Skip to content

Commit a91d7b6

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into ps-freshness
2 parents 67bd89b + 3cfa658 commit a91d7b6

4 files changed

Lines changed: 24 additions & 21 deletions

File tree

articles/communication-services/concepts/interop/tpe/teams-phone-extensibility-capabilities.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ The following list of capabilities is supported for scenarios where at least one
6262
| | Cancel all Media Operations || ✔️ |
6363
| | Start continuous DTMF Recognition from end user | N/A | ✔️ |
6464
| | Stream real-time transcript of the call to a WebSocket | N/A | ✔️ |
65-
| | Mute other VoIP participants (such as other agents) | ✔️ | ✔️ |
65+
| | Mute other VoIP participants (such as other agents) | ✔️ | |
6666
| | Mute other PSTN users |||
6767
| | [Dial-pad commands](/microsoftteams/audio-conferencing-common-questions#what-in-meeting-dial-pad-commands-are-supported) for PSTN users |||
6868
| | Place call on hold and take call off hold (1:1 call only) | ✔️ ||

articles/firewall/change-sku.md

Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: duongau
66
ms.service: azure-firewall
77
ms.topic: how-to
8-
ms.date: 09/29/2025
8+
ms.date: 02/21/2026
99
ms.author: duau
1010
ms.custom:
1111
- devx-track-azurepowershell
@@ -33,7 +33,7 @@ Before you begin, make sure you have:
3333
- A planned maintenance window (for manual migration method)
3434

3535
> [!IMPORTANT]
36-
> This article applies to Azure Firewall Standard and Premium SKUs only. [Azure Firewall Basic SKU](overview.md#azure-firewall-basic) doesn't support SKU changes and must be migrated to Standard SKU first before any upgrade to Premium. Always perform SKU change operations during scheduled maintenance times and test the process thoroughly in a nonproduction environment first.
36+
> This article applies primarily to Azure Firewall Standard and Premium SKUs. [Azure Firewall Basic SKU](overview.md#azure-firewall-basic) doesn't support direct change to Premium SKU and must be migrated to Standard SKU first before any upgrade to Premium. Downgrading from Azure Firewall Premium or Standard to Basic is supported only through PowerShell or Terraform. Always perform SKU change operations during scheduled maintenance times and test the process thoroughly in a nonproduction environment first.
3737
3838
## Easy SKU change method (recommended)
3939

@@ -46,7 +46,7 @@ Use the easy SKU change method when:
4646
- Your firewall is deployed in a supported region
4747
- You want to minimize downtime (zero downtime with this method)
4848
- You have a standard deployment without complex custom configurations
49-
- **For downgrade**: Your Premium policy doesn't use Premium-exclusive features that are incompatible with Standard
49+
- **For downgrade**: A firewall policy created for a higher SKU (Premium or Standard) can't be attached to a lower SKU firewall. To downgrade, you must create a new firewall policy or use an existing policy that is compatible with the target SKU.
5050

5151
### Policy considerations for SKU changes
5252

@@ -74,7 +74,6 @@ When downgrading from Premium to Standard, consider the following policy require
7474
**Policy handling options:**
7575
- **Use existing Standard policy**: Select a preexisting Standard policy that doesn't contain Premium features
7676
- **Create new Standard policy**: The system can create a new Standard policy, automatically removing Premium-specific features
77-
- **Modify current policy**: Manually remove Premium features from your current policy before downgrade
7877

7978
### Change SKU using the Azure portal
8079

@@ -88,7 +87,7 @@ To change your firewall SKU using the Azure portal:
8887
1. In the SKU change dialog box, select **Premium** as the target SKU.
8988
1. Choose your policy option:
9089
- Select an existing Premium policy, or
91-
- Allow the system to upgrade your current Standard policy to Premium
90+
- Create a new Premium policy and select it.
9291
1. Select **Save** to begin the upgrade.
9392

9493
#### Downgrade to Standard
@@ -110,22 +109,22 @@ The SKU change process typically completes within a few minutes with zero downti
110109
### PowerShell and Terraform SKU change
111110

112111
You can also perform SKU changes using:
113-
- **PowerShell**: Change the `sku_tier` property to "Premium" or "Standard"
112+
- **PowerShell**: Change the `sku_tier` property to "Premium", "Standard" or "Basic"
114113
- **Terraform**: Update the `sku_tier` attribute in your configuration to the desired SKU
115114

116115
### Limitations
117116

118117
The easy SKU change method has the following limitations:
119118

120119
**General limitations:**
121-
- Doesn't support [Azure Firewall Basic SKU](overview.md#azure-firewall-basic) - Basic SKU users must migrate to Standard first
120+
- Doesn't support direct upgrades from [Azure Firewall Basic SKU](overview.md#azure-firewall-basic) - Basic SKU users must migrate to Standard first
122121
- Not available for firewalls with certain complex configurations
123122
- Limited availability in some regions
124123
- Requires existing firewall policy (not available for Classic rules)
125124

126125
**Downgrade-specific limitations:**
127126
- Premium features (TLS inspection, IDPS Alert and Deny mode, URL filtering, web categories) must be removed before downgrade
128-
- If your Premium policy contains incompatible features, you must modify the policy or create a new Standard policy
127+
- For the new Firewall SKU, you mustuse an existing compatible policy or create a new Standard policy
129128
- Some rule configurations might need manual adjustment after downgrade
130129

131130
If the easy SKU change method isn't available for your scenario, use the manual migration method described in the next section.
@@ -426,7 +425,6 @@ If you're unable to downgrade from Premium to Standard:
426425

427426
2. **Policy modification options**:
428427
- Create a new Standard policy without Premium features
429-
- Modify your existing policy to remove Premium features
430428
- Use Azure PowerShell to identify and remove incompatible rules
431429

432430
3. **Validation steps**:

articles/storage/files/storage-files-identity-ad-ds-update-password.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -4,27 +4,28 @@ description: Learn how to update the password of the Active Directory Domain Ser
44
author: khdownie
55
ms.service: azure-file-storage
66
ms.topic: how-to
7-
ms.date: 11/26/2025
7+
ms.date: 02/25/2026
88
ms.author: kendownie
99
# Customer intent: As a storage administrator, I want to update the password of the Active Directory Domain Services identity that represents my storage account, so that I can maintain Kerberos authentication and ensure uninterrupted access to Azure file shares.
1010
---
1111

12-
# Update the password of your storage account identity in AD DS
12+
# Update the password for your storage account identity in AD DS
1313

1414
**Applies to:** :heavy_check_mark: SMB Azure file shares
1515

16-
When you domain join your storage account in your Active Directory Domain Services (AD DS), you create an AD principal, either a computer account or service account, with a password. The password of the AD principal is one of the Kerberos keys of the storage account. Depending on the password policy of the organization unit of the AD principal, you must periodically rotate the password of the AD principal to avoid authentication issues. Failing to change the password before it expires could result in losing Kerberos authentication to your Azure file shares. Some AD environments may also delete AD principals with expired passwords using an automated cleanup script.
16+
When you domain join your storage account in your Active Directory Domain Services (AD DS), you create an AD principal, either a computer account or service account, with a password. The password for the AD principal is one of the Kerberos keys for the storage account. Depending on the password policy of the organizational unit for the AD principal, you must periodically rotate the password to avoid authentication problems. If you don't change the password before it expires, you lose Kerberos authentication to your Azure file shares. Some AD environments also delete AD principals with expired passwords by using an automated cleanup script.
1717

1818
Instead of periodically rotating the password, you can also place the AD principal that represents the storage account into an organizational unit that doesn't require password rotation.
1919

20-
There are two options for triggering password rotation. You can use the `AzFilesHybrid` module or Active Directory PowerShell. Use one method, not both.
20+
Two options exist for triggering password rotation. You can use the `AzFilesHybrid` module or Active Directory PowerShell. Use one method, not both.
2121

2222
## Option 1: Use AzFilesHybrid module
23-
To regenerate and rotate the password of the AD principal that represents the storage account, use the `Update-AzStorageAccountADObjectPassword` cmdlet from the [AzFilesHybrid module](https://github.com/Azure-Samples/azure-files-samples/releases). To execute `Update-AzStorageAccountADObjectPassword`, you must:
23+
24+
To regenerate and rotate the password for the AD principal that represents the storage account, use the `Update-AzStorageAccountADObjectPassword` cmdlet from the [AzFilesHybrid module](https://github.com/Azure-Samples/azure-files-samples/releases). To run `Update-AzStorageAccountADObjectPassword`, you must:
2425

2526
- Run the cmdlet from a domain-joined client.
26-
- Have the owner permission on the storage account.
27-
- Have AD DS permissions to change the password of the AD principal that represents the storage account.
27+
- Have the owner permission on the storage account.
28+
- Have AD DS permissions to change the password for the AD principal that represents the storage account.
2829

2930
```PowerShell
3031
# Update the password of the AD DS account registered for the storage account
@@ -35,14 +36,14 @@ Update-AzStorageAccountADObjectPassword `
3536
-StorageAccountName "<your-storage-account-name-here>"
3637
```
3738

38-
After you rotate to kerb2, we recommend waiting several hours and using `Update-AzStorageAccountADObjectPassword` cmdlet again regenerate and rotate back to kerb1, such that both Kerberos keys are regenerated.
39+
After you rotate to kerb2, wait several hours and use the `Update-AzStorageAccountADObjectPassword` cmdlet again to regenerate and rotate back to kerb1, so both Kerberos keys are regenerated.
3940

4041
## Option 2: Use Active Directory PowerShell
4142

4243
If you don't want to download the `AzFilesHybrid` module, you can use [Active Directory PowerShell](/powershell/module/activedirectory).
4344

4445
> [!IMPORTANT]
45-
> The Windows Server Active Directory PowerShell cmdlets in this section must be run in Windows PowerShell 5.1 with elevated privileges.
46+
> You must run the Windows Server Active Directory PowerShell cmdlets in this section in PowerShell 5.1 with elevated privileges.
4647
4748
Replace `<domain-object-identity>` in the following script with the appropriate value for your environment:
4849

@@ -57,9 +58,8 @@ Set-ADAccountPassword -Identity <domain-object-identity> -Reset -NewPassword $Ne
5758

5859
## Test that the AD DS account password matches a Kerberos key
5960

60-
After you update the AD DS account password, you can test it using the following PowerShell command.
61+
After you update the AD DS account password, test it by using the following PowerShell command.
6162

6263
```powershell
6364
Test-AzStorageAccountADObjectPasswordIsKerbKey -ResourceGroupName "<your-resource-group-name>" -Name "<your-storage-account-name>" -Verbose
6465
```
65-

articles/synapse-analytics/cicd/continuous-integration-delivery.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -253,6 +253,11 @@ You can choose the operation types based on the use case. Following part is an e
253253
> In CI/CD scenarios, the integration runtime type in different environments must be the same. For example, if you have a self-hosted integration runtime in the development environment, the same integration runtime must be self-hosted in other environments, such as in test and production. Similarly, if you're sharing integration runtimes across multiple stages, the integration runtimes must be linked and self-hosted in all environments, such as in development, test, and production.
254254
>
255255
> Currently, the DevOps Service Connection with **Workload Identity Federation (WIF)** is not supported in Synapse Workspace deployment extension. Switch to secret mode to make the connection successful.
256+
>
257+
> For secure, secretless alternatives that fully support Workload Identity Federation (WIF), use the [AzureCLI@2](/azure/devops/pipelines/tasks/reference/azure-cli-v2) or [PowerShell](/azure/devops/pipelines/tasks/reference/powershell-v2)
258+
> pipeline tasks with a federated service connection, as described in [Connect to Azure using Workload Identity Federation](https://learn.microsoft.com/azure/devops/pipelines/library/connect-to-azure?view=azure-devops).
259+
>
260+
> These tasks support secretless authentication and can execute Synapse deployment commands (`az synapse pipeline create`, `az synapse artifact publish`) while maintaining the same deployment flow.
256261

257262
### Create a release for deployment
258263

0 commit comments

Comments
 (0)