Skip to content

Commit 12b9695

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into azurebl
2 parents 9be5d7c + c148ff5 commit 12b9695

File tree

112 files changed

+767
-630
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

112 files changed

+767
-630
lines changed

articles/active-directory/devices/troubleshoot-mac-sso-extension-plugin.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ Use the following steps to check the operating system (OS) version on the macOS
7777
1. From the macOS device, open Terminal from the **Applications** -> **Utilities** folder.
7878
1. When the Terminal opens type **sw_vers** at the prompt, look for a result like the following:
7979

80-
```bash
80+
```zsh
8181
% sw_vers
8282
ProductName: macOS
8383
ProductVersion: 13.0.1
@@ -194,7 +194,7 @@ Once deployed the **Microsoft Enterprise SSO Extension for Apple devices** suppo
194194
1. When the **Spotlight Search** appears type **Terminal** and hit **return**.
195195
1. When the Terminal opens type **`osascript -e 'id of app "<appname>"'`** at the prompt. See some examples follow:
196196

197-
```bash
197+
```zsh
198198
% osascript -e 'id of app "Safari"'
199199
com.apple.Safari
200200

@@ -294,14 +294,14 @@ During troubleshooting it may be useful to reproduce a problem while tailing the
294294
1. When the **Spotlight Search** appears type: **Terminal** and hit **return**.
295295
1. When the Terminal opens type:
296296

297-
```bash
297+
```zsh
298298
tail -F ~/Library/Containers/com.microsoft.CompanyPortalMac.ssoextension/Data/Library/Caches/Logs/Microsoft/SSOExtension/*
299299
```
300300

301301
> [!NOTE]
302302
> The trailing /* indicates that multiple logs will be tailed should any exist
303303
304-
```
304+
```output
305305
% tail -F ~/Library/Containers/com.microsoft.CompanyPortalMac.ssoextension/Data/Library/Caches/Logs/Microsoft/SSOExtension/*
306306
==> /Users/<username>/Library/Containers/com.microsoft.CompanyPortalMac.ssoextension/Data/Library/Caches/Logs/Microsoft/SSOExtension/SSOExtension 2022-12-25--13-11-52-855.log <==
307307
2022-12-29 14:49:59:281 | I | TID=783491 MSAL 1.2.4 Mac 13.0.1 [2022-12-29 19:49:59] Handling SSO request, requested operation:

articles/active-directory/external-identities/code-samples.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,14 +37,14 @@ You can bulk-invite external users to an organization from email addresses that
3737

3838
3. Sign in to your tenancy
3939

40-
```powershell
40+
```azurepowershell-interactive
4141
$cred = Get-Credential
4242
Connect-AzureAD -Credential $cred
4343
```
4444
4545
4. Run the PowerShell cmdlet
4646
47-
```powershell
47+
```azurepowershell-interactive
4848
$invitations = import-csv C:\data\invitations.csv
4949
$messageInfo = New-Object Microsoft.Open.MSGraph.Model.InvitedUserMessageInfo
5050
$messageInfo.customizedMessageBody = "Hey there! Check this out. I created an invitation through PowerShell"

articles/active-directory/fundamentals/multi-tenant-user-management-scenarios.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -165,13 +165,13 @@ This scenario requires automatic synchronization and identity management to conf
165165

166166
This section describes three techniques for automating account provisioning in the automated scenario.
167167

168-
#### Technique 1: Use the [built-in cross-tenant synchronization capability in Azure AD](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/seamless-application-access-and-lifecycle-management-for-multi/ba-p/3728752)
168+
#### Technique 1: Use the [built-in cross-tenant synchronization capability in Azure AD](../multi-tenant-organizations/cross-tenant-synchronization-overview.md)
169169

170170
This approach only works when all tenants that you need to synchronize are in the same cloud instance (such as Commercial to Commercial).
171171

172172
#### Technique 2: Provision accounts with Microsoft Identity Manager
173173

174-
Use an external Identity and Access Management (IAM) solution such as [Microsoft Identity Manager](https://microsoft.sharepoint-df.com/microsoft-identity-manager/microsoft-identity-manager-2016) (MIM) as a synchronization engine.
174+
Use an external Identity and Access Management (IAM) solution such as [Microsoft Identity Manager](/microsoft-identity-manager/microsoft-identity-manager-2016) (MIM) as a synchronization engine.
175175

176176
This advanced deployment uses MIM as a synchronization engine. MIM calls the [Microsoft Graph API](https://developer.microsoft.com/graph) and [Exchange Online PowerShell](/powershell/exchange/exchange-online/exchange-online-powershell?view=exchange-ps&preserve-view=true). Alternative implementations can include the cloud-hosted [Active Directory Synchronization Service](/windows-server/identity/ad-ds/get-started/virtual-dc/active-directory-domain-services-overview) (ADSS) managed service offering from [Microsoft Industry Solutions](https://www.microsoft.com/industrysolutions). There are non-Microsoft offerings that you can create from scratch with other IAM offerings (such as SailPoint, Omada, and OKTA).
177177

articles/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -178,21 +178,21 @@ To use Azure PowerShell locally for this article instead of using Cloud Shell:
178178

179179
1. Sign in to Azure.
180180

181-
```azurepowershell
181+
```azurepowershell-interactive
182182
Connect-AzAccount
183183
```
184184
185185
1. Install the [latest version of PowerShellGet](/powershell/gallery/powershellget/install-powershellget).
186186
187-
```azurepowershell
187+
```azurepowershell-interactive
188188
Install-Module -Name PowerShellGet -AllowPrerelease
189189
```
190190
191191
You might need to `Exit` out of the current PowerShell session after you run this command for the next step.
192192
193193
1. Install the prerelease version of the `Az.ManagedServiceIdentity` module to perform the user-assigned managed identity operations in this article.
194194
195-
```azurepowershell
195+
```azurepowershell-interactive
196196
Install-Module -Name Az.ManagedServiceIdentity -AllowPrerelease
197197
```
198198
@@ -330,7 +330,7 @@ In this article, you learn how to create, list, and delete a user-assigned manag
330330

331331
1. If you're running locally, sign in to Azure through the Azure CLI.
332332

333-
```
333+
```azurecli-interactive
334334
az login
335335
```
336336

articles/active-directory/managed-identities-azure-resources/qs-configure-cli-windows-vm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -132,7 +132,7 @@ To assign a user-assigned identity to a VM during its creation, your account nee
132132
3. Create a VM using [az vm create](/cli/azure/vm/#az-vm-create). The following example creates a VM associated with the new user-assigned identity, as specified by the `--assign-identity` parameter, with the specified `--role` and `--scope`. Be sure to replace the `<RESOURCE GROUP>`, `<VM NAME>`, `<USER NAME>`, `<PASSWORD>`, `<USER ASSIGNED IDENTITY NAME>`, `<ROLE>`, and `<SUBSCRIPTION>` parameter values with your own values.
133133

134134
```azurecli-interactive
135-
az vm create --resource-group <RESOURCE GROUP> --name <VM NAME> --image UbuntuLTS --admin-username <USER NAME> --admin-password <PASSWORD> --assign-identity <USER ASSIGNED IDENTITY NAME> --role <ROLE> --scope <SUBSCRIPTION>
135+
az vm create --resource-group <RESOURCE GROUP> --name <VM NAME> --image <SKU linux image> --admin-username <USER NAME> --admin-password <PASSWORD> --assign-identity <USER ASSIGNED IDENTITY NAME> --role <ROLE> --scope <SUBSCRIPTION>
136136
```
137137

138138
### Assign a user-assigned managed identity to an existing Azure VM

articles/active-directory/managed-identities-azure-resources/qs-configure-cli-windows-vmss.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -133,7 +133,7 @@ This section walks you through creation of a virtual machine scale set and assig
133133
3. [Create](/cli/azure/vmss/#az-vmss-create) a virtual machine scale set. The following example creates a virtual machine scale set associated with the new user-assigned managed identity, as specified by the `--assign-identity` parameter, with the specified `--role` and `--scope`. Be sure to replace the `<RESOURCE GROUP>`, `<VMSS NAME>`, `<USER NAME>`, `<PASSWORD>`, `<USER ASSIGNED IDENTITY>`, `<ROLE>`, and `<SUBSCRIPTION>` parameter values with your own values.
134134

135135
```azurecli-interactive
136-
az vmss create --resource-group <RESOURCE GROUP> --name <VMSS NAME> --image UbuntuLTS --admin-username <USER NAME> --admin-password <PASSWORD> --assign-identity <USER ASSIGNED IDENTITY> --role <ROLE> --scope <SUBSCRIPTION>
136+
az vmss create --resource-group <RESOURCE GROUP> --name <VMSS NAME> --image <SKU Linux Image> --admin-username <USER NAME> --admin-password <PASSWORD> --assign-identity <USER ASSIGNED IDENTITY> --role <ROLE> --scope <SUBSCRIPTION>
137137
```
138138

139139
### Assign a user-assigned managed identity to an existing virtual machine scale set

articles/active-directory/managed-identities-azure-resources/tutorial-vm-managed-identities-cosmos.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -170,7 +170,7 @@ The user assigned managed identity should be specified using its [resourceID](./
170170
# [Azure CLI](#tab/azure-cli)
171171

172172
```azurecli
173-
az vm create --resource-group <MyResourceGroup> --name <myVM> --image UbuntuLTS --admin-username <USER NAME> --admin-password <PASSWORD> --assign-identity <USER ASSIGNED IDENTITY NAME>
173+
az vm create --resource-group <MyResourceGroup> --name <myVM> --image <SKU Linux Image> --admin-username <USER NAME> --admin-password <PASSWORD> --assign-identity <USER ASSIGNED IDENTITY NAME>
174174
```
175175

176176
[Configure managed identities for Azure resources on a VM using the Azure CLI](qs-configure-cli-windows-vm.md#user-assigned-managed-identity)

articles/active-directory/standards/index.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,12 +24,12 @@ landingContent:
2424
linkLists:
2525
- linkListType: overview
2626
links:
27-
- text: Configure to identity standards
28-
url: standards-overview.md
2927
- text: NIST AAL overview
3028
url: nist-overview.md
3129
- text: FedRAMP High impact overview
3230
url: configure-azure-active-directory-for-fedramp-high-impact.md
31+
- text: Configure Azure Active Directory for Memorandum 22-09 requirements
32+
url: memo-22-09-meet-identity-requirements.md
3333
- text: Configure Azure Active Directory for CMMC compliance
3434
url: configure-azure-active-directory-for-cmmc-compliance.md
3535
- text: Configure Azure Active Directory for HIPAA compliance

articles/aks/node-access.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,8 @@
22
title: Connect to Azure Kubernetes Service (AKS) cluster nodes
33
description: Learn how to connect to Azure Kubernetes Service (AKS) cluster nodes for troubleshooting and maintenance tasks.
44
ms.topic: article
5-
ms.date: 11/3/2022
5+
ms.date: 04/26/2023
6+
ms.reviewer: mattmcinnes
67
ms.custom: contperf-fy21q4
78

89
#Customer intent: As a cluster operator, I want to learn how to connect to virtual machines in an AKS cluster to perform maintenance or troubleshoot a problem.
@@ -16,7 +17,7 @@ This article shows you how to create a connection to an AKS node and update the
1617

1718
## Before you begin
1819

19-
This article assumes you have an SSH key. If not, you can create an SSH key using [macOS or Linux][ssh-nix] or [Windows][ssh-windows]. Make sure you save the key pair in an OpenSSH format, other formats like .ppk are not supported.
20+
This article assumes you have an SSH key. If not, you can create an SSH key using [macOS or Linux][ssh-nix] or [Windows][ssh-windows]. Make sure you save the key pair in an OpenSSH format, other formats like .ppk aren't supported.
2021

2122
You also need the Azure CLI version 2.0.64 or later installed and configured. Run `az --version` to find the version. If you need to install or upgrade, see [Install Azure CLI][install-azure-cli].
2223

@@ -74,7 +75,7 @@ To create the SSH connection to the Windows Server node from another node, use t
7475

7576
> [!IMPORTANT]
7677
>
77-
> The following steps for creating the SSH connection to the Windows Server node from another node can only be used if you created your AKS cluster using the Azure CLI and the `--generate-ssh-keys` parameter. If you didn't use this method to create your cluster, you'll use a password instead of an SSH key. To do this, see [Create the SSH connection to a Windows node using a password](#create-the-ssh-connection-to-a-windows-node-using-a-password)
78+
> The following steps for creating the SSH connection to the Windows Server node from another node can only be used if you created your AKS cluster using the Azure CLI and the `--generate-ssh-keys` parameter. If you didn't use this method to create your cluster, use a password instead of an SSH key. To do this, see [Create the SSH connection to a Windows node using a password](#create-the-ssh-connection-to-a-windows-node-using-a-password)
7879
7980
Open a new terminal window and use the `kubectl get pods` command to get the name of the pod started by `kubectl debug`.
8081

@@ -123,7 +124,7 @@ aksnpwin000000 Ready agent 87s v1.19.9 10.240.0.
123124

124125
In the above example, *10.240.0.67* is the internal IP address of the Windows Server node.
125126

126-
Create an SSH connection to the Windows Server node using the internal IP address, and connect to port 22 through port 2022 on your development computer. The default username for AKS nodes is *azureuser*. Accept the prompt to continue with the connection. You are then provided with the bash prompt of your Windows Server node:
127+
Create an SSH connection to the Windows Server node using the internal IP address, and connect to port 22 through port 2022 on your development computer. The default username for AKS nodes is *azureuser*. Accept the prompt to continue with the connection. You're then provided with the bash prompt of your Windows Server node:
127128

128129
```bash
129130
ssh -o 'ProxyCommand ssh -p 2022 -W %h:%p [email protected]' [email protected]
@@ -217,7 +218,7 @@ kubectl delete pod node-debugger-aks-nodepool1-12345678-vmss000000-bkmmx
217218
> [!NOTE]
218219
> Updating of the SSH key is supported on Azure virtual machine scale sets with AKS clusters.
219220
220-
Use the [az aks update][az-aks-update] command to update the SSH key on the cluster. This operation will update the key on all node pools. You can either specify the key or a key file using the `--ssh-key-value` argument.
221+
Use the [az aks update][az-aks-update] command to update the SSH key on the cluster. This operation updates the key on all node pools. You can either specify the key or a key file using the `--ssh-key-value` argument.
221222

222223
```azurecli
223224
az aks update --name myAKSCluster --resource-group MyResourceGroup --ssh-key-value <new SSH key value or SSH key file>

articles/aks/rdp.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,15 +4,16 @@ titleSuffix: Azure Kubernetes Service
44
description: Learn how to create an RDP connection with Azure Kubernetes Service (AKS) cluster Windows Server nodes for troubleshooting and maintenance tasks.
55
ms.topic: article
66
ms.custom: devx-track-azurecli, devx-track-azurepowershell
7-
ms.date: 07/06/2022
7+
ms.author: mattmcinnes
8+
ms.date: 04/26/2023
89
#Customer intent: As a cluster operator, I want to learn how to use RDP to connect to nodes in an AKS cluster to perform maintenance or troubleshoot a problem.
910
---
1011

1112
# Connect with RDP to Azure Kubernetes Service (AKS) cluster Windows Server nodes for maintenance or troubleshooting
1213

1314
Throughout the lifecycle of your Azure Kubernetes Service (AKS) cluster, you may need to access an AKS Windows Server node. This access could be for maintenance, log collection, or other troubleshooting operations. You can access the AKS Windows Server nodes using RDP. For security purposes, the AKS nodes aren't exposed to the internet.
1415

15-
Alternatively, if you want to SSH to your AKS Windows Server nodes, you'll need access to the same key-pair that was used during cluster creation. Follow the steps in [SSH into Azure Kubernetes Service (AKS) cluster nodes][ssh-steps].
16+
Alternatively, if you want to SSH to your AKS Windows Server nodes, you need access to the same key-pair that was used during cluster creation. Follow the steps in [SSH into Azure Kubernetes Service (AKS) cluster nodes][ssh-steps].
1617

1718
This article shows you how to create an RDP connection with an AKS node using their private IP addresses.
1819

@@ -60,7 +61,7 @@ The following example creates a virtual machine named *myVM* in the *myResourceG
6061

6162
### [Azure CLI](#tab/azure-cli)
6263

63-
You'll need to get the subnet ID used by your Windows Server node pool. The commands below will query for the following information:
64+
You need to get the subnet ID used by your Windows Server node pool and query for:
6465
* The cluster's node resource group
6566
* The virtual network
6667
* The subnet's name
@@ -102,7 +103,7 @@ Record the public IP address of the virtual machine. You'll use this address in
102103

103104
### [Azure PowerShell](#tab/azure-powershell)
104105

105-
You'll need to get the subnet ID used by your Windows Server node pool. The commands below will query for the following information:
106+
You'll need to get the subnet ID used by your Windows Server node pool and query for:
106107
* The cluster's node resource group
107108
* The virtual network
108109
* The subnet's name and address prefix
@@ -153,7 +154,7 @@ The following example output shows the VM has been successfully created and disp
153154
13.62.204.18
154155
```
155156

156-
Record the public IP address of the virtual machine. You'll use this address in a later step.
157+
Record the public IP address of the virtual machine and use the address in a later step.
157158

158159
---
159160

@@ -270,7 +271,7 @@ Connect to the public IP address of the virtual machine you created earlier usin
270271

271272
![Image of connecting to the virtual machine using an RDP client](media/rdp/vm-rdp.png)
272273

273-
After you've connected to your virtual machine, connect to the *internal IP address* of the Windows Server node you want to troubleshoot using an RDP client from within your virtual machine.
274+
After you have connected to your virtual machine, connect to the *internal IP address* of the Windows Server node you want to troubleshoot using an RDP client from within your virtual machine.
274275

275276
![Image of connecting to the Windows Server node using an RDP client](media/rdp/node-rdp.png)
276277

0 commit comments

Comments
 (0)