Skip to content

Commit ec98426

Browse files
authored
Merge pull request #216969 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 663c41d + 7826d0a commit ec98426

13 files changed

+49
-39
lines changed

articles/active-directory-b2c/identity-provider-azure-ad-single-tenant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ If you want to get the `family_name` and `given_name` claims from Azure AD, you
8181
1. Select **Add optional claim**.
8282
1. For the **Token type**, select **ID**.
8383
1. Select the optional claims to add, `family_name` and `given_name`.
84-
1. Select **Add**. If **Turn on the Microsoft Graph email permission (required for claims to appear in token)** appears, enable it, and then select **Add** again.
84+
1. Select **Add**. If **Turn on the Microsoft Graph profile permission (required for claims to appear in token)** appears, enable it, and then select **Add** again.
8585
8686
## [Optional] Verify your app authenticity
8787

articles/active-directory/conditional-access/concept-conditional-access-grant.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -161,7 +161,6 @@ The following client apps are confirmed to support this setting:
161161
- Microsoft Teams
162162
- Microsoft To Do
163163
- Microsoft Word
164-
- Microsoft Power Apps
165164
- Microsoft Field Service (Dynamics 365)
166165
- MultiLine for Intune
167166
- Nine Mail - Email and Calendar

articles/active-directory/hybrid/migrate-from-federation-to-cloud-authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -402,7 +402,7 @@ To learn how to verify or turn on this feature, see [Sync userPrincipalName upda
402402
403403
We recommend that you roll over the Kerberos decryption key at least every 30 days to align with the way that Active Directory domain members submit password changes. There is no associated device attached to the AZUREADSSO computer account object, so you must perform the rollover manually.
404404
405-
See FAQ [How do I roll over the Kerberos decryption key of the AZUREADSSO computer account?](how-to-connect-sso.md).
405+
See FAQ [How do I roll over the Kerberos decryption key of the AZUREADSSO computer account?](how-to-connect-sso-faq.yml#how-can-i-roll-over-the-kerberos-decryption-key-of-the--azureadsso--computer-account-).
406406
407407
### Monitoring and logging
408408

articles/aks/open-service-mesh-uninstall-add-on.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,9 @@ After the OSM add-on is disabled, use `osm uninstall cluster-wide-resources` to
3232
osm uninstall cluster-wide-resources
3333
```
3434

35+
> [!NOTE]
36+
> For version 1.1, the command is `osm uninstall mesh --delete-cluster-wide-resources`
37+
3538
> [!IMPORTANT]
3639
> You must remove these additional resources after you disable the OSM add-on. Leaving these resources on your cluster may cause issues if you enable the OSM add-on again in the future.
3740

articles/aks/use-multiple-node-pools.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ To get started, create an AKS cluster with a single node pool. The following exa
4848
# Create a resource group in East US
4949
az group create --name myResourceGroup --location eastus
5050
51-
# Create a basic single-node AKS cluster
51+
# Create a basic single-node pool AKS cluster
5252
az aks create \
5353
--resource-group myResourceGroup \
5454
--name myAKSCluster \

articles/azure-functions/functions-bindings-timer.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ public static void Run([TimerTrigger("0 */5 * * * *")]TimerInfo myTimer, ILogger
4545

4646
# [Isolated process](#tab/isolated-process)
4747

48-
:::code language="csharp" source="~/azure-functions-dotnet-worker/samples/Extensions/Timer/TimerFunction.cs" range="12-18":::
48+
:::code language="csharp" source="~/azure-functions-dotnet-worker/samples/Extensions/Timer/TimerFunction.cs" range="11-17":::
4949

5050

5151
# [C# Script](#tab/csharp-script)

articles/azure-functions/functions-identity-based-connections-tutorial-2.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ You've granted your function app access to the service bus namespace using manag
9393

9494
| Name | Value | Description |
9595
| ------------ | ---------------- | ----------- |
96-
| **ServiceBusConnection__fullyQualifiedNamespace** | <SERVICE_BUS_NAMESPACE>.servicebus.windows.net | This setting connections your function app to the Service Bus use identity-based connections instead of secrets. |
96+
| **ServiceBusConnection__fullyQualifiedNamespace** | <SERVICE_BUS_NAMESPACE>.servicebus.windows.net | This setting connects your function app to the Service Bus using an identity-based connection instead of secrets. |
9797

9898
1. After you create the two settings, select **Save** > **Confirm**.
9999

articles/azure-resource-manager/management/resource-name-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -688,7 +688,7 @@ In the following tables, the term alphanumeric refers to:
688688
> | Entity | Scope | Length | Valid Characters |
689689
> | --- | --- | --- | --- |
690690
> | deployments | resource group | 1-64 | Alphanumerics, underscores, parentheses, hyphens, and periods. |
691-
> | resourcegroups | subscription | 1-90 | Underscores, hyphens, periods, and letters or digits as defined by the [Char.IsLetterOrDigit](/dotnet/api/system.char.isletterordigit) function.<br><br>Valid characters are members of the following categories in [UnicodeCategory](/dotnet/api/system.globalization.unicodecategory):<br>**UppercaseLetter**,<br>**LowercaseLetter**,<br>**TitlecaseLetter**,<br>**ModifierLetter**,<br>**OtherLetter**,<br>**DecimalDigitNumber**.<br><br>Can't end with period. |
691+
> | resourcegroups | subscription | 1-90 | Underscores, hyphens, periods, parentheses, and letters or digits as defined by the [Char.IsLetterOrDigit](/dotnet/api/system.char.isletterordigit) function.<br><br>Valid characters are members of the following categories in [UnicodeCategory](/dotnet/api/system.globalization.unicodecategory):<br>**UppercaseLetter**,<br>**LowercaseLetter**,<br>**TitlecaseLetter**,<br>**ModifierLetter**,<br>**OtherLetter**,<br>**DecimalDigitNumber**.<br><br>Can't end with period. |
692692
> | tagNames | resource | 1-512 | Can't use:<br>`<>%&\?/` or control characters |
693693
> | tagNames / tagValues | tag name | 1-256 | All characters. |
694694
> | templateSpecs | resource group | 1-90 | Alphanumerics, underscores, parentheses, hyphens, and periods. |

articles/governance/policy/concepts/definition-structure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1025,7 +1025,7 @@ Azure Policy supports the following types of effect:
10251025
- **Deny**: generates an event in the activity log and fails the request
10261026
- **DeployIfNotExists**: deploys a related resource if it doesn't already exist
10271027
- **Disabled**: doesn't evaluate resources for compliance to the policy rule
1028-
- **Modify**: adds, updates, or removes the defined tags from a resource or subscription
1028+
- **Modify**: adds, updates, or removes the defined set of fields in the request
10291029
- **EnforceOPAConstraint** (deprecated): configures the Open Policy Agent admissions controller with
10301030
Gatekeeper v3 for self-managed Kubernetes clusters on Azure
10311031
- **EnforceRegoPolicy** (deprecated): configures the Open Policy Agent admissions controller with

articles/openshift/howto-add-update-pull-secret.md

Lines changed: 2 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -149,7 +149,7 @@ First, modify the Samples Operator configuration file. Then, you can run the fol
149149
oc edit configs.samples.operator.openshift.io/cluster -o yaml
150150
```
151151

152-
Change the `spec.architectures.managementState` and `status.architecture.managementState` values from `Removed` to `Managed`.
152+
Change the `spec.architectures.managementState` value from `Removed` to `Managed`.
153153

154154
The following YAML snippet shows only the relevant sections of the edited YAML file:
155155

@@ -164,13 +164,6 @@ spec:
164164
architectures:
165165
- x86_64
166166
managementState: Managed
167-
status:
168-
architectures:
169-
170-
...
171-
172-
managementState: Managed
173-
version: 4.3.27
174167
```
175168
176169
Second, run the following command to edit the Operator Hub configuration file:
@@ -179,7 +172,7 @@ Second, run the following command to edit the Operator Hub configuration file:
179172
oc edit operatorhub cluster -o yaml
180173
```
181174

182-
Change the `Spec.Sources.Disabled` and `Status.Sources.Disabled` values from `true` to `false` for any sources you want enabled.
175+
Change the `Spec.Sources.Disabled` value from `true` to `false` for any sources you want enabled.
183176

184177
The following YAML snippet shows only the relevant sections of the edited YAML file:
185178

@@ -194,18 +187,6 @@ Spec:
194187
Name: certified-operators
195188
Disabled: false
196189
Name: redhat-operators
197-
Status:
198-
Sources:
199-
Disabled: false
200-
Name: certified-operators
201-
Status: Success
202-
Disabled: false
203-
Name: community-operators
204-
Status: Success
205-
Disabled: false
206-
Name: redhat-operators
207-
Status: Success
208-
Events: <none>
209190
```
210191
211192
Save the file to apply your edits.

0 commit comments

Comments
 (0)