Skip to content

Commit f2eb1bc

Browse files
authored
Merge pull request #167094 from MicrosoftDocs/master
7/27 PM Publish
2 parents c9e79d2 + 3975532 commit f2eb1bc

File tree

159 files changed

+1196
-660
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

159 files changed

+1196
-660
lines changed

.openpublishing.redirection.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38441,6 +38441,26 @@
3844138441
"redirect_url": "/azure/iot-develop/quickstart-devkit-mxchip-az3166-iot-hub",
3844238442
"redirect_document_id": false
3844338443
},
38444+
{
38445+
"source_path_from_root": "/articles/iot-hub/quickstart-control-device-dotnet.md",
38446+
"redirect_url": "/azure/iot-hub/quickstart-control-device?pivots=programming-language-csharp",
38447+
"redirect_document_id": false
38448+
},
38449+
{
38450+
"source_path_from_root": "/articles/iot-hub/quickstart-control-device-node.md",
38451+
"redirect_url": "/azure/iot-hub/quickstart-control-device?pivots=programming-language-nodejs",
38452+
"redirect_document_id": false
38453+
},
38454+
{
38455+
"source_path_from_root": "/articles/iot-hub/quickstart-control-device-python.md",
38456+
"redirect_url": "/azure/iot-hub/quickstart-control-device?pivots=programming-language-python",
38457+
"redirect_document_id": false
38458+
},
38459+
{
38460+
"source_path_from_root": "/articles/iot-hub/quickstart-control-device-java.md",
38461+
"redirect_url": "/azure/iot-hub/quickstart-control-device?pivots=programming-language-java",
38462+
"redirect_document_id": false
38463+
},
3844438464
{
3844538465
"source_path_from_root": "/articles/iot-suite/iot-suite-connected-factory-publisher.md",
3844638466
"redirect_url": "https://github.com/Azure/iot-edge-opc-publisher/blob/master/README.md",

articles/active-directory/privileged-identity-management/pim-how-to-activate-role.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,9 @@ If you have been made *eligible* for an administrative role, then you must *acti
2424

2525
This article is for administrators who need to activate their Azure AD role in Privileged Identity Management.
2626

27+
> [!TIP]
28+
> You can use the shortcut URL [AKA.MS/PIM](https://aka.ms/PIM) to jump straight to the Azure AD roles selection page.
29+
2730
# [New version](#tab/new)
2831

2932
## Activate a role for new version

articles/active-directory/privileged-identity-management/pim-how-to-change-default-settings.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,7 @@ If setting multiple approvers, approval completes as soon as one of them approve
9797

9898
![Select a user or group pane to select approvers](./media/pim-resource-roles-configure-role-settings/resources-role-settings-select-approvers.png)
9999

100-
1. Select at least one user and then click **Select**. Select at least one approver. There are no default approvers.
100+
1. Select at least one user and then click **Select**. Select at least one approver. If no specific approvers are selected, privileged role administrators/global administrators will become the default approvers.
101101

102102
Your selections will appear in the list of selected approvers.
103103

articles/active-directory/verifiable-credentials/introduction-to-verifiable-credentials-architecture.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ This architectural overview introduces the capabilities and components of the Az
2626

2727
## Approaches to identity
2828

29-
Today most organizations use centralized identity systems to provide employees credentials. They also use use various methods to bring customers, partners, vendors, and relying parties into the organization’s trust boundaries. These methods include federation, creating and managing guest accounts with systems like Azure AD B2B, and creating explicit trusts with relying parties. Most business relationships have a digital component, so enabling some form of trust between organizations requires significant effort.
29+
Today most organizations use centralized identity systems to provide employees credentials. They also use various methods to bring customers, partners, vendors, and relying parties into the organization’s trust boundaries. These methods include federation, creating and managing guest accounts with systems like Azure AD B2B, and creating explicit trusts with relying parties. Most business relationships have a digital component, so enabling some form of trust between organizations requires significant effort.
3030

3131
### Centralized identity systems
3232

@@ -78,7 +78,7 @@ Terminology for verifiable credentials (VCs) might be confusing if you're not fa
7878

7979
“A ***decentralized identifier document***, also referred to as a ***DID document***, is a document that is accessible using a verifiable data registry and contains information related to a specific decentralized identifier, such as the associated repository and public key information.”
8080

81-
* In the scenario above, both the issuer and verifier have a DID, and a DID document. The DID document contains the public key, and the list of DNS web domains associated with DID (also known as linked domains).
81+
* In the scenario above, both the issuer and verifier have a DID, and a DID document. The DID document contains the public key, and the list of DNS web domains associated with the DID (also known as linked domains).
8282

8383
* Woodgrove (issuer) signs their employees’ VCs with its public key; similarly, Proseware (verifier) signs requests to present a VC using its key, which is also associated with its DID.
8484

@@ -129,7 +129,7 @@ These use cases demonstrate how centralized identities and decentralized identit
129129

130130
**Awareness**: Alice is interested in working for Woodgrove, Inc. and visits Woodgrove’s career website.
131131

132-
**Activation**: The Woodgrove site presents Alice with a method to prove their identity by promptinthem with a QR code or a deep link to visit its trusted identity proofing partner, Adatum.
132+
**Activation**: The Woodgrove site presents Alice with a method to prove their identity by prompting them with a QR code or a deep link to visit its trusted identity proofing partner, Adatum.
133133

134134
**Request and upload**: Adatum requests proof of identity from Alice. Alice takes a selfie and a driver’s license picture and uploads them to Adatum.
135135

@@ -166,7 +166,7 @@ By combining centralized and decentralized identity architectures for onboarding
166166

167167
As an employee, Alice is operating inside of the trust boundary of Woodgrove. Woodgrove acts as the identity provider (IDP) and maintains complete control of the identity and the configuration of the apps Alice uses to interact within the Woodgrove trust boundary. To use resources in the Azure AD trust boundary, Alice provides potentially multiple forms of proof of identification to log on to Woodgrove’s trust boundary and access the resources inside of Woodgrove’s technology environment. This is a typical scenario that is well served using a centralized identity architecture.
168168

169-
* Woodgrove manages the trust boundary, and using good security practices provides the least-privileged level of access to Alice based on the job performed. To maintain a strong security posture, and potentially for compliance reasons, Woodgrove must also be able to track employees’ permissions and access to resources and must be able to revoke permissions when the employment is terminated.
169+
* Woodgrove manages the trust boundary and using good security practices provides the least-privileged level of access to Alice based on the job performed. To maintain a strong security posture, and potentially for compliance reasons, Woodgrove must also be able to track employees’ permissions and access to resources and must be able to revoke permissions when the employment is terminated.
170170

171171
* Alice only uses the credential that Woodgrove maintains to access Woodgrove resources. Alice has no need to track when the credential is used since the credential is managed by Woodgrove and only used with Woodgrove resources. The identity is only valid inside of the Woodgrove trust boundary when access to Woodgrove resources is necessary, so Alice has no need to possess the credential.
172172

@@ -272,7 +272,7 @@ In this flow, a holder interacts with a relying party (RP) to present a VC as pa
272272

273273
1. The wallet downloads the request from the link. The request includes:
274274

275-
* a [standards based request for credentials](https://identity.foundation/presentation-exchange/) of a schema or credentialType.
275+
* a [standards based request for credentials](https://identity.foundation/presentation-exchange/) of a schema or credential type.
276276

277277
* the DID of the RP, which the wallet looks up in ION.
278278

articles/active-directory/verifiable-credentials/plan-issuance-solution.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ Each issuer has a single key set used for signing, updating, and recovery. This
5454

5555
* Rules are an issuer-defined model that describes the required inputs of a verifiable credential, the trusted sources of the inputs, and the mapping of input claims to output claims.
5656

57-
* Input – Are a subset of the model in the rules file for client consumption. The subset must describe the set of inputs, where to obtain the inputs and the endpoint to call to obtain a verifiable credential.
57+
* **Input** – Are a subset of the model in the rules file for client consumption. The subset must describe the set of inputs, where to obtain the inputs and the endpoint to call to obtain a verifiable credential.
5858

5959
* Rules and display files for different credentials can be configured to use different containers, subscriptions, and storage. For example, you can delegate permissions to different teams that own management of specific VCs.
6060

@@ -122,7 +122,7 @@ With Azure AD Verifiable Credentials, the most common credential use cases are:
122122

123123
* a user’s selfie
124124

125-
* verification of liveness.
125+
* verification of liveness
126126

127127
This kind of credential is a good fit for identity onboarding scenarios of new employees, partners, service providers, students, and other instances where identity verification is essential.
128128

@@ -150,7 +150,7 @@ In addition to the industry-specific standards and schemas that might be applica
150150

151151
* **Minimize private information**: Meet the use cases with the minimal amount of private information necessary. For example, a VC used for e-commerce websites that offers discounts to employees and alumni can be fulfilled by presenting the credential with just the first and last name claims. Additional information such as hiring date, title, department, etc. are not needed.
152152

153-
* **Favor abstract claims**: Each claim should meet the need while minimizing the detail. For example, a claim called “ageOver” with discrete values such as “13”,”21”,”60”, is more abstract than a date of birth claim.
153+
* **Favor abstract claims**: Each claim should meet the need while minimizing the detail. For example, a claim named “ageOver” with discrete values such as “13”,”21”,”60”, is more abstract than a date of birth claim.
154154

155155
* **Plan for revocability**: We recommend you define an index claim to enable mechanisms to find and revoke credentials. You are limited to defining one index claim per contract. It is important to note that values for indexed claims are not stored in the backend, only a hash of the claim value. For more information, see [Revoke a previously issued verifiable credential](../verifiable-credentials/how-to-issuer-revoke.md).
156156

articles/app-service/quickstart-custom-container.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -203,7 +203,7 @@ Create a container registry by following the instructions in [Quickstart: Create
203203

204204
![sign in to Azure](./media/quickstart-docker/sign-in.png)
205205

206-
1. In the [Status Bar](https://code.visualstudio.com/docs/getstarted/userinterface) at the bottom, verify that your Azure account email address. In the **APP SERVICE** explorer, your subscription should be displayed.
206+
1. In the [Status Bar](https://code.visualstudio.com/docs/getstarted/userinterface) at the bottom, verify your Azure account email address. In the **APP SERVICE** explorer, your subscription should be displayed.
207207

208208
1. In the Activity Bar, select the **Docker** logo. In the **REGISTRIES** explorer, verify that the container registry you created appears.
209209

@@ -286,7 +286,7 @@ In this Dockerfile, the parent image is one of the built-in Java containers of A
286286

287287
3. In the image tag box, specify the tag you want in the following format: `<acr-name>.azurecr.io/<image-name>/<tag>`, where `<acr-name>` is the name of the container registry you created. Press **Enter**.
288288

289-
4. When the image finishes building, click **Refresh** at the top of the **IMAGES** explorer and verify the image is built successfully.
289+
4. When the image finishes building, click **Refresh** at the top of the **IMAGES** explorer and verify that the image is built successfully.
290290

291291
![Screenshot shows the built image with tag.](./media/quickstart-docker/built-image.png)
292292

@@ -295,7 +295,7 @@ In this Dockerfile, the parent image is one of the built-in Java containers of A
295295
1. In the Activity Bar, click the **Docker** icon. In the **IMAGES** explorer, find the image you just built.
296296
1. Expand the image, right-click on the tag you want, and click **Push**.
297297
1. Make sure the image tag begins with `<acr-name>.azurecr.io` and press **Enter**.
298-
1. When Visual Studio Code finishes pushing the image to your container registry, click **Refresh** at the top of the **REGISTRIES** explorer and verify the image is pushed successfully.
298+
1. When Visual Studio Code finishes pushing the image to your container registry, click **Refresh** at the top of the **REGISTRIES** explorer and verify that the image is pushed successfully.
299299

300300
![Screenshot shows the image deployed to Azure container registry.](./media/quickstart-docker/image-in-registry.png)
301301

articles/automation/whats-new.md

Lines changed: 17 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Significant updates to Azure Automation updated each month.
44
services: automation
55
ms.subservice:
66
ms.topic: overview
7-
ms.date: 06/09/2021
7+
ms.date: 07/27/2021
88
ms.custom: references_regions
99
---
1010

@@ -18,6 +18,22 @@ Azure Automation receives improvements on an ongoing basis. To stay up to date w
1818

1919
This page is updated monthly, so revisit it regularly.
2020

21+
## July 2021
22+
23+
### Preview Support for User Assigned Managed Identities
24+
25+
**Type:** New feature
26+
27+
Azure Automation now supports [User Assigned Managed Identities](automation-secure-asset-encryption.md) for cloud jobs in Azure public , Gov & China regions. Read the [announcement](https://azure.microsoft.com/updates/azure-automation-user-assigned-identities/) for more information.
28+
29+
### General Availability of customer-managed keys for Azure Automation
30+
31+
**Type:** New feature
32+
33+
Customers can manage and secure encryption of Azure Automation assets using their own managed keys. With the introduction of customer-managed keys you can supplement default encryption with an additional encryption layer using keys that you create and manage in Azure Key Vault. This additional encryption should help you meet your organization’s regulatory or compliance needs.
34+
35+
For more information, see [Use of customer-managed keys](automation-secure-asset-encryption.md#use-of-customer-managed-keys-for-an-automation-account).
36+
2137
## June 2021
2238

2339
### Security update for Log Analytics Contributor role

articles/azure-functions/functions-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ The following are a common, _but by no means exhaustive_, set of scenarios for A
4141
| **Process file uploads** | Run code when a file is uploaded or changed in [blob storage](./functions-bindings-storage-blob.md) |
4242
| **Build a serverless workflow** | Chain a series of functions together using [durable functions](./durable/durable-functions-overview.md) |
4343
| **Respond to database changes** | Run custom logic when a document is created or updated in [Cosmos DB](./functions-bindings-cosmosdb-v2.md) |
44-
| **Run scheduled tasks** | Execute code at [set times](./functions-bindings-timer.md) |
44+
| **Run scheduled tasks** | Execute code on [pre-defined timed intervals](./functions-bindings-timer.md) |
4545
| **Create reliable message queue systems** | Process message queues using [Queue Storage](./functions-bindings-storage-queue.md), [Service Bus](./functions-bindings-service-bus.md), or [Event Hubs](./functions-bindings-event-hubs.md) |
4646
| **Analyze IoT data streams** | Collect and process [data from IoT devices](./functions-bindings-event-iot.md) |
4747
| **Process data in real time** | Use [Functions and SignalR](./functions-bindings-signalr-service.md) to respond to data in the moment |

articles/azure-maps/tutorial-creator-indoor-maps.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ To upload the Drawing package:
8585
8686
To check the status of the drawing package and retrieve its unique ID (`udid`):
8787
88-
1. In the Postman app, select **New**..
88+
1. In the Postman app, select **New**.
8989
9090
2. In the **Create New** window, select **HTTP Request**.
9191
@@ -113,7 +113,7 @@ You can retrieve metadata from the Drawing package resource. The metadata contai
113113
114114
To retrieve content metadata:
115115
116-
1. In the Postman app, select **New**..
116+
1. In the Postman app, select **New**.
117117
118118
2. In the **Create New** window, select **HTTP Request**.
119119
@@ -148,7 +148,7 @@ Now that the Drawing package is uploaded, we'll use the `udid` for the uploaded
148148
149149
To convert a Drawing package:
150150
151-
1. In the Postman app, select **New**..
151+
1. In the Postman app, select **New**.
152152
153153
2. In the **Create New** window, select **HTTP Request**.
154154
@@ -176,7 +176,7 @@ After the conversion operation completes, it returns a `conversionId`. We can ac
176176
177177
To check the status of the conversion process and retrieve the `conversionId`:
178178
179-
1. In the Postman app, select **New**..
179+
1. In the Postman app, select **New**.
180180
181181
2. In the **Create New** window, select **HTTP Request**.
182182
@@ -233,7 +233,7 @@ A dataset is a collection of map features, such as buildings, levels, and rooms.
233233

234234
To create a dataset:
235235

236-
1. In the Postman app, select **New**..
236+
1. In the Postman app, select **New**.
237237

238238
2. In the **Create New** window, select **HTTP Request**.
239239

@@ -259,7 +259,7 @@ To create a dataset:
259259
260260
To check the status of the dataset creation process and retrieve the `datasetId`:
261261
262-
1. In the Postman app, select **New**..
262+
1. In the Postman app, select **New**.
263263
264264
2. In the **Create New** window, select **HTTP Request**.
265265
@@ -287,7 +287,7 @@ A tileset is a set of vector tiles that render on the map. Tilesets are created
287287
288288
To create a tileset:
289289
290-
1. In the Postman app, select **New**..
290+
1. In the Postman app, select **New**.
291291
292292
2. In the **Create New** window, select **HTTP Request**.
293293
@@ -313,7 +313,7 @@ To create a tileset:
313313
314314
To check the status of the dataset creation process and retrieve the `tilesetId`:
315315
316-
1. In the Postman app, select **New**..
316+
1. In the Postman app, select **New**.
317317
318318
2. In the **Create New** window, select **HTTP Request**.
319319
@@ -341,7 +341,7 @@ Datasets can be queried using [WFS API](/rest/api/maps/v2/wfs). You can use the
341341
342342
To query the all collections in your dataset:
343343
344-
1. In the Postman app, select **New**..
344+
1. In the Postman app, select **New**.
345345
346346
2. In the **Create New** window, select **HTTP Request**.
347347
@@ -391,7 +391,7 @@ In this section, we'll query [WFS API](/rest/api/maps/v2/wfs) for the `unit` fea
391391
392392
To query the unit collection in your dataset:
393393
394-
1. In the Postman app, select **New**..
394+
1. In the Postman app, select **New**.
395395
396396
2. In the **Create New** window, select **HTTP Request**.
397397
@@ -445,7 +445,7 @@ Feature statesets define dynamic properties and values on specific features that
445445
446446
To create a stateset:
447447
448-
1. In the Postman app, select **New**..
448+
1. In the Postman app, select **New**.
449449
450450
2. In the **Create New** window, select **HTTP Request**.
451451
@@ -500,7 +500,7 @@ To create a stateset:
500500
501501
To update the `occupied` state of the unit with feature `id` "UNIT26":
502502
503-
1. In the Postman app, select **New**..
503+
1. In the Postman app, select **New**.
504504
505505
2. In the **Create New** window, select **HTTP Request**.
506506

articles/azure-resource-manager/bicep/toc.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,7 @@
3232
items:
3333
- name: Resource declaration
3434
href: resource-declaration.md
35+
displayName: existing
3536
- name: Conditional deployment
3637
href: conditional-resource-deployment.md
3738
displayName: runtime

0 commit comments

Comments
 (0)