Skip to content

Commit effcf5e

Browse files
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into AzureSqlEdgeTutorial
2 parents 871a072 + f5ae64c commit effcf5e

File tree

280 files changed

+4249
-2250
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

280 files changed

+4249
-2250
lines changed

.openpublishing.redirection.json

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20295,6 +20295,36 @@
2029520295
"redirect_url": "/azure/marketplace/marketplace-commercial-transaction-capabilities-and-considerations",
2029620296
"redirect_document_id": false
2029720297
},
20298+
{
20299+
"source_path": "articles/marketplace/cloud-partner-portal/consulting-services/cloud-partner-portal-consulting-services-publishing-offer.md",
20300+
"redirect_url": "/azure/marketplace/partner-center-portal/create-consulting-service-offer",
20301+
"redirect_document_id": false
20302+
},
20303+
{
20304+
"source_path": "articles/marketplace/cloud-partner-portal/consulting-services/cpp-consulting-service-prerequisites.md",
20305+
"redirect_url": "/azure/marketplace/partner-center-portal/consulting-service-prerequisites",
20306+
"redirect_document_id": false
20307+
},
20308+
{
20309+
"source_path": "articles/marketplace/cloud-partner-portal/consulting-services/cpp-consulting-service-create-offer.md",
20310+
"redirect_url": "/azure/marketplace/partner-center-portal/create-consulting-service-offer",
20311+
"redirect_document_id": false
20312+
},
20313+
{
20314+
"source_path": "articles/marketplace/cloud-partner-portal/consulting-services/cpp-consulting-service-define-offer-settings.md",
20315+
"redirect_url": "/azure/marketplace/partner-center-portal/create-consulting-service-offer",
20316+
"redirect_document_id": false
20317+
},
20318+
{
20319+
"source_path": "articles/marketplace/cloud-partner-portal/consulting-services/cpp-consulting-service-storefront-details.md",
20320+
"redirect_url": "/azure/marketplace/partner-center-portal/create-consulting-service-offer",
20321+
"redirect_document_id": false
20322+
},
20323+
{
20324+
"source_path": "articles/marketplace/cloud-partner-portal/consulting-services/cpp-consulting-service-publish-offer.md",
20325+
"redirect_url": "/azure/marketplace/partner-center-portal/create-consulting-service-offer",
20326+
"redirect_document_id": false
20327+
},
2029820328
{
2029920329
"source_path": "articles/multi-factor-authentication/multi-factor-authentication-app-faq.md",
2030020330
"redirect_url": "./end-user/microsoft-authenticator-app-faq",

articles/active-directory/manage-apps/common-scenarios.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ Most applications require a user to be provisioned into the application before a
5050

5151
|Feature |Description|Recommendation |
5252
|---------|---------|---------|
53-
|SCIM Provisioning|[SCIM](https://aka.ms/SICMOverview) is an industry best practice for automating user provisioning. Any SCIM-compliant application can be integrated with Azure AD. Automatically create, update, and delete user accounts without having to maintain CSV files, custom scripts, or on-prem solutions.|Check out the growing list of [pre-integrated](https://docs.microsoft.com/azure/active-directory/saas-apps/tutorial-list) apps in the Azure AD app gallery|
53+
|SCIM Provisioning|[SCIM](https://aka.ms/SCIMOverview) is an industry best practice for automating user provisioning. Any SCIM-compliant application can be integrated with Azure AD. Automatically create, update, and delete user accounts without having to maintain CSV files, custom scripts, or on-prem solutions.|Check out the growing list of [pre-integrated](https://docs.microsoft.com/azure/active-directory/saas-apps/tutorial-list) apps in the Azure AD app gallery|
5454
|Microsoft Graph|Leverage the breath and depth of data that Azure AD has to enrich your application with the data that it needs.|Leverage the [Microsoft graph](https://developer.microsoft.com/graph/) to get data from across the Microsoft ecosystem. |
5555

5656

articles/active-directory/users-groups-roles/TOC.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@
6868
href: /azure/active-directory/b2b/use-dynamic-groups?context=azure/active-directory/users-groups-roles/context/ugr-context
6969
- name: Manage your directory
7070
items:
71-
- name: Administer your directory
71+
- name: Azure AD organizations
7272
href: /azure/active-directory/fundamentals/active-directory-administer?context=azure/active-directory/users-groups-roles/context/ugr-context
7373
- name: Manage domain names
7474
href: domains-manage.md
@@ -84,7 +84,7 @@
8484
href: /azure/active-directory/connect/active-directory-aadconnect?context=azure/active-directory/users-groups-roles/context/ugr-context
8585
- name: Manage groups
8686
items:
87-
- name: Manage access with Azure AD groups
87+
- name: Manage access with groups
8888
href: /azure/active-directory/fundamentals/active-directory-manage-groups?context=azure/active-directory/users-groups-roles/context/ugr-context
8989
- name: Create a group (Azure portal)
9090
href: /azure/active-directory/fundamentals/active-directory-groups-create-azure-portal?context=azure/active-directory/users-groups-roles/context/ugr-context
@@ -134,6 +134,8 @@
134134
href: groups-assign-sensitivity-labels.md
135135
- name: Assign licenses
136136
items:
137+
- name: Assign licenses to users
138+
href: /azure/active-directory/fundamentals/license-users-groups?context=azure/active-directory/users-groups-roles/context/ugr-context
137139
- name: Assign licenses to a group
138140
href: licensing-groups-assign.md
139141
- name: Resolve group license problems

articles/active-directory/users-groups-roles/my-staff-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.topic: article
99
ms.service: active-directory
1010
ms.subservice: user-help
1111
ms.workload: identity
12-
ms.date: 05/01/2020
12+
ms.date: 05/08/2020
1313
ms.author: curtand
1414
ms.reviewer: sahenry
1515
ms.custom: oldportal;it-pro;

articles/api-management/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -228,8 +228,6 @@
228228
href: how-to-configure-cloud-metrics-logs.md
229229
- name: Configure local metrics and logs for self-hosted gateway
230230
href: how-to-configure-local-metrics-logs.md
231-
- name: Log requests with Azure Application Insights
232-
href: api-management-howto-app-insights.md
233231
- name: Set up DR using backup/restore
234232
href: api-management-howto-disaster-recovery-backup-restore.md
235233
- name: Manage user accounts

articles/api-management/configure-custom-domain.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -68,12 +68,12 @@ To perform the steps described in this article, you must have:
6868
> Wildcard domain names, e.g. `*.contoso.com` are supported in all tiers except the Consumption tier.
6969
7070
> [!TIP]
71-
> We recommend using Azure Key Vault for managing certificates and setting them to autorotate.
71+
> We recommend using [Azure Key Vault for managing certificates](https://docs.microsoft.com/azure/key-vault/certificates/about-certificates) and setting them to autorenew.
7272
> If you use Azure Key Vault to manage the custom domain TLS/SSL certificate, make sure the certificate is inserted into Key Vault [as a _certificate_](https://docs.microsoft.com/rest/api/keyvault/CreateCertificate/CreateCertificate), not a _secret_.
7373
>
7474
> To fetch a TLS/SSL certificate, API Management must have the list and get secrets permissions on the Azure Key Vault containing the certificate. When using Azure portal all the necessary configuration steps will be completed automatically. When using command line tools or management API, these permissions must be granted manually. This is done in two steps. First, use Managed identities page on your API Management instance to make sure that Managed Identity is enabled and make a note of the principal id shown on that page. Second, give permission list and get secrets permissions to this principal id on the Azure Key Vault containing the certificate.
7575
>
76-
> If the certificate is set to autorotate, API Management will pick up the latest version automatically without any downtime to the service (if your API Management tier has SLA - i. e. in all tiers except the Developer tier).
76+
> If the certificate is set to autorenew, API Management will pick up the latest version automatically without any downtime to the service (if your API Management tier has SLA - i. e. in all tiers except the Developer tier).
7777
7878
1. Click Apply.
7979

articles/app-service/environment/management-addresses.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: ccompy
55

66
ms.assetid: a7738a24-89ef-43d3-bff1-77f43d5a3952
77
ms.topic: article
8-
ms.date: 11/13/2019
8+
ms.date: 05/10/2020
99
ms.author: ccompy
1010
ms.custom: seodec18
1111
---
@@ -21,8 +21,8 @@ The addresses noted below can be configured in a route table to avoid asymmetric
2121

2222
| Region | Addresses |
2323
|--------|-----------|
24-
| All public regions | 13.64.115.203, 13.66.140.0, 13.67.8.128, 13.69.64.128, 13.69.227.128, 13.70.73.128, 13.71.170.64, 13.71.194.129, 13.75.34.192, 13.75.127.117, 13.77.50.128, 13.78.109.0, 13.89.171.0, 13.94.141.115, 13.94.143.126, 13.94.149.179, 20.36.106.128, 20.36.114.64, 23.100.226.236, 23.102.135.246, 23.102.188.65, 40.69.106.128, 40.70.146.128, 40.71.13.64, 40.74.100.64, 40.78.194.128, 40.79.130.64, 40.79.178.128, 40.83.120.64, 40.83.121.56, 40.83.125.161, 40.90.240.166, 40.91.126.196, 40.112.242.192, 40.119.4.111, 40.124.47.188, 51.140.146.64, 51.140.210.128, 52.151.25.45, 52.162.80.89, 52.162.106.192, 52.165.152.214, 52.165.153.122, 52.165.154.193, 52.165.158.140, 52.174.22.21, 52.178.177.147, 52.178.184.149, 52.178.190.65, 52.178.195.197, 52.187.56.50, 52.187.59.251, 52.187.63.19, 52.187.63.37, 52.224.105.172, 52.225.177.153, 52.231.18.64, 52.231.146.128, 65.52.14.230, 65.52.172.237, 65.52.193.203, 70.37.57.58, 70.37.89.222, 104.43.242.137, 104.44.129.141, 104.44.129.243, 104.44.129.255, 104.44.134.255, 104.208.54.11, 104.211.81.64, 104.211.146.128, 104.214.49.0, 157.55.176.93, 157.55.208.185, 191.233.203.64, 191.236.154.88 |
25-
| Microsoft Azure Government | 23.97.29.209, 13.72.53.37, 13.72.180.105, 23.97.0.17, 23.97.16.184 |
24+
| All public regions | 13.66.140.0, 13.67.8.128, 13.69.64.128, 13.69.227.128, 13.70.73.128, 13.71.170.64, 13.71.194.129, 13.75.34.192, 13.75.127.117, 13.77.50.128, 13.78.109.0, 13.89.171.0, 13.94.141.115, 13.94.143.126, 13.94.149.179, 20.36.106.128, 20.36.114.64, 23.102.135.246, 23.102.188.65, 40.69.106.128, 40.70.146.128, 40.71.13.64, 40.74.100.64, 40.78.194.128, 40.79.130.64, 40.79.178.128, 40.83.120.64, 40.83.121.56, 40.83.125.161, 40.112.242.192, 51.140.146.64, 51.140.210.128, 52.151.25.45, 52.162.106.192, 52.165.152.214, 52.165.153.122, 52.165.154.193, 52.165.158.140, 52.174.22.21, 52.178.177.147, 52.178.184.149, 52.178.190.65, 52.178.195.197, 52.187.56.50, 52.187.59.251, 52.187.63.19, 52.187.63.37, 52.224.105.172, 52.225.177.153, 52.231.18.64, 52.231.146.128, 65.52.172.237, 70.37.57.58, 104.44.129.141, 104.44.129.243, 104.44.129.255, 104.44.134.255, 104.208.54.11, 104.211.81.64, 104.211.146.128, 157.55.208.185, 191.233.203.64, 191.236.154.88 |
25+
| Microsoft Azure Government | 23.97.29.209, 13.72.53.37, 13.72.180.105 |
2626

2727
## Configuring a Network Security Group
2828

@@ -37,7 +37,7 @@ The management addresses can be placed in a route table with a next hop of inter
3737
$rg = "resource group name"
3838
$rt = "route table name"
3939
$location = "azure location"
40-
$managementAddresses = "13.64.115.203", "13.66.140.0", "13.67.8.128", "13.69.64.128", "13.69.227.128", "13.70.73.128", "13.71.170.64", "13.71.194.129", "13.75.34.192", "13.75.127.117", "13.77.50.128", "13.78.109.0", "13.89.171.0", "13.94.141.115", "13.94.143.126", "13.94.149.179", "20.36.106.128", "20.36.114.64", "23.100.226.236", "23.102.135.246", "23.102.188.65", "40.69.106.128", "40.70.146.128", "40.71.13.64", "40.74.100.64", "40.78.194.128", "40.79.130.64", "40.79.178.128", "40.83.120.64", "40.83.121.56", "40.83.125.161", "40.90.240.166", "40.91.126.196", "40.112.242.192", "40.119.4.111", "40.124.47.188", "51.140.146.64", "51.140.210.128", "52.151.25.45", "52.162.80.89", "52.162.106.192", "52.165.152.214", "52.165.153.122", "52.165.154.193", "52.165.158.140", "52.174.22.21", "52.178.177.147", "52.178.184.149", "52.178.190.65", "52.178.195.197", "52.187.56.50", "52.187.59.251", "52.187.63.19", "52.187.63.37", "52.224.105.172", "52.225.177.153", "52.231.18.64", "52.231.146.128", "65.52.14.230", "65.52.172.237", "65.52.193.203", "70.37.57.58", "70.37.89.222", "104.43.242.137", "104.44.129.141", "104.44.129.243", "104.44.129.255", "104.44.134.255", "104.208.54.11", "104.211.81.64", "104.211.146.128", "104.214.49.0", "157.55.176.93", "157.55.208.185", "191.233.203.64", "191.236.154.88"
40+
$managementAddresses = "13.66.140.0", "13.67.8.128", "13.69.64.128", "13.69.227.128", "13.70.73.128", "13.71.170.64", "13.71.194.129", "13.75.34.192", "13.75.127.117", "13.77.50.128", "13.78.109.0", "13.89.171.0", "13.94.141.115", "13.94.143.126", "13.94.149.179", "20.36.106.128", "20.36.114.64", "23.102.135.246", "23.102.188.65", "40.69.106.128", "40.70.146.128", "40.71.13.64", "40.74.100.64", "40.78.194.128", "40.79.130.64", "40.79.178.128", "40.83.120.64", "40.83.121.56", "40.83.125.161", "40.112.242.192", "51.140.146.64", "51.140.210.128", "52.151.25.45", "52.162.106.192", "52.165.152.214", "52.165.153.122", "52.165.154.193", "52.165.158.140", "52.174.22.21", "52.178.177.147", "52.178.184.149", "52.178.190.65", "52.178.195.197", "52.187.56.50", "52.187.59.251", "52.187.63.19", "52.187.63.37", "52.224.105.172", "52.225.177.153", "52.231.18.64", "52.231.146.128", "65.52.172.237", "70.37.57.58", "104.44.129.141", "104.44.129.243", "104.44.129.255", "104.44.134.255", "104.208.54.11", "104.211.81.64", "104.211.146.128", "157.55.208.185", "191.233.203.64", "191.236.154.88"
4141

4242
az network route-table create --name $rt --resource-group $rg --location $location
4343
foreach ($ip in $managementAddresses) {

articles/app-service/environment/using-an-ase.md

Lines changed: 16 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: ccompy
55

66
ms.assetid: a22450c4-9b8b-41d4-9568-c4646f4cf66b
77
ms.topic: article
8-
ms.date: 3/26/2020
8+
ms.date: 5/10/2020
99
ms.author: ccompy
1010
ms.custom: seodec18
1111
---
@@ -117,15 +117,22 @@ The SCM URL is used to access the Kudu console or for publishing your app by usi
117117

118118
### DNS configuration
119119

120-
When you use an External ASE, apps made in your ASE are registered with Azure DNS. With an ILB ASE, you must manage your own DNS.
120+
When you use an External ASE, apps made in your ASE are registered with Azure DNS. There are no additional steps then in an External ASE for your apps to be publicly available. With an ILB ASE, you must manage your own DNS. You can do this in your own DNS server or with Azure DNS private zones.
121121

122-
To configure DNS with your ILB ASE:
122+
To configure DNS in your own DNS server with your ILB ASE:
123123

124-
create a zone for <ASE name>.appserviceenvironment.net
125-
create an A record in that zone that points * to the ILB IP address
126-
create an A record in that zone that points @ to the ILB IP address
127-
create a zone in <ASE name>.appserviceenvironment.net named scm
128-
create an A record in the scm zone that points * to the ILB IP address
124+
1. create a zone for <ASE name>.appserviceenvironment.net
125+
1. create an A record in that zone that points * to the ILB IP address
126+
1. create an A record in that zone that points @ to the ILB IP address
127+
1. create a zone in <ASE name>.appserviceenvironment.net named scm
128+
1. create an A record in the scm zone that points * to the ILB IP address
129+
130+
To configure DNS in Azure DNS Private zones:
131+
132+
1. create an Azure DNS private zone named <ASE name>.appserviceenvironment.net
133+
1. create an A record in that zone that points * to the ILB IP address
134+
1. create an A record in that zone that points @ to the ILB IP address
135+
1. create an A record in that zone that points *.scm to the ILB IP address
129136

130137
The DNS settings for your ASE default domain suffix do not restrict your apps to only being accessible by those names. You can set a custom domain name without any validation on your apps in an ILB ASE. If you then want to create a zone named *contoso.net*, you could do so and point it to the ILB IP address. The custom domain name works for app requests but doesn't for the scm site. The scm site is only available at *&lt;appname&gt;.scm.&lt;asename&gt;.appserviceenvironment.net*.
131138

@@ -151,7 +158,7 @@ The publishing endpoints for apps in an ILB ASE use the domain that the ILB ASE
151158

152159
## Storage
153160

154-
An ASE has 1 TB of storage for all the apps in the ASE. An App Service plan in the Isolated pricing SKU has a limit of 250 GB by default. If you have five or more App Service plans, be careful not to exceed the 1-TB limit of the ASE. If you need more than the 250-GB limit in one App Service plan, contact support to adjust the App Service plan limit to a maximum of 1 TB. When the plan limit is adjusted, there's still a limit of 1 TB across all the App Service plans in the ASE.
161+
An ASE has 1 TB of storage for all the apps in the ASE. An App Service plan in the Isolated pricing SKU has a limit of 250 GB. In an ASE, 250 GB of storage is added per App Service plan up to the 1 TB limit. You can have more App Service plans than just four, but there is no more storage added beyond the 1 TB limit.
155162

156163
## Logging
157164

articles/automation/automation-child-runbooks.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,9 +10,6 @@ ms.topic: conceptual
1010

1111
It is a recommended practice in Azure Automation to write reusable, modular runbooks with a discrete function that is called by other runbooks. A parent runbook often calls one or more child runbooks to perform required functionality. There are two ways to call a child runbook, and there are distinct differences that you should understand to be able to determine which is best for your scenarios.
1212

13-
>[!NOTE]
14-
>This article has been updated to use the new Azure PowerShell Az module. You can still use the AzureRM module, which will continue to receive bug fixes until at least December 2020. To learn more about the new Az module and AzureRM compatibility, see [Introducing the new Azure PowerShell Az module](https://docs.microsoft.com/powershell/azure/new-azureps-module-az?view=azps-3.5.0). For Az module installation instructions on your Hybrid Runbook Worker, see [Install the Azure PowerShell Module](https://docs.microsoft.com/powershell/azure/install-az-ps?view=azps-3.5.0). For your Automation account, you can update your modules to the latest version using [How to update Azure PowerShell modules in Azure Automation](automation-update-azure-modules.md).
15-
1613
## Invoking a child runbook using inline execution
1714

1815
To invoke a runbook inline from another runbook, use the name of the runbook and provide values for its parameters, just like you would use an activity or a cmdlet. All runbooks in the same Automation account are available to all others to be used in this manner. The parent runbook waits for the child runbook to complete before moving to the next line, and any output returns directly to the parent.

articles/automation/automation-config-aws-account.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,4 +27,4 @@ After you have created and copied your AWS security keys, you need to create a C
2727

2828
## Next steps
2929

30-
* Review the solution article [Automating deployment of a VM in Amazon Web Services](automation-scenario-aws-deployment.md) to learn how to create runbooks to automate tasks in AWS.
30+
* Review [Automating deployment of a VM in Amazon Web Services](automation-scenario-aws-deployment.md) to learn how to create runbooks to automate tasks in AWS.

0 commit comments

Comments
 (0)