You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/network-considerations.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -105,11 +105,12 @@ The following network security group rules are required for Azure AD DS to provi
105
105
| 443 | TCP | AzureActiveDirectoryDomainServices | Any | Allow | Yes | Synchronization with your Azure AD tenant. |
106
106
| 3389 | TCP | CorpNetSaw | Any | Allow | Yes | Management of your domain. |
107
107
| 5986 | TCP | AzureActiveDirectoryDomainServices | Any | Allow | Yes | Management of your domain. |
108
-
| 636 | TCP | Any | Any | Allow | No | Only enabled when you configure secure LDAP (LDAPS). |
109
108
110
109
> [!WARNING]
111
110
> Don't manually edit these network resources and configurations. When you associate a misconfigured network security group or a user defined route table with the subnet in which Azure AD DS is deployed, you may disrupt Microsoft's ability to service and manage the domain. Synchronization between your Azure AD tenant and your Azure AD DS managed domain is also disrupted.
112
111
>
112
+
> If you use secure LDAP, you can add the required TCP port 636 rule to allow external traffic if needed. Adding this rule doesn't place your network security group rules in an unsupported state. For more information, see [Lock down secure LDAP access over the internet](tutorial-configure-ldaps.md#lock-down-secure-ldap-access-over-the-internet)
113
+
>
113
114
> Default rules for *AllowVnetInBound*, *AllowAzureLoadBalancerInBound*, *DenyAllInBound*, *AllowVnetOutBound*, *AllowInternetOutBound*, and *DenyAllOutBound* also exist for the network security group. Don't edit or delete these default rules.
114
115
>
115
116
> The Azure SLA doesn't apply to deployments where an improperly configured network security group and/or user defined route tables have been applied that blocks Azure AD DS from updating and managing your domain.
Copy file name to clipboardExpand all lines: articles/aks/api-server-authorized-ip-ranges.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,7 +37,7 @@ For more information about the API server and other cluster components, see [Kub
37
37
API server authorized IP ranges only work for new AKS clusters. Create a cluster using the [az aks create][az-aks-create] and specify the *--api-server-authorized-ip-ranges* parameter to provide a list of authorized IP address ranges. These IP address ranges are usually address ranges used by your on-premises networks or public IPs. When you specify a CIDR range, start with the first IP address in the range. For example, *137.117.106.90/29* is a valid range, but make sure you specify the first IP address in the range, such as *137.117.106.88/29*.
38
38
39
39
> [!IMPORTANT]
40
-
> By default, your cluster uses the [Standard SKU load balancer][standard-sku-lb] which you can use to configure the outbound gateway. When you enable API server authorized IP ranges during cluster creation, the public IP for your cluster is also allowed by default in addition to the ranges you specify. If you specify *""* or no value for *--api-server-authorized-ip-ranges*, API server authorized IP ranges will be disabled.
40
+
> By default, your cluster uses the [Standard SKU load balancer][standard-sku-lb] which you can use to configure the outbound gateway. When you enable API server authorized IP ranges during cluster creation, the public IP for your cluster is also allowed by default in addition to the ranges you specify. If you specify *""* or no value for *--api-server-authorized-ip-ranges*, API server authorized IP ranges will be disabled. Note that if you're using PowerShell, use *--api-server-authorized-ip-ranges=""* (with equals sign) to avoid any parsing issues.
41
41
42
42
The following example creates a single-node cluster named *myAKSCluster* in the resource group named *myResourceGroup* with API server authorized IP ranges enabled. The IP address ranges allowed are *73.140.245.0/24*:
***Assign access to**: Under the **Select system-assigned managed identity** subsection, select **Function App**.
64
-
***Select**: The pane will be populated with all the function apps in your subscription that have a **Managed System Identity**. In this case, select the **SummaryService** function app:
64
+
***Select**: The pane will be populated with all the function apps in your subscription that have a **Managed System Identity**. In this case, select the **FishTankTemperatureService** function app:
65
65
66
66

67
67
@@ -79,7 +79,7 @@ This sample uses the [List Keys API](https://docs.microsoft.com/rest/api/cosmos-
79
79
The List Keys API returns the `DatabaseAccountListKeysResult` object. This type isn't defined in the C# libraries. The following code shows the implementation of this class:
80
80
81
81
```csharp
82
-
namespaceSummarizationService
82
+
namespaceMonitor
83
83
{
84
84
publicclassDatabaseAccountListKeysResult
85
85
{
@@ -123,7 +123,7 @@ using Microsoft.Extensions.Logging;
Copy file name to clipboardExpand all lines: articles/cost-management-billing/manage/troubleshoot-azure-sign-up.md
+14-13Lines changed: 14 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,26 +1,27 @@
1
1
---
2
-
title: Troubleshoot Azure sign-up
3
-
description: Resolving an issue when trying to sign-up for a new account in the Microsoft Azure portal account center.
2
+
title: Unable to sign up a new Azure account
3
+
description: Resolving an issue when trying to sign up for a new account in the Microsoft Azure portal account center.
4
+
services: cost-management-billing
4
5
author: v-miegge
5
-
ms.reviewer: dcscontentpm
6
+
manager: dcscontentpm
6
7
tags: billing
7
8
ms.service: cost-management-billing
8
9
ms.topic: conceptual
9
10
ms.date: 02/12/2020
10
11
ms.author: v-miegge
11
12
---
12
13
13
-
# Troubleshoot Azure sign-up
14
+
# Troubleshoot issues when you sign up a new account in Azure portal or Azure account center
14
15
15
-
You may experience an issue when you try to sign-up for a new account in the Microsoft Azure portal or Azure account center. Before you troubleshoot the issue, first verify the following:
16
+
You may experience an issue when you try to signup for a new account in the Microsoft Azure portal or Azure account center. Before you troubleshoot the issue, first verify the following:
16
17
17
18
- The information that you provided for your Azure account profile (including contact email address, street address, and telephone number) is correct.
18
19
- The credit card information is correct.
19
-
- You don’t already have a Microsoft account that has the same information.
20
+
- You don't already have a Microsoft account that has the same information.
20
21
21
22
## Resolutions
22
23
23
-
To resolve any errors, select the issue that you experience when you try to sign-up for Azure.
24
+
To resolve any errors, select the issue that you experience when you try to signup for Azure.
24
25
25
26
### Error: *We cannot proceed with sign-up due to an issue with your account. Please contact billing support.*
26
27
@@ -32,9 +33,9 @@ To resolve the issue, follow these steps:
32
33
33
34
3. Make sure that all address fields are completed and valid.
34
35
35
-
4. When you sign-up for the Azure subscription, make sure that the billing address for the credit card registration matches your bank records.
36
+
4. When you signup for the Azure subscription, make sure that the billing address for the credit card registration matches your bank records.
36
37
37
-
If you continue to receive the error message, try to sign-up by using a different browser.
38
+
If you continue to receive the error message, try to signup by using a different browser.
38
39
39
40
### Progress bar hangs in *Identity verification by card* section.
40
41
@@ -79,7 +80,7 @@ Have you used an Azure subscription in the past? The Azure Terms of Use agreemen
79
80
80
81
### I saw a charge on my Free Trial account
81
82
82
-
You may see a small verification hold on your credit card account after you sign-up. This is removed within three to five days. If you are worried about managing costs, read more about [preventing unexpected costs](getting-started.md).
83
+
You may see a small verification hold on your credit card account after you signup. This is removed within three to five days. If you are worried about managing costs, read more about [preventing unexpected costs](getting-started.md).
83
84
84
85
### Can't activate Azure benefit plan like MSDN, BizSpark, BizSparkPlus, or MPN
85
86
@@ -105,13 +106,13 @@ To resolve this issue, double-check whether the following items are true:
105
106
106
107
- The information that you provided for your Azure account profile (including contact email address, street address, and telephone number) is correct.
107
108
- The credit card information is correct.
108
-
- You don’t already have a Microsoft account that uses the same information.
109
+
- You don't already have a Microsoft account that uses the same information.
109
110
110
111
### Error: *Your current account type is not supported*
111
112
112
-
This issue can occur if the account is registered in an [unmanaged Azure AD directory](../../active-directory/users-groups-roles/directory-self-service-signup.md), and it is not in your organization’s Azure AD directory.
113
+
This issue can occur if the account is registered in an [unmanaged Azure AD directory](../../active-directory/users-groups-roles/directory-self-service-signup.md), and it is not in your organization's Azure AD directory.
113
114
114
-
To resolve this issue, sign-up the Azure account by using another account, or take over the unmanaged AD directory. For more information, see [Take over an unmanaged directory as administrator in Azure Active Directory](../../active-directory/users-groups-roles/domains-admin-takeover.md).
115
+
To resolve this issue, signup the Azure account by using another account, or take over the unmanaged AD directory. For more information, see [Take over an unmanaged directory as administrator in Azure Active Directory](../../active-directory/users-groups-roles/domains-admin-takeover.md).
description: Helps to resolve the issues in which you can't sign-in the Azure portal or Azure account center.
4
+
services: cost-management-billing
4
5
author: v-miegge
5
-
ms.reviewer: dcscontentpm
6
+
manager: dcscontentpm
6
7
tags: billing
7
8
ms.service: cost-management-billing
8
9
ms.topic: conceptual
@@ -31,12 +32,12 @@ This issue can occur if you use more than one user account in an internet browse
31
32
To resolve the issue, try one of the following methods:
32
33
33
34
- Clear the cache and delete Internet cookies. In Internet Explorer, click **Tools** > **Internet Options** > **Delete**. Make sure that the check boxes for temporary files, cookies, password, and browsing history are selected, and then click Delete.
34
-
- Reset the Internet Explorer settings to revert any personal settings that you’ve made. Click **Tools** > **Internet Options** > **Advanced** > select the **Delete personal settings** box > **Reset**.
35
+
- Reset the Internet Explorer settings to revert any personal settings that you've made. Click **Tools** > **Internet Options** > **Advanced** > select the **Delete personal settings** box > **Reset**.
35
36
- Use the private browsing mode for your browser. For Internet Explorer: Click **Tools** > **Safety** > **InPrivate Browsing**, and then browse and sign-in to the [Azure portal](https://portal.azure.com/) or [Azure account center](https://account.azure.com/Subscriptions).
36
37
37
38
### I can sign-in but I see *No subscriptions found*
38
39
39
-
This problem occurs if you selected at the wrong directory, or if your account doesn’t have sufficient permissions.
40
+
This problem occurs if you selected at the wrong directory, or if your account doesn't have sufficient permissions.
40
41
41
42
**Scenario 1:** Error message is received in the [Azure portal](https://portal.azure.com/)
0 commit comments