Skip to content

Commit 0c8e213

Browse files
authored
Merge pull request #206864 from MicrosoftDocs/main
8/03 PM Publish
2 parents 8a25e67 + 6d3c560 commit 0c8e213

File tree

137 files changed

+1955
-660
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

137 files changed

+1955
-660
lines changed

articles/active-directory/devices/device-management-azure-portal.md

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -107,6 +107,25 @@ To view or copy BitLocker keys, you need to be the owner of the device or have o
107107
- Security Administrator
108108
- Security Reader
109109

110+
## Block users from viewing their BitLocker keys (preview)
111+
In this preivew, admins can block self-service BitLocker key access to the registered owner of the device. Default users without the BitLocker read permission will be unable to view or copy their BitLocker key(s) for their owned devices.
112+
113+
To disable/enable self-service BitLocker recovery:
114+
115+
```PowerShell
116+
Connect-MgGraph -Scopes Policy.ReadWrite.Authorization
117+
$authPolicyUri = "https://graph.microsoft.com/beta/policies/authorizationPolicy/authorizationPolicy"
118+
$body = @{
119+
defaultUserRolePermissions = @{
120+
allowedToReadBitlockerKeysForOwnedDevice = $false #Set this to $true to allow BitLocker self-service recovery
121+
}
122+
}| ConvertTo-Json
123+
Invoke-MgGraphRequest -Uri $authPolicyUri -Method PATCH -Body $body
124+
# Show current policy setting
125+
$authPolicy = Invoke-MgGraphRequest -Uri $authPolicyUri
126+
$authPolicy.defaultUserRolePermissions
127+
```
128+
110129
## View and filter your devices (preview)
111130

112131
In this preview, you have the ability to infinitely scroll, reorder columns, and select all devices. You can filter the device list by these device attributes:

articles/active-directory/managed-identities-azure-resources/tutorial-linux-vm-access-nonaad.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -103,6 +103,7 @@ To complete these steps, you need an SSH client.  If you are using Windows, you
103103
2. **Connect** to the VM with the SSH client of your choice. 
104104
3. In the terminal window, use CURL to make a request to the local managed identities for Azure resources endpoint to get an access token for Azure Key Vault.  
105105

106+
106107
The CURL request for the access token is below.  
107108

108109
```bash
@@ -147,4 +148,4 @@ Alternatively you may also do this via [PowerShell or the CLI](../../azure-resou
147148
In this tutorial, you learned how to use a Linux VM system-assigned managed identity to access Azure Key Vault. To learn more about Azure Key Vault see:
148149

149150
> [!div class="nextstepaction"]
150-
>[Azure Key Vault](../../key-vault/general/overview.md)
151+
>[Azure Key Vault](../../key-vault/general/overview.md)

articles/active-directory/saas-apps/sonarqube-tutorial.md

Lines changed: 32 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: 'Tutorial: Azure AD SSO integration with Sonarqube'
3-
description: Learn how to configure single sign-on between Azure Active Directory and Sonarqube.
2+
title: 'Tutorial: Azure AD SSO integration with SonarQube'
3+
description: Learn how to configure single sign-on between Azure Active Directory and SonarQube.
44
services: active-directory
55
author: jeevansd
66
manager: CelesteDG
@@ -13,59 +13,62 @@ ms.date: 06/25/2021
1313
ms.author: jeedes
1414
---
1515

16-
# Tutorial: Azure AD SSO integration with Sonarqube
16+
# Tutorial: Azure AD SSO integration with SonarQube
1717

18-
In this tutorial, you'll learn how to integrate Sonarqube with Azure Active Directory (Azure AD). When you integrate Sonarqube with Azure AD, you can:
18+
In this tutorial, you'll learn how to integrate SonarQube with Azure Active Directory (Azure AD). When you integrate SonarQube with Azure AD, you can:
1919

20-
* Control in Azure AD who has access to Sonarqube.
21-
* Enable your users to be automatically signed-in to Sonarqube with their Azure AD accounts.
20+
* Control in Azure AD who has access to SonarQube.
21+
* Enable your users to be automatically signed-in to SonarQube with their Azure AD accounts.
2222
* Manage your accounts in one central location - the Azure portal.
2323

2424
## Prerequisites
2525

2626
To get started, you need the following items:
2727

2828
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
29-
* Sonarqube single sign-on (SSO) enabled subscription.
29+
* SonarQube single sign-on (SSO) enabled subscription.
30+
31+
> [!NOTE]
32+
> Help on installing SonarQube can be found in the [online documentation](https://docs.sonarqube.org/latest/setup/install-server/).
3033
3134
## Scenario description
3235

3336
In this tutorial, you configure and test Azure AD SSO in a test environment.
3437

35-
* Sonarqube supports **SP** initiated SSO.
38+
* SonarQube supports **SP** initiated SSO.
3639

3740
> [!NOTE]
3841
> Identifier of this application is a fixed string value so only one instance can be configured in one tenant.
3942
40-
## Add Sonarqube from the gallery
43+
## Add SonarQube from the gallery
4144

42-
To configure the integration of Sonarqube into Azure AD, you need to add Sonarqube from the gallery to your list of managed SaaS apps.
45+
To configure the integration of SonarQube into Azure AD, you need to add SonarQube from the gallery to your list of managed SaaS apps.
4346

4447
1. Sign in to the Azure portal using either a work or school account, or a personal Microsoft account.
4548
1. On the left navigation pane, select the **Azure Active Directory** service.
4649
1. Navigate to **Enterprise Applications** and then select **All Applications**.
4750
1. To add new application, select **New application**.
48-
1. In the **Add from the gallery** section, type **Sonarqube** in the search box.
49-
1. Select **Sonarqube** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
51+
1. In the **Add from the gallery** section, type **SonarQube** in the search box.
52+
1. Select **SonarQube** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
5053

51-
## Configure and test Azure AD SSO for Sonarqube
54+
## Configure and test Azure AD SSO for SonarQube
5255

53-
Configure and test Azure AD SSO with Sonarqube using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in Sonarqube.
56+
Configure and test Azure AD SSO with SonarQube using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in SonarQube.
5457

55-
To configure and test Azure AD SSO with Sonarqube, perform the following steps:
58+
To configure and test Azure AD SSO with SonarQube, perform the following steps:
5659

5760
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
5861
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
5962
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
60-
1. **[Configure Sonarqube SSO](#configure-sonarqube-sso)** - to configure the single sign-on settings on application side.
61-
1. **[Create Sonarqube test user](#create-sonarqube-test-user)** - to have a counterpart of B.Simon in Sonarqube that is linked to the Azure AD representation of user.
63+
1. **[Configure SonarQube SSO](#configure-sonarqube-sso)** - to configure the single sign-on settings on application side.
64+
1. **[Create SonarQube test user](#create-sonarqube-test-user)** - to have a counterpart of B.Simon in SonarQube that is linked to the Azure AD representation of user.
6265
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
6366

6467
## Configure Azure AD SSO
6568

6669
Follow these steps to enable Azure AD SSO in the Azure portal.
6770

68-
1. In the Azure portal, on the **Sonarqube** application integration page, find the **Manage** section and select **single sign-on**.
71+
1. In the Azure portal, on the **SonarQube** application integration page, find the **Manage** section and select **single sign-on**.
6972
1. On the **Select a single sign-on method** page, select **SAML**.
7073
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
7174

@@ -93,7 +96,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
9396

9497
![The Certificate download link](common/certificatebase64.png)
9598

96-
1. On the **Set up Sonarqube** section, copy the appropriate URL(s) based on your requirement.
99+
1. On the **Set up SonarQube** section, copy the appropriate URL(s) based on your requirement.
97100

98101
![Copy configuration URLs](common/copy-configuration-urls.png)
99102

@@ -111,19 +114,19 @@ In this section, you'll create a test user in the Azure portal called B.Simon.
111114

112115
### Assign the Azure AD test user
113116

114-
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to Sonarqube.
117+
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to SonarQube.
115118

116119
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
117-
1. In the applications list, select **Sonarqube**.
120+
1. In the applications list, select **SonarQube**.
118121
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
119122
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
120123
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
121124
1. If you are expecting a role to be assigned to the users, you can select it from the **Select a role** dropdown. If no role has been set up for this app, you see "Default Access" role selected.
122125
1. In the **Add Assignment** dialog, click the **Assign** button.
123126

124-
## Configure Sonarqube SSO
127+
## Configure SonarQube SSO
125128

126-
1. Open a new web browser window and sign into your Sonarqube company site as an administrator.
129+
1. Open a new web browser window and sign into your SonarQube company site as an administrator.
127130

128131
1. Click on **Administration > Configuration > Security** and go to the **SAML Plugin** perform the following steps.
129132

@@ -160,20 +163,20 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
160163

161164
j. Click **Save**.
162165

163-
### Create Sonarqube test user
166+
### Create SonarQube test user
164167

165-
In this section, you create a user called B.Simon in Sonarqube. Work with [Sonarqube Client support team](https://sonarsource.com/company/contact/) to add the users in the Sonarqube platform. Users must be created and activated before you use single sign-on.
168+
In this section, you create a user called B.Simon in SonarQube. Work with [SonarQube Client support team](https://sonarsource.com/company/contact/) to add the users in the SonarQube platform. Users must be created and activated before you use single sign-on.
166169

167170
## Test SSO
168171

169172
In this section, you test your Azure AD single sign-on configuration with following options.
170173

171-
* Click on **Test this application** in Azure portal. This will redirect to Sonarqube Sign-on URL where you can initiate the login flow.
174+
* Click on **Test this application** in Azure portal. This will redirect to SonarQube Sign-on URL where you can initiate the login flow.
172175

173-
* Go to Sonarqube Sign-on URL directly and initiate the login flow from there.
176+
* Go to SonarQube Sign-on URL directly and initiate the login flow from there.
174177

175-
* You can use Microsoft My Apps. When you click the Sonarqube tile in the My Apps, this will redirect to Sonarqube Sign-on URL. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
178+
* You can use Microsoft My Apps. When you click the SonarQube tile in the My Apps, this will redirect to SonarQube Sign-on URL. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
176179

177180
## Next steps
178181

179-
* Once you configure the Sonarqube you can enforce session controls, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session controls extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
182+
* Once you configure SonarQube, you can enforce session controls, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session controls extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).

articles/aks/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@
1010
href: supported-kubernetes-versions.md
1111
- name: Add-ons, extensions, and other integrations
1212
href: integrations.md
13-
displayName: add-on, extensions, prometheus, grafana, openfaas, spark, istio, linkerd, consul
13+
displayName: add-on, extensions, prometheus, grafana, openfaas, spark, istio, linkerd, consul, github, actions
1414
- name: Solution architectures
1515
href: /azure/architecture/reference-architectures/containers/aks-start-here?bc=%2fazure%2faks%2fbreadcrumb%2ftoc.json&toc=%2fazure%2faks%2ftoc.json?WT.mc_id=AKSDOCSTOC
1616
- name: Quickstarts

articles/aks/cluster-configuration.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -31,9 +31,9 @@ By using `containerd` for AKS nodes, pod startup latency improves and node resou
3131
`Containerd` works on every GA version of Kubernetes in AKS, and in every upstream kubernetes version above v1.19, and supports all Kubernetes and AKS features.
3232

3333
> [!IMPORTANT]
34-
> Clusters with Linux node pools created on Kubernetes v1.19 or greater default to `containerd` for its container runtime. Clusters with node pools on a earlier supported Kubernetes versions receive Docker for their container runtime. Linux node pools will be updated to `containerd` once the node pool Kubernetes version is updated to a version that supports `containerd`. You can still use Docker node pools and clusters on versions below 1.23, but Docker is no longer supported as of September 2022.
34+
> Clusters with Linux node pools created on Kubernetes v1.19 or greater default to `containerd` for its container runtime. Clusters with node pools on a earlier supported Kubernetes versions receive Docker for their container runtime. Linux node pools will be updated to `containerd` once the node pool Kubernetes version is updated to a version that supports `containerd`.
3535
>
36-
> Using `containerd` with Windows Server 2019 node pools is generally available, and will be the only container runtime option in Kubernetes 1.21 and greater. For more details, see [Add a Windows Server node pool with `containerd`][/learn/aks-add-np-containerd].
36+
> Using `containerd` with Windows Server 2019 node pools is generally available, and will be the only container runtime option in Kubernetes 1.21 and greater. You can still use Docker node pools and clusters on versions below 1.23, but Docker is no longer supported as of September 2022. For more details, see [Add a Windows Server node pool with `containerd`][aks-add-np-containerd].
3737
>
3838
> It is highly recommended to test your workloads on AKS node pools with `containerd` prior to using clusters with a Kubernetes version that supports `containerd` for your node pools.
3939
@@ -232,4 +232,4 @@ az aks show -n aks -g myResourceGroup --query "oidcIssuerProfile.issuerUrl" -ots
232232
[az-feature-register]: /cli/azure/feature#az_feature_register
233233
[az-feature-list]: /cli/azure/feature#az_feature_list
234234
[az-provider-register]: /cli/azure/provider#az_provider_register
235-
[aks-add-np-containerd]: windows-container-cli.md#add-a-windows-server-node-pool-with-containerd
235+
[aks-add-np-containerd]: ./learn/quick-windows-container-deploy-cli.md#add-a-windows-server-node-pool-with-containerd

articles/aks/index.yml

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,10 @@ landingContent:
2828
links:
2929
- text: Use CVM (Preview)
3030
url: use-cvm.md
31+
- text: AKS GitHub Actions
32+
url: kubernetes-action.md
33+
- text: FIPS support for Windows Server node pools
34+
url: enable-fips-nodes.md#create-a-fips-enabled-windows-node-pool
3135
- text: Automatically upgrade an AKS cluster
3236
url: auto-upgrade-cluster.md
3337
- text: Start/stop node pools
@@ -40,7 +44,8 @@ landingContent:
4044
url: use-network-policies.md#create-an-aks-cluster-for-calico-network-policies
4145
- text: API Server VNet integration (preview)
4246
url: api-server-vnet-integration.md
43-
47+
- text: GitHub Actions for AKS
48+
url: integrations.md#github-actions
4449
- linkListType: concept
4550
links:
4651
- text: Kubernetes core concepts for AKS
@@ -182,4 +187,6 @@ landingContent:
182187
- text: Dapr cluster extension
183188
url: dapr.md
184189
- text: Cluster extensions
185-
url: cluster-extensions.md
190+
url: cluster-extensions.md
191+
- text: GitHub Actions for AKS
192+
url: integrations.md#github-actions

articles/aks/integrations.md

Lines changed: 19 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ Azure Kubernetes Service (AKS) provides additional, supported functionality for
1313

1414
## Add-ons
1515

16-
Add-ons are a fully-supported way to provide extra capabilities for your AKS cluster. Add-ons' installation, configuration, and lifecycle is managed by AKS. Use `az aks addon` to install an add-on or manage the add-ons for your cluster.
16+
Add-ons are a fully supported way to provide extra capabilities for your AKS cluster. Add-ons' installation, configuration, and lifecycle is managed by AKS. Use `az aks addon` to install an add-on or manage the add-ons for your cluster.
1717

1818
The following rules are used by AKS for applying updates to installed add-ons:
1919

@@ -44,6 +44,10 @@ Cluster extensions build on top of certain Helm charts and provide an Azure Reso
4444

4545
Both extensions and add-ons are supported ways to add functionality to your AKS cluster. When you install an add-on, the functionality is added as part of the AKS resource provider in the Azure API. When you install an extension, the functionality is added as part of a separate resource provider in the Azure API.
4646

47+
## GitHub Actions
48+
49+
GitHub Actions helps you automate your software development workflows from within GitHub. For more details on using GitHub Actions with Azure, see [What is GitHub Actions for Azures][github-actions]. For an example of using GitHub Actions with an AKS cluster, see [Build, test, and deploy containers to Azure Kubernetes Service using GitHub Actions][github-actions-aks].
50+
4751
## Open source and third-party integrations
4852

4953
You can install many open source and third-party integrations on your AKS cluster, but these open-source and third-party integrations are not covered by the [AKS support policy][aks-support-policy].
@@ -99,4 +103,17 @@ The below table shows a few examples of open-source and third-party integrations
99103
[keda]: keda-about.md
100104
[web-app-routing]: web-app-routing.md
101105
[maintenance-windows]: planned-maintenance.md
102-
[release-tracker]: release-tracker.md
106+
[release-tracker]: release-tracker.md
107+
[github-actions]: /azure/developer/github/github-actions
108+
[azure/aks-set-context]: https://github.com/Azure/aks-set-context
109+
[azure/k8s-set-context]: https://github.com/Azure/k8s-set-context
110+
[azure/k8s-bake]: https://github.com/Azure/k8s-bake
111+
[azure/k8s-create-secret]: https://github.com/Azure/k8s-create-secret
112+
[azure/k8s-deploy]: https://github.com/Azure/k8s-deploy
113+
[azure/k8s-lint]: https://github.com/Azure/k8s-lint
114+
[azure/setup-helm]: https://github.com/Azure/setup-helm
115+
[azure/setup-kubectl]: https://github.com/Azure/setup-kubectl
116+
[azure/k8s-artifact-substitute]: https://github.com/Azure/k8s-artifact-substitute
117+
[azure/aks-create-action]: https://github.com/Azure/aks-create-action
118+
[azure/aks-github-runner]: https://github.com/Azure/aks-github-runner
119+
[github-actions-aks]: kubernetes-action.md

0 commit comments

Comments
 (0)