Skip to content

Commit f1a21d7

Browse files
authored
Merge pull request #280239 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents a2c3b1b + 160aa4c commit f1a21d7

15 files changed

+17
-17
lines changed

articles/ai-studio/how-to/develop/index-build-consume-sdk.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -268,7 +268,7 @@ from azure.ai.ml.entities import LocalSource
268268

269269
input_source=LocalSource(input_data="<path-to-your-local-files>")
270270

271-
# Github repository
271+
# GitHub repository
272272
from azure.ai.ml.entities import GitSource
273273

274274
input_source=GitSource(

articles/automation/source-control-integration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ Azure Automation supports three types of source control:
4242
> Azure Automation Run As Account will retire on **September 30, 2023** and will be replaced with Managed Identities. Before that date, you need to [migrate from a Run As account to Managed identities](migrate-run-as-accounts-managed-identity.md).
4343
4444
> [!NOTE]
45-
> According to [this](/azure/devops/organizations/accounts/change-application-access-policies#application-connection-policies) Azure DevOps documentation, **Third-party application access via OAuth** policy is defaulted to **off** for all new organizations. So if you try to configure source control in Azure Automation with **Azure Devops (Git)** as source control type without enabling **Third-party application access via OAuth** under Policies tile of Organization Settings in Azure DevOps then you might get **SourceControl securityToken is invalid** error. Hence to avoid this error, make sure you first enable **Third-party application access via OAuth** under Policies tile of Organization Settings in Azure DevOps.
45+
> According to [this](/azure/devops/organizations/accounts/change-application-access-policies#application-connection-policies) Azure DevOps documentation, **Third-party application access via OAuth** policy is defaulted to **off** for all new organizations. So if you try to configure source control in Azure Automation with **Azure DevOps (Git)** as source control type without enabling **Third-party application access via OAuth** under Policies tile of Organization Settings in Azure DevOps then you might get **SourceControl securityToken is invalid** error. Hence to avoid this error, make sure you first enable **Third-party application access via OAuth** under Policies tile of Organization Settings in Azure DevOps.
4646
4747
## Configure source control
4848

articles/container-apps/azure-pipelines.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ Take the following steps to configure an Azure DevOps pipeline to deploy to Azur
9191
| Requirement | Instructions |
9292
|--|--|
9393
| Azure account | If you don't have one, [create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F). You need the *Contributor* or *Owner* permission on the Azure subscription to proceed. Refer to [Assign Azure roles using the Azure portal](../role-based-access-control/role-assignments-portal.yml?tabs=current) for details. |
94-
| Azure Devops project | Go to [Azure DevOps](https://azure.microsoft.com/services/devops/) and select *Start free*. Then create a new project. |
94+
| Azure DevOps project | Go to [Azure DevOps](https://azure.microsoft.com/services/devops/) and select *Start free*. Then create a new project. |
9595
| Azure CLI | Install the [Azure CLI](/cli/azure/install-azure-cli).|
9696

9797
### Create an Azure DevOps repository and clone the source code

articles/defender-for-cloud/defender-for-devops-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ Here, you can add [Azure DevOps](quickstart-onboard-devops.md), [GitHub](quickst
4040

4141
The DevOps inventory table allows you to review onboarded DevOps resources and the security information related to them.
4242

43-
:::image type="content" source="media/defender-for-devops-introduction/inventory-grid.png" alt-text="Screenshot that shows the Devops inventory table on the DevOps security overview page." lightbox="media/defender-for-devops-introduction/bottom-of-page.png":::
43+
:::image type="content" source="media/defender-for-devops-introduction/inventory-grid.png" alt-text="Screenshot that shows the DevOps inventory table on the DevOps security overview page." lightbox="media/defender-for-devops-introduction/bottom-of-page.png":::
4444

4545
On this part of the screen you see:
4646

articles/defender-for-cloud/faq-defender-for-devops.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ sections:
7878
Exemptions aren't available for DevOps security recommendations within Microsoft Defender for Cloud at the moment.
7979
8080
- question: |
81-
Why am I not able to see GitHub Advanced Security for Azure Devops (GHAzDO) results in Defender for Cloud?
81+
Why am I not able to see GitHub Advanced Security for Azure DevOps (GHAzDO) results in Defender for Cloud?
8282
answer: |
8383
Confirm your connectors is properly [authorized](#why-am-i-getting-an-error-while-trying-to-connect-).
8484

articles/defender-for-cloud/multi-factor-authentication-enforcement.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -92,6 +92,7 @@ To see which accounts don't have MFA enabled, use the following Azure Resource G
9292
9393
- Conditional Access feature to enforce MFA on external users/tenants isn't supported yet.
9494
- Conditional Access policy applied to Microsoft Entra roles (such as all global admins, external users, external domain, etc.) isn't supported yet.
95+
- Conditional Access authentication strength isn't supported yet.
9596
- External MFA solutions such as Okta, Ping, Duo, and more aren't supported within the identity MFA recommendations.
9697
9798
## Next steps

articles/dev-box/concept-dev-box-network-requirements.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -183,7 +183,7 @@ This list doesn't include FQDNs and endpoints for other services such as Microso
183183

184184
Direct connectivity to Azure Virtual Desktop RDP broker service endpoints is critical for remote performance to a dev box. These endpoints affect both connectivity and latency. To align with the Microsoft 365 network connectivity principles, you should categorize these endpoints as *Optimize* endpoints, and use a [Remote Desktop Protocol (RDP) Shortpath](/windows-365/enterprise/rdp-shortpath-public-networks) from your Azure virtual network to those endpoints. RDP Shortpath can provide another connection path for improved dev box connectivity, especially in suboptimal network conditions.
185185

186-
To make it easier to configure network security controls, use Azure Virtual Desktop service tags to identity those endpoints for direct routing using an Azure Networking User Defined Route (UDR). A UDR results in direct routing between your virtual network and the RDP broker for lowest latency. For more information about Azure Service Tags, see Azure service tags overview.
186+
To make it easier to configure network security controls, use Azure Virtual Desktop service tags to identify those endpoints for direct routing using an Azure Networking User Defined Route (UDR). A UDR results in direct routing between your virtual network and the RDP broker for lowest latency. For more information about Azure Service Tags, see Azure service tags overview.
187187
Changing the network routes of a dev box (at the network layer or at the dev box layer like VPN) might break the connection between the dev box and the Azure Virtual Desktop RDP broker. If so, the end user is disconnected from their dev box until a connection is re-established.
188188

189189
## DNS requirements
@@ -255,4 +255,4 @@ For more information, see [Virtual Network service endpoints](/azure/virtual-net
255255

256256
- [Check access to required FQDNs and endpoints for Azure Virtual Desktop](/azure/virtual-desktop/check-access-validate-required-fqdn-endpoint).
257257
- Learn how to unblock these FQDNs and endpoints in Azure Firewall, see [Use Azure Firewall to protect Azure Virtual Desktop](/azure/firewall/protect-azure-virtual-desktop).
258-
- For more information about network connectivity, see [Understanding Azure Virtual Desktop network connectivity](/azure/virtual-desktop/network-connectivity).
258+
- For more information about network connectivity, see [Understanding Azure Virtual Desktop network connectivity](/azure/virtual-desktop/network-connectivity).

articles/load-balancer/tutorial-cross-region-portal.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,6 @@ If you don’t have an Azure subscription, create a [free account](https://azure
3030
- An Azure subscription.
3131
- Two **standard** sku Azure Load Balancers with backend pools deployed in two different Azure regions.
3232
- For information on creating a regional standard load balancer and virtual machines for backend pools, see [Quickstart: Create a public load balancer to load balance VMs using the Azure portal](quickstart-load-balancer-standard-public-portal.md).
33-
- Append the name of the load balancers, virtual machines, and other resources in each region with a **-R1** and **-R2**.
3433

3534
## Sign in to Azure portal
3635

articles/managed-grafana/how-to-data-source-plugins-managed-identity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ Azure Managed Grafana supports many popular data sources. The table below lists
5353
Within the Standard service tier, users who have subscribed to the Grafana Enterprise option can also access the following data sources.
5454

5555
* [AppDynamics](https://grafana.com/grafana/plugins/dlopes7-appdynamics-datasource)
56-
* [Azure Devops](https://grafana.com/grafana/plugins/grafana-azuredevops-datasource)
56+
* [Azure DevOps](https://grafana.com/grafana/plugins/grafana-azuredevops-datasource)
5757
* [Databricks](https://grafana.com/grafana/plugins/grafana-databricks-datasource)
5858
* [DataDog](https://grafana.com/grafana/plugins/grafana-datadog-datasource)
5959
* [Dynatrace](https://grafana.com/grafana/plugins/grafana-dynatrace-datasource)

articles/postgresql/flexible-server/generative-ai-azure-cognitive.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -591,5 +591,5 @@ select
591591

592592
## Related content
593593

594-
- [Learn more about Azure Open AI integration](generative-ai-azure-openai.md)
594+
- [Learn more about Azure OpenAI Service integration](generative-ai-azure-openai.md)
595595
- [Learn more about Azure Machine Learning integration](generative-ai-azure-machine-learning.md)

0 commit comments

Comments
 (0)