Skip to content

Commit 12d8a5b

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 9732844 + 611654a commit 12d8a5b

File tree

58 files changed

+542
-226
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

58 files changed

+542
-226
lines changed

articles/active-directory-b2c/add-api-connector-token-enrichment.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -247,8 +247,8 @@ After you deploy your REST API, set the metadata of the `REST-GetProfile` techni
247247

248248
- **ServiceUrl**. Set the URL of the REST API endpoint.
249249
- **SendClaimsIn**. Specify how the input claims are sent to the RESTful claims provider.
250-
- **AuthenticationType**. Set the type of authentication being performed by the RESTful claims provider.
251-
- **AllowInsecureAuthInProduction**. In a production environment, make sure to set this metadata to `true`
250+
- **AuthenticationType**. Set the type of authentication being performed by the RESTful claims provider such as `Basic` or `ClientCertificate`
251+
- **AllowInsecureAuthInProduction**. In a production environment, make sure to set this metadata to `false`
252252

253253
See the [RESTful technical profile metadata](restful-technical-profile.md#metadata) for more configurations.
254254

articles/active-directory-b2c/relyingparty.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 06/27/2021
11+
ms.date: 11/09/2021
1212
ms.custom: project-no-code
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
@@ -240,6 +240,7 @@ When the protocol is `SAML`, a metadata element contains the following elements.
240240
| UseDetachedKeys | No | Possible values: `true`, or `false` (default). When the value is set to `true`, Azure AD B2C changes the format of the encrypted assertions. Using detached keys adds the encrypted assertion as a child of the EncrytedAssertion as opposed to the EncryptedData. |
241241
| WantsSignedResponses| No | Indicates whether Azure AD B2C signs the `Response` section of the SAML response. Possible values: `true` (default) or `false`. |
242242
| RemoveMillisecondsFromDateTime| No | Indicates whether the milliseconds will be removed from datetime values within the SAML response (these include IssueInstant, NotBefore, NotOnOrAfter, and AuthnInstant). Possible values: `false` (default) or `true`. |
243+
| RequestContextMaximumLengthInBytes| No | Indicates the maximum length of the [SAML applications](saml-service-provider.md) `RelayState` parameter. The default is 1000. The maximum is 2048.|
243244

244245
### InputClaims
245246

articles/active-directory/cloud-sync/bread/toc.yml

Lines changed: 2 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -3,22 +3,9 @@
33
topicHref: /azure/index
44
items:
55
- name: Active Directory
6-
tocHref: /azure/active-directory/manage-apps/
7-
topicHref: /azure/active-directory/index
8-
items:
9-
- name: Cloud sync
10-
tocHref: /azure/active-directory/manage-apps/
11-
topicHref: /azure/active-directory/cloud-sync/index
12-
13-
- name: Azure
14-
tocHref: /azure/
15-
topicHref: /azure/index
16-
items:
17-
- name: Active Directory
18-
tocHref: /azure/active-directory/hybrid/
6+
tocHref: /azure/active-directory/
197
topicHref: /azure/active-directory/index
208
items:
219
- name: Cloud sync
2210
tocHref: /azure/active-directory/hybrid/
23-
topicHref: /azure/active-directory/cloud-sync/index
24-
11+
topicHref: /azure/active-directory/cloud-sync/index

articles/active-directory/devices/troubleshoot-device-dsregcmd.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -250,7 +250,7 @@ This section performs various tests to help diagnose join failures. The informat
250250
251251
- **Client Time**: The system time, in UTC.
252252
- **AD Connectivity Test**: This test performs a connectivity test to the domain controller. An error in this test will likely result in join errors in the pre-check phase.
253-
- **AD Configuration Test**: This test reads and verifies whether the Special Containment Procedures (SCP) object is configured properly in the on-premises Active Directory forest. Errors in this test would likely result in join errors in the discover phase with the error code 0x801c001d.
253+
- **AD Configuration Test**: This test reads and verifies whether the Service Connection Point (SCP) object is configured properly in the on-premises Active Directory forest. Errors in this test would likely result in join errors in the discover phase with the error code 0x801c001d.
254254
- **DRS Discovery Test**: This test gets the DRS endpoints from discovery metadata endpoint and performs a user realm request. Errors in this test would likely result in join errors in the discover phase.
255255
- **DRS Connectivity Test**: This test performs a basic connectivity test to the DRS endpoint.
256256
- **Token Acquisition Test**: This test tries to get an Azure AD authentication token if the user tenant is federated. Errors in this test would likely result in join errors in the authentication phase. If authentication fails, sync-join will be attempted as fallback, unless fallback is explicitly disabled with the following registry key settings:

articles/active-directory/hybrid/how-to-connect-sync-endpoint-api-v2.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection: M365-identity-device-management
1515
---
1616

1717
# Azure AD Connect sync V2 endpoint API
18-
Microsoft has deployed a new endpoint (API) for Azure AD Connect that improves the performance of the synchronization service operations to Azure Active Directory. By utilizing the new V2 endpoint, you will experience noticeable performance gains on export and import to Azure AD. This new endpoint supports the following:
18+
Microsoft has deployed a new endpoint (API) for Azure AD Connect that improves the performance of the synchronization service operations to Azure Active Directory. By utilizing the new V2 endpoint, you will experience noticeable performance gains on export and import to Azure AD. This new endpoint supports:
1919

2020
- syncing groups with up to 250k members
2121
- performance gains on export and import to Azure AD
@@ -32,12 +32,13 @@ Microsoft has deployed a new endpoint (API) for Azure AD Connect that improves t
3232
3333
## Prerequisites 
3434
In order to use the new V2 endpoint, you will need to use Azure AD Connect v2.0. When you deploy AADConnect V2.0, the V2 endpoint will be automatically enabled.
35-
Note that support for the V2 endpoint is no longer available for V1.x versions. If you need to sync groups with more than 50K members you need to upgrade to Azure AD Connect V2.0.
35+
Support for the V2 endpoint is no longer available for V1.x versions. If you need to sync groups with more than 50K members, you need to upgrade to Azure AD Connect V2.0.
3636

3737
## Frequently asked questions 
3838

3939
**When will the new end point become the default for upgrades and new installations?**
40-
The V2 endpoint is the default setting for AADConnect V2.0 and is not supported for AADConnect V1.x
40+
The V2 endpoint is the default setting for AADConnect V2.0 and is not supported for AADConnect V1.x.
41+
There is an issue where customers who have the V2 endpoint running with an older version and try to upgrade to a newer V1.6 release will see that the 50K limitation on group membership is reinstated. We won't fix this issue in V1.6 and will require customers to upgrade to AADConnect V2.0 if this is an issue for them.
4142

4243
## Next steps
4344

articles/active-directory/hybrid/reference-connect-version-history.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -69,6 +69,9 @@ However, if you'd like all the latest features and updates, the best way to see
6969
- We fixed a bug where the Autoupgrade process attempted to upgrade AADConnect servers that are running older Windows OS version 2008 or 2008 R2 and failed. These versions of Windows Server are no longer supported. In this release we only attempt autoupgrade on machines that run Windows Server 2012 or newer.
7070
- We fixed an issue where, under certain conditions, miisserver would be crashing due to access violation exception.
7171

72+
### Known Issues
73+
- There is an issue where customers who have the V2 endpoint running with an older version and try to upgrade to a newer V1.6 release will see that the 50K limitation on group membership is reinstated. We will not fix this issue in V1.6 and require customers to upgrade to AADConnect V2.0 if this is an issue for them.
74+
7275
## 2.0.28.0
7376

7477
>[!NOTE]

articles/active-directory/managed-identities-azure-resources/managed-identity-best-practice-recommendations.md

Lines changed: 10 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.devlang:
1212
ms.topic: conceptual
1313
ms.tgt_pltfrm:
1414
ms.workload: identity
15-
ms.date: 10/15/2021
15+
ms.date: 11/09/2021
1616
ms.author: barclayn
1717
---
1818

@@ -34,7 +34,6 @@ If your infrastructure requires that multiple resources require access to the sa
3434

3535
If you require that each resource has its own identity, or have resources that require a unique set of permissions and want the identity to be deleted as the resource is deleted, then you should use a system-assigned identity.
3636

37-
3837
| Scenario| Recommendation|Notes|
3938
|---|---|---|
4039
| Rapid creation of resources (for example, ephemeral computing) with managed identities | User-assigned identity | If you attempt to create multiple managed identities in a short space of time – for example, deploying multiple virtual machines each with their own system-assigned identity - you may exceed the rate limit for Azure Active Directory object creations, and the request will fail with an HTTP 429 error. <br/><br/>If resources are being created or deleted rapidly, you may also exceed the limit on the number of resources in Azure Active Directory if using system-assigned identities. While a deleted system-assigned identity is no longer accessible by any resource, it will count towards your limit until fully purged after 30 days.<br/><br/>Deploying the resources associated with a single user-assigned identity will require the creation of only one Service Principal in Azure Active Directory, avoiding the rate limit. Using a single identity that is created in advance will also reduce the risk of replication delays that could occur if multiple resources are created each with their own identity.<br/><br/>Read more about the [Azure subscription service limits](../../azure-resource-manager/management/azure-subscription-service-limits.md#managed-identity-limits). |
@@ -85,7 +84,7 @@ When granting any identity, including a managed identity, permissions to access
8584

8685
### Consider the effect of assigning managed identities to Azure resources
8786

88-
It is important to note that when an Azure resource, such as an Azure Logic App, an Azure function, or a Virtual Machine, etc. is assigned a managed identity, all the permissions granted to the managed identity are now available to the Azure resource. This is particularly important because if a user has access to install or execute code on this resource, then the user has access to all the identities assigned/associated to the Azure resource. The purpose of managed identity is to give code running on an Azure resource access to other resources, without developers needing to handle or put credentials directly into code to get that access.
87+
It is important to note that when an Azure resource, such as an Azure Logic App, an Azure function, or a Virtual Machine, etc. is assigned a managed identity, all the permissions granted to the managed identity are now available to the Azure resource. This is important because if a user has access to install or execute code on this resource, then the user has access to all the identities assigned/associated to the Azure resource. The purpose of managed identity is to give code running on an Azure resource access to other resources, without developers needing to handle or put credentials directly into code to get that access.
8988

9089
For example, if a managed Identity (ClientId = 1234) has been granted read/write access to ***StorageAccount7755*** and has been assigned to ***LogicApp3388***, then Alice, who does not have any direct permissions over the managed identity or the storage account but has permission to execute code within ***LogicApp3388*** can also read/write data to/from ***StorageAccount7755*** by executing the code that uses the managed identity.
9190

@@ -106,3 +105,11 @@ Role assignments that are associated with deleted managed identities
106105
will be displayed with “Identity not found” when viewed in the portal. [Read more](../../role-based-access-control/troubleshooting.md#role-assignments-with-identity-not-found).
107106

108107
:::image type="content" source="media/managed-identity-best-practice-recommendations/identity-not-found.png" alt-text="Identity not found for role assignment.":::
108+
109+
## Limitation of using Azure AD Groups with managed identities for authorization
110+
111+
Using Azure AD Groups for granting access to services is a great way to simplify the authorization process. The idea is simple – grant permissions to a group and add identities to the group so that they inherit the same permissions. This is a well-established pattern from various on-premises systems and works well when the identities represent users. However, for non-human identities, such as Azure AD Applications and Managed identities, the exact mechanism is not well suited today. Today’s implementation with Azure AD and Azure Role Based Access Control (Azure RBAC), uses access tokens issued by Azure AD for authentication of each identity. However, if the identity is added to a group, its group membership is expressed as a claim in the access token issued by Azure AD. Azure RBAC uses this claim to further evaluate the authorization rules for allowing or denying access.
112+
113+
As the group membership is a claim in the access token, group membership changes do not take effect until the token is refreshed. A human user can acquire a new access token by logging out and in again. Managed identity tokens are cached by the underlying Azure infrastructure for performance and resiliency purposes. This means that it can take several hours for changes to a managed identity’s group membership to take effect. Today, it is not possible to force a managed identity’s token to be refreshed before its expiry. If you change a managed identity’s group membership to add or remove permissions, you may therefore need to wait several hours for the Azure resource using the identity to have the correct access, compared to just a few minutes if you were to add or remove permissions directly on the identity.
114+
115+
To ensure that changes to permissions for managed identities take effect quickly, we recommend that you group Azure resources using a [user-assigned managed identity](how-manage-user-assigned-managed-identities.md?pivots=identity-mi-methods-azcli) with permissions applied directly to the identity, instead of adding to or removing managed identities from an Azure AD group that has permissions. A user-assigned managed identity can be used like a group because it can be assigned to one or more Azure resources to use it. The assignment operation can be controlled using the [Managed identity contributor](../../role-based-access-control/built-in-roles.md#managed-identity-contributor) and [Managed identity operator role](../../role-based-access-control/built-in-roles.md#managed-identity-operator).

articles/aks/azure-files-csi.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Use Container Storage Interface (CSI) drivers for Azure Files on Azure Ku
33
description: Learn how to use the Container Storage Interface (CSI) drivers for Azure Files in an Azure Kubernetes Service (AKS) cluster.
44
services: container-service
55
ms.topic: article
6-
ms.date: 08/27/2020
6+
ms.date: 11/09/2021
77
author: palma21
88

99
---
@@ -254,7 +254,10 @@ kubectl apply -f private-pvc.yaml
254254

255255
[Azure Files supports the NFS v4.1 protocol](../storage/files/storage-files-how-to-create-nfs-shares.md). NFS 4.1 support for Azure Files provides you with a fully managed NFS file system as a service built on a highly available and highly durable distributed resilient storage platform.
256256

257-
This option is optimized for random access workloads with in-place data updates and provides full POSIX file system support. This section shows you how to use NFS shares with the Azure File CSI driver on an AKS cluster.
257+
This option is optimized for random access workloads with in-place data updates and provides full POSIX file system support. This section shows you how to use NFS shares with the Azure File CSI driver on an AKS cluster.
258+
259+
> [!NOTE]
260+
> Make sure cluster `Control plane` identity(with name `AKS Cluster Name`) has `Contributor` permission on vnet resource group.
258261
259262
### Create NFS file share storage class
260263

articles/analysis-services/analysis-services-gateway.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: An On-premises gateway is necessary if your Analysis Services serve
44
author: minewiskan
55
ms.service: azure-analysis-services
66
ms.topic: conceptual
7-
ms.date: 04/27/2021
7+
ms.date: 11/09/2021
88
ms.author: owend
99
ms.reviewer: minewiskan
1010
---
@@ -51,7 +51,7 @@ The following are fully qualified domain names used by the gateway.
5151
| *.frontend.clouddatahub.net |443 |HTTPS |
5252
| *.core.windows.net |443 |HTTPS |
5353
| login.microsoftonline.com |443 |HTTPS |
54-
| *.msftncsi.com |80 |Used to test internet connectivity if the gateway is unreachable by the Power BI service. |
54+
| *.msftncsi.com |443 |Used to test internet connectivity if the gateway is unreachable by the Power BI service. |
5555
| *.microsoftonline-p.com |443 |Used for authentication depending on configuration. |
5656
| dc.services.visualstudio.com |443 |Used by AppInsights to collect telemetry. |
5757

25.7 KB
Loading

0 commit comments

Comments
 (0)