Skip to content

Commit 115443a

Browse files
authored
Merge pull request #178734 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/MicrosoftDocs/azure-docs (branch master)
2 parents fd2ae55 + b41f257 commit 115443a

26 files changed

+107
-79
lines changed

articles/active-directory/manage-apps/tenant-restrictions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ The headers should include the following elements:
7373

7474
- For *Restrict-Access-To-Tenants*, use a value of \<permitted tenant list\>, which is a comma-separated list of tenants you want to allow users to access. Any domain that is registered with a tenant can be used to identify the tenant in this list, as well as the directory ID itself. For an example of all three ways of describing a tenant, the name/value pair to allow Contoso, Fabrikam, and Microsoft looks like: `Restrict-Access-To-Tenants: contoso.com,fabrikam.onmicrosoft.com,72f988bf-86f1-41af-91ab-2d7cd011db47`
7575

76-
- For *Restrict-Access-Context*, use a value of a single directory ID, declaring which tenant is setting the tenant restrictions. For example, to declare Contoso as the tenant that set the tenant restrictions policy, the name/value pair looks like: `Restrict-Access-Context: 456ff232-35l2-5h23-b3b3-3236w0826f3d`. You **must** use your own directory ID in this spot in order to get logs for these authentications.
76+
- For *Restrict-Access-Context*, use a value of a single directory ID, declaring which tenant is setting the tenant restrictions. For example, to declare Contoso as the tenant that set the tenant restrictions policy, the name/value pair looks like: `Restrict-Access-Context: 456ff232-35l2-5h23-b3b3-3236w0826f3d`. You *must* use your own directory ID here to get logs for these authentications. If you use any directory ID other than your own, those sign-in logs *will* appear in someone else’s tenant, with all personal information removed. For more information, see [Admin experience](#admin-experience).
7777

7878
> [!TIP]
7979
> You can find your directory ID in the [Azure Active Directory portal](https://aad.portal.azure.com/). Sign in as an administrator, select **Azure Active Directory**, then select **Properties**.

articles/aks/quotas-skus-regions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ This article details the default resource limits for Azure Kubernetes Service (A
2222
All other network, compute, and storage limitations apply to the provisioned infrastructure. For the relevant limits, see [Azure subscription and service limits](../azure-resource-manager/management/azure-subscription-service-limits.md).
2323

2424
> [!IMPORTANT]
25-
> When you upgrade an AKS cluster, extra resources are temporarily consumed. These resources include include available IP addresses in a virtual network subnet or virtual machine vCPU quota.
25+
> When you upgrade an AKS cluster, extra resources are temporarily consumed. These resources include available IP addresses in a virtual network subnet or virtual machine vCPU quota.
2626
>
2727
> For Windows Server containers, you can perform an upgrade operation to apply the latest node updates. If you don't have the available IP address space or vCPU quota to handle these temporary resources, the cluster upgrade process will fail. For more information on the Windows Server node upgrade process, see [Upgrade a node pool in AKS][nodepool-upgrade].
2828

articles/iot-edge/how-to-provision-devices-at-scale-linux-on-windows-symmetric.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ For Windows Admin Center, use the following steps:
7676

7777
---
7878

79-
## Verify successful configuration
79+
## Verify successful installation
8080

8181
Verify that IoT Edge for Linux on Windows was successfully installed and configured on your IoT Edge device.
8282

articles/iot-edge/how-to-provision-devices-at-scale-linux-on-windows-tpm.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -81,9 +81,9 @@ The IoT Edge for Linux on Windows VM has a TPM feature that can be enabled or di
8181

8282
# [Physical TPM](#tab/physical-tpm)
8383

84-
To provision your device, you need to gather information from your TPM chip and provide it to your instance of the device provisioning service so that the service can recognize your device when it tries to connect.
84+
To provision your device, you need an **Endorsement key** for your TPM chip and **Registration ID** for your device. You provide this information to your instance of the device provisioning service so that the service can recognize your device when it tries to connect.
8585

86-
First, you need to determine the endorsement key, which is unique to each TPM chip and is obtained from the TPM chip manufacturer associated with it. Then, you need to provide a registration ID for your device. You can derive a unique registration ID for your TPM device by, for example, creating an SHA-256 hash of the endorsement key.
86+
The endorsement key is unique to each TPM chip. It is obtained from the TPM chip manufacturer associated with it. You can derive a unique registration ID for your TPM device by, for example, creating an SHA-256 hash of the endorsement key.
8787

8888
IoT Edge for Linux on Windows provides a PowerShell script to help retrieve this information from your TPM. To use the script, follow these steps on your device:
8989

@@ -128,7 +128,7 @@ Simulated TPM samples:
128128
1. Provision your device by using the **Scope ID** that you collected from your instance of the device provisioning service.
129129

130130
```powershell
131-
Provision-EflowVM -provisioningType "DpsTpm" -scopeId "<scope id>"
131+
Provision-EflowVM -provisioningType "DpsTpm" -scopeId "SCOPE_ID_HERE"
132132
```
133133

134134
# [Windows Admin Center](#tab/windowsadmincenter)
@@ -146,7 +146,7 @@ Simulated TPM samples:
146146

147147
---
148148

149-
## Verify successful configuration
149+
## Verify successful installation
150150

151151
Verify that IoT Edge for Linux on Windows was successfully installed and configured on your IoT Edge device.
152152

@@ -202,4 +202,4 @@ Use the following commands on your device to verify that the IoT Edge installed
202202

203203
The device provisioning service enrollment process lets you set the device ID and device twin tags at the same time as you provision the new device. You can use those values to target individual devices or groups of devices by using automatic device management.
204204

205-
Learn how to [deploy and monitor IoT Edge modules at scale by using the Azure portal](how-to-deploy-at-scale.md) or [the Azure CLI](how-to-deploy-cli-at-scale.md).
205+
Learn how to [deploy and monitor IoT Edge modules at scale by using the Azure portal](how-to-deploy-at-scale.md) or [the Azure CLI](how-to-deploy-cli-at-scale.md).

articles/iot-edge/how-to-provision-devices-at-scale-linux-on-windows-x509.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ You can use either PowerShell or Windows Admin Center to provision your IoT Edge
8484
For PowerShell, run the following command with the placeholder values updated with your own values:
8585

8686
```powershell
87-
Provision-EflowVm -provisioningType DpsX509 -scopeId PASTE_YOUR_ID_SCOPE_HERE -registrationId PASTE_YOUR_REGISTRATION_ID_HERE -identityCertPath PASTE_ABSOLUTE_PATH_TO_IDENTITY_CERTIFICATE_HERE -identityPrivateKey PASTE_ABSOLUTE_PATH_TO_IDENTITY_PRIVATE_KEY_HERE
87+
Provision-EflowVm -provisioningType DpsX509 -scopeId PASTE_YOUR_ID_SCOPE_HERE -registrationId PASTE_YOUR_REGISTRATION_ID_HERE -identityCertPath PASTE_ABSOLUTE_PATH_TO_IDENTITY_CERTIFICATE_HERE -identityPrivateKey PASTE_ABSOLUTE_PATH_TO_IDENTITY_PRIVATE_KEY_HERE
8888
```
8989

9090
# [Windows Admin Center](#tab/windowsadmincenter)
@@ -103,7 +103,7 @@ For Windows Admin Center, use the following steps:
103103

104104
---
105105

106-
## Verify successful configuration
106+
## Verify successful installation
107107

108108
Verify that IoT Edge for Linux on Windows was successfully installed and configured on your IoT Edge device.
109109

articles/iot-edge/how-to-provision-devices-at-scale-linux-tpm.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ A physical Linux device to be the IoT Edge device.
5454

5555
# [Virtual machine](#tab/virtual-machine)
5656

57-
* A Windows development machine with [Hyper-V enabled](/virtualization/hyper-v-on-windows/quick-start/enable-hyper-v). This article uses Windows 10 running an Ubuntu Server VM.
57+
A Windows development machine with [Hyper-V enabled](/virtualization/hyper-v-on-windows/quick-start/enable-hyper-v). This article uses Windows 10 running an Ubuntu Server VM.
5858

5959
---
6060

@@ -192,10 +192,10 @@ After the runtime is installed on your device, configure the device with the inf
192192
provisioning:
193193
source: "dps"
194194
global_endpoint: "https://global.azure-devices-provisioning.net"
195-
scope_id: "<SCOPE_ID>"
195+
scope_id: "SCOPE_ID_HERE"
196196
attestation:
197197
method: "tpm"
198-
registration_id: "<REGISTRATION_ID>"
198+
registration_id: "REGISTRATION_ID_HERE"
199199
# always_reprovision_on_startup: true
200200
# dynamic_reprovisioning: false
201201
```
@@ -233,11 +233,11 @@ After the runtime is installed on your device, configure the device with the inf
233233
[provisioning]
234234
source = "dps"
235235
global_endpoint = "https://global.azure-devices-provisioning.net"
236-
id_scope = "<SCOPE_ID>"
236+
id_scope = "SCOPE_ID_HERE"
237237

238238
[provisioning.attestation]
239239
method = "tpm"
240-
registration_id = "<REGISTRATION_ID>"
240+
registration_id = "REGISTRATION_ID_HERE"
241241
```
242242

243243
1. Update the values of `id_scope` and `registration_id` with your device provisioning service and device information. The `scope_id` value is the **ID Scope** from your device provisioning service instance's overview page.
@@ -369,7 +369,7 @@ You can give access to the TPM by overriding the systemd settings so that the `a
369369
:::moniker-end
370370
<!-- end 1.2 -->
371371

372-
## Restart IoT Edge and verify successful installation
372+
## Verify successful installation
373373

374374
<!-- 1.1 -->
375375
:::moniker range="iotedge-2018-06"
@@ -445,4 +445,4 @@ You can verify that the individual enrollment that you created in the device pro
445445

446446
The device provisioning service enrollment process lets you set the device ID and device twin tags at the same time as you provision the new device. You can use those values to target individual devices or groups of devices by using automatic device management.
447447

448-
Learn how to [deploy and monitor IoT Edge modules at scale by using the Azure portal](how-to-deploy-at-scale.md) or [the Azure CLI](how-to-deploy-cli-at-scale.md).
448+
Learn how to [deploy and monitor IoT Edge modules at scale by using the Azure portal](how-to-deploy-at-scale.md) or [the Azure CLI](how-to-deploy-cli-at-scale.md).

articles/iot-edge/how-to-provision-devices-at-scale-linux-x509.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -101,12 +101,12 @@ Have the following information ready:
101101
provisioning:
102102
source: "dps"
103103
global_endpoint: "https://global.azure-devices-provisioning.net"
104-
scope_id: "<SCOPE_ID>"
104+
scope_id: "SCOPE_ID_HERE"
105105
attestation:
106106
method: "x509"
107-
# registration_id: "<OPTIONAL REGISTRATION ID. LEAVE COMMENTED OUT TO REGISTER WITH CN OF identity_cert>"
108-
identity_cert: "<REQUIRED URI TO DEVICE IDENTITY CERTIFICATE>"
109-
identity_pk: "<REQUIRED URI TO DEVICE IDENTITY PRIVATE KEY>"
107+
# registration_id: "OPTIONAL_REGISTRATION_ID_LEAVE_COMMENTED_OUT_TO_REGISTER_WITH_CN_OF_IDENTITY_CERT"
108+
identity_cert: "REQUIRED_URI_TO_DEVICE_IDENTITY_CERTIFICATE_HERE"
109+
identity_pk: "REQUIRED_URI_TO_DEVICE_IDENTITY_PRIVATE_KEY_HERE"
110110
# always_reprovision_on_startup: true
111111
# dynamic_reprovisioning: false
112112
```
@@ -155,15 +155,15 @@ Have the following information ready:
155155
[provisioning]
156156
source = "dps"
157157
global_endpoint = "https://global.azure-devices-provisioning.net"
158-
id_scope = "<SCOPE_ID>"
158+
id_scope = "SCOPE_ID_HERE"
159159

160160
[provisioning.attestation]
161161
method = "x509"
162-
registration_id = "<REGISTRATION ID>"
162+
registration_id = "REGISTRATION_ID_HERE"
163163

164-
identity_cert = "<DEVICE IDENTITY CERTIFICATE>"
164+
identity_cert = "DEVICE_IDENTITY_CERTIFICATE_HERE"
165165

166-
identity_pk = "<DEVICE IDENTITY PRIVATE KEY>"
166+
identity_pk = "DEVICE_IDENTITY_PRIVATE_KEY_HERE"
167167
```
168168

169169
1. Update the value of `id_scope` with the scope ID you copied from your instance of DPS.

articles/iot-edge/how-to-provision-devices-at-scale-windows-symmetric.md

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,13 @@ monikerRange: "=iotedge-2018-06"
1616

1717
This article provides end-to-end instructions for autoprovisioning one or more Windows IoT Edge devices using symmetric keys. You can automatically provision Azure IoT Edge devices with the [Azure IoT Hub device provisioning service](../iot-dps/index.yml) (DPS). If you're unfamiliar with the process of autoprovisioning, review the [provisioning overview](../iot-dps/about-iot-dps.md#provisioning-process) before continuing.
1818

19+
>[!NOTE]
20+
>Azure IoT Edge with Windows containers will not be supported starting with version 1.2 of Azure IoT Edge.
21+
>
22+
>Consider using the new method for running IoT Edge on Windows devices, [Azure IoT Edge for Linux on Windows](iot-edge-for-linux-on-windows.md).
23+
>
24+
>If you want to use Azure IoT Edge for Linux on Windows, you can follow the steps in the [equivalent how-to guide](how-to-provision-devices-at-scale-linux-on-windows-symmetric.md).
25+
1926
The tasks are as follows:
2027

2128
1. Create either an **individual enrollment** for a single device or a **group enrollment** for a set of devices.
@@ -54,13 +61,11 @@ Have the following information ready:
5461

5562
1. The **Initialize-IoTEdge** command configures the IoT Edge runtime on your machine. The command defaults to manual provisioning with Windows containers, so use the `-DpsSymmetricKey` flag to use automatic provisioning with symmetric key authentication.
5663

57-
Replace the placeholder values for `{scope_id}`, `{registration_id}`, and `{symmetric_key}` with the data you collected earlier.
58-
59-
Add the `-RegistrationId {registration_id}` parameter if you want to set the device ID as something other than the CN name of the identity certificate.
64+
Replace the placeholder values for `paste_scope_id_here`, `paste_registration_id_here`, and `paste_symmetric_key_here` with the data you collected earlier.
6065

6166
```powershell
6267
. {Invoke-WebRequest -useb https://aka.ms/iotedge-win} | Invoke-Expression; `
63-
Initialize-IoTEdge -DpsSymmetricKey -ScopeId {scope ID} -RegistrationId {registration ID} -SymmetricKey {symmetric key}
68+
Initialize-IoTEdge -DpsSymmetricKey -ScopeId paste_scope_id_here -RegistrationId paste_registration_id_here -SymmetricKey paste_symmetric key_here
6469
```
6570

6671
## Verify successful installation

articles/iot-edge/how-to-provision-devices-at-scale-windows-tpm.md

Lines changed: 10 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,13 @@ monikerRange: "=iotedge-2018-06"
1616

1717
This article provides instructions for autoprovisioning an Azure IoT Edge for Windows device by using a Trusted Platform Module (TPM). You can automatically provision IoT Edge devices with the [Azure IoT Hub device provisioning service](../iot-dps/index.yml). If you're unfamiliar with the process of autoprovisioning, review the [provisioning overview](../iot-dps/about-iot-dps.md#provisioning-process) before you continue.
1818

19+
>[!NOTE]
20+
>Azure IoT Edge with Windows containers will not be supported starting with version 1.2 of Azure IoT Edge.
21+
>
22+
>Consider using the new method for running IoT Edge on Windows devices, [Azure IoT Edge for Linux on Windows](iot-edge-for-linux-on-windows.md).
23+
>
24+
>If you want to use Azure IoT Edge for Linux on Windows, you can follow the steps in the [equivalent how-to guide](how-to-provision-devices-at-scale-linux-on-windows-tpm.md).
25+
1926
This article outlines two methodologies. Select your preference based on the architecture of your solution:
2027

2128
- Autoprovision a Windows device with physical TPM hardware.
@@ -117,11 +124,11 @@ After the runtime is installed on your device, configure the device with the inf
117124

118125
1. The `Initialize-IoTEdge` command configures the IoT Edge runtime on your machine. The command defaults to manual provisioning with Windows containers. Use the `-Dps` flag to use the device provisioning service instead of manual provisioning.
119126

120-
Replace the placeholder values for `{scope_id}` and `{registration_id}` with the data you collected earlier.
127+
Replace the placeholder values for `paste_scope_id_here` and `paste_registration_id_here` with the data you collected earlier.
121128

122129
```powershell
123130
. {Invoke-WebRequest -useb https://aka.ms/iotedge-win} | Invoke-Expression; `
124-
Initialize-IoTEdge -Dps -ScopeId {scope ID} -RegistrationId {registration ID}
131+
Initialize-IoTEdge -Dps -ScopeId paste_scope_id_here -RegistrationId paste_registration_id_here
125132
```
126133

127134
## Verify successful installation
@@ -150,4 +157,4 @@ If the runtime started successfully, go into your IoT hub and start deploying Io
150157
151158
The device provisioning service enrollment process lets you set the device ID and device twin tags at the same time as you provision the new device. You can use those values to target individual devices or groups of devices by using automatic device management.
152159
153-
Learn how to [deploy and monitor IoT Edge modules at scale by using the Azure portal](how-to-deploy-at-scale.md) or [the Azure CLI](how-to-deploy-cli-at-scale.md).
160+
Learn how to [deploy and monitor IoT Edge modules at scale by using the Azure portal](how-to-deploy-at-scale.md) or [the Azure CLI](how-to-deploy-cli-at-scale.md).

articles/iot-edge/how-to-provision-devices-at-scale-windows-x509.md

Lines changed: 10 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,13 @@ monikerRange: "=iotedge-2018-06"
1717

1818
This article provides end-to-end instructions for autoprovisioning one or more Windows IoT Edge devices using X.509 certificates. You can automatically provision Azure IoT Edge devices with the [Azure IoT Hub device provisioning service](../iot-dps/index.yml) (DPS). If you're unfamiliar with the process of autoprovisioning, review the [provisioning overview](../iot-dps/about-iot-dps.md#provisioning-process) before continuing.
1919

20+
>[!NOTE]
21+
>Azure IoT Edge with Windows containers will not be supported starting with version 1.2 of Azure IoT Edge.
22+
>
23+
>Consider using the new method for running IoT Edge on Windows devices, [Azure IoT Edge for Linux on Windows](iot-edge-for-linux-on-windows.md).
24+
>
25+
>If you want to use Azure IoT Edge for Linux on Windows, you can follow the steps in the [equivalent how-to guide](how-to-provision-devices-at-scale-linux-on-windows-x509.md).
26+
2027
The tasks are as follows:
2128

2229
1. Generate certificates and keys.
@@ -82,13 +89,13 @@ Have the following information ready:
8289

8390
1. The **Initialize-IoTEdge** command configures the IoT Edge runtime on your machine. The command defaults to manual provisioning with Windows containers, so use the `-DpsX509` flag to use automatic provisioning with X.509 certificate authentication.
8491

85-
Replace the placeholder values for `{scope_id}`, `{identity cert chain path}`, and `{identity key path}` with the appropriate values from your DPS instance and the file paths on your device.
92+
Replace the placeholder values for `scope_id`, `identity cert chain path`, and `identity key path` with the appropriate values from your DPS instance and the file paths on your device.
8693

87-
Add the `-RegistrationId {registration_id}` parameter if you want to set the device ID as something other than the CN name of the identity certificate.
94+
Add the `-RegistrationId paste_registration_id_here` parameter if you want to set the device ID as something other than the CN name of the identity certificate.
8895

8996
```powershell
9097
. {Invoke-WebRequest -useb https://aka.ms/iotedge-win} | Invoke-Expression; `
91-
Initialize-IoTEdge -DpsX509 -ScopeId {scope ID} -X509IdentityCertificate {identity cert chain path} -X509IdentityPrivateKey {identity key path}
98+
Initialize-IoTEdge -DpsX509 -ScopeId paste_scope_id_here -X509IdentityCertificate paste_identity_cert_chain_path_here -X509IdentityPrivateKey paste_identity_key_path_here
9299
```
93100

94101
>[!TIP]

0 commit comments

Comments
 (0)