();
98+
ApiHandle<ObjectMetaDataEntry> entry = *metaData->GetMetadataByName("MyInt64Value");
99+
int64_t intValue = *entry->AsInt64();
100+
101+
// ...
102+
}
103+
});
104+
```
105+
77106
The query will succeed even if the object does not hold any metadata.
78107
79108
## Next steps

0 commit comments

Comments
 (0)