Skip to content

Commit f74143d

Browse files
authored
Merge pull request #195745 from MicrosoftDocs/main
4/21 AM Publish
2 parents acfc931 + d41f3a2 commit f74143d

File tree

77 files changed

+523
-327
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

77 files changed

+523
-327
lines changed

articles/active-directory/authentication/how-to-certificate-based-authentication.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Topic that shows how to configure Azure AD certificate-based authen
55
ms.service: active-directory
66
ms.subservice: authentication
77
ms.topic: how-to
8-
ms.date: 02/18/2022
8+
ms.date: 04/21/2022
99

1010
ms.author: justinha
1111
author: justinha
@@ -160,6 +160,9 @@ The username binding policy helps determine the user in the tenant. By default,
160160

161161
An admin can override the default and create a custom mapping. Currently, we support two certificate fields, SAN (Subject Alternate Name) Principal Name and SAN RFC822Name, to map against the user object attribute userPrincipalName and onPremisesUserPrincipalName.
162162

163+
>[!IMPORTANT]
164+
>If a username binding policy uses synced attributes, such as onPremisesUserPrincipalName attribute of the user object, be aware that any user with administrative access to the Azure AD Connect server can change the sync attribute mapping, and in turn change the value of the synced attribute to their needs. The user does not need to be a cloud admin.
165+
163166
1. Create the username binding by selecting one of the X.509 certificate fields to bind with one of the user attributes. The username binding order represents the priority level of the binding. The first one has the highest priority and so on.
164167

165168
:::image type="content" border="true" source="./media/how-to-certificate-based-authentication/username-binding-policy.png" alt-text="Screenshot of a username binding policy.":::

articles/active-directory/authentication/howto-authentication-passwordless-security-key-windows.md

Lines changed: 12 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 02/22/2021
9+
ms.date: 04/20/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -31,7 +31,7 @@ This document focuses on enabling FIDO2 security key based passwordless authenti
3131
| [Hybrid Azure AD joined devices](../devices/concept-azure-ad-join-hybrid.md) require Windows 10 version 2004 or higher | | X |
3232
| Fully patched Windows Server 2016/2019 Domain Controllers. | | X |
3333
| [Azure AD Connect](../hybrid/how-to-connect-install-roadmap.md#install-azure-ad-connect) version 1.4.32.0 or later | | X |
34-
| [Microsoft Intune](/intune/fundamentals/what-is-intune) (Optional) | X | X |
34+
| [Microsoft Endpoint Manager](/intune/fundamentals/what-is-intune) (Optional) | X | X |
3535
| Provisioning package (Optional) | X | X |
3636
| Group Policy (Optional) | | X |
3737

@@ -58,8 +58,8 @@ Hybrid Azure AD joined devices must run Windows 10 version 2004 or newer.
5858

5959
Organizations may choose to use one or more of the following methods to enable the use of security keys for Windows sign-in based on their organization's requirements:
6060

61-
- [Enable with Intune](#enable-with-intune)
62-
- [Targeted Intune deployment](#targeted-intune-deployment)
61+
- [Enable with Endpoint Manager](#enable-with-endpoint-manager)
62+
- [Targeted Endpoint Manager deployment](#targeted-endpoint-manager-deployment)
6363
- [Enable with a provisioning package](#enable-with-a-provisioning-package)
6464
- [Enable with Group Policy (Hybrid Azure AD joined devices only)](#enable-with-group-policy)
6565

@@ -68,36 +68,34 @@ Organizations may choose to use one or more of the following methods to enable t
6868
>
6969
> Organizations with **Azure AD joined devices** must do this before their devices can authenticate to on-premises resources with FIDO2 security keys.
7070
71-
### Enable with Intune
71+
### Enable with Endpoint Manager
7272

73-
To enable the use of security keys using Intune, complete the following steps:
73+
To enable the use of security keys using Endpoint Manager, complete the following steps:
7474

7575
1. Sign in to the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com).
7676
1. Browse to **Devices** > **Enroll Devices** > **Windows enrollment** > **Windows Hello for Business**.
7777
1. Set **Use security keys for sign-in** to **Enabled**.
7878

7979
Configuration of security keys for sign-in isn't dependent on configuring Windows Hello for Business.
8080

81-
### Targeted Intune deployment
81+
### Targeted Endpoint Manager deployment
8282

83-
To target specific device groups to enable the credential provider, use the following custom settings via Intune:
83+
To target specific device groups to enable the credential provider, use the following custom settings via Endpoint Manager:
8484

8585
1. Sign in to the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com).
86-
1. Browse to **Devices** > **Windows** > **Configuration Profiles** > **Create profile**.
86+
1. Browse to **Devices** > **Windows** > **Configuration profiles** > **Create profile**.
8787
1. Configure the new profile with the following settings:
8888
- Platform: Windows 10 and later
89-
- Profile type: Template > Custom
89+
- Profile type: Templates > Custom
9090
- Name: Security Keys for Windows Sign-In
9191
- Description: Enables FIDO Security Keys to be used during Windows Sign In
92-
1. Click **Add* and in **Add Row**, add the following Custom OMA-URI Settings:
92+
1. Click **Next** > **Add** and in **Add Row**, add the following Custom OMA-URI Settings:
9393
- Name: Turn on FIDO Security Keys for Windows Sign-In
9494
- Description: (Optional)
9595
- OMA-URI: ./Device/Vendor/MSFT/PassportForWork/SecurityKey/UseSecurityKeyForSignin
9696
- Data Type: Integer
9797
- Value: 1
98-
1. The remainder of the policy settings include assigning to specific users, devices, or groups. For more information, see [Assign user and device profiles in Microsoft Intune](/intune/device-profile-assign).
99-
100-
![Intune custom device configuration policy creation](./media/howto-authentication-passwordless-security-key/intune-custom-profile.png)
98+
1. The remainder of the policy settings include assigning to specific users, devices, or groups. For more information, see [Assign user and device profiles in Microsoft Endpoint Manager](/intune/device-profile-assign).
10199

102100
### Enable with a provisioning package
103101

articles/active-directory/saas-apps/atlassian-cloud-provisioning-tutorial.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -158,6 +158,7 @@ Once you've configured provisioning, use the following resources to monitor your
158158
## Change log
159159

160160
* 06/15/2020 - Added support for batch PATCH for groups.
161+
* 04/21/2021 - Added support for **Schema Discovery**.
161162

162163
## Additional resources
163164

articles/active-directory/saas-apps/visibly-provisioning-tutorial.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.author: thwimmer
1919

2020
# Tutorial: Configure Visibly for automatic user provisioning
2121

22-
This tutorial describes the steps you need to perform in both Visibly and Azure Active Directory (Azure AD) to configure automatic user provisioning. When configured, Azure AD automatically provisions and de-provisions users and groups to [Visibly](https://www.visibly.io/) using the Azure AD Provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../app-provisioning/user-provisioning.md).
22+
This tutorial describes the steps you need to perform in both Visibly and Azure Active Directory (Azure AD) to configure automatic user provisioning. When configured, Azure AD automatically provisions and de-provisions users and groups to [Visibly](https://visibly.io/) using the Azure AD Provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../app-provisioning/user-provisioning.md).
2323

2424

2525
## Capabilities Supported
@@ -36,7 +36,7 @@ The scenario outlined in this tutorial assumes that you already have the followi
3636

3737
* [An Azure AD tenant](../develop/quickstart-create-new-tenant.md)
3838
* A user account in Azure AD with [permission](../roles/permissions-reference.md) to configure provisioning (for example, Application Administrator, Cloud Application administrator, Application Owner, or Global Administrator).
39-
* A [Visibly](https://www.visibly.io/) tenant
39+
* A [Visibly](https://visibly.io/) tenant
4040

4141
## Step 1. Plan your provisioning deployment
4242
1. Learn about [how the provisioning service works](../app-provisioning/user-provisioning.md).
@@ -146,4 +146,4 @@ Once you've configured provisioning, use the following resources to monitor your
146146

147147
## Next steps
148148

149-
* [Learn how to review logs and get reports on provisioning activity](../app-provisioning/check-status-user-account-provisioning.md)
149+
* [Learn how to review logs and get reports on provisioning activity](../app-provisioning/check-status-user-account-provisioning.md)

articles/app-service/configure-custom-container.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -206,12 +206,14 @@ The only exception is the `C:\home\LogFiles` directory, which is used to store t
206206

207207
::: zone pivot="container-linux"
208208

209-
You can use the */home* directory in your custom container file system to persist files across restarts and share them across instances. The `/home` directory is provided to enable your custom container to access persistent storage.
209+
You can use the */home* directory in your custom container file system to persist files across restarts and share them across instances. The `/home` directory is provided to enable your custom container to access persistent storage. Saving data within `/home` will contribute to the [storage space quota](https://docs.microsoft.com/azure/azure-resource-manager/management/azure-subscription-service-limits#app-service-limits) included with your App Service Plan.
210210

211211
When persistent storage is disabled, then writes to the `/home` directory are not persisted across app restarts or across multiple instances. When persistent storage is enabled, all writes to the `/home` directory are persisted and can be accessed by all instances of a scaled-out app. Additionally, any contents inside the `/home` directory of the container are overwritten by any existing files already present on the persistent storage when the container starts.
212212

213213
The only exception is the `/home/LogFiles` directory, which is used to store the container and application logs. This folder will always persist upon app restarts if [application logging is enabled](troubleshoot-diagnostic-logs.md#enable-application-logging-linuxcontainer) with the **File System** option, independently of the persistent storage being enabled or disabled. In other words, enabling or disabling the persistent storage will not affect the application logging behavior.
214214

215+
It is recommended to write data to `/home` or a [mounted azure storage path](configure-connect-to-azure-storage.md?tabs=portal&pivots=container-linux). Data written outside these paths will not be persistent during restarts and will be saved to platform-managed host disk space separate from the App Service Plans file storage quota.
216+
215217
::: zone-end
216218

217219
By default, persistent storage is disabled on custom containers and the setting is exposed in the app settings. To enable it, set the `WEBSITES_ENABLE_APP_SERVICE_STORAGE` app setting value to `true` via the [Cloud Shell](https://shell.azure.com). In Bash:

articles/azure-functions/functions-app-settings.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -175,7 +175,7 @@ The tenant ID of the app registration used to access the vault where keys are st
175175

176176
The URI of a key vault instance used to store keys. Supported in version 4.x and later versions of the Functions runtime. This is the recommended setting for using a key vault instance for key storage. Requires that `AzureWebJobsSecretStorageType` be set to `keyvault`.
177177

178-
The `AzureWebJobsSecretStorageKeyVaultTenantId` value should be the full value of **Vault URI** displayed in the **Key Vault overview** tab, including `https://`.
178+
The `AzureWebJobsSecretStorageKeyVaultUri` value should be the full value of **Vault URI** displayed in the **Key Vault overview** tab, including `https://`.
179179

180180
The vault must have an access policy corresponding to the system-assigned managed identity of the hosting resource. The access policy should grant the identity the following secret permissions: `Get`,`Set`, `List`, and `Delete`. <br/>When running locally, the developer identity is used, and settings must be in the [local.settings.json file](functions-develop-local.md#local-settings-file).
181181

articles/batch/index.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,9 +7,9 @@ metadata:
77
description: Azure Batch runs large-scale applications efficiently in the cloud. Schedule compute-intensive tasks and dynamically adjust resources for your solution without managing infrastructure.
88
ms.service: batch
99
ms.topic: landing-page
10-
author: JnHs
11-
ms.author: jenhayes
12-
ms.date: 10/09/2020
10+
author: prkannap
11+
ms.author: prkannap
12+
ms.date: 04/20/2022
1313

1414
landingContent:
1515
- title: About Azure Batch

articles/batch/security-controls-policy.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
title: Azure Policy Regulatory Compliance controls for Azure Batch
33
description: Lists Azure Policy Regulatory Compliance controls available for Azure Batch. These built-in policy definitions provide common approaches to managing the compliance of your Azure resources.
4-
ms.date: 03/10/2022
4+
ms.date: 04/20/2022
55
ms.topic: sample
6-
author: JnHs
7-
ms.author: jenhayes
6+
author: prkannap
7+
ms.author: prkannap
88
ms.service: batch
99
ms.custom: subject-policy-compliancecontrols
1010
---

articles/cognitive-services/language-service/question-answering/how-to/prebuilt.md

Lines changed: 95 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -119,6 +119,7 @@ We see that multiple answers are received as part of the API response. Each answ
119119

120120
## Prebuilt API limits
121121

122+
### API call limits
122123
If you need to use larger documents than the limit allows, you can break the text into smaller chunks of text before sending them to the API. In this context, a document is a defined single string of text characters.
123124

124125
These numbers represent the **per individual API call limits**:
@@ -127,6 +128,99 @@ These numbers represent the **per individual API call limits**:
127128
* Maximum size of a single document: 5,120 characters.
128129
* Maximum three responses per document.
129130

131+
### Language codes supported
132+
The following language codes are supported by Prebuilt API. These language codes are in accordance to the [ISO 639-1 codes standard](https://en.wikipedia.org/wiki/List_of_ISO_639-1_codes).
133+
134+
Language code|Language
135+
----|----
136+
af|Afrikaans
137+
am|Amharic
138+
ar|Arabic
139+
as|Assamese
140+
az|Azerbaijani
141+
ba|Bashkir
142+
be|Belarusian
143+
bg|Bulgarian
144+
bn|Bengali
145+
ca|Catalan, Valencian
146+
ckb|Central Kurdish
147+
cs|Czech
148+
cy|Welsh
149+
da|Danish
150+
de|German
151+
el|Greek, Modern (1453–)
152+
en|English
153+
eo|Esperanto
154+
es|Spanish, Castilian
155+
et|Estonian
156+
eu|Basque
157+
fa|Persian
158+
fi|Finnish
159+
fr|French
160+
ga|Irish
161+
gl|Galician
162+
gu|Gujarati
163+
he|Hebrew
164+
hi|Hindi
165+
hr|Croatian
166+
hu|Hungarian
167+
hy|Armenian
168+
id|Indonesian
169+
is|Icelandic
170+
it|Italian
171+
ja|Japanese
172+
ka|Georgian
173+
kk|Kazakh
174+
km|Central Khmer
175+
kn|Kannada
176+
ko|Korean
177+
ky|Kirghiz, Kyrgyz
178+
la|Latin
179+
lo|Lao
180+
lt|Lithuanian
181+
lv|Latvian
182+
mk|Macedonian
183+
ml|Malayalam
184+
mn|Mongolian
185+
mr|Marathi
186+
ms|Malay
187+
mt|Maltese
188+
my|Burmese
189+
ne|Nepali
190+
nl|Dutch, Flemish
191+
nn|Norwegian Nynorsk
192+
no|Norwegian
193+
or|Oriya
194+
pa|Punjabi, Panjabi
195+
pl|Polish
196+
ps|Pashto, Pushto
197+
pt|Portuguese
198+
ro|Romanian, Moldavian, Moldovan
199+
ru|Russian
200+
sa|Sanskrit
201+
sd|Sindhi
202+
si|Sinhala, Sinhalese
203+
sk|Slovak
204+
sl|Slovenian
205+
sq|Albanian
206+
sr|Serbian
207+
sv|Swedish
208+
sw|Swahili
209+
ta|Tamil
210+
te|Telugu
211+
tg|Tajik
212+
th|Thai
213+
tl|Tagalog
214+
tr|Turkish
215+
tt|Tatar
216+
ug|Uighur, Uyghur
217+
uk|Ukrainian
218+
ur|Urdu
219+
uz|Uzbek
220+
vi|Vietnamese
221+
yi|Yiddish
222+
zh|Chinese
223+
130224
## Prebuilt API reference
131225

132-
Visit the [full prebuilt API samples](https://github.com/Azure/azure-rest-api-specs/blob/main/specification/cognitiveservices/data-plane/Language/stable/2021-10-01/examples/questionanswering/SuccessfulQueryText.json) documentation to understand the input and output parameters required for calling the API.
226+
Visit the [full prebuilt API samples](https://github.com/Azure/azure-rest-api-specs/blob/main/specification/cognitiveservices/data-plane/Language/stable/2021-10-01/examples/questionanswering/SuccessfulQueryText.json) documentation to understand the input and output parameters required for calling the API.

articles/cognitive-services/language-service/question-answering/includes/sdk-csharp.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,7 @@ Use this quickstart for the question answering client library for .NET to:
2626
* The [Visual Studio IDE](https://visualstudio.microsoft.com/vs/) or current version of [.NET Core](https://dotnet.microsoft.com/download/dotnet-core).
2727
* Question answering, requires a [Language resource](https://portal.azure.com/?quickstart=true#create/Microsoft.CognitiveServicesTextAnalytics) with the custom question answering feature enabled to generate an API key and endpoint. <!--TODO: Change link-->
2828
* After your Language resource deploys, select **Go to resource**. You will need the key and endpoint from the resource you create to connect to the API. Paste your key and endpoint into the code below later in the quickstart.
29+
* To create a Language resource with [Azure CLI](/articles/cognitive-services/cognitive-services-apis-create-account-cli.md) provide the following additional properties during resource creation configure Custom Question Answering with your Language resource `--api-properties qnaAzureSearchEndpointId=/subscriptions/<azure-subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.Search/searchServices/<azure-search-service-name> qnaAzureSearchEndpointKey=<azure-search-service-auth-key>`
2930
* An existing knowledge base to query. If you have not setup a knowledge base, you can follow the instructions in the [**Language Studio quickstart**](../quickstart/sdk.md). Or add a knowledge base that uses this [Surface User Guide URL](https://download.microsoft.com/download/7/B/1/7B10C82E-F520-4080-8516-5CF0D803EEE0/surface-book-user-guide-EN.pdf) as a data source.
3031

3132
## Setting up

0 commit comments

Comments
 (0)