Skip to content

Commit 01c5016

Browse files
authored
Merge pull request #281401 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 529f5ea + e17a23a commit 01c5016

File tree

13 files changed

+56
-26
lines changed

13 files changed

+56
-26
lines changed

articles/azure-resource-manager/bicep/bicep-functions-object.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -69,32 +69,34 @@ The output from the preceding example with the default values is:
6969

7070
`empty(itemToTest)`
7171

72-
Determines if an array, object, or string is empty.
72+
Determines if an array, object, or string is empty or null.
7373

7474
Namespace: [sys](bicep-functions.md#namespaces-for-functions).
7575

7676
### Parameters
7777

7878
| Parameter | Required | Type | Description |
7979
|:--- |:--- |:--- |:--- |
80-
| itemToTest |Yes |array, object, or string |The value to check if it's empty. |
80+
| itemToTest |Yes |array, object, or string |The value to check if it's empty or null. |
8181

8282
### Return value
8383

84-
Returns **True** if the value is empty; otherwise, **False**.
84+
Returns **True** if the value is empty or null; otherwise, **False**.
8585

8686
### Example
8787

88-
The following example checks whether an array, object, and string are empty.
88+
The following example checks whether an array, object, and string are empty or null.
8989

9090
```bicep
9191
param testArray array = []
9292
param testObject object = {}
9393
param testString string = ''
94+
param testNullString string?
9495
9596
output arrayEmpty bool = empty(testArray)
9697
output objectEmpty bool = empty(testObject)
9798
output stringEmpty bool = empty(testString)
99+
output stringNull bool = empty(testNullString)
98100
```
99101

100102
The output from the preceding example with the default values is:
@@ -104,6 +106,7 @@ The output from the preceding example with the default values is:
104106
| arrayEmpty | Bool | True |
105107
| objectEmpty | Bool | True |
106108
| stringEmpty | Bool | True |
109+
| stringNull | Bool | True |
107110

108111
## intersection
109112

articles/container-registry/container-registry-tutorial-sign-build-push.md

Lines changed: 13 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.date: 4/23/2023
1111

1212
# Sign container images with Notation and Azure Key Vault using a self-signed certificate
1313

14-
Signing container images is a process that ensures their authenticity and integrity. This is achieved by adding a digital signature to the container image, which can be validated during deployment. The signature helps to verify that the image is from a trusted publisher and has not been modified. [Notation](https://github.com/notaryproject/notation) is an open source supply chain tool developed by the [Notary Project](https://notaryproject.dev/), which supports signing and verifying container images and other artifacts. The Azure Key Vault (AKV) is used to store certificates with signing keys that can be used by Notation with the Notation AKV plugin (azure-kv) to sign and verify container images and other artifacts. The Azure Container Registry (ACR) allows you to attach signatures to container images and other artifacts as well as view those signatures.
14+
Signing container images is a process that ensures their authenticity and integrity. This is achieved by adding a digital signature to the container image, which can be validated during deployment. The signature helps to verify that the image is from a trusted publisher and has not been modified. [Notation](https://github.com/notaryproject/notation) is an open source supply chain security tool developed by the [Notary Project community](https://notaryproject.dev/) and backed by Microsoft, which supports signing and verifying container images and other artifacts. The Azure Key Vault (AKV) is used to store certificates with signing keys that can be used by Notation with the Notation AKV plugin (azure-kv) to sign and verify container images and other artifacts. The Azure Container Registry (ACR) allows you to attach signatures to container images and other artifacts as well as view those signatures.
1515

1616
In this tutorial:
1717

@@ -41,16 +41,16 @@ In this tutorial:
4141
cp ./notation /usr/local/bin
4242
```
4343

44-
2. Install the Notation Azure Key Vault plugin `azure-kv` v1.1.0 on a Linux amd64 environment.
44+
2. Install the Notation Azure Key Vault plugin `azure-kv` v1.2.0 on a Linux amd64 environment.
4545

4646
> [!NOTE]
4747
> The URL and SHA256 checksum for the Notation Azure Key Vault plugin can be found on the plugin's [release page](https://github.com/Azure/notation-azure-kv/releases).
4848
4949
```bash
50-
notation plugin install --url https://github.com/Azure/notation-azure-kv/releases/download/v1.1.0/notation-azure-kv_1.1.0_linux_amd64.tar.gz --sha256sum 2fc959bf850275246b044203609202329d015005574fabbf3e6393345e49b884
50+
notation plugin install --url https://github.com/Azure/notation-azure-kv/releases/download/v1.2.0/notation-azure-kv_1.2.0_linux_amd64.tar.gz --sha256sum 06bb5198af31ce11b08c4557ae4c2cbfb09878dfa6b637b7407ebc2d57b87b34
5151
```
5252
53-
3. List the available plugins and confirm that the `azure-kv` plugin with version `1.1.0` is included in the list.
53+
3. List the available plugins and confirm that the `azure-kv` plugin with version `1.2.0` is included in the list.
5454
5555
```bash
5656
notation plugin ls
@@ -345,6 +345,14 @@ To verify the container image, add the root certificate that signs the leaf cert
345345
346346
## Next steps
347347
348-
See [Use Image Integrity to validate signed images before deploying them to your Azure Kubernetes Service (AKS) clusters (Preview)](/azure/aks/image-integrity?tabs=azure-cli) and [Ratify on Azure](https://ratify.dev/docs/1.0/quickstarts/ratify-on-azure/) to get started into verifying and auditing signed images before deploying them on AKS.
348+
Notation also provides CI/CD solutions on Azure Pipeline and GitHub Actions Workflow:
349+
350+
- [Sign and verify a container image with Notation in Azure Pipeline](/azure/security/container-secure-supply-chain/articles/notation-ado-task-sign)
351+
- [Sign and verify a container image with Notation in GitHub Actions Workflow](https://github.com/marketplace/actions/notation-actions)
352+
353+
To validate signed image deployment in AKS or Kubernetes:
354+
355+
- [Use Image Integrity to validate signed images before deploying them to your Azure Kubernetes Service (AKS) clusters (Preview)](/azure/aks/image-integrity?tabs=azure-cli)
356+
- [Use Ratify to validate and audit image deployment in any Kubernetes cluster](https://ratify.dev/)
349357
350358
[terms-of-use]: https://azure.microsoft.com/support/legal/preview-supplemental-terms/

articles/container-registry/container-registry-tutorial-sign-trusted-ca.md

Lines changed: 14 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ Signing and verifying container images with a certificate issued by a trusted Ce
1515

1616
Here are some essential components that help you to sign and verify container images with a certificate issued by a trusted CA:
1717

18-
* The [Notation](https://github.com/notaryproject/notation) is an open-source supply chain tool developed by [Notary Project](https://notaryproject.dev/), which supports signing and verifying container images and other artifacts.
18+
* The [Notation](https://github.com/notaryproject/notation) is an open-source supply chain security tool developed by [Notary Project community](https://notaryproject.dev/) and backed by Microsoft, which supports signing and verifying container images and other artifacts.
1919
* The Azure Key Vault (AKV), a cloud-based service for managing cryptographic keys, secrets, and certificates will help you ensure to securely store and manage a certificate with a signing key.
2020
* The [Notation AKV plugin azure-kv](https://github.com/Azure/notation-azure-kv), the extension of Notation uses the keys stored in Azure Key Vault for signing and verifying the digital signatures of container images and artifacts.
2121
* The Azure Container Registry (ACR) allows you to attach these signatures to the signed image and helps you to store and manage these container images.
@@ -53,17 +53,17 @@ In this article:
5353
cp ./notation /usr/local/bin
5454
```
5555

56-
2. Install the Notation Azure Key Vault plugin `azure-kv` v1.1.0 on a Linux amd64 environment.
56+
2. Install the Notation Azure Key Vault plugin `azure-kv` v1.2.0 on a Linux amd64 environment.
5757

5858
> [!NOTE]
5959
> The URL and SHA256 checksum for the Notation Azure Key Vault plugin can be found on the plugin's [release page](https://github.com/Azure/notation-azure-kv/releases).
6060
6161
```bash
62-
notation plugin install --url https://github.com/Azure/notation-azure-kv/releases/download/v1.1.0/notation-azure-kv_1.1.0_linux_amd64.tar.gz --sha256sum 2fc959bf850275246b044203609202329d015005574fabbf3e6393345e49b884
62+
notation plugin install --url https://github.com/Azure/notation-azure-kv/releases/download/v1.2.0/notation-azure-kv_1.2.0_linux_amd64.tar.gz --sha256sum 06bb5198af31ce11b08c4557ae4c2cbfb09878dfa6b637b7407ebc2d57b87b34
6363
```
6464
65-
3. List the available plugins and confirm that the `azure-kv` plugin with version `1.1.0` is included in the list.
66-
65+
3. List the available plugins and confirm that the `azure-kv` plugin with version `1.2.0` is included in the list.
66+
6767
```bash
6868
notation plugin ls
6969
```
@@ -394,6 +394,14 @@ To learn more about assigning policy to a principal, see [Assign Access Policy](
394394
395395
## Next steps
396396
397-
See [Use Image Integrity to validate signed images before deploying them to your Azure Kubernetes Service (AKS) clusters (Preview)](/azure/aks/image-integrity?tabs=azure-cli) and [Ratify on Azure](https://ratify.dev/docs/1.0/quickstarts/ratify-on-azure/) to get started into verifying and auditing signed images before deploying them on AKS.
397+
Notation also provides CI/CD solutions on Azure Pipeline and GitHub Actions Workflow:
398+
399+
- [Sign and verify a container image with Notation in Azure Pipeline](/azure/security/container-secure-supply-chain/articles/notation-ado-task-sign)
400+
- [Sign and verify a container image with Notation in GitHub Actions Workflow](https://github.com/marketplace/actions/notation-actions)
401+
402+
To validate signed image deployment in AKS or Kubernetes:
403+
404+
- [Use Image Integrity to validate signed images before deploying them to your Azure Kubernetes Service (AKS) clusters (Preview)](/azure/aks/image-integrity?tabs=azure-cli)
405+
- [Use Ratify to validate and audit image deployment in any Kubernetes cluster](https://ratify.dev/)
398406
399407
[terms-of-use]: https://azure.microsoft.com/support/legal/preview-supplemental-terms/

articles/key-vault/general/about-keys-secrets-certificates.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ Where:
3737
|-|-|
3838
| `vault-name` or `hsm-name` | The name for a key vault or a Managed HSM pool in the Microsoft Azure Key Vault service.<br /><br />Vault names and Managed HSM pool names are selected by the user and are globally unique.<br /><br />Vault name and Managed HSM pool name must be a 3-24 character string, containing only 0-9, a-z, A-Z, and not consecutive -.|
3939
| `object-type` | The type of the object, "keys", "secrets", or "certificates".|
40-
| `object-name` | An `object-name` is a user provided name for and must be unique within a key vault. The name must be a 1-127 character string, starting with a letter and containing only 0-9, a-z, A-Z, and -.|
40+
| `object-name` | An `object-name` is a user provided name for and must be unique within a key vault. The name must be a 1-127 character string, containing only 0-9, a-z, A-Z, and -.|
4141
| `object-version `| An `object-version` is a system-generated, 32 character string identifier that is optionally used to address a unique version of an object. |
4242

4343
## DNS suffixes for object identifiers

articles/key-vault/managed-hsm/key-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -215,7 +215,7 @@ az keyvault key restore --id https://ContosoMHSM.managedhsm.azure.net/deletedKey
215215
Use `az keyvault key import` command to import a key (only RSA and EC) from a file. The certificate file must have private key and must use PEM encoding (as defined in RFCs [1421](https://tools.ietf.org/html/rfc1421), [1422](https://tools.ietf.org/html/rfc1422), [1423](https://tools.ietf.org/html/rfc1423), [1424](https://tools.ietf.org/html/rfc1424)).
216216

217217
```azurecli-interactive
218-
az keyvault key import --hsm-name ContosoHSM --name myrsakey --pem-file mycert.key --password 'mypassword'
218+
az keyvault key import --hsm-name ContosoHSM --name myrsakey --pem-file mycert.key --pem-password 'mypassword'
219219
220220
## OR
221221
# Note the key name (myaeskey) in the URI

articles/key-vault/secrets/tutorial-rotation-dual.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -155,7 +155,7 @@ Add secret to key vault with validity period for 60 days, storage account resour
155155

156156
# [Azure CLI](#tab/azure-cli)
157157
```azurecli
158-
$tomorrowDate = (get-date).AddDays(+1).ToString("yyyy-MM-ddTHH:mm:ssZ")
158+
tomorrowDate=$(date -u -d "+1 day" +"%Y-%m-%dT%H:%M:%SZ")
159159
az keyvault secret set --name storageKey --vault-name vaultrotation-kv --value <key1Value> --tags "CredentialId=key1" "ProviderAddress=<storageAccountResourceId>" "ValidityPeriodDays=60" --expires $tomorrowDate
160160
```
161161
# [Azure PowerShell](#tab/azurepowershell)
@@ -262,7 +262,7 @@ Add secret to key vault with validity period for 60 days, storage account resour
262262

263263
# [Azure CLI](#tab/azure-cli)
264264
```azurecli
265-
$tomorrowDate = (Get-Date).AddDays(+1).ToString('yyyy-MM-ddTHH:mm:ssZ')
265+
tomorrowDate=$(date -u -d "+1 day" +"%Y-%m-%dT%H:%M:%SZ")
266266
az keyvault secret set --name storageKey2 --vault-name vaultrotation-kv --value <key2Value> --tags "CredentialId=key2" "ProviderAddress=<storageAccountResourceId>" "ValidityPeriodDays=60" --expires $tomorrowDate
267267
```
268268
# [Azure PowerShell](#tab/azurepowershell)

articles/security/fundamentals/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -177,7 +177,7 @@
177177
href: database-security-checklist.md
178178
- name: Storage security guide
179179
href: ../../storage/blobs/security-recommendations.md?toc=/azure/security/fundamentals/toc.json&bc=/azure/security/breadcrumb/toc.json
180-
- name: Customer Lockbox for Microsoft Azure
180+
- name: Customer Lockbox
181181
items:
182182
- name: Overview
183183
href: customer-lockbox-overview.md
@@ -238,4 +238,4 @@
238238
- name: Pen testing
239239
href: pen-testing.md
240240
- name: Azure domains
241-
href: azure-domains.md
241+
href: azure-domains.md

articles/security/fundamentals/ransomware-features-resources.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Azure features & resources that help you protect, detect, and respond
2+
title: Azure features & resources that help you protect, detect, and respond to ransomware attacks
33
description: Azure features & resources that help you protect, detect, and respond
44
author: msmbaldwin
55
ms.service: security
@@ -9,7 +9,7 @@ ms.author: mbaldwin
99
ms.date: 01/10/2022
1010
---
1111

12-
# Azure features & resources that help you protect, detect, and respond
12+
# Azure features & resources that help you protect, detect, and respond to ransomware attacks
1313

1414
Microsoft has invested in Azure native security capabilities that organizations can leverage to defeat ransomware attack techniques found in both high-volume, everyday attacks, and sophisticated targeted attacks.
1515

@@ -86,7 +86,7 @@ This alert is an example of a detected Petya ransomware alert:
8686

8787
One important way that organizations can help protect against losses in a ransomware attack is to have a backup of business-critical information in case other defenses fail. Since ransomware attackers have invested heavily into neutralizing backup applications and operating system features like volume shadow copy, it is critical to have backups that are inaccessible to a malicious attacker. With a flexible business continuity and disaster recovery solution, industry-leading data protection and security tools, Azure cloud offers secure services to protect your data:
8888

89-
- **Azure Backup**: Azure Backup service provides simple, secure, and cost-effective solution to back up your Azure VM. Currently, Azure Backup supports backing up of all the disks (OS and Data disks) in a VM using backup solution for Azure Virtual machine.
89+
- **Azure Backup**: Azure Backup service provides simple, secure, and cost-effective solution to back up your Azure VM. Currently, Azure Backup supports backing up of all the disks (OS and Data disks) in a VM using backup solution for Azure virtual machine.
9090
- **Azure Disaster Recovery**: With disaster recovery from on-prem to the cloud, or from one cloud to another, you can avoid downtime and keep your applications up and running.
9191
- **Built-in Security and Management in Azure**: To be successful in the Cloud era, enterprises must have visibility/metrics and controls on every component to pinpoint issues efficiently, optimize and scale effectively, while having the assurance the security, compliance and policies are in place to ensure the velocity.
9292

articles/synapse-analytics/sql/query-specific-files.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ Your first step is to **create a database** with a datasource that references st
2828

2929
This function returns the file name that row originates from.
3030

31-
The following sample reads the NYC Yellow Taxi data files for the last three months of 2017 and returns the number of rides per file. The OPENROWSET part of the query specifies which files will be read.
31+
The following sample reads the NYC Yellow Taxi data files for September 2017 and returns the number of rides per file. The OPENROWSET part of the query specifies which files will be read.
3232

3333
```sql
3434
SELECT

articles/update-manager/deploy-updates.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ To install one-time updates on a single VM:
6060
:::image type="content" source="./media/deploy-updates/include-update-classification-inline.png" alt-text="Screenshot that shows update classification." lightbox="./media/deploy-updates/include-update-classification-expanded.png":::
6161

6262
- Select **Include KB ID/package** to include in the updates. You can add multiple KB IDs and package names. When you add KB ID/package name, the next row appears. The package can have both name and version. . For example, use `3103696` or `3134815`. For Windows, you can refer to the [MSRC webpage](https://msrc.microsoft.com/update-guide/deployments) to get the details of the latest Knowledge Base release. For supported Linux distros, you specify a comma separated list of packages by the package name, and you can include wildcards. For example, use `kernel*`, `glibc`, or `libc=1.0.1`. Based on the options specified, Update Manager shows a preview of OS updates under the **Selected Updates** section.
63-
- To exclude updates that you don't want to install, select **Exclude KB ID/package**. We recommend selecting this option because updates that aren't displayed here might be installed, as newer updates might be available. You can excludedd multiple KB IDs and package names.
63+
- To exclude updates that you don't want to install, select **Exclude KB ID/package**. We recommend selecting this option because updates that aren't displayed here might be installed, as newer updates might be available. You can exclude multiple KB IDs and package names.
6464
- To ensure that the updates published are on or before a specific date, select **Include by maximum patch publish date**. Select the date and select **Add** > **Next**.
6565

6666
:::image type="content" source="./media/deploy-updates/include-patch-publish-date-inline.png" alt-text="Screenshot that shows the patch publish date." lightbox="./media/deploy-updates/include-patch-publish-date-expanded.png":::

0 commit comments

Comments
 (0)