Skip to content

Commit 015430a

Browse files
Merge pull request #310853 from MicrosoftDocs/main
Auto Publish – main to live - 2026-01-23 23:00 UTC
2 parents a9b16c2 + d205b75 commit 015430a

80 files changed

Lines changed: 2211 additions & 2955 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.openpublishing.publish.config.json

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -834,12 +834,6 @@
834834
"branch": "tutorial",
835835
"branch_mapping": {}
836836
},
837-
{
838-
"path_to_root": "samples-tsi",
839-
"url": "https://github.com/Azure-Samples/Azure-Time-Series-Insights",
840-
"branch": "master",
841-
"branch_mapping": {}
842-
},
843837
{
844838
"path_to_root": "storage-mgmt-devguide-dotnet",
845839
"url": "https://github.com/Azure-Samples/storage-mgmt-devguide-dotnet",

.openpublishing.redirection.json

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6664,6 +6664,11 @@
66646664
"source_path": "articles/nat-gateway/nat-availability-zones.md",
66656665
"redirect_url": "/azure/reliability/reliability-nat-gateway",
66666666
"redirect_document_id": false
6667-
}
6667+
},
6668+
{
6669+
"source_path": "articles/cyclecloud/how-to/collect-custom-metrics-gpu-infiniband-telegraf.md",
6670+
"redirect_url": "/azure/cyclecloud/how-to/monitor-cyclecloud-cluster-using-prometheus-grafana",
6671+
"redirect_document_id": false
6672+
}
66686673
]
6669-
}
6674+
}

articles/active-directory-b2c/phone-based-mfa.md

Lines changed: 12 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: kengaderdus
77
manager: CelesteDG
88
ms.service: azure-active-directory
99
ms.topic: how-to
10-
ms.date: 11/05/2025
10+
ms.date: 1/21/2025
1111
ms.author: kengaderdus
1212
ms.subservice: b2c
1313
ms.custom: sfi-image-nochange
@@ -123,22 +123,29 @@ To help prevent fraudulent sign-ups, remove any country/region codes that do not
123123
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
124124
<TrustFrameworkPolicy xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
125125
xmlns:xsd="http://www.w3.org/2001/XMLSchema"
126-
xmlns="http://schemas.microsoft.com/online/cpim/schemas/2013/06" PolicySchemaVersion="0.3.0.0" TenantId="yourtenant.onmicrosoft.com" PolicyId="B2C_1A_signup_signin" PublicPolicyUri="http://yourtenant.onmicrosoft.com/B2C_1A_signup_signin">
126+
xmlns="http://schemas.microsoft.com/online/cpim/schemas/2013/06"
127+
PolicySchemaVersion="0.3.0.0"
128+
TenantId="yourtenant.onmicrosoft.com"
129+
PolicyId="B2C_1A_signup_signin"
130+
PublicPolicyUri="http://yourtenant.onmicrosoft.com/B2C_1A_signup_signin">
127131

128132
<BasePolicy>
129133
<TenantId>yourtenant.onmicrosoft.com</TenantId>
130134
<PolicyId>B2C_1A_TrustFrameworkExtensions</PolicyId>
131135
</BasePolicy>
132-
136+
137+
<!-- Add this BuildingBlocks section to the relying party policy. -->
133138
<BuildingBlocks>
134-
<!-- Add the XML code outlined in Step 2 if this section. -->
139+
<!-- Add the XML code outlined in Step 2 in this section. -->
135140
</BuildingBlocks>
136141

137142
<RelyingParty>
138143
...
139144
</RelyingParty>
140145
</TrustFrameworkPolicy>
141146
```
147+
> [!IMPORTANT]
148+
>Add the code in step 2 to the _relying party policy_ to enforce country/region code restrictions on the server side. You must not define these elements only in parent policies; put them in the relying party policy.
142149

143150
1. In the `BuildingBlocks` section of this policy file, add the following code. Make sure to include only the country/region codes relevant to your organization:
144151

@@ -178,11 +185,8 @@ To help prevent fraudulent sign-ups, remove any country/region codes that do not
178185

179186
The countryList acts as an allow list. Only the countries/regions you specify in this list (for example, Japan, Bulgaria, and the United States) are permitted to use MFA. All other countries/regions are blocked.
180187

181-
> [!IMPORTANT]
182-
> This code must be added to the relying party policy to ensure the country/region code restrictions are properly enforced on the server side.
188+
183189

184190
## Related content
185191

186192
- Learn about [Identity Protection and Conditional Access for Azure AD B2C](conditional-access-identity-protection-overview.md)
187-
188-
- Apply [Conditional Access to user flows in Azure Active Directory B2C](conditional-access-user-flow.md)

articles/active-directory-b2c/service-limits.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: azure-active-directory
99

1010
ms.topic: reference
11-
ms.date: 01/08/2026
11+
ms.date: 01/22/2026
1212
ms.subservice: b2c
1313
zone_pivot_groups: b2c-policy-type
1414

@@ -186,7 +186,7 @@ The following table lists the administrative configuration limits in the Azure A
186186

187187
## Region specific service limits
188188

189-
As a protection for our customers, Microsoft places some restrictions on telephony verification for certain region codes. The following table lists the region codes and their corresponding limits. These limits apply to both SMS and Voice verification.
189+
As a protection for our customers, Microsoft places some restrictions on telephony verification for certain region codes. The following table lists the region codes and their corresponding limits. Only SMS verification is subject to these limits.
190190

191191
| Region Code | Region Name | Limit per tenant per 60 minutes | Limit per tenant per 24 hours |
192192
|:----------- |:---------------------------------------------- |:------------------------------- | :----------------------------------------|

articles/app-service/includes/configure-azure-storage/azure-storage-linux-container-pivot.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
author: msangapu-msft
33
ms.service: azure-app-service
44
ms.topic: include
5-
ms.date: 03/04/2025
5+
ms.date: 01/23/2026
66
ms.author: msangapu
77
ms.custom:
88
- linux-related-content
@@ -238,6 +238,7 @@ You can customize health‑check behavior using the following app settings.
238238
| Azure Blob | `WEBSITE_BYOS_BLOB_HEALTH_CHECK_FREQUENCY` | `5` | Interval in seconds between health checks. |
239239
| Azure Blob | `WEBSITE_BYOS_BLOB_MAX_FAILED_PINGS` | `15` | Number of consecutive failures before marking the volume as faulted. |
240240
| Azure Blob | `WEBSITE_BYOS_BLOB_AUTO_RECOVERY_ENABLED` | `true` | Set to `false` to disable auto‑recovery logic. |
241+
| Azure Blob | `WEBSITE_BYOS_BLOB_DIRECT_IO` | `false` | If enabled, all transactions will query the remote storage directly and caching will be bypassed. This setting is applied at the application level and therefore affects all blob shares mounted by the application. |
241242

242243
#### Notes
243244
- Auto‑recovery helps prevent long‑running application hangs caused by unresponsive storage paths.

articles/app-service/reference-app-settings.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Environment Variables and App Settings Reference
33
description: This article describes the commonly used environment variables in Azure App Service, and which ones can be modified with app settings.
44
ms.topic: conceptual
5-
ms.date: 03/28/2025
5+
ms.date: 01/23/2026
66
author: cephalin
77
ms.author: cephalin
88
ms.service: azure-app-service
@@ -48,6 +48,7 @@ The following environment variables are related to the app environment in genera
4848
| `REMOTEDEBUGGINGVERSION` | Remote debugging version. |
4949
| `WEBSITE_CONTENTAZUREFILECONNECTIONSTRING` | By default, App Service creates a shared storage for you at app creation. To use a custom storage account instead, set to the connection string of your storage account. For functions, see [App settings reference for Azure Functions](../azure-functions/functions-app-settings.md#website_contentazurefileconnectionstring).<br/><br/>Example: `DefaultEndpointsProtocol=https;AccountName=<name>;AccountKey=<key>` |
5050
| `WEBSITE_CONTENTSHARE` | When you use specify a custom storage account with `WEBSITE_CONTENTAZUREFILECONNECTIONSTRING`, App Service creates a file share in that storage account for your app. To use a custom name, set this variable to the name that you want. If a file share with the specified name doesn't exist, App Service creates it for you.<br/><br/>Example: `myapp123` |
51+
| `WEBSITE_BYOS_BLOB_DIRECT_IO` | Set to `false` by default. If enabled, all transactions will query the remote storage directly and caching will be bypassed. This setting is applied at the application level and therefore affects all blob shares mounted by the application.<br/><br/> Only relevant when using custom-mounted Azure Blob Storage. Applicable to Linux containers only (not applicable to Windows). |
5152
| `WEBSITE_SCM_ALWAYS_ON_ENABLED` | Read-only. Shows whether Always On is enabled (`1`) or not (`0`). |
5253
| `WEBSITE_SCM_SEPARATE_STATUS` | Read-only. Shows whether the Kudu app is running in a separate process (`1`) or not (`0`). |
5354
| `WEBSITE_DNS_ATTEMPTS` | Number of times to try name resolution. |
22.3 KB
Loading

0 commit comments

Comments
 (0)