Skip to content

Commit e068e2b

Browse files
authored
Merge pull request #79285 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/Microsoft/azure-docs (branch master)
2 parents 02a0689 + a9a85eb commit e068e2b

File tree

4 files changed

+10
-11
lines changed

4 files changed

+10
-11
lines changed

articles/active-directory/conditional-access/howto-conditional-access-session-lifetime.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ The Azure AD default for browser session persistence allows users on personal de
5050
Conditional access is an Azure AD Premium capability and requires a premium license. If you would like to learn more about conditional access, see [What is conditional access in Azure Active Directory?](overview.md#license-requirements)
5151

5252
> [!WARNING]
53-
> If you are using the [configurable token lifetime](../develop/active-directory-configurable-token-lifetimes.md) feature currently in public preview, please note that we don’t support creating two different policies for the same user or app combination: one with this feature and another one with configurable token lifetime feature. Microsoft plans to retire the configurable token lifetime feature on October 15 and replace it with the conditional access authentication session management feature.
53+
> If you are using the [configurable token lifetime](../develop/active-directory-configurable-token-lifetimes.md) feature currently in public preview, please note that we don’t support creating two different policies for the same user or app combination: one with this feature and another one with configurable token lifetime feature. Microsoft plans to retire the configurable token lifetime feature on November 1 and replace it with the conditional access authentication session management feature.
5454
5555
### Policy 1: Sign-in frequency control
5656

articles/application-gateway/application-gateway-autoscaling-zone-redundant.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -80,6 +80,9 @@ Capacity unit price = 744(hours) * Max (25/50 compute unit for connections/sec,
8080

8181
Total price = $148.8+23.81 = $172.61
8282

83+
> [!NOTE]
84+
> The Max function returns the largest value in a pair of values.
85+
8386
**Example 3**
8487

8588
An Application Gateway WAF_v2 is provisioned for a month. During this time, it receives 25 new SSL connections/sec, average of 8.88-Mbps data transfer and does 80 request per second. Assuming connections are short lived, and that compute unit calculation for the application supports 10 RPS per compute unit, your price would be:
@@ -90,6 +93,9 @@ Capacity unit price = 744(hours) * Max (compute unit Max(25/50 for connections/s
9093

9194
Total price = $267.84 + $85.71 = $353.55
9295

96+
> [!NOTE]
97+
> The Max function returns the largest value in a pair of values.
98+
9399
## Scaling Application Gateway and WAF v2
94100

95101
Application Gateway and WAF can be configured to scale in two modes:

articles/azure-app-configuration/quickstart-aspnet-core-app.md

Lines changed: 2 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -128,8 +128,6 @@ Add the [Secret Manager tool](https://docs.microsoft.com/aspnet/core/security/ap
128128
@using Microsoft.Extensions.Configuration
129129
@inject IConfiguration Configuration
130130

131-
<!DOCTYPE html>
132-
<html lang="en">
133131
<style>
134132
body {
135133
background-color: @Configuration["TestApp:Settings:BackgroundColor"]
@@ -139,13 +137,8 @@ Add the [Secret Manager tool](https://docs.microsoft.com/aspnet/core/security/ap
139137
font-size: @Configuration["TestApp:Settings:FontSize"];
140138
}
141139
</style>
142-
<head>
143-
<title>Index View</title>
144-
</head>
145-
<body>
146-
<h1>@Configuration["TestApp:Settings:Message"]</h1>
147-
</body>
148-
</html>
140+
141+
<h1>@Configuration["TestApp:Settings:Message"]</h1>
149142
```
150143

151144
7. Open *_Layout.cshtml* in the Views > Shared directory, and replace its content with the following code:

articles/iot-edge/tutorial-store-data-sql-server.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ The following steps show you how to create an IoT Edge function using Visual Stu
6666
| Provide a solution name | Enter a descriptive name for your solution, like **SqlSolution**, or accept the default. |
6767
| Select module template | Choose **Azure Functions - C#**. |
6868
| Provide a module name | Name your module **sqlFunction**. |
69-
| Provide Docker image repository for the module | An image repository includes the name of your container registry and the name of your container image. Your container image is prepopulated from the last step. Replace **localhost:5000** with the login server value from your Azure container registry. You can retrieve the login server from the Overview page of your container registry in the Azure portal. <br><br>The final string looks like \<registry name\>.azurecr.io/sqlFunction. |
69+
| Provide Docker image repository for the module | An image repository includes the name of your container registry and the name of your container image. Your container image is prepopulated from the last step. Replace **localhost:5000** with the login server value from your Azure container registry. You can retrieve the login server from the Overview page of your container registry in the Azure portal. <br><br>The final string looks like \<registry name\>.azurecr.io/sqlfunction. |
7070

7171
The VS Code window loads your IoT Edge solution workspace.
7272

0 commit comments

Comments
 (0)