Skip to content

Commit dfc03b0

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into heidist-fresh
2 parents db393c0 + e88bdc4 commit dfc03b0

File tree

60 files changed

+894
-345
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

60 files changed

+894
-345
lines changed

articles/active-directory/manage-apps/datawiza-azure-ad-sso-oracle-jde.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Configure Azure AD Multi-Factor Authentication and SSO for an Oracle JD Edwards application using Datawiza Access Broker
2+
title: Configure Azure AD Multi-Factor Authentication and SSO for Oracle JD Edwards applications using Datawiza Access Broker
33
description: Enable Azure Active Directory Multi-Factor Authentication and SSO for Oracle JD Edwards application using Datawiza Access Broker
44
services: active-directory
55
author: gargi-sinha

articles/active-directory/manage-apps/datawiza-with-azure-ad.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,6 +123,6 @@ DAB evaluates policies, calculates headers, and sends you to the upstream applic
123123

124124
- [Configure Datawiza with Azure AD B2C](../../active-directory-b2c/partner-datawiza.md)
125125

126-
- [Configure Azure AD SSO for an Oracle JD Edwards application using Datawiza Access Broker](datawiza-azure-ad-sso-oracle-jde.md)
126+
- [Configure Azure AD Multi-Factor Authentication and SSO for Oracle JDE applications using DAB](datawiza-azure-ad-sso-oracle-jde.md)
127127

128128
- [Datawiza documentation](https://docs.datawiza.com)

articles/active-directory/manage-apps/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -166,7 +166,7 @@
166166
items:
167167
- name: Integrate Datawiza with Azure AD
168168
href: datawiza-with-azure-ad.md
169-
- name: Configure Oracle JD Edwards application with Azure AD using Datawiza Access Broker
169+
- name: Configure Oracle JDE with Azure AD
170170
href: datawiza-azure-ad-sso-oracle-jde.md
171171
- name: F5
172172
items:

articles/active-directory/managed-identities-azure-resources/tutorial-linux-vm-access-cosmos-db.md

Lines changed: 1 addition & 65 deletions
Original file line numberDiff line numberDiff line change
@@ -152,71 +152,7 @@ The CURL response gives you the list of Keys. For example, if you get the read-
152152
"secondaryReadonlyMasterKey":"38v5ns...7bA=="}
153153
```
154154

155-
Now that you have the access key for the Cosmos DB account you can pass it to a Cosmos DB SDK and make calls to access the account. For a quick example, you can pass the access key to the Azure CLI. You can get the `<COSMOS DB CONNECTION URL>` from the **Overview** tab on the Cosmos DB account blade in the Azure portal. Replace the `<ACCESS KEY>` with the value you obtained above:
156-
157-
```azurecli-interactive
158-
az cosmosdb collection show -c <COLLECTION ID> -d <DATABASE ID> --url-connection "<COSMOS DB CONNECTION URL>" --key <ACCESS KEY>
159-
```
160-
161-
This CLI command returns details about the collection:
162-
163-
```output
164-
{
165-
"collection": {
166-
"_conflicts": "conflicts/",
167-
"_docs": "docs/",
168-
"_etag": "\"00006700-0000-0000-0000-5a8271e90000\"",
169-
"_rid": "Es5SAM2FDwA=",
170-
"_self": "dbs/Es5SAA==/colls/Es5SAM2FDwA=/",
171-
"_sprocs": "sprocs/",
172-
"_triggers": "triggers/",
173-
"_ts": 1518498281,
174-
"_udfs": "udfs/",
175-
"id": "Test",
176-
"indexingPolicy": {
177-
"automatic": true,
178-
"excludedPaths": [],
179-
"includedPaths": [
180-
{
181-
"indexes": [
182-
{
183-
"dataType": "Number",
184-
"kind": "Range",
185-
"precision": -1
186-
},
187-
{
188-
"dataType": "String",
189-
"kind": "Range",
190-
"precision": -1
191-
},
192-
{
193-
"dataType": "Point",
194-
"kind": "Spatial"
195-
}
196-
],
197-
"path": "/*"
198-
}
199-
],
200-
"indexingMode": "consistent"
201-
}
202-
},
203-
"offer": {
204-
"_etag": "\"00006800-0000-0000-0000-5a8271ea0000\"",
205-
"_rid": "f4V+",
206-
"_self": "offers/f4V+/",
207-
"_ts": 1518498282,
208-
"content": {
209-
"offerIsRUPerMinuteThroughputEnabled": false,
210-
"offerThroughput": 400
211-
},
212-
"id": "f4V+",
213-
"offerResourceId": "Es5SAM2FDwA=",
214-
"offerType": "Invalid",
215-
"offerVersion": "V2",
216-
"resource": "dbs/Es5SAA==/colls/Es5SAM2FDwA=/"
217-
}
218-
}
219-
```
155+
Now that you have the access key for the Cosmos DB account you can pass it to a Cosmos DB SDK and make calls to access the account.
220156

221157
## Next steps
222158

articles/active-directory/managed-identities-azure-resources/tutorial-windows-vm-access-cosmos-db.md

Lines changed: 1 addition & 67 deletions
Original file line numberDiff line numberDiff line change
@@ -131,79 +131,13 @@ The response gives you the list of Keys. For example, if you get read-only keys
131131
{"primaryReadonlyMasterKey":"bWpDxS...dzQ==",
132132
"secondaryReadonlyMasterKey":"38v5ns...7bA=="}
133133
```
134-
Now that you have the access key for the Cosmos DB account you can pass it to a Cosmos DB SDK and make calls to access the account. For a quick example, you can pass the access key to the Azure CLI. You can get the `<COSMOS DB CONNECTION URL>` from the **Overview** tab on the Cosmos DB account blade in the Azure portal. Replace the `<ACCESS KEY>` with the value you obtained above:
135-
136-
```azurecli
137-
az cosmosdb collection show -c <COLLECTION ID> -d <DATABASE ID> --url-connection "<COSMOS DB CONNECTION URL>" --key <ACCESS KEY>
138-
```
139-
140-
This CLI command returns details about the collection:
141-
142-
```output
143-
{
144-
"collection": {
145-
"_conflicts": "conflicts/",
146-
"_docs": "docs/",
147-
"_etag": "\"00006700-0000-0000-0000-5a8271e90000\"",
148-
"_rid": "Es5SAM2FDwA=",
149-
"_self": "dbs/Es5SAA==/colls/Es5SAM2FDwA=/",
150-
"_sprocs": "sprocs/",
151-
"_triggers": "triggers/",
152-
"_ts": 1518498281,
153-
"_udfs": "udfs/",
154-
"id": "Test",
155-
"indexingPolicy": {
156-
"automatic": true,
157-
"excludedPaths": [],
158-
"includedPaths": [
159-
{
160-
"indexes": [
161-
{
162-
"dataType": "Number",
163-
"kind": "Range",
164-
"precision": -1
165-
},
166-
{
167-
"dataType": "String",
168-
"kind": "Range",
169-
"precision": -1
170-
},
171-
{
172-
"dataType": "Point",
173-
"kind": "Spatial"
174-
}
175-
],
176-
"path": "/*"
177-
}
178-
],
179-
"indexingMode": "consistent"
180-
}
181-
},
182-
"offer": {
183-
"_etag": "\"00006800-0000-0000-0000-5a8271ea0000\"",
184-
"_rid": "f4V+",
185-
"_self": "offers/f4V+/",
186-
"_ts": 1518498282,
187-
"content": {
188-
"offerIsRUPerMinuteThroughputEnabled": false,
189-
"offerThroughput": 400
190-
},
191-
"id": "f4V+",
192-
"offerResourceId": "Es5SAM2FDwA=",
193-
"offerType": "Invalid",
194-
"offerVersion": "V2",
195-
"resource": "dbs/Es5SAA==/colls/Es5SAM2FDwA=/"
196-
}
197-
}
198-
```
199134

135+
Now that you have the access key for the Cosmos DB account you can pass it to a Cosmos DB SDK and make calls to access the account.
200136

201137
## Disable
202138

203139
[!INCLUDE [msi-tut-disable](../../../includes/active-directory-msi-tut-disable.md)]
204140

205-
206-
207141
## Next steps
208142

209143
In this tutorial, you learned how to use a Windows VM system-assigned identity to access Cosmos DB. To learn more about Cosmos DB see:

articles/availability-zones/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,8 @@
2424
href: migrate-app-service.md
2525
- name: Cache for Redis
2626
href: migrate-cache-redis.md
27+
- name: Container instances
28+
href: migrate-container-instances.md
2729
- name: Recovery Services vault
2830
href: migrate-recovery-services-vault.md
2931
- name: Storage accounts

articles/availability-zones/az-region.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@ In the Product Catalog, always-available services are listed as "non-regional" s
101101
| [Azure Batch](../batch/create-pool-availability-zones.md) | ![An icon that signifies this service is zone redundant.](media/icon-zone-redundant.svg) |
102102
| [Azure Cache for Redis](migrate-cache-redis.md) | ![An icon that signifies this service is zone redundant.](media/icon-zone-redundant.svg) ![An icon that signifies this service is zonal](media/icon-zonal.svg) |
103103
| [Azure Cognitive Search](../search/search-performance-optimization.md#availability-zones) | ![An icon that signifies this service is zone redundant.](media/icon-zone-redundant.svg) |
104-
| [Azure Container Instances](../container-instances/container-instances-region-availability.md) | ![An icon that signifies this service is zonal](media/icon-zonal.svg) |
104+
| [Azure Container Instances](migrate-container-instances.md) | ![An icon that signifies this service is zonal](media/icon-zonal.svg) |
105105
| [Azure Container Registry](../container-registry/zone-redundancy.md) | ![An icon that signifies this service is zone redundant.](media/icon-zone-redundant.svg) |
106106
| [Azure Data Explorer](/azure/data-explorer/create-cluster-database-portal) | ![An icon that signifies this service is zone redundant.](media/icon-zone-redundant.svg) |
107107
| [Azure Data Factory](../data-factory/concepts-data-redundancy.md) | ![An icon that signifies this service is zone redundant.](media/icon-zone-redundant.svg) |
Lines changed: 62 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,62 @@
1+
---
2+
title: Migrate Azure Container Instances to availability zone support
3+
description: Learn how to migrate Azure Container Instances to availability zone support.
4+
author: anaharris-ms
5+
ms.service: azure
6+
ms.topic: conceptual
7+
ms.date: 07/22/2022
8+
ms.author: anaharris
9+
ms.reviewer: tomvcassidy
10+
ms.custom: references_regions
11+
---
12+
13+
# Migrate Azure Container Instances to availability zone support
14+
15+
This guide describes how to migrate Azure Container Instances from non-availability zone support to availability support.
16+
17+
18+
## Prerequisites
19+
20+
* If using Azure CLI, ensure version 2.30.0 or later
21+
* If using PowerShell, ensure version 2.1.1-preview or later
22+
* If using the Java SDK, ensure version 2.9.0 or later
23+
* ACI API version 09-01-2021
24+
* Make sure the region you're migrating to supports zonal container group deployments. To view a list of supported regions, see [Resource availability for Azure Container Instances in Azure regions](../container-instances/container-instances-region-availability.md).
25+
26+
## Considerations
27+
28+
The following container groups don't support availability zones, and don't offer any migration guidance:
29+
30+
- Container groups with GPU resources
31+
- Virtual Network injected container groups
32+
- Windows Server 2016 container groups
33+
34+
## Downtime requirements
35+
36+
Because ACI requires you to delete your existing deployment and recreate it with zonal support, the downtime is the time it takes to make a new deployment.
37+
38+
## Migration guidance: Delete and redeploy container group
39+
40+
To delete and redeploy a container group:
41+
42+
1. Delete your current container group with one of the following tools:
43+
44+
- [Azure CLI](../container-instances/container-instances-quickstart.md#clean-up-resources)
45+
- [PowerShell](../container-instances/container-instances-quickstart.md#clean-up-resources),
46+
- [Portal](../container-instances/container-instances-quickstart-portal.md#clean-up-resources).
47+
48+
>[!NOTE]
49+
>Zonal support is not supported in the Azure portal. Even if you delete your container group through the portal, you'll still need to create your new container group using CLI or Powershell.
50+
51+
1. Follow the steps in [Deploy an Azure Container Instances (ACI) container group in an availability zone (preview)](../container-instances/availability-zones.md).
52+
53+
54+
55+
## Next steps
56+
57+
> [!div class="nextstepaction"]
58+
> [Regions and Availability Zones in Azure](az-overview.md)
59+
60+
> [!div class="nextstepaction"]
61+
> [Azure Services that support Availability Zones](az-region.md)
62+

articles/azure-app-configuration/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -143,7 +143,7 @@
143143
href: overview-managed-identity.md
144144
- name: Security baseline
145145
href: /security/benchmark/azure/baselines/app-config-security-baseline?toc=/azure/azure-app-configuration/TOC.json
146-
- name: Disable access key authentication (preview)
146+
- name: Disable access key authentication
147147
href: howto-disable-access-key-authentication.md
148148
- name: Security controls by Azure Policy
149149
href: ./security-controls-policy.md
@@ -169,7 +169,7 @@
169169
href: howto-convert-to-the-new-spring-boot.md
170170
- name: Move a resource between Azure regions
171171
href: howto-move-resource-between-regions.md
172-
- name: Recover App Configuration stores (Preview)
172+
- name: Recover App Configuration stores
173173
href: howto-recover-deleted-stores-in-azure-app-configuration.md
174174
- name: Disable public access
175175
href: howto-disable-public-access.md

articles/azure-app-configuration/howto-disable-access-key-authentication.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,15 @@
11
---
2-
title: Disable access key authentication for an Azure App Configuration instance (preview)
2+
title: Disable access key authentication for an Azure App Configuration instance
33
titleSuffix: Azure App Configuration
4-
description: Learn how to disable access key authentication for an Azure App Configuration instance (preview)
4+
description: Learn how to disable access key authentication for an Azure App Configuration instance
55
ms.service: azure-app-configuration
66
author: jimmyca15
77
ms.author: jimmyca
88
ms.topic: how-to
99
ms.date: 5/14/2021
1010
---
1111

12-
# Disable access key authentication for an Azure App Configuration instance (preview)
12+
# Disable access key authentication for an Azure App Configuration instance
1313

1414
Every request to an Azure App Configuration resource must be authenticated. By default, requests can be authenticated with either Azure Active Directory (Azure AD) credentials, or by using an access key. Of these two types of authentication schemes, Azure AD provides superior security and ease of use over access keys, and is recommended by Microsoft. To require clients to use Azure AD to authenticate requests, you can disable the usage of access keys for an Azure App Configuration resource.
1515

@@ -96,7 +96,7 @@ Be careful to restrict assignment of these roles only to those who require the a
9696
9797
## Limitations
9898

99-
The capability to disable access key authentication is available as a preview. The following limitations are currently in place.
99+
The capability to disable access key authentication has the following limitation:
100100

101101
### ARM template access
102102

0 commit comments

Comments
 (0)