Skip to content

Commit f17e86a

Browse files
committed
revert non-comm services, add one
1 parent 629370a commit f17e86a

File tree

7 files changed

+8
-8
lines changed

7 files changed

+8
-8
lines changed

articles/active-directory-b2c/identity-provider-generic-saml-options.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ The following XML is an example of a Microsoft Entra metadata single sign-on ser
8686

8787
### Assertion consumer service
8888

89-
The Assertion Consumer Service is where the identity provider SAML responses are sent and received by Azure AD B2C. SAML responses are transmitted to Azure AD B2C via HTTP POST binding. The Assertion Consumer Service location points to your relying party's base policy. For example, if the relying policy is *B2C_1A_signup_signin*, the Assertion Consumer Service is the base policy of the *B2C_1A_signup_signin*, such as *B2C_1A_TrustFrameworkBase*.
89+
The Assertion Consumer Service (ACS) is where the identity provider SAML responses are sent and received by Azure AD B2C. SAML responses are transmitted to Azure AD B2C via HTTP POST binding. The ACS location points to your relying party's base policy. For example, if the relying policy is *B2C_1A_signup_signin*, the ACS is the base policy of the *B2C_1A_signup_signin*, such as *B2C_1A_TrustFrameworkBase*.
9090

9191
The following XML is an example of an Azure AD B2C policy metadata assertion consumer service element.
9292

articles/active-directory/azuread-dev/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@
8585
- name: Publish to the Office 365 Seller Dashboard
8686
href: /partner-center/marketplace/add-in-submission-guide
8787
- name: Azure Access Control Service
88-
displayName: Access Control Service
88+
displayName: ACS
8989
- name: Use the Microsoft Graph API
9090
href: /graph/overview?toc=/azure/active-directory/azuread-dev/toc.json&bc=/azure/active-directory/azuread-dev/breadcrumb/toc.json
9191
- name: AD FS for developers

articles/aks/aks-migration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -167,7 +167,7 @@ If you're migrating existing persistent volumes to AKS, you generally follow the
167167
The following open-source tools can help you create managed disks and migrate volumes between Kubernetes clusters:
168168
169169
* [Azure CLI Disk Copy extension](https://github.com/noelbundick/azure-cli-disk-copy-extension) copies and converts disks across resource groups and Azure regions.
170-
* [Azure Kube CLI extension](https://github.com/yaron2/azure-kube-cli) enumerates Azure Container Service Kubernetes volumes and migrates them to an AKS cluster.
170+
* [Azure Kube CLI extension](https://github.com/yaron2/azure-kube-cli) enumerates ACS Kubernetes volumes and migrates them to an AKS cluster.
171171
172172
### Deployment of your cluster configuration
173173

articles/azure-monitor/insights/scom-assessment.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ Use the following information to set the Operations Manager Run As account for S
6868

6969
The Run As account must meet following requirements before proceeding:
7070

71-
* A domain user account that is a member of the local Administrators group on all servers supporting any Operations Manager role - Management server, SQL Server hosting the operational, data warehouse and Audit Collection Services database, Reporting, Web console, and Gateway server.
71+
* A domain user account that is a member of the local Administrators group on all servers supporting any Operations Manager role - Management server, SQL Server hosting the operational, data warehouse and ACS database, Reporting, Web console, and Gateway server.
7272
* Operation Manager Administrator Role for the management group being assessed
7373
* If the account does not have SQL sysadmin rights, then execute the [script](#sql-script-to-grant-granular-permissions-to-the-run-as-account) to grant granular permissions to the account on each SQL Server instance hosting one or all of the Operations Manager databases.
7474

@@ -91,7 +91,7 @@ Now that the Run As account is created, it needs to target management servers in
9191

9292
### SQL script to grant granular permissions to the Run As account
9393

94-
Execute the following SQL script to grant required permissions to the Run As account on the SQL Server instance used by Operations Manager hosting the operational, data warehouse, and Audit Collection Services database.
94+
Execute the following SQL script to grant required permissions to the Run As account on the SQL Server instance used by Operations Manager hosting the operational, data warehouse, and ACS database.
9595

9696
```
9797
-- Replace <UserName> with the actual user name being used as Run As Account.

articles/azure-relay/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@
5858
href: ../service-bus-messaging/deprecate-service-bus-management.md?toc=%2fazure%2fservice-bus-relay%2ftoc.json
5959
- name: Plan and design
6060
items:
61-
- name: Migrate from Access Control Service to SAS
61+
- name: Migrate from ACS to SAS
6262
href: relay-migrate-acs-sas.md
6363
- name: Develop
6464
items:

articles/backup/backup-azure-dpm-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ To edit the storage replication setting:
7777
You use vault credentials when you register the DPM server in the vault.
7878

7979
- The vault credentials file is a certificate generated by the portal for each backup vault.
80-
- The portal then uploads the public key to the Access Control Service.
80+
- The portal then uploads the public key to the Access Control Service (ACS).
8181
- During the machine registration workflow, the certificate's private key is made available to the user, which authenticates the machine.
8282
- Based on the authentication, the Azure Backup service sends data to the identified vault.
8383

articles/communication-services/concepts/known-issues.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ The following sections provide information about known issues associated with th
2525

2626
### Chrome M115 - regression
2727

28-
Chrome version 115 for Android introduced a regression when making video calls - the result of this bug is a user making a call on Azure Communication Services with this version of Chrome will have no outgoing video in Group and Azure Communication Services-MS Teams calls.
28+
Chrome version 115 for Android introduced a regression when making video calls - the result of this bug is a user making a call on Azure Communication Services with this version of Chrome will have no outgoing video in Group and Azure Communication Services-Microsoft Teams calls.
2929
- This is a known regression introduced on [Chromium](https://bugs.chromium.org/p/chromium/issues/detail?id=1469318)
3030
- As a short term mitigation please instruct users to use Microsoft Edge or Firefox on Android, or avoid using Google Chrome 115/116 on Android
3131

0 commit comments

Comments
 (0)