Skip to content

Commit fe6c9a3

Browse files
authored
Merge pull request #109169 from MicrosoftDocs/master
3/26 AM Publish
2 parents fab450a + 0df5037 commit fe6c9a3

File tree

81 files changed

+991
-178
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

81 files changed

+991
-178
lines changed

.openpublishing.redirection.json

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -50402,6 +50402,10 @@
5040250402
{
5040350403
"source_path": "articles/cognitive-services/Speech-Service/quickstart-voice-assistant-csharp-uwp.md",
5040450404
"redirect_url": "/azure/cognitive-services/speech-service/quickstarts/voice-assistants?pivots=programming-language-csharp&tabs=uwp"
50405+
},
50406+
{
50407+
"source_path": "articles/load-balancer/use-existing-lb-vmss-cli.md",
50408+
"redirect_url": "/azure/load-balancer/configure-vm-scale-set-cli"
5040550409
}
5040650410
]
5040750411
}

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 364 additions & 3 deletions
Large diffs are not rendered by default.

articles/active-directory/develop/scenario-web-app-sign-user-app-configuration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -100,7 +100,7 @@ In ASP.NET Core, these settings are located in the [appsettings.json](https://gi
100100
}
101101
```
102102

103-
In ASP.NET Core, another file ([properties\launchSettings.json](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/blob/bc564d68179c36546770bf4d6264ce72009bc65a/1-WebApp-OIDC/1-1-MyOrg/Properties/launchSettings.json#L6-L7)) contains the URL (`applicationUrl`) and the SSL port (`sslPort`) for your application and various profiles.
103+
In ASP.NET Core, another file ([properties\launchSettings.json](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/blob/bc564d68179c36546770bf4d6264ce72009bc65a/1-WebApp-OIDC/1-1-MyOrg/Properties/launchSettings.json#L6-L7)) contains the URL (`applicationUrl`) and the TLS/SSL port (`sslPort`) for your application and various profiles.
104104

105105
```Json
106106
{

articles/active-directory/develop/v2-oauth2-implicit-grant-flow.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -66,6 +66,9 @@ If your application is a native client, the implicit flow isn’t a great fit. T
6666

6767
If you are developing a Web application that includes a backend, and consuming an API from its backend code, the implicit flow is also not a good fit. Other grants give you far more power. For example, the OAuth2 client credentials grant provides the ability to obtain tokens that reflect the permissions assigned to the application itself, as opposed to user delegations. This means the client has the ability to maintain programmatic access to resources even when a user is not actively engaged in a session, and so on. Not only that, but such grants give higher security guarantees. For instance, access tokens never transit through the user browser, they don’t risk being saved in the browser history, and so on. The client application can also perform strong authentication when requesting a token.
6868

69+
[OAuth2-Spec-Implicit-Misuse]: https://tools.ietf.org/html/rfc6749#section-10.16
70+
[OAuth2-Threat-Model-And-Security-Implications]: https://tools.ietf.org/html/rfc6819
71+
6972
## Protocol diagram
7073

7174
The following diagram shows what the entire implicit sign-in flow looks like and the sections that follow describe each step in more detail.

articles/active-directory/saas-apps/mondaycom-tutorial.md

Lines changed: 27 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,6 @@ To configure the integration of monday.com into Azure AD, you need to add monday
5555
1. In the **Add from the gallery** section, type **monday.com** in the search box.
5656
1. Select **monday.com** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
5757

58-
5958
## Configure and test Azure AD single sign-on for monday.com
6059

6160
Configure and test Azure AD SSO with monday.com using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in monday.com.
@@ -81,50 +80,50 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8180

8281
1. On the **Basic SAML Configuration** section, if you have **Service Provider metadata file** and wish to configure in **IDP** initiated mode, perform the following steps:
8382

84-
a. Click **Upload metadata file**.
83+
a. Click **Upload metadata file**.
8584

8685
![Upload metadata file](common/upload-metadata.png)
8786

88-
b. Click on **folder logo** to select the metadata file and click **Upload**.
87+
b. Click on **folder logo** to select the metadata file and click **Upload**.
8988

90-
![choose metadata file](common/browse-upload-metadata.png)
89+
![choose metadata file](common/browse-upload-metadata.png)
9190

92-
c. After the metadata file is successfully uploaded, the **Identifier** and **Reply URL** values get auto populated in Basic SAML Configuration section.
91+
c. After the metadata file is successfully uploaded, the **Identifier** and **Reply URL** values get auto populated in Basic SAML Configuration section.
9392

94-
![image](common/idp-intiated.png)
93+
![image](common/idp-intiated.png)
9594

96-
> [!Note]
97-
> If the **Identifier** and **Reply URL** values do not get populated automatically, then fill in the values manually. The **Identifier** and the **Reply URL** are the same and value is in the following pattern: `https://<your-domain>.monday.com/saml/saml_callback`
95+
> [!Note]
96+
> If the **Identifier** and **Reply URL** values do not get populated automatically, then fill in the values manually. The **Identifier** and the **Reply URL** are the same and value is in the following pattern: `https://<your-domain>.monday.com/saml/saml_callback`
9897
9998
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
10099

101-
![image](common/metadata-upload-additional-signon.png)
100+
![image](common/metadata-upload-additional-signon.png)
102101

103-
In the **Sign-on URL** text box, type a URL using the following pattern:
102+
In the **Sign-on URL** text box, type a URL using the following pattern:
104103
`https://<YOUR_DOMAIN>.monday.com`
105104

106-
> [!NOTE]
107-
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign-On URL. Contact [monday.com Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
105+
> [!NOTE]
106+
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign-On URL. Contact [monday.com Client support team](https://monday.com/contact-us/) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
108107
109108
1. monday.com application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
110109

111-
![image](common/default-attributes.png)
110+
![image](common/default-attributes.png)
112111

113112
1. In addition to above, monday.com application expects few more attributes to be passed back in SAML response which are shown below. These attributes are also pre populated but you can review them as per your requirements.
114113

115-
| Name | Source Attribute|
116-
| ---------------| --------------- |
117-
| Email | user.mail |
114+
| Name | Source Attribute |
115+
|--|--|
116+
| Email | user.mail |
118117
| FirstName | user.givenname |
119118
| LastName | user.surname |
120119

121120
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
122121

123-
![The Certificate download link](common/certificatebase64.png)
122+
![The Certificate download link](common/certificatebase64.png)
124123

125124
1. On the **Set up monday.com** section, copy the appropriate URL(s) based on your requirement.
126125

127-
![Copy configuration URLs](common/copy-configuration-urls.png)
126+
![Copy configuration URLs](common/copy-configuration-urls.png)
128127

129128
### Create an Azure AD test user
130129

@@ -133,7 +132,7 @@ In this section, you'll create a test user in the Azure portal called B.Simon.
133132
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
134133
1. Select **New user** at the top of the screen.
135134
1. In the **User** properties, follow these steps:
136-
1. In the **Name** field, enter `B.Simon`.
135+
1. In the **Name** field, enter `B.Simon`.
137136
1. In the **User name** field, enter the [email protected]. For example, `[email protected]`.
138137
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
139138
1. Click **Create**.
@@ -150,7 +149,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
150149

151150
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
152151

153-
![The Add User link](common/add-assign-user.png)
152+
![The Add User link](common/add-assign-user.png)
154153

155154
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
156155
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
@@ -160,17 +159,17 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
160159

161160
1. To automate the configuration within monday.com, you need to install **My Apps Secure Sign-in browser extension** by clicking **Install the extension**.
162161

163-
![My apps extension](common/install-myappssecure-extension.png)
162+
![My apps extension](common/install-myappssecure-extension.png)
164163

165164
1. After adding extension to the browser, click on **Setup monday.com** which will direct you to the monday.com application. From there, provide the admin credentials to sign into monday.com. The browser extension will automatically configure the application for you and automate steps 3-6.
166165

167-
![Setup configuration](common/setup-sso.png)
166+
![Setup configuration](common/setup-sso.png)
168167

169168
1. If you want to setup monday.com manually, open a new web browser window and sign in to monday.com as an administrator and perform the following steps:
170169

171170
1. Go to the **Profile** on the top right corner of page and click on **Admin**.
172171

173-
![monday.com configuration](./media/mondaycom-tutorial/configuration01.png)
172+
![monday.com configuration](./media/mondaycom-tutorial/configuration01.png)
174173

175174
1. Select **Security** and make sure to click on **Open** next to SAML.
176175

@@ -180,8 +179,8 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
180179

181180
![monday.com configuration](./media/mondaycom-tutorial/configuration03.png)
182181

183-
>[!NOTE]
184-
>For more details refer [this](https://support.monday.com/hc/articles/360000460605-SAML-Single-Sign-on?abcb=34642) article
182+
> [!NOTE]
183+
> For more details refer [this](https://support.monday.com/hc/articles/360000460605-SAML-Single-Sign-on?abcb=34642) article
185184
186185
### Create monday.com test user
187186

@@ -195,10 +194,10 @@ When you click the monday.com tile in the Access Panel, you should be automatica
195194

196195
## Additional resources
197196

198-
- [ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory ](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
197+
- [List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
199198

200-
- [What is application access and single sign-on with Azure Active Directory? ](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
199+
- [What is application access and single sign-on with Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
201200

202201
- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
203202

204-
- [Try monday.com with Azure AD](https://aad.portal.azure.com/)
203+
- [Try monday.com with Azure AD](https://aad.portal.azure.com/)

articles/aks/azure-files-dynamic-pv.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ A storage class is used to define how an Azure file share is created. A storage
2727

2828
* *Standard_LRS* - standard locally redundant storage (LRS)
2929
* *Standard_GRS* - standard geo-redundant storage (GRS)
30-
* *Standard_ZRS* - standard zone redundant storage (GRS)
30+
* *Standard_ZRS* - standard zone redundant storage (ZRS)
3131
* *Standard_RAGRS* - standard read-access geo-redundant storage (RA-GRS)
3232
* *Premium_LRS* - premium locally redundant storage (LRS)
3333
* *Premium_ZRS* - premium zone redundant storage (GRS)

articles/app-service/app-service-web-tutorial-dotnetcore-sqldb.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -59,8 +59,8 @@ The sample project contains a basic CRUD (create-read-update-delete) app using [
5959
Run the following commands to install the required packages, run database migrations, and start the application.
6060

6161
```bash
62-
dotnet restore
63-
dotnet ef database update
62+
dotnet tool install -g dotnet-ef --version 3.1.1
63+
dotnet-ef database update
6464
dotnet run
6565
```
6666

articles/automation/TOC.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,11 @@
3131
- name: Manage Azure Automation data
3232
href: automation-managing-data.md
3333
displayName: backup
34+
- name: Troubleshoot
35+
items:
36+
- name: Automation account troubleshooting
37+
href: troubleshoot/automation-account.md
38+
displayName: troubleshoot
3439
- name: Process Automation
3540
items:
3641
- name: Hybrid Runbook Worker Overview
Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,50 @@
1+
---
2+
title: Automation account troubleshooting
3+
description: Learn how to troubleshoot and resolve issues with an Azure account.
4+
services: automation
5+
author: mgoedtel
6+
ms.author: magoedte
7+
ms.date: 03/24/2020
8+
ms.topic: conceptual
9+
ms.service: automation
10+
manager: carmonm
11+
---
12+
# Automation account troubleshooting
13+
14+
This article discusses solutions to issues that you might encounter when you use an Automation account. The following sections highlight specific error messages and possible resolutions for each. For general information about Automation accounts, see [Create an Azure account](../automation-quickstart-create-account.md).
15+
16+
## <a name="rp-register"></a>Scenario: Unable to register Automation Resource Provider for subscriptions
17+
18+
### Issue
19+
20+
When you work with management solutions in your Automation account, you encounter the following error:
21+
22+
```error
23+
Error details: Unable to register Automation Resource Provider for subscriptions:
24+
```
25+
26+
### Cause
27+
28+
The Automation Resource Provider isn't registered in the subscription.
29+
30+
### Resolution
31+
32+
To register the Automation Resource Provider, follow these steps in the Azure portal:
33+
34+
1. From your browser, go to the [Azure portal](https://portal.azure.com).
35+
36+
2. Navigate to **Subscriptions** and select your subscription from the Subscriptions page.
37+
38+
3. Under **Settings**, select **Resource Providers**.
39+
40+
4. From the list of resource providers, verify that the **Microsoft.Automation** resource provider is registered.
41+
42+
5. If it's not listed, register the **Microsoft.Automation** provider by following the steps at [Resolve errors for resource provider registration](/azure/azure-resource-manager/resource-manager-register-provider-errors).
43+
44+
## Next steps
45+
46+
If you didn't see your problem or can't resolve your issue, try one of the following channels for additional support:
47+
48+
* Get answers from Azure experts through [Azure Forums](https://azure.microsoft.com/support/forums/).
49+
* Connect with [@AzureSupport](https://twitter.com/azuresupport), the official Microsoft Azure account for improving customer experience by connecting the Azure community to the right resources: answers, support, and experts.
50+
* File an Azure support incident. Go to the [Azure support site](https://azure.microsoft.com/support/options/) and select **Get Support**.

articles/azure-maps/how-to-search-for-address.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -222,5 +222,5 @@ If you have a set of coordinate locations to reverse geocode, you can use [Post
222222
223223
## Next steps
224224
225-
- Explore the [Azure Maps search service](https://docs.microsoft.com/rest/api/maps/search) API documentation.
226-
- Learn about [Best practices](https://docs.microsoft.com/azure/azure-maps/how-to-use-best-practices-for-search).
225+
- Explore the [Azure Maps Search Service REST API documentation](https://docs.microsoft.com/rest/api/maps/search).
226+
- Learn about [Azure Maps Search Service best practices](https://docs.microsoft.com/azure/azure-maps/how-to-use-best-practices-for-search) and how to optimize your queries.

0 commit comments

Comments
 (0)