Skip to content

Commit f421333

Browse files
authored
Merge pull request #291526 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 5eddce0 + c8355d7 commit f421333

File tree

4 files changed

+25
-1
lines changed

4 files changed

+25
-1
lines changed

articles/cost-management-billing/reservations/exchange-and-refund-azure-reservations.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,8 @@ Not all reservations are eligible for exchange. For example, you can't exchange
3939
- Synapse Analytics Pre-purchase plan
4040
- Red Hat plans
4141
- SUSE Linux plans
42+
- Microsoft Defender for Cloud Pre-Purchase Plan
43+
- Microsoft Sentinel Pre-Purchase Plan
4244

4345
You can also refund reservations, but the sum total of all canceled reservation commitment in your billing scope (such as EA, Microsoft Customer Agreement, and Microsoft Partner Agreement) can't exceed USD 50,000 in a 12 month rolling window.
4446

@@ -51,6 +53,8 @@ The following reservations aren't eligible for refunds:
5153
- Azure VMware solution by CloudSimple
5254
- Red Hat plans
5355
- SUSE Linux plans
56+
- Microsoft Defender for Cloud Pre-Purchase Plan
57+
- Microsoft Sentinel Pre-Purchase Plan
5458

5559
## Prerequisites
5660

9.6 KB
Loading

articles/firewall/premium-deploy-certificates-enterprise-ca.md

Lines changed: 17 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,12 +28,28 @@ To use an Enterprise CA to generate a certificate to use with Azure Firewall Pre
2828
- an [Azure Key Vault](premium-certificates.md#azure-key-vault)
2929
- a Managed Identity with Read permissions to **Certificates and Secrets** defined in the Key Vault Access Policy
3030

31+
## Create a new Subordinate Certificate Template
32+
33+
1. Run `certtmpl.msc` to open the Certificate Template Console.
34+
2. Find the **Subordinate Certification Authority** template in the console.
35+
3. Right-click on the **Subordinate Certification Authority** template and select **Duplicate Template**.
36+
4. In the **Properties of New Template** window, go to the **Compatibility** tab and set the appropriate compatibility settings or leave them as default.
37+
5. Go to the **General** tab, set the **Template Display Name** (for example: `My Subordinate CA`), and adjust the validity period if necessary. Optionally, select the **Publish certificate in Active Directory** checkbox.
38+
6. In the **Settings** tab, ensure the required users and groups have read and `enroll` permissions.
39+
7. Navigate to the **Extensions** tab, select **Key Usage**, and select **Edit**.
40+
- Ensure that the **Digital signature**, **Certificate signing**, and **CRL signing** checkboxes are selected.
41+
- Select the **Make this extension critical** checkbox and select **OK**.
42+
43+
:::image type="content" source="media/premium-deploy-certificates-enterprise-ca/certificate-template-key-usage-extension.png" alt-text="Screenshot of certificate template key usage extensions.":::
44+
8. Select **OK** to save the new certificate template.
45+
9. Ensure the new template is enabled so it can be used to issue certificates.
46+
3147
## Request and export a certificate
3248

3349
1. Access the web enrollment site on the Root CA, usually `https://<servername>/certsrv` and select **Request a Certificate**.
3450
1. Select **Advanced Certificate Request**.
3551
1. Select **Create and Submit a Request to this CA**.
36-
1. Fill out the form using the Subordinate Certification Authority template.
52+
1. Fill out the form using the Subordinate Certification Authority template created in the previous section.
3753
:::image type="content" source="media/premium-deploy-certificates-enterprise-ca/advanced-certificate-request.png" alt-text="Screenshot of advanced certificate request":::
3854
1. Submit the request and install the certificate.
3955
1. Assuming this request is made from a Windows Server using Internet Explorer, open **Internet Options**.

articles/synapse-analytics/sql/resources-self-help-sql-on-demand.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1109,6 +1109,10 @@ Connect-AzAccount -ServicePrincipal -Credential $cred -Tenant $tenantId
11091109
11101110
New-AzSynapseRoleAssignment -WorkspaceName "<workspaceName>" -RoleDefinitionName "Synapse Administrator" -ObjectId "<app_id_to_add_as_admin>" [-Debug]
11111111
```
1112+
> [!NOTE]
1113+
> In this case, the synapse data studio UI will not display the role assignment added by the above method, so it is recommended to add the role assignment to both object ID and application ID at the same time so that it can be displayed on the UI as well.
1114+
>
1115+
> New-AzSynapseRoleAssignment -WorkspaceName "\<workspaceName\>" -RoleDefinitionName "Synapse Administrator" -ObjectId "\<object_id_to_add_as_admin\>" [-Debug]
11121116
11131117
**Validation**
11141118

0 commit comments

Comments
 (0)