Skip to content

Commit 0bb5c9a

Browse files
authored
Merge pull request #189604 from MicrosoftDocs/main
Merge main to live, 4 AM
2 parents 8b7bbcc + 054eaa3 commit 0bb5c9a

File tree

62 files changed

+395
-272
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

62 files changed

+395
-272
lines changed

articles/active-directory/conditional-access/workload-identity.md

Lines changed: 56 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: how-to
9-
ms.date: 01/10/2022
9+
ms.date: 02/23/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -19,31 +19,25 @@ ms.collection: M365-identity-device-management
1919

2020
Previously, Conditional Access policies applied only to users when they access apps and services like SharePoint online or the Azure portal. This preview adds support for Conditional Access policies applied to service principals owned by the organization. We call this capability Conditional Access for workload identities.
2121

22-
A workload identity is an identity that allows an application or service principal access to resources, sometimes in the context of a user. These workload identities differ from traditional user accounts as:
22+
A [workload identity](../develop/workload-identities-overview.md) is an identity that allows an application or service principal access to resources, sometimes in the context of a user. These workload identities differ from traditional user accounts as they:
2323

24-
- They usually have no formal lifecycle process.
24+
- Can’t perform multi-factor authentication.
25+
- Often have no formal lifecycle process.
2526
- Need to store their credentials or secrets somewhere.
26-
- Applications may use multiple identities.
27-
28-
These differences make workload identities difficult to manage, puts them at higher risk for leaks, and reduces the potential for securing access.
27+
28+
These differences make workload identities harder to manage and put them at higher risk for compromise.
2929

3030
> [!IMPORTANT]
3131
> In public preview, you can scope Conditional Access policies to service principals in Azure AD with an Azure Active Directory Premium P2 edition active in your tenant. After general availability, additional licenses might be required.
3232
3333
> [!NOTE]
3434
> Policy can be applied to single tenant service principals that have been registered in your tenant. Third party SaaS and multi-tenanted apps are out of scope. Managed identities are not covered by policy.
3535
36-
This preview enables blocking service principals from outside of trusted IP ranges, such as a corporate network public IP ranges.
36+
This preview enables blocking service principals from outside of trusted public IP ranges, or based on risk detected by Azure AD Identity Protection.
3737

3838
## Implementation
3939

40-
### Step 1: Set up a sample application
41-
42-
If you already have a test application that makes use of a service principal, you can skip this step.
43-
44-
Set up a sample application that, demonstrates how a job or a Windows service can run with an application identity, instead of a user's identity. Follow the instructions in the article [Quickstart: Get a token and call the Microsoft Graph API by using a console app's identity](../develop/quickstart-v2-netcore-daemon.md) to create this application.
45-
46-
### Step 2: Create a Conditional Access policy
40+
### Create a location-based Conditional Access policy
4741

4842
Create a location based Conditional Access policy that applies to service principals.
4943

@@ -60,6 +54,52 @@ Create a location based Conditional Access policy that applies to service princi
6054
1. Your policy can be saved in **Report-only** mode, allowing administrators to estimate the effects, or policy is enforced by turning policy **On**.
6155
1. Select **Create** to complete your policy.
6256

57+
### Create a risk-based Conditional Access policy
58+
59+
Use this sample JSON for a risk-based policy using the [Microsoft Graph beta endpoint](/graph/api/resources/conditionalaccesspolicy?view=graph-rest-1.0&preserve-view=true).
60+
61+
> [!NOTE]
62+
> Report-only mode doesn't report account risk on a risky workload identity.
63+
64+
```json
65+
{
66+
"displayName": "Name",
67+
"state": "enabled OR disabled",
68+
"conditions": {
69+
"applications": {
70+
"includeApplications": [
71+
"All"
72+
],
73+
"excludeApplications": [],
74+
"includeUserActions": [],
75+
"includeAuthenticationContextClassReferences": [],
76+
"applicationFilter": null
77+
},
78+
"userRiskLevels": [],
79+
"signInRiskLevels": [],
80+
"clientApplications": {
81+
"includeServicePrincipals": [
82+
"ServicePrincipalsInMyTenant"
83+
],
84+
"excludeServicePrincipals": []
85+
},
86+
"servicePrincipalRiskLevels": [
87+
"low",
88+
"medium",
89+
"high"
90+
]
91+
},
92+
"grantControls": {
93+
"operator": "and",
94+
"builtInControls": [
95+
"block"
96+
],
97+
"customAuthenticationFactors": [],
98+
"termsOfUse": []
99+
}
100+
}
101+
```
102+
63103
## Roll back
64104

65105
If you wish to roll back this feature, you can delete or disable any created policies.
@@ -77,14 +117,14 @@ Failure reason when Service Principal is blocked by Conditional Access: “Acces
77117

78118
### Finding the objectID
79119

80-
You can get the objectID of the service principal from Azure AD Enterprise Applications. The Object ID in Azure AD App registrations cannot be used. This identifier is the Object ID of the app registration, not of the service principal.
120+
You can get the objectID of the service principal from Azure AD Enterprise Applications. The Object ID in Azure AD App registrations can’t be used. This identifier is the Object ID of the app registration, not of the service principal.
81121

82122
1. Browse to the **Azure portal** > **Azure Active Directory** > **Enterprise Applications**, find the application you registered.
83123
1. From the **Overview** tab, copy the **Object ID** of the application. This identifier is the unique to the service principal, used by Conditional Access policy to find the calling app.
84124

85125
### Microsoft Graph
86126

87-
Sample JSON for configuration using the Microsoft Graph beta endpoint.
127+
Sample JSON for location-based configuration using the Microsoft Graph beta endpoint.
88128

89129
```json
90130
{

articles/active-directory/devices/azuread-join-sso.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -39,9 +39,13 @@ If you have a hybrid environment, with both Azure AD and on-premises AD, it's li
3939
1. The local security authority (LSA) service enables Kerberos and NTLM authentication on the device.
4040

4141
> [!NOTE]
42-
> Windows Hello for Business requires additional configuration to enable on-premises SSO from an Azure AD joined device. For more information, see [Configure Azure AD joined devices for On-premises Single-Sign On using Windows Hello for Business](/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-base).
42+
> Additional configuration is required when passwordless authentication to Azure AD joined devices is used.
4343
>
44-
> FIDO2 security key based passwordless authentication with Windows 10 or newer requires additional configuration to enable on-premises SSO from an Azure AD joined device. For more information, see [Enable passwordless security key sign-in to on-premises resources with Azure Active Directory](../authentication/howto-authentication-passwordless-security-key-on-premises.md).
44+
> For FIDO2 security key based passwordless authentication and Windows Hello for Business Hybrid Cloud Trust, see [Enable passwordless security key sign-in to on-premises resources with Azure Active Directory](../authentication/howto-authentication-passwordless-security-key-on-premises.md).
45+
>
46+
> For Windows Hello for Business Hybrid Key Trust, see [Configure Azure AD joined devices for On-premises Single-Sign On using Windows Hello for Business](/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-base).
47+
>
48+
> For Windows Hello for Business Hybrid Certificate Trust, see [Using Certificates for AADJ On-premises Single-sign On](/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-cert).
4549
4650
During an access attempt to a resource requesting Kerberos or NTLM in the user's on-premises environment, the device:
4751

articles/active-directory/hybrid/how-to-connect-install-prerequisites.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.service: active-directory
1111
ms.workload: identity
1212
ms.tgt_pltfrm: na
1313
ms.topic: how-to
14-
ms.date: 01/21/2022
14+
ms.date: 02/23/2022
1515
ms.subservice: hybrid
1616
ms.author: billmath
1717

@@ -88,7 +88,7 @@ We recommend that you harden your Azure AD Connect server to decrease the securi
8888
### SQL Server used by Azure AD Connect
8989
* Azure AD Connect requires a SQL Server database to store identity data. By default, a SQL Server 2019 Express LocalDB (a light version of SQL Server Express) is installed. SQL Server Express has a 10-GB size limit that enables you to manage approximately 100,000 objects. If you need to manage a higher volume of directory objects, point the installation wizard to a different installation of SQL Server. The type of SQL Server installation can impact the [performance of Azure AD Connect](./plan-connect-performance-factors.md#sql-database-factors).
9090
* If you use a different installation of SQL Server, these requirements apply:
91-
* Azure AD Connect supports all versions of SQL Server from 2012 (with the latest service pack) to SQL Server 2019. Azure SQL Database *isn't supported* as a database.
91+
* Azure AD Connect supports all versions of SQL Server from 2012 (with the latest service pack) to SQL Server 2019. Azure SQL Database *isn't supported* as a database. This includes both Azure SQL Database and Azure SQL Managed Instance.
9292
* You must use a case-insensitive SQL collation. These collations are identified with a \_CI_ in their name. Using a case-sensitive collation identified by \_CS_ in their name *isn't supported*.
9393
* You can have only one sync engine per SQL instance. Sharing a SQL instance with FIM/MIM Sync, DirSync, or Azure AD Sync *isn't supported*.
9494

articles/active-directory/identity-protection/howto-export-risk-data.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,12 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: identity-protection
88
ms.topic: how-to
9-
ms.date: 07/30/2021
9+
ms.date: 02/18/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
1313
manager: karenhoran
14-
ms.reviewer: sahandle
14+
ms.reviewer: sahandle, etbasser
1515

1616
ms.collection: M365-identity-device-management
1717
---
@@ -26,18 +26,20 @@ Azure AD stores reports and security signals for a defined period of time. When
2626
| Azure AD MFA usage | 30 days | 30 days | 30 days |
2727
| Risky sign-ins | 7 days | 30 days | 30 days |
2828

29-
Organizations can choose to store data for longer periods by changing diagnostic settings in Azure AD to send **RiskyUsers** and **UserRiskEvents** data to a Log Analytics workspace, archive data to a storage account, stream data to an Event Hub, or send data to a partner solution. Find these options in the **Azure portal** > **Azure Active Directory**, **Diagnostic settings** > **Edit setting**. If you don't have a diagnostic setting, follow the instructions in the article [Create diagnostic settings to send platform logs and metrics to different destinations](../../azure-monitor/essentials/diagnostic-settings.md) to create one.
29+
Organizations can choose to store data for longer periods by changing diagnostic settings in Azure AD to send **RiskyUsers**, **UserRiskEvents**, **RiskyServicePrincipals**, and **ServicePrincipalRiskEvents** data to a Log Analytics workspace, archive data to a storage account, stream data to an event hub, or send data to a partner solution. Find these options in the **Azure portal** > **Azure Active Directory**, **Diagnostic settings** > **Edit setting**. If you don't have a diagnostic setting, follow the instructions in the article [Create diagnostic settings to send platform logs and metrics to different destinations](../../azure-monitor/essentials/diagnostic-settings.md) to create one.
3030

3131
[ ![Diagnostic settings screen in Azure AD showing existing configuration](./media/howto-export-risk-data/change-diagnostic-setting-in-portal.png) ](./media/howto-export-risk-data/change-diagnostic-setting-in-portal.png#lightbox)
3232

3333
## Log Analytics
3434

3535
Log Analytics allows organizations to query data using built in queries or custom created Kusto queries, for more information, see [Get started with log queries in Azure Monitor](../../azure-monitor/logs/get-started-queries.md).
3636

37-
Once enabled you will find access to Log Analytics in the **Azure portal** > **Azure AD** > **Log Analytics**. The tables of most interest to Identity Protection administrators are **AADRiskyUsers** and **AADUserRiskEvents**.
37+
Once enabled you'll find access to Log Analytics in the **Azure portal** > **Azure AD** > **Log Analytics**. The following tables are of most interest to Identity Protection administrators:
3838

3939
- AADRiskyUsers - Provides data like the **Risky users** report in Identity Protection.
4040
- AADUserRiskEvents - Provides data like the **Risk detections** report in Identity Protection.
41+
- RiskyServicePrincipals - Provides data like the **Risky workload identities** report in Identity Protection.
42+
- ServicePrincipalRiskEvents - Provides data like the **Workload identity detections** report in Identity Protection.
4143

4244
[ ![Log Analytics view showing a query against the AADUserRiskEvents table showing the top 5 events](./media/howto-export-risk-data/log-analytics-view-query-user-risk-events.png) ](./media/howto-export-risk-data/log-analytics-view-query-user-risk-events.png#lightbox)
4345

15.2 KB
Loading

articles/api-management/websocket-api.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -113,6 +113,7 @@ Below are the current restrictions of WebSocket support in API Management:
113113
* WebSocket APIs are not supported yet in the Consumption tier.
114114
* WebSocket APIs are not supported yet in the [self-hosted gateway](./self-hosted-gateway-overview.md).
115115
* Azure CLI, PowerShell, and SDK currently do not support management operations of WebSocket APIs.
116+
* 200 active connections limit per unit.
116117

117118
### Unsupported policies
118119

articles/automation/extension-based-hybrid-runbook-worker-install.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -653,10 +653,10 @@ Microsoft.Automation/automationAccounts/hybridRunbookWorkerGroups/hybridRunbookW
653653

654654
## Next steps
655655

656-
To learn about Azure VM extensions, see:
656+
- To learn how to configure your runbooks to automate processes in your on-premises datacenter or other cloud environments, see [Run runbooks on a Hybrid Runbook Worker](automation-hrw-run-runbooks.md).
657657

658-
- [Azure VM extensions and features for Windows](/azure/virtual-machines/extensions/features-windows).
659-
- [Azure VM extensions and features for Linux](/azure/virtual-machines/extensions/features-linux).
658+
- To learn how to troubleshoot your Hybrid Runbook Workers, see [Troubleshoot Hybrid Runbook Worker issues](troubleshoot/extension-based-hybrid-runbook-worker.md).
660659

661-
To learn about VM extensions for Arc-enabled servers, see:
662-
- [VM extension management with Azure Arc-enabled servers](/azure/azure-arc/servers/manage-vm-extensions).
660+
- To learn about Azure VM extensions, see [Azure VM extensions and features for Windows](/azure/virtual-machines/extensions/features-windows) and [Azure VM extensions and features for Linux](/azure/virtual-machines/extensions/features-linux).
661+
662+
- To learn about VM extensions for Arc-enabled servers, see [VM extension management with Azure Arc-enabled servers](/azure/azure-arc/servers/manage-vm-extensions).

articles/availability-zones/az-region.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,7 @@ In the Product Catalog, always-available services are listed as "non-regional" s
116116
| [Azure Container Instances](../container-instances/container-instances-region-availability.md) | ![An icon that signifies this service is zonal](media/icon-zonal.svg) |
117117
| [Azure Container Registry](../container-registry/zone-redundancy.md) | ![An icon that signifies this service is zone redundant.](media/icon-zone-redundant.svg) |
118118
| [Azure Data Explorer](/azure/data-explorer/create-cluster-database-portal) | ![An icon that signifies this service is zone redundant.](media/icon-zone-redundant.svg) |
119-
| [Azure Data Factory](../data-factory/index.yml) | ![An icon that signifies this service is zone redundant.](media/icon-zone-redundant.svg) |
119+
| [Azure Data Factory](../data-factory/concepts-data-redundancy.md) | ![An icon that signifies this service is zone redundant.](media/icon-zone-redundant.svg) |
120120
| Azure Database for MySQL – [Flexible Server](../mysql/flexible-server/concepts-high-availability.md) | ![An icon that signifies this service is zone redundant.](media/icon-zone-redundant.svg) |
121121
| Azure Database for PostgreSQL – [Flexible Server](../postgresql/flexible-server/overview.md) | ![An icon that signifies this service is zone redundant.](media/icon-zone-redundant.svg) |
122122
| [Azure DDoS Protection](../ddos-protection/ddos-faq.yml) | ![An icon that signifies this service is zone redundant.](media/icon-zone-redundant.svg) |

articles/azure-resource-manager/troubleshooting/common-deployment-errors.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Troubleshoot common Azure deployment errors
33
description: Describes common errors for Azure resources deployed with Azure Resource Manager templates (ARM templates) or Bicep files.
44
tags: top-support-issue
55
ms.topic: troubleshooting
6-
ms.date: 01/13/2022
6+
ms.date: 02/23/2022
77
ms.custom: devx-track-azurepowershell
88
---
99

@@ -74,6 +74,7 @@ If your error code isn't listed, submit a GitHub issue. On the right side of the
7474
| StorageAccountAlreadyExists <br> StorageAccountAlreadyTaken | Provide a unique name for the storage account. | [Resolve storage account name](error-storage-account-name.md) |
7575
| StorageAccountNotFound | Check the subscription, resource group, and name of the storage account that you're trying to use. | |
7676
| SubnetsNotInSameVnet | A virtual machine can only have one virtual network. When deploying several NICs, make sure they belong to the same virtual network. | [Windows VM multiple NICs](../../virtual-machines/windows/multiple-nics.md) <br><br> [Linux VM multiple NICs](../../virtual-machines/linux/multiple-nics.md) |
77+
| SubnetIsFull | There aren't enough available addresses in the subnet to deploy resources. You can release addresses from the subnet, use a different subnet, or create a new subnet. | [Manage subnets](../../virtual-network/virtual-network-manage-subnet.md) and [Virtual network FAQ](../../virtual-network/virtual-networks-faq.md#are-there-any-restrictions-on-using-ip-addresses-within-these-subnets) <br><br> [Private IP addresses](../../virtual-network/ip-services/private-ip-addresses.md) |
7778
| SubscriptionNotFound | A specified subscription for deployment can't be accessed. It could be the subscription ID is wrong, the user deploying the template doesn't have adequate permissions to deploy to the subscription, or the subscription ID is in the wrong format. When using ARM template nested deployments to deploy across scopes, provide the subscription's GUID. | [ARM template deploy across scopes](../templates/deploy-to-resource-group.md) <br><br> [Bicep file deploy across scopes](../bicep/deploy-to-resource-group.md) |
7879
| SubscriptionNotRegistered | When deploying a resource, the resource provider must be registered for your subscription. When you use an Azure Resource Manager template for deployment, the resource provider is automatically registered in the subscription. Sometimes, the automatic registration doesn't complete in time. To avoid this intermittent error, register the resource provider before deployment. | [Resolve registration](error-register-resource-provider.md) |
7980
| TemplateResourceCircularDependency | Remove unnecessary dependencies. | [Resolve circular dependencies](error-invalid-template.md#circular-dependency) |

articles/azure-signalr/signalr-concept-serverless-development-config.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -51,6 +51,9 @@ For more information, see the [*SignalR trigger* binding reference](../azure-fun
5151

5252
You also need to configure your function endpoint as an upstream so that service will trigger the function when there is message from client. For more information about how to configure upstream, please refer to this [doc](concept-upstream.md).
5353

54+
> [!NOTE]
55+
> StreamInvocation from client is not supported in Serverless Mode.
56+
5457
### Sending messages and managing group membership
5558

5659
Use the *SignalR* output binding to send messages to clients connected to Azure SignalR Service. You can broadcast messages to all clients, or you can send them to a subset of clients that are authenticated with a specific user ID or have been added to a specific group.

0 commit comments

Comments
 (0)