Skip to content

Commit f4b821e

Browse files
authored
Merge pull request #231678 from MicrosoftDocs/main
Publish to Live Wednesday 4AM PST, 03/22
2 parents 6857df4 + 3f1c589 commit f4b821e

File tree

143 files changed

+3707
-707
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

143 files changed

+3707
-707
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22445,6 +22445,11 @@
2244522445
"source_path": "articles/private-multi-access-edge-compute-mec/metaswitch-fusion-core-overview.md",
2244622446
"redirect_URL": "/azure/private-5g-core",
2244722447
"redirect_document_id": false
22448+
},
22449+
{
22450+
"source_path": "articles/private-5g-core/modify-site-plan.md",
22451+
"redirect_URL": "/azure/private-5g-core/modify-service-plan",
22452+
"redirect_document_id": false
2244822453
},
2244922454
{
2245022455
"source_path": "articles/communications-gateway/rotate-secrets.md",
@@ -22455,6 +22460,11 @@
2245522460
"source_path": "articles/batch/high-availability-disaster-recovery.md",
2245622461
"redirect_URL": "/azure/reliability/reliability-batch",
2245722462
"redirect_document_id": false
22463+
},
22464+
{
22465+
"source_path_from_root": "/articles/communication-services/concepts/bring-your-own-storage.md",
22466+
"redirect_url": "/azure/communication-services/concepts/call-automation/call-recording/bring-your-own-storage",
22467+
"redirect_document_id": false
2245822468
}
2245922469

2246022470
]

articles/active-directory/authentication/howto-authentication-passwordless-phone.md

Lines changed: 15 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,13 @@ services: active-directory
77
ms.service: active-directory
88
ms.subservice: authentication
99
ms.topic: how-to
10-
ms.date: 01/29/2023
10+
ms.date: 03/21/2023
1111

1212

1313
ms.author: justinha
1414
author: justinha
1515
manager: amycolannino
16-
ms.reviewer: librown
16+
ms.reviewer: librown; tilarso
1717

1818
ms.collection: M365-identity-device-management
1919
---
@@ -78,7 +78,19 @@ To enable the authentication method for passwordless phone sign-in, complete the
7878
7979
## User registration
8080

81-
Users register themselves for the passwordless authentication method of Azure AD. For users who already registered the Microsoft Authenticator app for [multi-factor authentication](./concept-mfa-howitworks.md), skip to the next section, [enable phone sign-in](#enable-phone-sign-in). To register the Microsoft Authenticator app, follow these steps:
81+
Users register themselves for the passwordless authentication method of Azure AD. For users who already registered the Microsoft Authenticator app for [multi-factor authentication](./concept-mfa-howitworks.md), skip to the next section, [enable phone sign-in](#enable-phone-sign-in).
82+
83+
### Direct phone Sign-in registration
84+
Users can register for passwordless phone sign-in directly within the Microsoft Authenticator app without the need to first registering Microsoft Authenticator with their account, all while never accruing a password. Here's how:
85+
1. Acquire a [Temporary Access Pass](../authentication/howto-authentication-temporary-access-pass.md) from your Admin or Organization.
86+
2. Download and install the Microsoft Authenticator app on your mobile device.
87+
3. Open Microsoft Authenticator and click **Add account** and then choose **Work or school account.**
88+
4. Choose **Sign in."
89+
5. Follow the instructions to sign-in with your account using the Temporary Access Pass provided by your Admin or Organization.
90+
6. Once signed-in, continue following the additional steps to set up phone sign-in.
91+
92+
### Guided registration with My Sign-ins
93+
To register the Microsoft Authenticator app, follow these steps:
8294

8395
1. Browse to [https://aka.ms/mysecurityinfo](https://aka.ms/mysecurityinfo).
8496
1. Sign in, then select **Add method** > **Authenticator app** > **Add** to add Microsoft Authenticator.

articles/active-directory/saas-apps/servicenow-provisioning-tutorial.md

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -87,13 +87,7 @@ To configure automatic user provisioning for ServiceNow in Azure AD:
8787

8888
1. Set **Provisioning Mode** to **Automatic**.
8989

90-
1. In the **Admin Credentials** section, enter your ServiceNow tenant URL, Client ID, Client Secret and Authorization Endpoint. Select **Test Connection** to ensure that Azure AD can connect to ServiceNow. [This ServiceNow documentation](https://docs.servicenow.com/bundle/utah-platform-security/page/administer/security/task/t_CreateEndpointforExternalClients.html) outlines how to generate these values.
91-
![Screenshot that shows the Service Provisioning page, where you can enter admin credentials.](./media/servicenow-provisioning-tutorial/servicenow-provisioning.png)
92-
93-
> [!NOTE]
94-
> - Tenant URL: https://**InsertInstanceName**.service-now.com/api/now/scim
95-
> - Authorization Endpoint: https://**InsertInstanceName**.service-now.com/oauth_auth.do?response_type=code&client_id=**InsertClientID**&state=1&scope=useraccount&redirect_uri=https%3A%2F%2Fportal.azure.com%2FTokenAuthorize
96-
> - Token Endoint: https://**InsertInstanceName**.service-now.com/api/now/scim
90+
1. In the **Admin Credentials** section, enter your ServiceNow admin credentials and username. Select **Test Connection** to ensure that Azure AD can connect to ServiceNow. If the connection fails, ensure that your ServiceNow account has admin permissions and try again.
9791

9892
1. In the **Notification Email** box, enter the email address of a person or group that should receive the provisioning error notifications. Then select the **Send an email notification when a failure occurs** check box.
9993

articles/aks/enable-host-encryption.md

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ This feature can only be set at cluster creation or node pool creation time.
3434

3535
## Use host-based encryption on new clusters
3636

37-
Configure the cluster agent nodes to use host-based encryption when the cluster is created.
37+
Configure the cluster agent nodes to use host-based encryption when the cluster is created.
3838

3939
```azurecli-interactive
4040
az aks create --name myAKSCluster --resource-group myResourceGroup -s Standard_DS2_v2 -l westus2 --enable-encryption-at-host
@@ -52,12 +52,13 @@ az aks nodepool add --name hostencrypt --cluster-name myAKSCluster --resource-gr
5252

5353
If you want to create new node pools without the host-based encryption feature, you can do so by omitting the `--enable-encryption-at-host` parameter.
5454

55-
## Next steps
56-
57-
Review [best practices for AKS cluster security][best-practices-security]
58-
Read more about [host-based encryption](../virtual-machines/disk-encryption.md#encryption-at-host---end-to-end-encryption-for-your-vm-data).
55+
> [!NOTE]
56+
> After you enable host-based encryption on your cluster, make sure you provide the proper access to your Azure Key Vault to enable encryption at rest. For more information, see [Control access][control-keys] and [Azure built-in roles for Key Vault data plane operations][akv-built-in-roles].
5957
58+
## Next steps
6059

60+
- Review [best practices for AKS cluster security][best-practices-security].
61+
- Read more about [host-based encryption](../virtual-machines/disk-encryption.md#encryption-at-host---end-to-end-encryption-for-your-vm-data).
6162
<!-- LINKS - external -->
6263

6364
<!-- LINKS - internal -->
@@ -70,3 +71,5 @@ Read more about [host-based encryption](../virtual-machines/disk-encryption.md#e
7071
[az-feature-register]: /cli/azure/feature#az_feature_register
7172
[az-feature-list]: /cli/azure/feature#az_feature_list
7273
[az-provider-register]: /cli/azure/provider#az_provider_register
74+
[control-keys]: ../key-vault/general/best-practices.md#control-access-to-your-vault
75+
[akv-built-in-roles]: ../key-vault/general/rbac-guide.md#azure-built-in-roles-for-key-vault-data-plane-operations

articles/app-service/tutorial-python-postgresql-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -509,7 +509,7 @@ Follow the steps below to setup the Azure Developer CLI and provision and deploy
509509
powershell -ex AllSigned -c "Invoke-RestMethod 'https://aka.ms/install-azd.ps1' | Invoke-Expression"
510510
```
511511
512-
### [Linux/MacOS](#tab/linuxmac)
512+
### [macOS/Linux](#tab/mac-linux)
513513
514514
```azdeveloper
515515
curl -fsSL https://aka.ms/install-azd.sh | bash

articles/azure-cache-for-redis/cache-how-to-premium-persistence.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: flang-msft
66
ms.author: franlanglois
77
ms.service: cache
88
ms.topic: conceptual
9-
ms.date: 01/23/2023
9+
ms.date: 03/23/2023
1010

1111
---
1212
# Configure data persistence for a Premium Azure Cache for Redis instance
@@ -117,6 +117,7 @@ The following list contains answers to commonly asked questions about Azure Cach
117117
- [Will I be charged for the storage being used in Data Persistence](#will-i-be-charged-for-the-storage-being-used-in-data-persistence)
118118
- [How frequently does RDB and AOF persistence write to my blobs, and should I enable soft delete?](#how-frequently-does-rdb-and-aof-persistence-write-to-my-blobs-and-should-i-enable-soft-delete)
119119
- [Will having firewall exceptions on the storage account affect persistence](#will-having-firewall-exceptions-on-the-storage-account-affect-persistence)
120+
- [How do I check if soft delete is enabled on my storage account?](#how-do-i-check-if-soft-delete-is-enabled-on-my-storage-account)
120121

121122
### RDB persistence
122123

articles/azure-functions/storage-considerations.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Storage considerations for Azure Functions
33
description: Learn about the storage requirements of Azure Functions and about encrypting stored data.
44
ms.topic: conceptual
5-
ms.date: 12/13/2022
5+
ms.date: 03/21/2023
66
---
77

88
# Storage considerations for Azure Functions
@@ -27,6 +27,8 @@ To learn more about storage account types, see [Storage account overview](../sto
2727

2828
While you can use an existing storage account with your function app, you must make sure that it meets these requirements. Storage accounts created as part of the function app create flow in the Azure portal are guaranteed to meet these storage account requirements. In the portal, unsupported accounts are filtered out when choosing an existing storage account while creating a function app. In this flow, you're only allowed to choose existing storage accounts in the same region as the function app you're creating. To learn more, see [Storage account location](#storage-account-location).
2929

30+
Storage accounts secured by using firewalls or virtual private networks also can't be used in the portal creation flow. For more information, see [Restrict your storage account to a virtual network](functions-networking-options.md#restrict-your-storage-account-to-a-virtual-network).
31+
3032
<!-- JH: Does using a Premium Storage account improve perf? -->
3133

3234
## Storage account guidance

0 commit comments

Comments
 (0)