Skip to content

Commit 0f75edd

Browse files
authored
Merge pull request #296375 from MicrosoftDocs/main
3/14/2025 PM Publish
2 parents d6b3817 + ee8901d commit 0f75edd

File tree

85 files changed

+2359
-2132
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

85 files changed

+2359
-2132
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2819,6 +2819,11 @@
28192819
"redirect_url": "/azure/bastion/bastion-connect-vm-ssh-linux",
28202820
"redirect_document_id": false
28212821
},
2822+
{
2823+
"source_path_from_root": "/articles/bastion/quickstart-developer-sku.md",
2824+
"redirect_url": "/azure/bastion/quickstart-developer",
2825+
"redirect_document_id": false
2826+
},
28222827
{
28232828
"source_path_from_root": "/articles/bastion/bastion-connect-vm-rdp.md",
28242829
"redirect_url": "/azure/bastion/bastion-connect-vm-rdp-windows",

articles/application-gateway/for-containers/alb-controller-release-notes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,12 +26,12 @@ Instructions for new or existing deployments of ALB Controller are found in the
2626

2727
| ALB Controller Version | Gateway API Version | Kubernetes Version | Release Notes |
2828
| ---------------------- | ------------------- | ------------------ | ------------- |
29-
| 1.4.12 | v1.1.1 | v1.26, v1.27, v1.28, v1.29, v1.30 | Updated to Gateway API version 1.1.1, Regex match support for path and header match in HTTP and GRPC routes, [Wildcard hostname fix](https://github.com/Azure/AKS/issues/4713), Misc. bug fixes and improvements |
30-
29+
| 1.4.14 | v1.1.1 | v1.26, v1.27, v1.28, v1.29, v1.30 | Bug fixes, including [issue #4086](https://github.com/Azure/AKS/issues/4086) |
3130
## Release history
3231

3332
| ALB Controller Version | Gateway API Version | Kubernetes Version | Release Notes |
3433
| ---------------------- | ------------------- | ------------------ | ------------- |
34+
| 1.4.12 | v1.1.1 | v1.26, v1.27, v1.28, v1.29, v1.30 | Updated to Gateway API version 1.1.1, Regex match support for path and header match in HTTP and GRPC routes, [Wildcard hostname fix](https://github.com/Azure/AKS/issues/4713), Misc. bug fixes and improvements |
3535
| 1.3.7| v1.1 | v1.26, v1.27, v1.28, v1.29, v1.30 | Minor fixes and improvements |
3636
| 1.2.3| v1.1 | v1.26, v1.27, v1.28, v1.29, v1.30 | Gateway API v1.1, gRPC support, frontend mutual authentication, readiness probe fixes, custom health probe port and TLS mode |
3737
| 1.0.2| v1 | v1.26, v1.27, v1.28, v1.29 | ECDSA + RSA certificate support for both Ingress and Gateway API, Ingress fixes, Server-sent events support |

articles/application-gateway/for-containers/quickstart-deploy-application-gateway-for-containers-alb-controller.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -146,7 +146,7 @@ You need to complete the following tasks before deploying Application Gateway fo
146146
az aks get-credentials --resource-group $RESOURCE_GROUP --name $AKS_NAME
147147
helm install alb-controller oci://mcr.microsoft.com/application-lb/charts/alb-controller \
148148
--namespace $HELM_NAMESPACE \
149-
--version 1.4.12 \
149+
--version 1.4.14 \
150150
--set albController.namespace=$CONTROLLER_NAMESPACE \
151151
--set albController.podIdentity.clientID=$(az identity show -g $RESOURCE_GROUP -n azure-alb-identity --query clientId -o tsv)
152152
```
@@ -164,7 +164,7 @@ You need to complete the following tasks before deploying Application Gateway fo
164164
az aks get-credentials --resource-group $RESOURCE_GROUP --name $AKS_NAME
165165
helm upgrade alb-controller oci://mcr.microsoft.com/application-lb/charts/alb-controller \
166166
--namespace $HELM_NAMESPACE \
167-
--version 1.4.12 \
167+
--version 1.4.14 \
168168
--set albController.namespace=$CONTROLLER_NAMESPACE \
169169
--set albController.podIdentity.clientID=$(az identity show -g $RESOURCE_GROUP -n azure-alb-identity --query clientId -o tsv)
170170
```

articles/application-gateway/for-containers/troubleshooting-guide.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -25,10 +25,10 @@ Example output:
2525

2626
| NAME | READY | UP-TO-DATE | AVAILABLE | AGE | CONTAINERS | IMAGES | SELECTOR |
2727
| ------------------------ | ----- | ---------- | --------- | ---- | ----------------------- | ------------------------------------------------------------------------------- | -------- |
28-
| alb-controller | 2/2 | 2 | 2 | 18d | alb-controller | mcr.microsoft.com/application-lb/images/alb-controller:**1.4.12** | app=alb-controller |
29-
| alb-controller-bootstrap | 1/1 | 1 | 1 | 18d | alb-controller-bootstrap | mcr.microsoft.com/application-lb/images/alb-controller-bootstrap:**1.4.12** | app=alb-controller-bootstrap |
28+
| alb-controller | 2/2 | 2 | 2 | 18d | alb-controller | mcr.microsoft.com/application-lb/images/alb-controller:**1.4.14** | app=alb-controller |
29+
| alb-controller-bootstrap | 1/1 | 1 | 1 | 18d | alb-controller-bootstrap | mcr.microsoft.com/application-lb/images/alb-controller-bootstrap:**1.4.14** | app=alb-controller-bootstrap |
3030

31-
In this example, the ALB controller version is **1.4.12**.
31+
In this example, the ALB controller version is **1.4.14**.
3232

3333
The ALB Controller version can be upgraded by running the `helm upgrade alb-controller` command. For more information, see [Install the ALB Controller](quickstart-deploy-application-gateway-for-containers-alb-controller.md#install-the-alb-controller).
3434

articles/azure-cache-for-redis/cache-migration-guide.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,8 @@ description: Learn how to migrate your existing cache to Azure Cache for Redis
77
ms.topic: conceptual
88
ms.custom:
99
- ignite-2024
10+
- migration
11+
- aws-to-azure
1012
ms.date: 11/17/2021
1113
---
1214
# Migrate to Azure Cache for Redis

articles/azure-resource-manager/management/resource-name-rules.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Naming rules and restrictions for Azure resources
33
description: Learn the rules and restrictions for naming Azure resources.
44
ms.topic: conceptual
5-
ms.date: 02/19/2025
5+
ms.date: 03/14/2025
66
---
77

88
# Naming rules and restrictions for Azure resources
@@ -634,9 +634,10 @@ In the following tables, the term alphanumeric refers to:
634634
> | netAppAccounts / backups | NetApp account | 3-225 | Alphanumerics, underscores, periods, and hyphens <br><br> Start with alphanumeric. |
635635
> | netAppAccounts / backupPolicies | NetApp account | 1-64 | Alphanumerics, underscores, and hyphens <br><br> Start with alphanumeric. |
636636
> | netAppAccounts / capacityPools | NetApp account | 1-64 | Alphanumerics, underscores, and hyphens<br><br>Start with alphanumeric. |
637+
> | netAppAccounts / shareNames | NetApp account | 1-64 | Alphanumerics and hyphens. <br><br>Start with alphanumeric.<br><br>Underscores aren't supported. |
637638
> | netAppAccounts / snapshots | NetApp account | 1-255 | Alphanumerics, underscores, and hyphens <br><br> Start with alphanumeric. |
638639
> | netAppAccounts / snapshotPolicies | NetApp account | 1-64 | Alphanumerics, underscores, and hyphens<br><br>Start with alphanumeric. |
639-
> | netAppAccounts / volumes | NetApp account | 1-64 | Alphanumerics, underscores, and hyphens <br><br> Start with alphanumeric. <br><br> Volume can't be named `bin` or `default`. |
640+
> | netAppAccounts / volumes | NetApp account | 1-64 | Alphanumerics and hyphens <br><br> Start with alphanumeric. <br><br> Volume can't be named `bin` or `default`. |
640641
> | netAppAccounts / volumeGroups | NetApp account | 3-64 | Alphanumerics, underscores, and hyphens<br><br>Start with alphanumeric. |
641642
642643
## Microsoft.Network
Lines changed: 62 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,62 @@
1+
---
2+
title: include file
3+
description: include file
4+
author: terencefan
5+
ms.service: azure-signalr-service
6+
ms.topic: include
7+
ms.date: 03/12/2025
8+
ms.author: tefa
9+
ms.custom: include file
10+
---
11+
12+
The following steps describe how to assign a **SignalR App Server** role to a service principal or a managed identity for an Azure SignalR Service resource. For detailed steps, see [Assign Azure roles using the Azure portal](../../role-based-access-control/role-assignments-portal.yml).
13+
14+
> [!NOTE]
15+
> A role can be assigned to any scope, including management group, subscription, resource group, or single resource. To learn more about scope, see [Understand scope for Azure RBAC](../../role-based-access-control/scope-overview.md).
16+
17+
1. In the [Azure portal](https://portal.azure.com/), go to your Azure SignalR Service resource.
18+
19+
1. Select **Access control (IAM)** in the sidebar.
20+
21+
1. Select **Add** > **Add role assignment**.
22+
23+
:::image type="content" source="~/reusable-content/ce-skilling/azure/media/role-based-access-control/add-role-assignment-menu-generic.png" alt-text="Screenshot that shows the page for access control and selections for adding a role assignment.":::
24+
25+
1. On the **Role** tab, select **SignalR App Server** or other SignalR built-in roles depends on your scenario.
26+
27+
| Role | Description | Use case |
28+
| ------------------------------------------------------------------------------------------------- | --------------------------------------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------- |
29+
| [SignalR App Server](../../role-based-access-control/built-in-roles.md#signalr-app-server) | Access to the server connection creation and key generation APIs. | Most commonly used for app server with Azure SignalR resource run in **Default** mode. |
30+
| [SignalR Service Owner](../../role-based-access-control/built-in-roles.md#signalr-service-owner) | Full access to all data-plane APIs, including REST APIs, the server connection creation, and key/token generation APIs. | For negotiation server with Azure SignalR resource run in **Serverless** mode, as it requires both REST API permissions and authentication API permissions. |
31+
| [SignalR REST API Owner](../../role-based-access-control/built-in-roles.md#signalr-rest-api-owner) | Full access to data-plane REST APIs. | For using [Azure SignalR Management SDK](/azure/azure-signalr/signalr-howto-use-management-sdk) to manage connections and groups, but does **NOT** make server connections or handle negotiation requests. |
32+
| [SignalR REST API Reader](../../role-based-access-control/built-in-roles.md#signalr-rest-api-reader) | Read-only access to data-plane REST APIs. | Use it when write a monitoring tool that calls readonly REST APIs. |
33+
34+
1. Select Next.
35+
36+
37+
1. For Microsoft Entra application.
38+
39+
40+
1. In the `Assign access` to row, select **User, group, or service principal**.
41+
1. In the `Members` row, click `select members`, then choose the identity in the pop-up window.
42+
43+
1. For managed identity for Azure resources.
44+
45+
1. In the `Assign access` to row, select **Managed identity**.
46+
1. In the `Members` row, click `select members`, then choose the application in the pop-up window.
47+
48+
1. Select Next.
49+
50+
51+
1. Review your assignment, then click **Review + assign** to confirm the role assignment.
52+
53+
> [!IMPORTANT]
54+
> Newly added role assignments might take up to 30 minutes to propagate.
55+
56+
To learn more about how to assign and manage Azure roles, see these articles:
57+
58+
- [Assign Azure roles using the Azure portal](../../role-based-access-control/role-assignments-portal.yml)
59+
- [Assign Azure roles using the REST API](../../role-based-access-control/role-assignments-rest.md)
60+
- [Assign Azure roles using Azure PowerShell](../../role-based-access-control/role-assignments-powershell.md)
61+
- [Assign Azure roles using the Azure CLI](../../role-based-access-control/role-assignments-cli.md)
62+
- [Assign Azure roles using Azure Resource Manager templates](../../role-based-access-control/role-assignments-template.md)

articles/azure-signalr/signalr-concept-authorize-azure-active-directory.md

Lines changed: 22 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ When a security principal tries to access an Azure SignalR Service resource, the
3333

3434
When you use an access key, the key is shared between your app server (or function app) and the Azure SignalR Service resource. Azure SignalR Service authenticates the client connection request by using the shared key.
3535

36-
When you use Microsoft Entra ID, there is no shared key. Instead, Azure SignalR Service uses a *temporary access key* for signing tokens used in client connections. The workflow contains four steps:
36+
When you use Microsoft Entra ID, there's no shared key. Instead, Azure SignalR Service uses a *temporary access key* for signing tokens used in client connections. The workflow contains four steps:
3737

3838
1. The security principal requires an OAuth 2.0 token from Microsoft Entra ID to authenticate itself.
3939
2. The security principal calls the SignalR authentication API to get a temporary access key.
@@ -44,13 +44,27 @@ The temporary access key expires in 90 minutes. We recommend that you get a new
4444

4545
The workflow is built in the [Azure SignalR Service SDK for app servers](https://github.com/Azure/azure-signalr).
4646

47+
### Cross tenant access when using Microsoft Entra ID
48+
49+
In some cases, your server and your Azure SignalR resource may not be in the same tenant due to security concerns.
50+
51+
A [multitenant applications](/entra/identity-platform/single-and-multi-tenant-apps#best-practices-for-multitenant-apps) could help you in this scenario.
52+
53+
If you've already registered a single-tenant app, see [convert your single-tenant app to multitenant](/entra/identity-platform/howto-convert-app-to-be-multi-tenant).
54+
55+
Once you have registered the multitenant application in your `tenantA`, you should provision it as an enterprise application in your `tenantB`.
56+
57+
[Create an enterprise application from a multitenant application in Microsoft Entra ID](/entra/identity/enterprise-apps/create-service-principal-cross-tenant?pivots=msgraph-powershell)
58+
59+
The application registered in your `tenantA` and the enterprise application provisioned in your `tenantB` share the same Application (client) ID.
60+
4761
## Assign Azure roles for access rights
4862

4963
Microsoft Entra ID authorizes access rights to secured resources through [Azure RBAC](../role-based-access-control/overview.md). Azure SignalR Service defines a set of Azure built-in roles that encompass common sets of permissions for accessing Azure SignalR Service resources. You can also define custom roles for access to Azure SignalR Service resources.
5064

5165
### Resource scope
5266

53-
You might have to determine the scope of access that the security principal should have before you assign any Azure RBAC role to a security principal. We recommend that you grant only the narrowest possible scope. Azure RBAC roles defined at a broader scope are inherited by the resources beneath them.
67+
Before assigning Azure RBAC roles to a security principal, it’s essential to define the appropriate scope of access they should have. We advise granting the most limited scope necessary to minimize unnecessary permissions. Keep in mind that Azure RBAC roles assigned at a higher or broader scope are automatically inherited by the resources nested within that scope.
5468

5569
You can scope access to Azure SignalR Service resources at the following levels, beginning with the narrowest scope.
5670

@@ -65,16 +79,16 @@ You can scope access to Azure SignalR Service resources at the following levels,
6579

6680
| Role | Description | Use case |
6781
| ------------------------------------------------------------------------------------------------- | --------------------------------------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------- |
68-
| [SignalR App Server](../role-based-access-control/built-in-roles.md#signalr-app-server) | Access to the WebSocket connection creation API and authentication APIs. | Most commonly used for an app server. |
69-
| [SignalR Service Owner](../role-based-access-control/built-in-roles.md#signalr-service-owner) | Full access to all data-plane APIs, including REST APIs, the WebSocket connection creation API, and authentication APIs. | Use for *serverless mode* for authorization with Microsoft Entra ID, because it requires both REST API permissions and authentication API permissions. |
70-
| [SignalR REST API Owner](../role-based-access-control/built-in-roles.md#signalr-rest-api-owner) | Full access to data-plane REST APIs. | Often used to write a tool that manages connections and groups, but does *not* make connections or call authentication APIs. |
71-
| [SignalR REST API Reader](../role-based-access-control/built-in-roles.md#signalr-rest-api-reader) | Read-only access to data-plane REST APIs. | Commonly used to write a monitoring tool that calls *only* Azure SignalR Service data-plane read-only REST APIs. |
82+
| [SignalR App Server](../role-based-access-control/built-in-roles.md#signalr-app-server) | Access to the server connection creation and key generation APIs. | Most commonly used for app server with Azure SignalR resource run in **Default** mode. |
83+
| [SignalR Service Owner](../role-based-access-control/built-in-roles.md#signalr-service-owner) | Full access to all data-plane APIs, including REST APIs, the server connection creation, and key/token generation APIs. | For negotiation server with Azure SignalR resource run in **Serverless** mode, as it requires both REST API permissions and authentication API permissions. |
84+
| [SignalR REST API Owner](../role-based-access-control/built-in-roles.md#signalr-rest-api-owner) | Full access to data-plane REST APIs. | For using [Azure SignalR Management SDK](./signalr-howto-use-management-sdk.md) to manage connections and groups, but does **NOT** make server connections or handle negotiation requests. |
85+
| [SignalR REST API Reader](../role-based-access-control/built-in-roles.md#signalr-rest-api-reader) | Read-only access to data-plane REST APIs. | Use it when write a monitoring tool that calls readonly REST APIs.
7286

7387
## Next steps
7488

75-
- To learn how to create an Azure application and use Microsoft Entra authorization, see [Authorize requests to Azure SignalR Service resources with Microsoft Entra applications](signalr-howto-authorize-application.md).
89+
- To learn how to create an Azure application and use Microsoft Entra authorization, see [Authorize requests to Azure SignalR Service resources with Microsoft Entra applications](./signalr-howto-authorize-application.md).
7690

77-
- To learn how to configure a managed identity and use Microsoft Entra authorization, see [Authorize requests to Azure SignalR Service resources with Microsoft Entra managed identities](signalr-howto-authorize-managed-identity.md).
91+
- To learn how to configure a managed identity and use Microsoft Entra authorization, see [Authorize requests to Azure SignalR Service resources with Microsoft Entra managed identities](./signalr-howto-authorize-managed-identity.md).
7892

7993
- To learn more about roles and role assignments, see [What is Azure role-based access control (Azure RBAC)?](../role-based-access-control/overview.md).
8094

0 commit comments

Comments
 (0)