You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/troubleshoot-alerts.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
10
10
ms.subservice: domain-services
11
11
ms.workload: identity
12
12
ms.topic: troubleshooting
13
-
ms.date: 08/17/2022
13
+
ms.date: 09/20/2022
14
14
ms.author: justinha
15
15
16
16
---
@@ -193,7 +193,9 @@ The managed domain's health automatically updates itself within two hours and re
193
193
194
194
### Resolution
195
195
196
-
This error is unrecoverable. To resolve the alert, [delete your existing managed domain](delete-aadds.md) and recreate it. If you have trouble deleting the managed domain, [open an Azure support request][azure-support] for additional troubleshooting assistance.
196
+
Azure AD DS creates additional resources to function properly, such as public IP addresses, virtual network interfaces, and a load balancer. If any of these resources are modified, the managed domain is in an unsupported state and can't be managed. For more information about these resources, see [Network resources used by Azure AD DS](network-considerations.md#network-resources-used-by-azure-ad-ds).
197
+
198
+
This alert is generated when one of these required resources is modified and can't automatically be recovered by Azure AD DS. To resolve the alert, [open an Azure support request][azure-support] to fix the instance.
# Application types for the Microsoft identity platform
19
19
20
-
The Microsoft identity platform supports authentication for a variety of modern app architectures, all of them based on industry-standard protocols [OAuth 2.0 or OpenID Connect](active-directory-v2-protocols.md). This article describes the types of apps that you can build by using Microsoft identity platform, regardless of your preferred language or platform. The information is designed to help you understand high-level scenarios before you start working with the code in the [application scenarios](authentication-flows-app-scenarios.md#application-scenarios).
20
+
The Microsoft identity platform supports authentication for various modern app architectures, all of them based on industry-standard protocols [OAuth 2.0 or OpenID Connect](active-directory-v2-protocols.md). This article describes the types of apps that you can build by using Microsoft identity platform, regardless of your preferred language or platform. The information is designed to help you understand high-level scenarios before you start working with the code in the [application scenarios](authentication-flows-app-scenarios.md#application-scenarios).
Many modern apps have a single-page app front end written primarily in JavaScript, often with a framework like Angular, React, or Vue. The Microsoft identity platform supports these apps by using the [OpenID Connect](v2-protocols-oidc.md) protocol for authentication and either [OAuth 2.0 implicit grant flow](v2-oauth2-implicit-grant-flow.md) or the more recent [OAuth 2.0 authorization code + PKCE flow](v2-oauth2-auth-code-flow.md) for authorization (see below).
41
+
Many modern apps have a single-page app front end written primarily in JavaScript, often with a framework like Angular, React, or Vue. The Microsoft identity platform supports these apps by using the [OpenID Connect](v2-protocols-oidc.md) protocol for authentication and one of two types of authorization grants defined by OAuth 2.0. The supported grant types are either the [OAuth 2.0 implicit grant flow](v2-oauth2-implicit-grant-flow.md) or the more recent [OAuth 2.0 authorization code + PKCE flow](v2-oauth2-auth-code-flow.md) (see below).
42
42
43
43
The flow diagram below demonstrates the OAuth 2.0 authorization code grant (with details around PKCE omitted), where the app receives a code from the Microsoft identity platform `authorize` endpoint, and redeems it for an access token and a refresh token using cross-site web requests. The access token expires every 24 hours, and the app must request another code using the refresh token. In addition to the access token, an `id_token` that represents the signed-in user to the client application is typically also requested through the same flow and/or a separate OpenID Connect request (not shown here).
44
44
@@ -48,9 +48,7 @@ To see this scenario in action, check out the [Tutorial: Sign in users and call
48
48
49
49
### Authorization code flow vs. implicit flow
50
50
51
-
For most of the history of OAuth 2.0, the [implicit flow](v2-oauth2-implicit-grant-flow.md) was the recommended way to build single-page apps. With the removal of [third-party cookies](reference-third-party-cookies-spas.md) and [greater attention](https://tools.ietf.org/html/draft-ietf-oauth-security-topics-14) paid to security concerns around the implicit flow, we've moved to the authorization code flow for single-page apps.
52
-
53
-
To ensure compatibility of your app in Safari and other privacy-conscious browsers, we no longer recommend use of the implicit flow and instead recommend the authorization code flow.
51
+
For most of the history of OAuth 2.0, the [implicit flow](v2-oauth2-implicit-grant-flow.md) was the recommended way to build single-page apps. With the removal of [third-party cookies](reference-third-party-cookies-spas.md) and [greater attention](https://tools.ietf.org/html/draft-ietf-oauth-security-topics-14) paid to security concerns around the implicit flow, the authorization code flow for single-page apps should now be implemented to ensure compatibility of your app in Safari and other privacy-conscious browsers. The continued use of the implicit flow is not recommended.
Further details of different types of tokens used in the Microsoft identity platform are available in the [access token](access-tokens.md) reference and [id_token reference](id-tokens.md)
70
+
Further details of different types of tokens used in the Microsoft identity platform are available in the [access token](access-tokens.md) reference and [id_token](id-tokens.md) reference.
73
71
74
72
In web server apps, the sign-in authentication flow takes these high-level steps:
75
73
76
74

77
75
78
76
You can ensure the user's identity by validating the ID token with a public signing key that is received from the Microsoft identity platform. A session cookie is set, which can be used to identify the user on subsequent page requests.
79
77
80
-
To see this scenario in action, try the code samples in the [Web app that signs in users scenario](scenario-web-app-sign-user-overview.md).
78
+
To see this scenario in action, try the code samples in [Sign in users from a Web app](scenario-web-app-sign-user-overview.md).
81
79
82
-
In addition to simple sign-in, a web server app might need to access another web service, such as a REST API. In this case, the web server app engages in a combined OpenID Connect and OAuth 2.0 flow, by using the [OAuth 2.0 authorization code flow](v2-oauth2-auth-code-flow.md). For more information about this scenario, read about [getting started with web apps and Web APIs](https://github.com/AzureADQuickStarts/AppModelv2-WebApp-WebAPI-OpenIDConnect-DotNet).
80
+
In addition to simple sign-in, a web server app might need to access another web service, such as a Representational State Transfer ([REST](https://docs.microsoft.com/rest/api/azure/)) API. In this case, the web server app engages in a combined OpenID Connect and OAuth 2.0 flow, by using the [OAuth 2.0 authorization code flow](v2-oauth2-auth-code-flow.md). For more information about this scenario, refer to our code [sample](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/blob/master/2-WebApp-graph-user/2-1-Call-MSGraph/README.md).
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/review-admin-consent-requests.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -51,7 +51,7 @@ To review the admin consent requests and take action:
51
51
52
52
## Review admin consent requests using Microsoft Graph
53
53
54
-
To review the admin consent requests programmatically, use the [appConsentRequest resource type](/graph/api/resources/userconsentrequest) and [userConsentRequest resource type](/graph/api/resources/userconsentrequest) and their associated methods in Microsoft Graph. You cannot approve or deny consent requests using Microsoft Graph.
54
+
To review the admin consent requests programmatically, use the [appConsentRequest resource type](/graph/api/resources/appconsentrequest) and [userConsentRequest resource type](/graph/api/resources/userconsentrequest) and their associated methods in Microsoft Graph. You cannot approve or deny consent requests using Microsoft Graph.
55
55
56
56
## Next steps
57
57
-[Review permissions granted to apps](manage-application-permissions.md)
Copy file name to clipboardExpand all lines: articles/azure-arc/data/connectivity.md
+41-16Lines changed: 41 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ ms.topic: conceptual
18
18
19
19
There are multiple options for the degree of connectivity from your Azure Arc-enabled data services environment to Azure. As your requirements vary based on business policy, government regulation, or the availability of network connectivity to Azure, you can choose from the following connectivity modes.
20
20
21
-
Azure Arc-enabled data services provides you the option to connect to Azure in two different *connectivity modes*:
21
+
Azure Arc-enabled data services provide you the option to connect to Azure in two different *connectivity modes*:
22
22
23
23
- Directly connected
24
24
- Indirectly connected
@@ -43,7 +43,7 @@ Some Azure-attached services are only available when they can be directly reache
|**Automatic high availability**|Supported|Supported|
46
-
|**Self-service provisioning**|Supported<br/>Creation can be done through Azure Data Studio, the appropriate CLI, or Kubernetes native tools (helm, kubectl, oc, etc.), or using Azure Arc-enabled Kubernetes GitOps provisioning.|Supported<br/>In addition to the indirectly connected mode creation options, you can also create through the Azure portal, Azure Resource Manager APIs, the Azure CLI, or ARM templates.
46
+
|**Self-service provisioning**|Supported<br/>Use Azure Data Studio, the appropriate CLI, or Kubernetes native tools like Helm, `kubectl`, or `oc`, or use Azure Arc-enabled Kubernetes GitOps provisioning.|Supported<br/>In addition to the indirectly connected mode creation options, you can also create through the Azure portal, Azure Resource Manager APIs, the Azure CLI, or ARM templates.
|**Billing**|Supported<br/>Billing data is periodically exported out and sent to Azure.|Supported<br/>Billing data is automatically and continuously sent to Azure and reflected in near real time. |
49
49
|**Inventory management**|Supported<br/>Inventory data is periodically exported out and sent to Azure.<br/><br/>Use client tools like Azure Data Studio, Azure Data CLI, or `kubectl` to view and manage inventory locally.|Supported<br/>Inventory data is automatically and continuously sent to Azure and reflected in near real time. As such, you can manage inventory directly from the Azure portal.|
@@ -76,8 +76,10 @@ Some Azure-attached services are only available when they can be directly reache
76
76
There are three connections required to services available on the Internet. These connections include:
-[Azure Arc data processing service](#azure-arc-data-processing-service)
81
83
82
84
All HTTPS connections to Azure and the Microsoft Container Registry are encrypted using SSL/TLS using officially signed and verifiable certificates.
83
85
@@ -111,9 +113,9 @@ Yes
111
113
112
114
None
113
115
114
-
### Helm chart used to create data controller in direct connected mode
116
+
### Helm chart (direct connected mode)
115
117
116
-
The helm chart used to provision the Azure Arc data controller bootstrapper and cluster level objects, such as custom resource definitions, cluster roles, and cluster role bindings, is pulled from an Azure Container Registry.
118
+
The Helm chart used to provision the Azure Arc data controller bootstrapper and cluster level objects, such as custom resource definitions, cluster roles, and cluster role bindings, is pulled from an Azure Container Registry.
117
119
118
120
#### Connection source
119
121
@@ -150,18 +152,6 @@ A computer running Azure Data Studio, or Azure CLI that is connecting to Azure.
150
152
151
153
-`login.microsoftonline.com`
152
154
-`management.azure.com`
153
-
-`san-af-eastus-prod.azurewebsites.net`
154
-
-`san-af-eastus2-prod.azurewebsites.net`
155
-
-`san-af-australiaeast-prod.azurewebsites.net`
156
-
-`san-af-centralus-prod.azurewebsites.net`
157
-
-`san-af-westus2-prod.azurewebsites.net`
158
-
-`san-af-westeurope-prod.azurewebsites.net`
159
-
-`san-af-southeastasia-prod.azurewebsites.net`
160
-
-`san-af-koreacentral-prod.azurewebsites.net`
161
-
-`san-af-northeurope-prod.azurewebsites.net`
162
-
-`san-af-westeurope-prod.azurewebsites.net`
163
-
-`san-af-uksouth-prod.azurewebsites.net`
164
-
-`san-af-francecentral-prod.azurewebsites.net`
165
155
166
156
#### Protocol
167
157
@@ -175,6 +165,8 @@ HTTPS
175
165
176
166
Yes
177
167
168
+
To use proxy, verify that the agents meet the network requirements. See [Meet network requirements](../kubernetes/quickstart-connect-cluster.md#meet-network-requirements).
169
+
178
170
#### Authentication
179
171
180
172
Azure Active Directory
@@ -219,3 +211,36 @@ Azure Active Directory
219
211
> For now, all browser HTTPS/443 connections to the data controller for running the command `az arcdata dc export` and Grafana and Kibana dashboards are SSL encrypted using self-signed certificates. A feature will be available in the future that will allow you to provide your own certificates for encryption of these SSL connections.
220
212
221
213
Connectivity from Azure Data Studio to the Kubernetes API server uses the Kubernetes authentication and encryption that you have established. Each user that is using Azure Data Studio or CLI must have an authenticated connection to the Kubernetes API to perform many of the actions related to Azure Arc-enabled data services.
214
+
215
+
### Azure Arc data processing service
216
+
217
+
Points to the data processing service endpoint in connection
218
+
219
+
#### Connection target
220
+
221
+
-`san-af-eastus-prod.azurewebsites.net`
222
+
-`san-af-eastus2-prod.azurewebsites.net`
223
+
-`san-af-australiaeast-prod.azurewebsites.net`
224
+
-`san-af-centralus-prod.azurewebsites.net`
225
+
-`san-af-westus2-prod.azurewebsites.net`
226
+
-`san-af-westeurope-prod.azurewebsites.net`
227
+
-`san-af-southeastasia-prod.azurewebsites.net`
228
+
-`san-af-koreacentral-prod.azurewebsites.net`
229
+
-`san-af-northeurope-prod.azurewebsites.net`
230
+
-`san-af-westeurope-prod.azurewebsites.net`
231
+
-`san-af-uksouth-prod.azurewebsites.net`
232
+
-`san-af-francecentral-prod.azurewebsites.net`
233
+
234
+
#### Protocol
235
+
236
+
HTTPS
237
+
238
+
#### Can use proxy
239
+
240
+
Yes
241
+
242
+
To use proxy, verify that the agents meet the network requirements. See [Meet network requirements](../kubernetes/quickstart-connect-cluster.md#meet-network-requirements).
0 commit comments