Skip to content

Commit 0769d16

Browse files
authored
Merge pull request #167199 from MicrosoftDocs/master
7/28 AM Publish
2 parents 2640c7a + f07cfc4 commit 0769d16

File tree

66 files changed

+3961
-3455
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

66 files changed

+3961
-3455
lines changed

articles/active-directory/authentication/concept-sspr-writeback.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 07/14/2020
9+
ms.date: 07/28/2021
1010

1111
ms.author: justinha
1212
author: justinha
@@ -54,7 +54,7 @@ When a federated or password hash synchronized user attempts to reset or change
5454
* If the writeback service is down, the user is informed that their password can't be reset right now.
5555
1. Next, the user passes the appropriate authentication gates and reaches the **Reset password** page.
5656
1. The user selects a new password and confirms it.
57-
1. When the user selects **Submit**, the plaintext password is encrypted with a symmetric key created during the writeback setup process.
57+
1. When the user selects **Submit**, the plaintext password is encrypted with a public key created during the writeback setup process.
5858
1. The encrypted password is included in a payload that gets sent over an HTTPS channel to your tenant-specific service bus relay (that is set up for you during the writeback setup process). This relay is protected by a randomly generated password that only your on-premises installation knows.
5959
1. After the message reaches the service bus, the password-reset endpoint automatically wakes up and sees that it has a reset request pending.
6060
1. The service then looks for the user by using the cloud anchor attribute. For this lookup to succeed, the following conditions must be met:

articles/active-directory/authentication/howto-sspr-windows.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,7 @@ The following limitations apply to using SSPR from the Windows sign-in screen:
4242
- *HideFastUserSwitching* is set to enabled or 1
4343
- *DontDisplayLastUserName* is set to enabled or 1
4444
- *NoLockScreen* is set to enabled or 1
45+
- *BlockNonAdminUserInstall* is set to enabled or 1
4546
- *EnableLostMode* is set on the device
4647
- Explorer.exe is replaced with a custom shell
4748
- The combination of the following specific three settings can cause this feature to not work.

articles/active-directory/conditional-access/howto-conditional-access-policy-registration.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: how-to
9-
ms.date: 04/20/2021
9+
ms.date: 07/28/2021
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Conditional Access: Securing security info registration
1919

20-
Securing when and how users register for Azure AD Multi-Factor Authentication and self-service password reset is possible with user actions in a Conditional Access policy. This feature is available to organizations who have enabled the [combined registration](../authentication/concept-registration-mfa-sspr-combined.md). This functionality allows organizations to treat the registration process like any application in a Conditional Access policy and use the full power of Conditional Access to secure the experience.
20+
Securing when and how users register for Azure AD Multi-Factor Authentication and self-service password reset is possible with user actions in a Conditional Access policy. This feature is available to organizations who have enabled the [combined registration](../authentication/concept-registration-mfa-sspr-combined.md). This functionality allows organizations to treat the registration process like any application in a Conditional Access policy and use the full power of Conditional Access to secure the experience. Users signing in to the Microsoft Authenticator app or enabling passwordless phone sign-in are subject to this policy.
2121

2222
Some organizations in the past may have used trusted network location or device compliance as a means to secure the registration experience. With the addition of [Temporary Access Pass](../authentication/howto-authentication-temporary-access-pass.md) in Azure AD, administrators can provision time-limited credentials to their users that allow them to register from any device or location. Temporary Access Pass credentials satisfy Conditional Access requirements for multi-factor authentication.
2323

articles/active-directory/saas-apps/github-enterprise-cloud-enterprise-account-tutorial.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -72,15 +72,15 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7272
1. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, enter the values for the following fields:
7373

7474
a. In the **Identifier (Entity ID)** text box, type a URL using the following pattern:
75-
`https://github.com/orgs/<ENTERPRISE-SLUG>`
75+
`https://github.com/enterprises/<ENTERPRISE-SLUG>`
7676

7777
b. In the **Reply URL** text box, type a URL using the following pattern:
78-
`https://github.com/orgs/<ENTERPRISE-SLUG>/saml/consume`
78+
`https://github.com/enterprises/<ENTERPRISE-SLUG>/saml/consume`
7979

8080
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
8181

8282
In the **Sign on URL** text box, type a URL using the following pattern:
83-
`https://github.com/orgs/<ENTERPRISE-SLUG>/sso`
83+
`https://github.com/enterprises/<ENTERPRISE-SLUG>/sso`
8484

8585
> [!NOTE]
8686
> Replace `<ENTERPRISE-SLUG>` with the actual name of your GitHub Enterprise Account.
@@ -136,7 +136,7 @@ After you enable SAML SSO for your GitHub Enterprise Account, SAML SSO is enable
136136

137137
## Test SSO with another enterprise account owner or organization member account
138138

139-
After the SAML integration is set up for the GitHub enterprise account (which also applies to the GitHub organizations in the enterprise account), other enterprise account owners who are assigned to the app in Azure AD should be able to navigate to the GitHub enterprise account URL (`https://github.com/orgs/<enterprise account>`), authenticate via SAML, and access the policies and settings under the GitHub enterprise account.
139+
After the SAML integration is set up for the GitHub enterprise account (which also applies to the GitHub organizations in the enterprise account), other enterprise account owners who are assigned to the app in Azure AD should be able to navigate to the GitHub enterprise account URL (`https://github.com/enterprises/<enterprise account>`), authenticate via SAML, and access the policies and settings under the GitHub enterprise account.
140140

141141
An organization owner for an organization in an enterprise account should be able to [invite a user to join their GitHub organization](https://docs.github.com/en/free-pro-team@latest/github/setting-up-and-managing-organizations-and-teams/inviting-users-to-join-your-organization). Sign in to GitHub.com with an organization owner account and follow the steps in the article to invite `B.Simon` to the organization. A GitHub user account will need to be created for `B.Simon` if one does not already exist.
142142

articles/aks/TOC.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -205,11 +205,11 @@
205205
href: use-ultra-disks.md
206206
- name: CSI Storage Drivers
207207
items:
208-
- name: Enable CSI Storage Drivers (preview)
208+
- name: Enable CSI Storage Drivers
209209
href: csi-storage-drivers.md
210-
- name: Azure Disk CSI drivers (preview)
210+
- name: Azure Disk CSI drivers
211211
href: azure-disk-csi.md
212-
- name: Azure Files CSI drivers (preview)
212+
- name: Azure Files CSI drivers
213213
href: azure-files-csi.md
214214
- name: Configure networking
215215
items:

articles/aks/azure-disk-csi.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,8 +8,7 @@ author: palma21
88

99
---
1010

11-
# Use the Azure disk Container Storage Interface (CSI) drivers in Azure Kubernetes Service (AKS) (preview)
12-
11+
# Use the Azure disk Container Storage Interface (CSI) drivers in Azure Kubernetes Service (AKS)
1312
The Azure disk Container Storage Interface (CSI) driver is a [CSI specification](https://github.com/container-storage-interface/spec/blob/master/spec.md)-compliant driver used by Azure Kubernetes Service (AKS) to manage the lifecycle of Azure disks.
1413

1514
The CSI is a standard for exposing arbitrary block and file storage systems to containerized workloads on Kubernetes. By adopting and using CSI, AKS can write, deploy, and iterate plug-ins to expose new or improve existing storage systems in Kubernetes without having to touch the core Kubernetes code and wait for its release cycles.
@@ -23,8 +22,6 @@ To create an AKS cluster with CSI driver support, see [Enable CSI drivers for Az
2322

2423
A [persistent volume](concepts-storage.md#persistent-volumes) (PV) represents a piece of storage that's provisioned for use with Kubernetes pods. A PV can be used by one or many pods and can be dynamically or statically provisioned. This article shows you how to dynamically create PVs with Azure disks for use by a single pod in an AKS cluster. For static provisioning, see [Manually create and use a volume with Azure disks](azure-disk-volume.md).
2524

26-
[!INCLUDE [preview features callout](./includes/preview/preview-callout.md)]
27-
2825
For more information on Kubernetes volumes, see [Storage options for applications in AKS][concepts-storage].
2926

3027
## Dynamically create Azure disk PVs by using the built-in storage classes

articles/aks/azure-files-csi.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ author: palma21
88

99
---
1010

11-
# Use Azure Files Container Storage Interface (CSI) drivers in Azure Kubernetes Service (AKS) (preview)
11+
# Use Azure Files Container Storage Interface (CSI) drivers in Azure Kubernetes Service (AKS)
1212

1313
The Azure Files Container Storage Interface (CSI) driver is a [CSI specification](https://github.com/container-storage-interface/spec/blob/master/spec.md)-compliant driver used by Azure Kubernetes Service (AKS) to manage the lifecycle of Azure Files shares.
1414

@@ -25,8 +25,6 @@ A [persistent volume (PV)](concepts-storage.md#persistent-volumes) represents a
2525

2626
For more information on Kubernetes volumes, see [Storage options for applications in AKS][concepts-storage].
2727

28-
[!INCLUDE [preview features callout](./includes/preview/preview-callout.md)]
29-
3028
## Dynamically create Azure Files PVs by using the built-in storage classes
3129

3230
A storage class is used to define how an Azure Files share is created. A storage account is automatically created in the [node resource group][node-resource-group] for use with the storage class to hold the Azure Files shares. Choose one of the following [Azure storage redundancy SKUs][storage-skus] for *skuName*:
@@ -258,8 +256,6 @@ kubectl apply -f private-pvc.yaml
258256

259257
This option is optimized for random access workloads with in-place data updates and provides full POSIX file system support. This section shows you how to use NFS shares with the Azure File CSI driver on an AKS cluster.
260258

261-
Make sure to check the [Support for Azure Storage features](../storage/files/files-nfs-protocol.md#support-for-azure-storage-features) and [region availability](../storage/files/files-nfs-protocol.md#regional-availability) sections during the preview phase.
262-
263259
### Create NFS file share storage class
264260

265261
Save a `nfs-sc.yaml` file with the manifest below editing the respective placeholders.

articles/aks/csi-storage-drivers.md

Lines changed: 2 additions & 42 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ author: palma21
88

99
---
1010

11-
# Enable Container Storage Interface (CSI) drivers for Azure disks and Azure Files on Azure Kubernetes Service (AKS) (preview)
11+
# Enable Container Storage Interface (CSI) drivers for Azure disks and Azure Files on Azure Kubernetes Service (AKS)
1212

1313
The Container Storage Interface (CSI) is a standard for exposing arbitrary block and file storage systems to containerized workloads on Kubernetes. By adopting and using CSI, Azure Kubernetes Service (AKS) can write, deploy, and iterate plug-ins to expose new or improve existing storage systems in Kubernetes without having to touch the core Kubernetes code and wait for its release cycles.
1414

@@ -25,47 +25,7 @@ The CSI storage driver support on AKS allows you to natively use:
2525

2626
- This feature can only be set at cluster creation time.
2727
- The minimum Kubernetes minor version that supports CSI drivers is v1.17.
28-
- During the preview, the default storage class will still be the [same in-tree storage class](concepts-storage.md#storage-classes). After this feature is generally available, the default storage class will be the `managed-csi` storage class and in-tree storage classes will be removed.
29-
- During the first preview phase, only Azure CLI is supported.
30-
31-
[!INCLUDE [preview features callout](./includes/preview/preview-callout.md)]
32-
33-
### Register the `EnableAzureDiskFileCSIDriver` preview feature
34-
35-
To create an AKS cluster that can use CSI drivers for Azure disks and Azure Files, you must enable the `EnableAzureDiskFileCSIDriver` feature flag on your subscription.
36-
37-
Register the `EnableAzureDiskFileCSIDriver` feature flag by using the [az feature register][az-feature-register] command, as shown in the following example:
38-
39-
```azurecli-interactive
40-
az feature register --namespace "Microsoft.ContainerService" --name "EnableAzureDiskFileCSIDriver"
41-
```
42-
43-
It takes a few minutes for the status to show *Registered*. Verify the registration status by using the [az feature list][az-feature-list] command:
44-
45-
```azurecli-interactive
46-
az feature list -o table --query "[?contains(name, 'Microsoft.ContainerService/EnableAzureDiskFileCSIDriver')].{Name:name,State:properties.state}"
47-
```
48-
49-
When ready, refresh the registration of the *Microsoft.ContainerService* resource provider by using the [az provider register][az-provider-register] command:
50-
51-
```azurecli-interactive
52-
az provider register --namespace Microsoft.ContainerService
53-
```
54-
55-
[!INCLUDE [preview features callout](./includes/preview/preview-callout.md)]
56-
57-
### Install aks-preview CLI extension
58-
59-
To create an AKS cluster or a node pool that can use the CSI storage drivers, you need the latest *aks-preview* Azure CLI extension. Install the *aks-preview* Azure CLI extension by using the [az extension add][az-extension-add] command. Or install any available updates by using the [az extension update][az-extension-update] command.
60-
61-
```azurecli-interactive
62-
# Install the aks-preview extension
63-
az extension add --name aks-preview
64-
65-
# Update the extension to make sure you have the latest version installed
66-
az extension update --name aks-preview
67-
```
68-
28+
- The default storage class will be the `managed-csi` storage class.
6929

7030
## Create a new cluster that can use CSI storage drivers
7131

articles/azure-monitor/insights/azure-key-vault-deprecated.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ The following table shows data collection methods and other details about how da
7171
| Azure | | |&#8226; | | | on arrival |
7272

7373
## Use Azure Key Vault
74-
After you [install the solution](https://azuremarketplace.microsoft.com/marketplace/apps/Microsoft.KeyVaultAnalyticsOMS?source=intercept.nl&tab=Overview), view the Key Vault data by clicking the **Key Vault Analytics** tile from the Azure Monitor **Overview** page. Open this page from the **Azure Monitor** menu by clicking **More** under the **Insights** section.
74+
After you install the solution, view the Key Vault data by clicking the **Key Vault Analytics** tile from the Azure Monitor **Overview** page. Open this page from the **Azure Monitor** menu by clicking **More** under the **Insights** section.
7575

7676
![Screenshot of the Key Vault Analytics tile on the Azure Monitor Overview page showing a graph of key vault operations volume over time.](media/azure-key-vault/log-analytics-keyvault-tile.png)
7777

@@ -146,4 +146,3 @@ Data collected before the change is not visible in the new solution. You can con
146146

147147
## Next steps
148148
* Use [Log queries in Azure Monitor](../logs/log-query-overview.md) to view detailed Azure Key Vault data.
149-

articles/azure-netapp-files/azure-netapp-files-resource-limits.md

Lines changed: 33 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.workload: storage
1313
ms.tgt_pltfrm: na
1414
ms.devlang: na
1515
ms.topic: conceptual
16-
ms.date: 04/22/2021
16+
ms.date: 07/28/2021
1717
ms.author: b-juche
1818
---
1919
# Resource limits for Azure NetApp Files
@@ -26,6 +26,7 @@ The following table describes resource limits for Azure NetApp Files:
2626

2727
| Resource | Default limit | Adjustable via support request |
2828
|----------------|---------------------|--------------------------------------|
29+
| [Regional capacity quota per subscription](#regional-capacity-quota) | 25 TiB | Yes |
2930
| Number of NetApp accounts per Azure region per subscription | 10 | Yes |
3031
| Number of capacity pools per NetApp account | 25 | Yes |
3132
| Number of volumes per subscription | 500 | Yes |
@@ -88,9 +89,39 @@ If you have already allocated at least 4 TiB of quota for a volume, you can init
8889

8990
You can increase the maxfiles limit to 500 million if your volume quota is at least 20 TiB. <!-- ANF-11854 -->
9091

92+
## Regional capacity quota
93+
94+
Azure NetApp Files has a regional limit based on capacity. The standard capacity limit for each subscription is 25 TiB per region, across all service levels.
95+
96+
You can request a capacity increase by submitting a specific **Service and subscription limits (quotas)** support ticket as follows:
97+
98+
1. Go to **Support + Troubleshooting** in the portal to start the Support request process:
99+
100+
![Screenshot that shows the Support Troubleshooting menu.](../media/azure-netapp-files/support-troubleshoot-menu.png)
101+
102+
2. Select the **Service and subscription limits (quotas)** issue type and enter all relevant details:
103+
104+
![Screenshot that shows the Service and Subscription Limits menu.](../media/azure-netapp-files/service-subscription-limits-menu.png)
105+
106+
3. Click the **Enter details** link in the Details tab, then select the **TiBs per subscription** quota type:
107+
108+
![Screenshot that shows the Enter Details link in Details tab.](../media/azure-netapp-files/support-details.png)
109+
110+
![Screenshot that shows the Quota Details window.](../media/azure-netapp-files/support-quota-details.png)
111+
112+
4. On the Support Method page, make sure to select **Severity Level B – Moderate impact**:
113+
114+
![Screenshot that shows the Support Method window.](../media/azure-netapp-files/support-method-severity.png)
115+
116+
5. Complete the request process to issue the request.
117+
118+
After the ticket is submitted, the request will be sent to the Azure capacity management team for processing. You will receive a response typically within 2 business days. The Azure capacity management team might contact you for handling of large requests.
119+
120+
A regional capacity quota increase does not incur a billing increase. Billing will still be based on the provisioned capacity pools.
121+
91122
## Request limit increase <a name="limit_increase"></a>
92123

93-
You can create an Azure support request to increase the adjustable limits from the table above.
124+
You can create an Azure support request to increase the adjustable limits from the [Resource Limits](#resource-limits) table.
94125

95126
From Azure portal navigation plane:
96127

0 commit comments

Comments
 (0)