Skip to content

Commit cd2ca00

Browse files
authored
Merge pull request #8295 from MicrosoftDocs/main
Auto push to live 2025-02-24 18:00:03
2 parents d1f6504 + 7d43a9f commit cd2ca00

9 files changed

Lines changed: 127 additions & 6 deletions

File tree

support/azure/azure-container-instances/connectivity/web-socket-is-closed-or-could-not-be-opened.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
22
title: Error - Web socket is closed or could not be opened
33
description: Learn how to resolve the (Web socket is closed or could not be opened) error. This error prevents you from connecting to your container from a virtual network.
4-
ms.date: 12/28/2023
4+
ms.date: 02/24/2025
55
author: tysonfms
66
ms.author: tysonfreeman
77
editor: v-jsitser
8-
ms.reviewer: v-leedennis
8+
ms.reviewer: albarqaw, v-weizhu, v-leedennis
99
ms.service: azure-container-instances
1010
ms.custom: sap:Connectivity
1111
#Customer intent: As an Azure administrator, I want to learn how to resolve the "Web socket is closed or could not be opened" error so that I can successfully deploy an image onto a container instance.
@@ -22,10 +22,12 @@ When you try to connect to your container from the Azure portal, you receive the
2222
2323
## Cause
2424

25-
Your firewall blocks access to port 19390. This port is required to connect to Container Instances from the Azure portal when container groups are deployed in virtual networks.
25+
Your firewall or corporate proxy blocks access to port 19390. This port is required to connect to Container Instances from the Azure portal when container groups are deployed in virtual networks.
2626

2727
## Solution
2828

29-
Allow ingress to TCP port 19390 in your firewall. At a minimum, make sure that your firewall gives access to that port for all public client IP addresses that the Azure portal has to connect to.
29+
To resolve this error, allow ingress to TCP port 19390 in your firewall. At a minimum, make sure that your firewall gives access to that port for all public client IP addresses that the Azure portal has to connect to.
30+
31+
In some scenarios where the corporate proxy blocks port 19390, allow this port for corporate proxy, and then verify the traffic by using the **Network** tab in the browser developer tools.
3032

3133
[!INCLUDE [Azure Help Support](../../../includes/azure-help-support.md)]

support/azure/azure-kubernetes/create-upgrade-delete/error-code-poddrainfailure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Troubleshoot UpgradeFailed errors due to eviction failures caused by PDBs
33
description: Learn how to troubleshoot UpgradeFailed errors due to eviction failures caused by Pod Disruption Budgets when you try to upgrade an Azure Kubernetes Service cluster.
4-
ms.date: 12/21/2023
4+
ms.date: 02/23/2025
55
editor: v-jsitser
66
ms.reviewer: chiragpa, v-leedennis, v-weizhu
77
ms.service: azure-kubernetes-service

support/dynamics-365/supply-chain/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -302,6 +302,8 @@
302302
href: warehousing/load-weight-positive-numbers.md
303303
- name: Location profile disallows negative inventory, but negative on-hand is permitted
304304
href: warehousing/location-profile-set.md
305+
- name: Many printing jobs are queued in the Document Routing Agent (DRA)
306+
href: warehousing/clear-document-rounting-agent-printing-queue.md
305307
- name: Multiple SKU option doesn't evaluate multiple location directive actions
306308
href: warehousing/evaluate-multiple-location-directive-actions.md
307309
- name: Mixed license plate receiving doesn't work for any disposition code but Credit
Lines changed: 49 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,49 @@
1+
---
2+
title: Many Printing Jobs Are Queued in Document Routing Agent
3+
description: Provides resolutions on how to clear the printing queue within the Document Routing Agent (DRA) in Microsoft Dynamics 365 Supply Chain Management.
4+
ms.date: 02/25/2025
5+
# ms.search.form:
6+
audience: Application User
7+
ms.reviewer: kamaybac, ivanma
8+
ms.search.region: Global
9+
ms.author: mirzaab
10+
ms.search.validFrom: 2025-02-10
11+
ms.dyn365.ops.version: 10.0.39
12+
ms.custom: sap:Warehouse management
13+
---
14+
# Many printing jobs might be queued in the Document Routing Agent (DRA)
15+
16+
This article provides resolutions on how to clear the printing queue within the Document Routing Agent (DRA) used in Microsoft Dynamics 365 Supply Chain Management.
17+
18+
## Symptoms
19+
20+
You might notice that many printing jobs are queued in the [Document Routing Agent (DRA)](/dynamics365/fin-ops-core/dev-itpro/analytics/install-document-routing-agent), causing delays or preventing new print jobs from being processed.
21+
22+
## Solution 1 - Clean up printing queue for one printer
23+
24+
Starting from [Dynamics 365 for Finance and Operations platform update 23](/dynamics365/fin-ops-core/dev-itpro/get-started/whats-new-platform-update-23#manage-access-to-network-printers-across-legal-entities), you can manually clear the printing queue for a specific printer by deleting it from the **System network printers** page. This action removes all pending documents for that printer. Follow these steps to delete and re-register the printer from the DRA client:
25+
26+
1. Navigate to the **Manage Network Printers** page by selecting **Organization administration** > **Setup** > **Network printers**.
27+
2. Expand the **Options** menu and select the **System network printers** button in the **Preview** section.
28+
3. Select the network printer and select the **Delete** button.
29+
30+
4. After deletion, pending printing jobs remain in the document routing status list for auditing purposes. However, the actual printing queue is already cleared for that printer.
31+
32+
5. [Re-register the same printer from the DRA client](/dynamics365/fin-ops-core/dev-itpro/analytics/install-document-routing-agent#register-network-printers), and try to print some documents.
33+
34+
> [!NOTE]
35+
>
36+
> - Except for the first document, the rest should be printed responsively. The first document might be slow due to a one-time 3-minute cache refresh interval after a new printer is registered.
37+
> - If the same printer name is used again, there is no need to set up the document routing again.
38+
> - If a new printer name is used, you should set up the document routing with the new printer name for all relevant work order types. For more information, see [Set up license plate label routing](/dynamics365/supply-chain/warehousing/print-license-plate-labels-using-label-layouts#routing).
39+
40+
## Solution 2 - Clean up printing queue and job status for all printers
41+
42+
The [Document routing history cleanup](/dynamics365/fin-ops-core/dev-itpro/analytics/install-document-routing-agent#adjust-the-document-routing-history-cleanup-batch-job) batch job can be used to delete all the document routing jobs older than seven days (168 hours). By default, this batch job runs daily and is first created when a document is sent to the DRA.
43+
44+
Follow these steps to use the **Document routing history cleanup** batch job:
45+
46+
1. Change the document routing job history retention period length from seven days to one hour to delete all printing jobs older than one hour.
47+
1. Copy the **Document routing history cleanup** batch job to a new batch job, and then update the copied batch job recurrence to run immediately.
48+
1. Wait for the copied batch to complete, and then delete the copied batch job.
49+
1. Restore the retention period from one hour to seven days.
Lines changed: 66 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,66 @@
1+
---
2+
title: Error AADSTS50017 - Validation of Given Certificate for Certificate-Based Authentication Failed
3+
description: Provides solutions to the Microsoft Entra authentication AADSTS50017 error that occurs when you access an application or resource with certificate-based authentication (CBA).
4+
ms.reviewer: laks, joaos, willfid, v-weizhu
5+
ms.service: entra-id
6+
ms.date: 02/25/2025
7+
ms.custom: sap:Issues Signing In to Applications
8+
---
9+
# Error AADSTS50017 - Validation of given certificate for certificate-based authentication failed
10+
11+
This article provides solutions to the Microsoft Entra authentication AADSTS50017 error that occurs when you access an application or resource with certificate-based authentication (CBA).
12+
13+
## Symptoms
14+
15+
When you try to access an application or resource with CBA, the sign-in process fails and the following error message is displayed:
16+
17+
> AADSTS50017: Validation of given certificate for certificate based authentication failed.
18+
19+
## Cause 1: Certificate chain failures or validation failures
20+
21+
The AADSTS50017 error might occur because of the following problems:
22+
23+
- Certificate chain failures due to missing certificate authority (CA) certificates in store.
24+
- Validation failures with Subject Key Identifier (SKI) and Authority Key Identifier (AKI) values.
25+
26+
In Public Key Infrastructure (PKI), the certificate chain validation process ensures the integrity and authenticity of the certificate chain. The SKI and AKI play crucial roles in this process. The SKI provides a unique identifier for the public key held by the certificate. The AKI is used to identify the CA that issues the certificate.
27+
28+
To resolve this issue, follow these steps:
29+
30+
1. Check if issuing certificate is correctly uploaded to the trusted certificate list.
31+
32+
A certificate chain consists of multiple certificates linked together. The end user's certificate can be issued by a root CA or a non-root CA (intermediate CA). If you have a non-root issuing CA (intermediate CA), both intermediate and root CA certificates must be uploaded to the Microsoft Entra CA trusted store.
33+
34+
2. Check the SKI value of your certificate and confirm if the AKI value matches any intermediate or root CA certificate that's uploaded to the trusted store.
35+
36+
If there is no match, your certificate or the missing CA certificate should be changed accordingly. To do this, [configure certificate authorities by using the Microsoft Entra admin center](/entra/identity/authentication/how-to-certificate-based-authentication#configure-certificate-authorities-by-using-the-microsoft-entra-admin-center).
37+
38+
To get the SKI and AKI values, check the details of your certificate and uploaded issuing CA certificates.
39+
40+
:::image type="content" source="media/error-code-aadsts50017-certificate-based-authentication-failed/certificate-chain-ski-aki-value.png" alt-text="Screenshot that shows a certificate chain." lightbox="media/error-code-aadsts50017-certificate-based-authentication-failed/certificate-chain-ski-aki-value.png":::
41+
42+
|Certificate type|Characteristic|
43+
|---|---|
44+
|Root CA certificate|It has its own SKI. It can issue the intermediate certificates when applicable. It doesn't contain the AKI field.|
45+
|Issuing or intermediate CA certificate (when applicable)|Its AKI points to the Root CA certificate's SKI. It has its own SKI that matches the AKI on a user certificate. It can issue user certificates, and issue intermediate certificates when applicable. Multiple intermediate CA certificates can exist.|
46+
|End-Entity (User or Client) certificate|It has its own SKI. Its AKI points to the issuing CA certificate's SKI.|
47+
48+
## Cause 2: Invalid certificates
49+
50+
If any certificates in the certificate chain are missing valid extension identifiers, such as certificate policy extensions, the AADSTS50017 error might occur.
51+
52+
To resolve this error, validate the certificate policy extensions for all certificates within the certificate chain, including user certificates, intermediate CA certificates, and the root CA certificate. Ensure that the certificate policy extension and its Object Identifiers (OIDs) are consistent and valid across the entire chain.
53+
54+
To verify the policy OIDs for consistency and validity, retrieve the relevant certificates in chain and validate them as follows:
55+
56+
:::image type="content" source="media/error-code-aadsts50017-certificate-based-authentication-failed/certificate-policies.png" alt-text="Screenshot that shows certificate policies." lightbox="media/error-code-aadsts50017-certificate-based-authentication-failed/certificate-policies.png":::
57+
58+
If any certificates are missing certificate policy extensions, reissue the CA certificate or end user certificate with the appropriate certificate policy extensions embedded.
59+
60+
For more information about policy extension and other supported extensions, see [Supported Extensions](/windows/win32/seccertenroll/supported-extensions).
61+
62+
## AADSTS error code reference
63+
64+
For a full list of authentication and authorization error codes, see [Microsoft Entra authentication and authorization error codes](/entra/identity-platform/reference-error-codes). To investigate individual errors, search at https://login.microsoftonline.com/error.
65+
66+
[!INCLUDE [Azure Help Support](../../../includes/azure-help-support.md)]
Loading
Loading

support/entra/entra-id/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -79,6 +79,8 @@
7979
href: app-integration/error-code-AADSTS50020-user-account-identity-provider-does-not-exist.md
8080
- name: Error AADSTS530004 - AcceptCompliantDevice setting isn't configured
8181
href: app-integration/error-code-aadsts530004-acceptcompliantdevice-setting-not-configured.md
82+
- name: Error AADSTS50017 - Validation of given certificate for certificate-based authentication failed
83+
href: app-integration/error-code-aadsts50017-certificate-based-authentication-failed.md
8284
- name: Error AADSTS50057 - user account is disabled
8385
href: app-integration/error-code-aadsts50057-user-account-is-disabled.md
8486
- name: AADSTS500011 - Resource Principal Not Found

support/sql/releases/sqlserver-2019/cumulativeupdate31.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ SQL Server 2019 CU14 introduced a [fix to address wrong results in parallel plan
3333

3434
### Issue two: Patching a read-scale availability group (Windows or Linux) causes the availability group on the patched replica to be removed
3535

36-
If you use the read-scale availability group (AG) feature in SQL Server on Windows or Linux, you should **not** install this CU.
36+
If you use the read-scale availability group (AG) feature in SQL Server on Windows or Linux, do **not** install this CU.
3737

3838
This CU introduced [a fix to support AG names longer than 64 characters](#3548672). However, when the patch is installed on an instance that has the read-scale AG configured, the AG metadata is dropped. This issue affects read-scale AGs in both [Windows](/sql/database-engine/availability-groups/windows/read-scale-availability-groups) and [Linux](/sql/linux/sql-server-linux-availability-group-configure-rs), which means that the `CLUSTER_TYPE` of the AG is either `NONE` or `EXTERNAL`.
3939

0 commit comments

Comments
 (0)