Skip to content

Commit f353b59

Browse files
authored
Merge pull request #186495 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/MicrosoftDocs/azure-docs (branch master)
2 parents 73cc35f + ede30b5 commit f353b59

File tree

5 files changed

+17
-29
lines changed

5 files changed

+17
-29
lines changed

articles/active-directory/saas-apps/palantir-foundry-tutorial.md

Lines changed: 6 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -66,37 +66,19 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
6666

6767
1. In the Azure portal, on the **Palantir Foundry** application integration page, find the **Manage** section and select **single sign-on**.
6868
1. On the **Select a single sign-on method** page, select **SAML**.
69-
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
69+
1. Select **Upload metadata file**, select the metadata file which you have downloaded in the **[Configure Palantir Foundry SSO](#configure-palantir-foundry-sso)** section, and then select **Add**.
7070

71-
![Edit Basic SAML Configuration](common/edit-urls.png)
71+
![Browse Upload Metadata](common/browse-upload-metadata.png)
7272

73-
1. In the **Basic SAML Configuration** section, if you see **Service Provider metadata file**, follow these steps:
74-
1. Select **Upload metadata file**.
75-
1. Select the folder icon to select the metadata file which you have downloaded in **Configure Palantir Foundry SSO** section, and then select **Upload**.
76-
1. When the metadata file is successfully uploaded, the values for **Identifier** and **Reply URL** appear automatically in the Palantir Foundry section text box.
73+
1. When the metadata file is successfully uploaded, the values for **Identifier**, **Reply URL** and **Logout URL** appear automatically in the Palantir Foundry section text box.
7774

7875
> [!Note]
79-
> If the **Identifier** and **Reply URL** values don't appear automatically, fill in the values manually according to your requirements.
80-
81-
1. If you don't see **Service Provider metadata file** in the **Basic SAML Configuration** section, perform the following steps:
82-
83-
1. In the **Identifier** text box, type a value using the following pattern: `urn:uuid:<SOME_UUID>`
84-
85-
1. In the **Reply URL** text box, type a URL using the following pattern: `https://<DOMAIN>/multipass/api/collectors/<SOME_UUID>/saml/SSO`
86-
87-
1. In the **Logout URL** text box, type a URL using the following pattern: `https://<DOMAIN>/multipass/api/collectors/<SOME_UUID>/SingleLogout`
88-
89-
> [!NOTE]
90-
> These values are not real. Update these values with the actual Identifier, Reply URL and Logout URL. Contact [Palantir Foundry Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
76+
> If the **Identifier**, **Reply URL** and **Logout URL** values don't appear automatically, fill in the values manually which can be found in Foundry Control Panel.
9177
9278
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
9379

9480
![The Certificate download link](common/metadataxml.png)
9581

96-
1. On the **Set up Palantir Foundry** section, copy the appropriate URL(s) based on your requirement.
97-
98-
![Copy configuration URLs](common/copy-configuration-urls.png)
99-
10082
### Create an Azure AD test user
10183

10284
In this section, you'll create a test user in the Azure portal called B.Simon.
@@ -123,9 +105,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
123105

124106
## Configure Palantir Foundry SSO
125107

126-
1. Log in to the Palantir Foundry as an administrator.
127-
128-
1. In Foundry Control Panel tab, go to the **Authentication** and click **Add SAML provider**.
108+
1. In Foundry Control Panel, go to the **Authentication** tab and click **Add SAML provider**.
129109

130110
![Screenshot for Add SAML provider.](./media/palantir-foundry-tutorial/saml-provider.png)
131111

@@ -167,4 +147,4 @@ You can also use Microsoft My Apps to test the application in any mode. When you
167147

168148
## Next steps
169149

170-
Once you configure Palantir Foundry you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).
150+
Once you configure Palantir Foundry you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).

articles/azure-sql-edge/release-notes.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,14 @@ ms.date: 11/24/2020
1515

1616
This article describes what's new and what has changed with every new build of Azure SQL Edge.
1717

18+
## Azure SQL Edge 1.0.5
19+
20+
SQL engine build 15.0.2000.1562
21+
22+
### What's new?
23+
24+
- Security bug fixes
25+
1826
## Azure SQL Edge 1.0.4
1927

2028
SQL engine build 15.0.2000.1559

articles/logic-apps/logic-apps-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.suite: integration
66
ms.reviewer: estfan, azla
77
ms.topic: overview
88
ms.custom: mvc, contperf-fy21q4
9-
ms.date: 08/18/2021
9+
ms.date: 01/27/2022
1010
---
1111

1212
# What is Azure Logic Apps?

articles/storage/blobs/storage-manage-find-blobs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -333,7 +333,7 @@ This section describes known issues and conditions.
333333

334334
- Uploading page blobs with index tags doesn't persist the tags. Set the tags after uploading a page blob.
335335

336-
- If Blob storage versioning is enabled, you can still use index tags on the current version. Index tags are preserved for previous versions, but those tags aren't passed to the blob index engine, so you cannot them to retrieve previous versions. If you promote a previous version to the current version, then the tags of that previous version become the tags of the current version. Because those tags are associated with the current version, they are passed to the blob index engine and you can query them.
336+
- If Blob storage versioning is enabled, you can still use index tags on the current version. Index tags are preserved for previous versions, but those tags aren't passed to the blob index engine, so you cannot use them to retrieve previous versions. If you promote a previous version to the current version, then the tags of that previous version become the tags of the current version. Because those tags are associated with the current version, they are passed to the blob index engine and you can query them.
337337

338338
- There is no API to determine if index tags are indexed.
339339

articles/virtual-wan/sd-wan-connectivity-architecture.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.author: sukishen
1616

1717
Azure Virtual WAN is a networking service that brings together many cloud connectivity and security services with a single operational interface. These services include branch (via Site-to-site VPN), remote user (Point-to-site VPN), private (ExpressRoute) connectivity, intra-cloud transitive connectivity for Vnets, VPN and ExpressRoute interconnectivity, routing, Azure Firewall, and encryption for private connectivity.
1818

19-
Although Azure Virtual WAN itself is a Software Defined WAN (SD-WAN), it is also designed to enable seamless interconnection with the premises-based SD-WAN technologies and services. Many such services are offered by our [Virtual WAN](virtual-wan-locations-partners.md) ecosystem and Azure Networking Managed Services partners [(MSPs)](../networking/networking-partners-msp.md). Enterprises that are transforming their private WAN to SD-WAN have options when interconnecting their private SD-WAN with Azure Virtual WAN. Enterprises can choose from these options:
19+
Although Azure Virtual WAN is a cloud-based SD-WAN that provides a rich suite of Azure first-party connectivity, routing, and security services, Azure Virtual WAN also is designed to enable seamless interconnection with premises-based SD-WAN and SASE technologies and services. Many such services are offered by our [Virtual WAN](virtual-wan-locations-partners.md) ecosystem and Azure Networking Managed Services partners [(MSPs)](../networking/networking-partners-msp.md). Enterprises that are transforming their private WAN to SD-WAN have options when interconnecting their private SD-WAN with Azure Virtual WAN. Enterprises can choose from these options:
2020

2121
* Direct Interconnect Model
2222
* Direct Interconnect Model with NVA-in-VWAN-hub

0 commit comments

Comments
 (0)