Skip to content

Commit f007ebf

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into heidist-fresh
2 parents 860c13b + ed1e560 commit f007ebf

File tree

132 files changed

+635
-1122
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

132 files changed

+635
-1122
lines changed

.openpublishing.redirection.json

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,35 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/security/develop/security-code-analysis-customize.md",
5+
"redirect_url": "/previous-versions/azure/security/develop/security-code-analysis-customize",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "articles/security/develop/security-code-analysis-faq.yml",
10+
"redirect_url": "/previous-versions/azure/security/develop/security-code-analysis-faq",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path": "articles/security/develop/security-code-analysis-onboard.md",
15+
"redirect_url": "/previous-versions/azure/security/develop/security-code-analysis-onboard",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path": "articles/security/develop/security-code-analysis-overview.md",
20+
"redirect_url": "/previous-versions/azure/security/develop/security-code-analysis-overview",
21+
"redirect_document_id": false
22+
},
23+
{
24+
"source_path": "articles/security/develop/security-code-analysis-releases.md",
25+
"redirect_url": "/previous-versions/azure/security/develop/security-code-analysis-releases",
26+
"redirect_document_id": false
27+
},
28+
{
29+
"source_path": "articles/security/develop/yaml-configuration.md",
30+
"redirect_url": "/previous-versions/azure/security/develop/yaml-configuration",
31+
"redirect_document_id": false
32+
},
333
{
434
"source_path": "articles/vmware-cloudsimple/access-cloudsimple-portal.md",
535
"redirect_url": "/previous-versions/azure/vmware-cloudsimple/access-cloudsimple-portal",

articles/active-directory/develop/msal-android-handling-exceptions.md

Lines changed: 13 additions & 16 deletions
Large diffs are not rendered by default.

articles/active-directory/develop/msal-net-token-cache-serialization.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 11/09/2021
12+
ms.date: 01/26/2023
1313
ms.author: dmwendia
1414
ms.reviewer: jmprieur
1515
ms.custom: "devx-track-csharp, aaddev, has-adal-ref"
@@ -24,7 +24,7 @@ After Microsoft Authentication Library (MSAL) [acquires a token](msal-acquire-ca
2424

2525
The recommendation is:
2626
- When you're writing a desktop application, use the cross-platform token cache as explained in [Desktop apps](msal-net-token-cache-serialization.md?tabs=desktop).
27-
- Do nothing for [mobile and UWP apps](msal-net-token-cache-serialization.md?tabs=mobile). MSAL.NET provides secure storage for the cache.
27+
- Do nothing for [mobile and Universal Windows Platform (UWP) apps](msal-net-token-cache-serialization.md?tabs=mobile). MSAL.NET provides secure storage for the cache.
2828
- In ASP.NET Core [web apps](scenario-web-app-call-api-overview.md) and [web APIs](scenario-web-api-call-api-overview.md), use [Microsoft.Identity.Web](microsoft-identity-web.md) as a higher-level API. You'll get token caches and much more. See [ASP.NET Core web apps and web APIs](msal-net-token-cache-serialization.md?tabs=aspnetcore).
2929
- In the other cases of [web apps](scenario-web-app-call-api-overview.md) and [web APIs](scenario-web-api-call-api-overview.md):
3030
- If you request tokens for users in a production application, use a [distributed token cache](msal-net-token-cache-serialization.md?tabs=aspnet#distributed-caches) (Redis, SQL Server, Azure Cosmos DB, distributed memory). Use token cache serializers available from [Microsoft.Identity.Web.TokenCache](https://www.nuget.org/packages/Microsoft.Identity.Web.TokenCache/).
@@ -252,7 +252,7 @@ You can specify that you don't want to have any token cache serialization and in
252252

253253
`WithCacheOptions(CacheOptions.EnableSharedCacheOptions)` makes the internal MSAL token cache shared between MSAL client application instances. Sharing a token cache is faster than using any token cache serialization, but the internal in-memory token cache doesn't have eviction policies. Existing tokens will be refreshed in place, but fetching tokens for different users, tenants, and resources makes the cache grow accordingly.
254254

255-
If you use this approach and have a large number of users or tenants, be sure to monitor the memory footprint. If the memory footprint becomes a problem, consider enabling token cache serialization, which might reduce the internal cache size. Also be aware that currently, you can't use shared cache and cache serialization together.
255+
If you use this approach and have a large number of users or tenants, be sure to monitor the memory footprint. If the memory footprint becomes a problem, consider enabling token cache serialization, which might reduce the internal cache size. Currently, you can't use shared cache and cache serialization together.
256256

257257
#### In-memory token cache
258258

articles/active-directory/multi-tenant-organizations/cross-tenant-synchronization-configure-graph.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.workload: identity
99
ms.subservice: multi-tenant-organizations
1010
ms.topic: how-to
11-
ms.date: 01/23/2023
11+
ms.date: 01/31/2023
1212
ms.author: rolyon
1313
ms.custom: it-pro
1414

@@ -62,7 +62,7 @@ These steps describe how to use Microsoft Graph Explorer (recommended), but you
6262
Content-Type: application/json
6363
6464
{
65-
"tenantId": "3d0f5dec-5d3d-455c-8016-e2af1ae4d31a",
65+
"tenantId": "3d0f5dec-5d3d-455c-8016-e2af1ae4d31a"
6666
}
6767
```
6868
@@ -94,12 +94,12 @@ These steps describe how to use Microsoft Graph Explorer (recommended), but you
9494
}
9595
```
9696
97-
1. Use the [Update crossTenantIdentitySyncPolicyPartner](/graph/api/crosstenantidentitysyncpolicypartner-update?view=graph-rest-beta&preserve-view=true) API to enable user synchronization in the target tenant.
97+
1. Use the [Create identitySynchronization](/graph/api/crosstenantaccesspolicyconfigurationpartner-put-identitysynchronization?view=graph-rest-beta&preserve-view=true) API to enable user synchronization in the target tenant.
9898
9999
**Request**
100100
101101
```http
102-
PATCH https://graph.microsoft.com/beta/policies/crossTenantAccessPolicy/partners/3d0f5dec-5d3d-455c-8016-e2af1ae4d31a/identitySynchronization
102+
PUT https://graph.microsoft.com/beta/policies/crossTenantAccessPolicy/partners/3d0f5dec-5d3d-455c-8016-e2af1ae4d31a/identitySynchronization
103103
Content-type: application/json
104104
105105
{

articles/active-directory/roles/custom-consent-permissions.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.workload: identity
99
ms.subservice: roles
1010
ms.topic: overview
11-
ms.date: 11/04/2020
11+
ms.date: 01/31/2023
1212
ms.author: rolyon
1313
ms.reviewer: psignoret
1414
ms.custom: it-pro
@@ -65,10 +65,10 @@ To delegate the creation, update and deletion of [app consent policies](../manag
6565
> | ---------- | ----------- |
6666
> | microsoft.directory/servicePrincipals/managePermissionGrantsForSelf.{id} | Grants the ability to consent to apps on behalf of self (user consent), subject to app consent policy `{id}`. |
6767
> | microsoft.directory/servicePrincipals/managePermissionGrantsForAll.{id} | Grants the permission to consent to apps on behalf of all (tenant-wide admin consent), subject to app consent policy `{id}`. |
68-
> | microsoft.directory/permissionGrantPolicies/standard/read | Grants the ability to read app consent policies. |
69-
> | microsoft.directory/permissionGrantPolicies/basic/update | Grants the ability to update basic properties on existing app consent policies. |
70-
> | microsoft.directory/permissionGrantPolicies/create | Grants the ability to create app consent policies. |
71-
> | microsoft.directory/permissionGrantPolicies/delete | Grants the ability to delete app consent policies. |
68+
> | microsoft.directory/permissionGrantPolicies/standard/read | Read standard properties of permission grant policies |
69+
> | microsoft.directory/permissionGrantPolicies/basic/update | Update basic properties of permission grant policies |
70+
> | microsoft.directory/permissionGrantPolicies/create | Create permission grant policies |
71+
> | microsoft.directory/permissionGrantPolicies/delete | Delete permission grant policies |
7272
7373
## Next steps
7474

articles/active-directory/roles/custom-device-permissions.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.workload: identity
99
ms.subservice: roles
1010
ms.topic: reference
11-
ms.date: 11/30/2022
11+
ms.date: 01/31/2023
1212
ms.author: rolyon
1313
ms.reviewer:
1414
ms.custom: it-pro
@@ -77,12 +77,12 @@ The following permission is available to update tenant-wide device registration
7777
> [!div class="mx-tableFixed"]
7878
> | Permission | Description |
7979
> | ---------- | ----------- |
80-
> | microsoft.directory/devices/createdFrom/read | Read createdfrom properties of devices |
80+
> | microsoft.directory/devices/createdFrom/read | Read created from Internet of Things (IoT) device template links |
8181
> | microsoft.directory/devices/registeredOwners/read | Read registered owners of devices |
8282
> | microsoft.directory/devices/registeredUsers/read | Read registered users of devices |
8383
> | microsoft.directory/devices/standard/read | Read basic properties on devices |
8484
> | microsoft.directory/bitlockerKeys/key/read | Read bitlocker metadata and key on devices |
85-
> | microsoft.directory/bitlockerKeys/metadata/read | Read bitlocker metadata on devices |
85+
> | microsoft.directory/bitlockerKeys/metadata/read | Read bitlocker key metadata on devices |
8686
> | microsoft.directory/deviceRegistrationPolicy/standard/read | Read standard properties on device registration policies |
8787
8888
#### Update

articles/active-directory/roles/custom-enterprise-app-permissions.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.workload: identity
99
ms.subservice: roles
1010
ms.topic: overview
11-
ms.date: 08/06/2021
11+
ms.date: 01/31/2023
1212
ms.author: rolyon
1313
ms.reviewer: vincesm
1414
ms.custom: it-pro
@@ -177,7 +177,7 @@ To delegate create, read, update, and delete (CRUD) permissions for updating the
177177
> | microsoft.directory/applicationPolicies/owners/update | Update the owner property of application policies |
178178
> | microsoft.directory/applicationPolicies/policyAppliedTo/read | Read application policies applied to objects list |
179179
> | microsoft.directory/applicationPolicies/standard/read | Read standard properties of application policies |
180-
> | microsoft.directory/servicePrincipals/allProperties/allTasks | Create and delete servicePrincipals, and read and update all properties in Azure Active Directory |
180+
> | microsoft.directory/servicePrincipals/allProperties/allTasks | Create and delete service principals, and read and update all properties |
181181
> | microsoft.directory/servicePrincipals/allProperties/read | Read all properties (including privileged properties) on servicePrincipals |
182182
> | microsoft.directory/servicePrincipals/allProperties/update | Update all properties (including privileged properties) on servicePrincipals |
183183
> | microsoft.directory/servicePrincipals/appRoleAssignedTo/read | Read service principal role assignments |
@@ -218,9 +218,9 @@ To delegate create, read, update, and delete (CRUD) permissions for updating the
218218
> | microsoft.directory/connectorGroups/allProperties/update | Update all properties of application proxy connector groups |
219219
> | microsoft.directory/connectors/create | Create application proxy connectors |
220220
> | microsoft.directory/connectors/allProperties/read | Read all properties of application proxy connectors |
221-
> | microsoft.directory/servicePrincipals/synchronizationJobs/manage | Start, restart, and pause application provisioning syncronization jobs |
222-
> | microsoft.directory/servicePrincipals/synchronization/standard/read | Read provisioning settings associated with the application object |
223-
> | microsoft.directory/servicePrincipals/synchronizationSchema/manage | Create and manage application provisioning syncronization jobs and schema |
221+
> | microsoft.directory/servicePrincipals/synchronizationJobs/manage | Start, restart, and pause application provisioning synchronization jobs |
222+
> | microsoft.directory/servicePrincipals/synchronization/standard/read | Read provisioning settings associated with your service principal |
223+
> | microsoft.directory/servicePrincipals/synchronizationSchema/manage | Create and manage application provisioning synchronization jobs and schema |
224224
> | microsoft.directory/provisioningLogs/allProperties/read | Read all properties of provisioning logs |
225225
226226
## Next steps

articles/api-management/api-management-configuration-repository-git.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -207,6 +207,7 @@ These files can be created, deleted, edited, and managed on your local file syst
207207
> * [Subscriptions](/rest/api/apimanagement/current-ga/subscription)
208208
> * Named values
209209
> * Developer portal entities other than styles and templates
210+
> * Policy Fragments
210211
>
211212
212213
### Root api-management folder

articles/azure-cache-for-redis/cache-how-to-upgrade.md

Lines changed: 25 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -13,9 +13,6 @@ ms.custom: template-how-to
1313

1414
# How to upgrade an existing Redis 4 cache to Redis 6
1515

16-
> [!IMPORTANT]
17-
> We are improving the upgrade experience and have temporarily disabled the Redis version upgrade. We recommend that you upgrade your caches starting in February 2023.
18-
1916
Azure Cache for Redis supports upgrading the version of your Azure Cache for Redis from Redis 4 to Redis 6. Upgrading is similar to regular monthly maintenance. Upgrading follows the same pattern as maintenance: First, the Redis version on the replica node is updated, followed by an update to the primary node. Your client application should treat the upgrade operation exactly like a planned maintenance event.
2017

2118
As a precautionary step, we recommend exporting the data from your existing Redis 4 cache and testing your client application with a Redis 6 cache in a lower environment before upgrading.
@@ -46,18 +43,37 @@ Before you upgrade, check the Redis version of a cache by selecting **Properties
4643

4744
## Upgrade using the Azure portal
4845

49-
> [!IMPORTANT]
50-
> We are improving the upgrade experience and have temporarily disabled the Redis version upgrade. We recommend that you upgrade your caches starting in February 2023.
46+
1. In the Azure portal, select the Azure Cache for Redis instance that you want to upgrade from Redis 4 to Redis 6.
47+
48+
1. On the left side of the screen, select **Advanced settings**.
49+
50+
1. If your cache instance is eligible to be upgraded, you should see the following blue banner. If you want to proceed, select the text in the banner.
51+
52+
:::image type="content" source="media/cache-how-to-upgrade/blue-banner-upgrade-cache.png" alt-text="Screenshot informing you that you can upgrade your cache to Redis 6 with additional features. Upgrading your cache instance cannot be reversed.":::
53+
54+
1. A dialog box displays a popup notifying you that upgrading is permanent and might cause a brief connection blip. Select **Yes** if you would like to upgrade your cache instance.
55+
56+
:::image type="content" source="media/cache-how-to-upgrade/dialog-version-upgrade.png" alt-text="Screenshot showing a dialog with more information about upgrading your cache with Yes selected.":::
57+
58+
1. To check on the status of the upgrade, navigate to **Overview**.
59+
60+
:::image type="content" source="media/cache-how-to-upgrade/upgrade-status.png" alt-text="Screenshot showing Overview in the Resource menu. Status shows cache is being upgraded.":::
5161

5262
## Upgrade using Azure CLI
5363

54-
> [!IMPORTANT]
55-
> We are improving the upgrade experience and have temporarily disabled the Redis version upgrade. We recommend that you upgrade your caches starting in February 2023.
64+
To upgrade a cache from 4 to 6 using the Azure CLI, use the following command:
65+
66+
```azurecli-interactive
67+
az redis update --name cacheName --resource-group resourceGroupName --set redisVersion=6
68+
```
5669

5770
## Upgrade using PowerShell
5871

59-
> [!IMPORTANT]
60-
> We are improving the upgrade experience and have temporarily disabled the Redis version upgrade. We recommend that you upgrade your caches starting in February 2023.
72+
To upgrade a cache from 4 to 6 using PowerShell, use the following command:
73+
74+
```powershell-interactive
75+
Set-AzRedisCache -Name "CacheName" -ResourceGroupName "ResourceGroupName" -RedisVersion "6"
76+
```
6177

6278
## Next steps
6379

articles/azure-functions/functions-add-output-binding-storage-queue-vs-code.md

Lines changed: 2 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Connect Azure Functions to Azure Storage using Visual Studio Code
33
description: Learn how to connect Azure Functions to an Azure Queue Storage by adding an output binding to your Visual Studio Code project.
4-
ms.date: 06/15/2022
4+
ms.date: 01/31/2023
55
ms.topic: quickstart
66
ms.devlang: csharp, java, javascript, powershell, python, typescript
77
ms.custom: devx-track-python, devx-track-js, mode-ui, devdivchpfy22
@@ -174,17 +174,7 @@ Because you're using the storage connection string, your function connects to th
174174

175175
### Connect Storage Explorer to your account
176176

177-
Skip this section if you have already installed Azure Storage Explorer and connected it to your Azure account.
178-
179-
1. Run the [Azure Storage Explorer](https://storageexplorer.com/) tool, select the connect icon on the left, and select **Add an account**.
180-
181-
:::image type="content" source="./media/functions-add-output-binding-storage-queue-vs-code/storage-explorer-add-account.png" alt-text="Screenshot of how to add an Azure account to Microsoft Azure Storage Explorer.":::
182-
183-
1. In the **Connect** dialog, choose **Add an Azure account**, choose your **Azure environment**, and then select **Sign in...**.
184-
185-
:::image type="content" source="./media/functions-add-output-binding-storage-queue-vs-code/storage-explorer-connect-azure-account.png" alt-text="Screenshot of the sign-in to your Azure account window.":::
186-
187-
After you successfully sign in to your account, you see all of the Azure subscriptions associated with your account.
177+
[!INCLUDE [functions-storage-explorer-connect.md](../../includes/functions-storage-explorer-connect.md)]
188178

189179
### Examine the output queue
190180

0 commit comments

Comments
 (0)