Skip to content

Commit 00d55f4

Browse files
authored
Merge pull request #79338 from MicrosoftDocs/master
6/11 PM Publish
2 parents 7376e69 + 140237a commit 00d55f4

File tree

101 files changed

+1834
-627
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

101 files changed

+1834
-627
lines changed

articles/active-directory/conditional-access/howto-conditional-access-session-lifetime.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ The Azure AD default for browser session persistence allows users on personal de
5050
Conditional access is an Azure AD Premium capability and requires a premium license. If you would like to learn more about conditional access, see [What is conditional access in Azure Active Directory?](overview.md#license-requirements)
5151

5252
> [!WARNING]
53-
> If you are using the [configurable token lifetime](../develop/active-directory-configurable-token-lifetimes.md) feature currently in public preview, please note that we don’t support creating two different policies for the same user or app combination: one with this feature and another one with configurable token lifetime feature. Microsoft plans to retire the configurable token lifetime feature on October 15 and replace it with the conditional access authentication session management feature.
53+
> If you are using the [configurable token lifetime](../develop/active-directory-configurable-token-lifetimes.md) feature currently in public preview, please note that we don’t support creating two different policies for the same user or app combination: one with this feature and another one with configurable token lifetime feature. Microsoft plans to retire the configurable token lifetime feature on November 1 and replace it with the conditional access authentication session management feature.
5454
5555
### Policy 1: Sign-in frequency control
5656

articles/active-directory/saas-apps/expensein-tutorial.md

Lines changed: 28 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.devlang: na
1616
ms.topic: tutorial
17-
ms.date: 05/31/2019
17+
ms.date: 06/11/2019
1818
ms.author: jeedes
1919

2020
ms.collection: M365-identity-device-management
@@ -54,15 +54,15 @@ To configure the integration of ExpenseIn into Azure AD, you need to add Expense
5454

5555
## Configure and test Azure AD single sign-on
5656

57-
Configure and test Azure AD SSO with ExpenseIn using a test user called **B. Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in ExpenseIn.
57+
Configure and test Azure AD SSO with ExpenseIn using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in ExpenseIn.
5858

5959
To configure and test Azure AD SSO with ExpenseIn, complete the following building blocks:
6060

6161
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** to enable your users to use this feature.
6262
2. **[Configure ExpenseIn](#configure-expensein)** to configure the SSO settings on application side.
63-
3. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** to test Azure AD single sign-on with B. Simon.
64-
4. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** to enable B. Simon to use Azure AD single sign-on.
65-
5. **[Create ExpenseIn test user](#create-expensein-test-user)** to have a counterpart of B. Simon in ExpenseIn that is linked to the Azure AD representation of user.
63+
3. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** to test Azure AD single sign-on with B.Simon.
64+
4. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** to enable B.Simon to use Azure AD single sign-on.
65+
5. **[Create ExpenseIn test user](#create-expensein-test-user)** to have a counterpart of B.Simon in ExpenseIn that is linked to the Azure AD representation of user.
6666
6. **[Test SSO](#test-sso)** to verify whether the configuration works.
6767

6868
### Configure Azure AD SSO
@@ -99,41 +99,51 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
9999

100100
### Configure ExpenseIn
101101

102-
1. In a different web browser window, sign in to ExpenseIn as an Administrator.
102+
1. To automate the configuration within ExpenseIn, you need to install **My Apps Secure Sign-in browser extension** by clicking **Install the extension**.
103103

104-
2. Click on **Admin** on the top of the page then navigate to **Single Sign-On** and click **Add provider**.
104+
![My apps extension](common/install-myappssecure-extension.png)
105+
106+
2. After adding extension to the browser, click on **Setup ExpenseIn** will direct you to the ExpenseIn application. From there, provide the admin credentials to sign into ExpenseIn. The browser extension will automatically configure the application for you and automate steps 3-5.
107+
108+
![Setup configuration](common/setup-sso.png)
109+
110+
3. If you want to setup ExpenseIn manually, open a new web browser window and sign into your ExpenseIn company site as an administrator and perform the following steps:
111+
112+
4. Click on **Admin** on the top of the page then navigate to **Single Sign-On** and click **Add provider**.
105113

106114
![ExpenseIn configuration](./media/expenseIn-tutorial/config01.png)
107115

108-
3. On the **New Identity Provider** pop-up, Perform the following steps:
116+
5. On the **New Identity Provider** pop-up, Perform the following steps:
109117

110118
![ExpenseIn configuration](./media/expenseIn-tutorial/config02.png)
111119

112120
a. In the **Provider Name** text box, type the name like ex:Azure.
113121

114-
b. In the **Target Url** text box, paste the value of **Login URL**, which you have copied from Azure portal.
122+
b. Select **Yes** as **Allow Provider Intitated Sign-On**.
123+
124+
c. In the **Target Url** text box, paste the value of **Login URL**, which you have copied from Azure portal.
115125

116-
c. In the **Issuer** text box, paste the value of **Azure AD Identifier**, which you have copied from Azure portal.
126+
d. In the **Issuer** text box, paste the value of **Azure AD Identifier**, which you have copied from Azure portal.
117127

118-
d. Open the Certificate (Base64) in Notepad, copy its content and paste it in the **Certificate** text box.
128+
e. Open the Certificate (Base64) in Notepad, copy its content and paste it in the **Certificate** text box.
119129

120-
e. Click **Create**.
130+
f. Click **Create**.
121131

122132
### Create an Azure AD test user
123133

124-
In this section, you'll create a test user in the Azure portal called B. Simon.
134+
In this section, you'll create a test user in the Azure portal called B.Simon.
125135

126136
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
127137
1. Select **New user** at the top of the screen.
128138
1. In the **User** properties, follow these steps:
129-
1. In the **Name** field, enter `B. Simon`.
130-
1. In the **User name** field, enter the [email protected]. For example, `BrittaSimon@contoso.com`.
139+
1. In the **Name** field, enter `B.Simon`.
140+
1. In the **User name** field, enter the [email protected]. For example, `B.Simon@contoso.com`.
131141
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
132142
1. Click **Create**.
133143

134144
### Assign the Azure AD test user
135145

136-
In this section, you'll enable B. Simon to use Azure single sign-on by granting access to ExpenseIn.
146+
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to ExpenseIn.
137147

138148
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
139149
1. In the applications list, select **ExpenseIn**.
@@ -145,7 +155,7 @@ In this section, you'll enable B. Simon to use Azure single sign-on by granting
145155

146156
![The Add User link](common/add-assign-user.png)
147157

148-
1. In the **Users and groups** dialog, select **B. Simon** from the Users list, then click the **Select** button at the bottom of the screen.
158+
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
149159
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
150160
1. In the **Add Assignment** dialog, click the **Assign** button.
151161

@@ -169,7 +179,7 @@ To enable Azure AD users to sign in to ExpenseIn, they must be provisioned into
169179

170180
b. In **Last Name** text box, enter the last name of user like **Simon**.
171181

172-
c. In **Email** text box, enter the email of user like `B. [email protected]`.
182+
c. In **Email** text box, enter the email of user like `[email protected]`.
173183

174184
d. Click **Create**.
175185

6.77 KB
Loading

articles/aks/node-updates-kured.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -56,6 +56,7 @@ To deploy the `kured` DaemonSet, apply the following sample YAML manifest from t
5656

5757
```console
5858
kubectl apply -f https://github.com/weaveworks/kured/releases/download/1.2.0/kured-1.2.0-dockerhub.yaml
59+
```
5960

6061
You can also configure additional parameters for `kured`, such as integration with Prometheus or Slack. For more information about additional configuration parameters, see the [kured installation docs][kured-install].
6162

articles/api-management/api-management-cross-domain-policies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -140,7 +140,7 @@ This example demonstrates how to support pre-flight requests, such as those with
140140
This policy can be used in the following policy [sections](https://azure.microsoft.com/documentation/articles/api-management-howto-policies/#sections) and [scopes](https://azure.microsoft.com/documentation/articles/api-management-howto-policies/#scopes).
141141

142142
- **Policy sections:** inbound
143-
- **Policy scopes:** global, API, operation
143+
- **Policy scopes:** global, product, API, operation
144144

145145
## <a name="JSONP"></a> JSONP
146146
The `jsonp` policy adds JSON with padding (JSONP) support to an operation or an API to allow cross-domain calls from JavaScript browser-based clients. JSONP is a method used in JavaScript programs to request data from a server in a different domain. JSONP bypasses the limitation enforced by most web browsers where access to web pages must be in the same domain.

articles/app-service/app-service-hybrid-connections.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.workload: na
1313
ms.tgt_pltfrm: na
1414
ms.devlang: na
1515
ms.topic: article
16-
ms.date: 07/26/2018
16+
ms.date: 06/06/2019
1717
ms.author: ccompy
1818
ms.custom: seodec18
1919

@@ -39,7 +39,6 @@ When your app makes a DNS request that matches a configured Hybrid Connection en
3939
> This means that you should try to always use a DNS name for your Hybrid Connection. Some client software does not do a DNS lookup if the endpoint uses an IP address instead.
4040
>
4141
42-
4342
### App Service Hybrid Connection benefits ###
4443

4544
There are a number of benefits to the Hybrid Connections capability, including:
@@ -137,7 +136,7 @@ To add one or more Hybrid Connections to your HCM:
137136
2. Select **Configure another Hybrid Connection**.
138137
![Screenshot of Configure New Hybrid Connections][8]
139138

140-
1. Sign in with your Azure account.
139+
1. Sign in with your Azure account to get your Hybrid Connections available with your subscriptions. The HCM does not continue to use your Azure account beyond that.
141140
1. Choose a subscription.
142141
1. Select the Hybrid Connections that you want the HCM to relay.
143142
![Screenshot of Hybrid Connections][9]
@@ -224,7 +223,9 @@ The status of "Connected" means that at least one HCM is configured with that Hy
224223

225224
The primary reason that clients cannot connect to their endpoint is because the endpoint was specified by using an IP address instead of a DNS name. If your app cannot reach the desired endpoint and you used an IP address, switch to using a DNS name that is valid on the host where the HCM is running. Also check that the DNS name resolves properly on the host where the HCM is running. Confirm that there is connectivity from the host where the HCM is running to the Hybrid Connection endpoint.
226225

227-
In App Service, the tcpping tool can be invoked from the Advanced Tools (Kudu) console. This tool can tell you if you have access to a TCP endpoint, but it does not tell you if you have access to a Hybrid Connection endpoint. When you use the tool in the console against a Hybrid Connection endpoint, you are only confirming that it uses a host:port combination.
226+
In App Service, the **tcpping** command line tool can be invoked from the Advanced Tools (Kudu) console. This tool can tell you if you have access to a TCP endpoint, but it does not tell you if you have access to a Hybrid Connection endpoint. When you use the tool in the console against a Hybrid Connection endpoint, you are only confirming that it uses a host:port combination.
227+
228+
If you have a command line client for your endpoint, you can test connectivity from the app console. For example, you can test access to web server endpoints by using curl.
228229

229230
## BizTalk Hybrid Connections ##
230231

articles/app-service/app-service-ip-restrictions.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.workload: web
1313
ms.tgt_pltfrm: na
1414
ms.devlang: multiple
1515
ms.topic: article
16-
ms.date: 05/28/2019
16+
ms.date: 06/06/2019
1717
ms.author: ccompy
1818
ms.custom: seodec18
1919

@@ -44,27 +44,27 @@ From the Access Restrictions UI, you can review the list of access restriction r
4444

4545
The list will show all of the current restrictions that are on your app. If you have a VNet restriction on your app, the table will show if service endpoints are enabled for Microsoft.Web. When there are no defined restrictions on your app, your app will be accessible from anywhere.
4646

47+
## Adding IP address rules
48+
4749
You can click on **[+] Add** to add a new access restriction rule. Once you add a rule, it will become effective immediately. Rules are enforced in priority order starting from the lowest number and going up. There is an implicit deny all that is in effect once you add even a single rule.
4850

49-
### Adding IP address rules
51+
When creating a rule, you must select allow/deny and also the type of rule. You are also required to provide the priority value and what you are restricting access to. You can optionally add a name, and description to the rule.
5052

5153
![add an IP access restriction rule](media/app-service-ip-restrictions/access-restrictions-ip-add.png)
5254

53-
When creating a rule, you must select allow/deny and also the type of rule. You are also required to provide the priority value and what you are restricting access to. You can optionally add a name, and description to the rule.
54-
5555
To set an IP address based rule, select a type of IPv4 or IPv6. IP Address notation must be specified in CIDR notation for both IPv4 and IPv6 addresses. To specify an exact address, you can use something like 1.2.3.4/32 where the first four octets represent your IP address and /32 is the mask. The IPv4 CIDR notation for all addresses is 0.0.0.0/0. To learn more about CIDR notation, you can read [Classless Inter-Domain Routing](https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing).
5656

57-
### Service endpoints
57+
## Service endpoints
5858

59-
![add a VNet access restriction rule](media/app-service-ip-restrictions/access-restrictions-vnet-add.png)
59+
Service endpoints enables you to restrict access to selected Azure virtual network subnets. To restrict access to a specific subnet, create a restriction rule with a type of Virtual Network. You can pick the subscription, VNet, and subnet you wish to allow or deny access with. If service endpoints are not already enabled with Microsoft.Web for the subnet that you selected, it will automatically be enabled for you unless you check the box asking not to do that. The situation where you would want to enable it on the app but not the subnet is largely related to if you have the permissions to enable service endpoints on the subnet or not. If you need to get somebody else to enable service endpoints on the subnet, you can check the box and have your app configured for service endpoints in anticipation of it being enabled later on the subnet.
6060

61-
To restrict access to selected subnets, select a type of Virtual Network. Below that you will be able to pick the subscription, VNet, and subnet you wish to allow or deny access with. If service endpoints are not already enabled with Microsoft.Web for the subnet that you selected, it will automatically be enabled for you unless you check the box asking not to do that. The situation where you would want to enable it on the app but not the subnet is largely related to if you have the permissions to enable service endpoints on the subnet or not. If you need to get somebody else to enable service endpoints on the subnet, you can check the box and have your app configured for service endpoints in anticipation of it being enabled later on the subnet.
61+
![add a VNet access restriction rule](media/app-service-ip-restrictions/access-restrictions-vnet-add.png)
6262

6363
Service endpoints cannot be used to restrict access to apps that run in an App Service Environment. When your app is in an App Service Environment, you can control access to your app with IP access rules.
6464

6565
With service endpoints, you can configure your app with Application Gateways or other WAF devices. You can also configure multi-tier applications with secure backends. For more details on some of the possibilities, read [Networking features and App Service](networking-features.md).
6666

67-
### Managing access restriction rules
67+
## Managing access restriction rules
6868

6969
You can click on any row to edit an existing access restriction rule. Edits are effective immediately including changes in priority ordering.
7070

@@ -78,15 +78,15 @@ To delete a rule, click the **...** on your rule and then click **remove**.
7878

7979
![delete access restriction rule](media/app-service-ip-restrictions/access-restrictions-delete.png)
8080

81-
### Blocking a single IP Address ##
81+
## Blocking a single IP Address ##
8282

8383
When adding your first IP Restriction rule, the service will add an explicit **deny all** rule with a priority of 2147483647. In practice, the explicit **deny all** rule will be last rule executed and will block access to any IP address that is not explicitly allowed using an **Allow** rule.
8484

8585
For the scenario where users want to explicitly block a single IP address or IP address block, but allow everything else access, it is necessary to add an explicit **Allow All** rule.
8686

8787
![block single ip address](media/app-service-ip-restrictions/block-single-address.png)
8888

89-
### SCM site
89+
## SCM site
9090

9191
In addition to being able to control access to your app, you can also restrict access to the scm site used by your app. The scm site is the web deploy endpoint and also the Kudu console. You can separately assign access restrictions to the scm site from the app or use the same set for both the app and the scm site. When you check the box to have the same restrictions as your app, everything is blanked out. If you uncheck the box, whatever settings you had earlier on the scm site are applied.
9292

0 commit comments

Comments
 (0)