Skip to content

Commit 1990de4

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into tamram23-0317
2 parents 4fe821c + beba025 commit 1990de4

22 files changed

+572
-409
lines changed

articles/active-directory/privileged-identity-management/groups-activate-roles.md

Lines changed: 6 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: how-to
1010
ms.tgt_pltfrm: na
1111
ms.workload: identity
1212
ms.subservice: pim
13-
ms.date: 01/12/2023
13+
ms.date: 3/15/2023
1414
ms.author: amsliu
1515
ms.reviewer: ilyal
1616
ms.custom: pim
@@ -23,6 +23,11 @@ In Azure Active Directory (Azure AD), part of Microsoft Entra, you can use Privi
2323

2424
This article is for eligible members or owners who want to activate their group membership or ownership in PIM.
2525

26+
>[!IMPORTANT]
27+
>When a group membership or ownership is activated, Azure AD PIM temporarily adds an active assignment. Azure AD PIM creates an active assignment (adds user as member or owner of the group) within seconds. When deactivation (manual or through activation time expiration) happens, Azure AD PIM removes user’s group membership or ownership within seconds as well.
28+
>
29+
>Application may provide access to users based on their group membership. In some situations, application access may not immediately reflect the fact that user was added to the group or removed from it. If application previously cached the fact that user is not member of the group – when user tries to access application again, access may not be provided. Similarly, if application previously cached the fact that user is member of the group – when group membership is deactivated, user may still get access. Specific situation depends on the application’s architecture. For some applications, signing out and signing back in may help to get access added or removed.
30+
2631
## Activate a role
2732

2833
When you need to take on a group membership or ownership, you can request activation by using the **My roles** navigation option in PIM.
@@ -76,15 +81,6 @@ You can view the status of your pending requests to activate. It is specifically
7681

7782
When you select **Cancel**, the request will be canceled. To activate the role again, you will have to submit a new request for activation.
7883

79-
## Troubleshoot
80-
81-
### Permissions are not granted after activating a role
82-
83-
When you activate a role in PIM, the activation may not instantly propagate to all portals that require the privileged role. Sometimes, even if the change is propagated, web caching in a portal may result in the change not taking effect immediately. If your activation is delayed, here is what you should do.
84-
85-
1. Sign out of the Azure portal and then sign back in.
86-
1. In PIM, verify that you are listed as the member of the role.
87-
8884
## Next steps
8985

9086
- [Approve activation requests for group members and owners (preview)](groups-approval-workflow.md)

articles/active-directory/privileged-identity-management/pim-how-to-activate-role.md

Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -6,14 +6,13 @@ documentationcenter: ''
66
author: amsliu
77
manager: amycolannino
88
editor: ''
9-
109
ms.service: active-directory
1110
ms.topic: how-to
1211
ms.workload: identity
1312
ms.subservice: pim
14-
ms.date: 02/02/2022
13+
ms.date: 3/15/2023
1514
ms.author: amsliu
16-
ms.reviewer: shaunliu
15+
ms.reviewer: ilyal
1716
ms.custom: pim
1817
ms.collection: M365-identity-device-management
1918
---
@@ -25,6 +24,11 @@ If you have been made *eligible* for an administrative role, then you must *acti
2524

2625
This article is for administrators who need to activate their Azure AD role in Privileged Identity Management.
2726

27+
>[!IMPORTANT]
28+
>When a role is activated, Azure AD PIM temporarily adds active assignment for the role. Azure AD PIM creates active assignment (assigns user to a role) within seconds. When deactivation (manual or through activation time expiration) happens, Azure AD PIM removes the active assignment within seconds as well.
29+
>
30+
>Application may provide access based on the role the user has. In some situations, application access may not immediately reflect the fact that user got role assigned or removed. If application previously cached the fact that user does not have a role – when user tries to access application again, access may not be provided. Similarly, if application previously cached the fact that user has a role – when role is deactivated, user may still get access. Specific situation depends on the application’s architecture. For some applications, signing out and signing back in may help get access added or removed.
31+
2832
## Activate a role
2933

3034
When you need to assume an Azure AD role, you can request activation by opening **My roles** in Privileged Identity Management.
@@ -230,13 +234,7 @@ If you don't require activation of a role that requires approval, you can cancel
230234

231235
## Deactivate a role assignment
232236

233-
When a role assignment is activated, you'll see a **Deactivate** option in the PIM portal for the role assignment. When you select **Deactivate**, there's a short time lag before the role is deactivated. Also, you can't deactivate a role assignment within five minutes after activation.
234-
235-
## Troubleshoot portal delay
236-
237-
### Permissions aren't granted after activating a role
238-
239-
When you activate a role in Privileged Identity Management, the activation might not instantly propagate to all portals that require the privileged role. Sometimes, even if the change is propagated, web caching in a portal may cause a delay before the change takes effect. If your activation is delayed, sign out of the portal you're trying to perform the action and then sign back in. In the Azure portal, PIM signs you out and back in automatically.
237+
When a role assignment is activated, you'll see a **Deactivate** option in the PIM portal for the role assignment. Also, you can't deactivate a role assignment within five minutes after activation.
240238

241239
## Next steps
242240

articles/active-directory/privileged-identity-management/pim-resource-roles-activate-your-roles.md

Lines changed: 7 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: how-to
1010
ms.tgt_pltfrm: na
1111
ms.workload: identity
1212
ms.subservice: pim
13-
ms.date: 3/1/2023
13+
ms.date: 3/15/2023
1414
ms.author: amsliu
1515
ms.reviewer: rianakarim
1616
ms.custom: pim
@@ -26,6 +26,11 @@ This article is for members who need to activate their Azure resource role in Pr
2626
>[!NOTE]
2727
>As of March 2023, you may now activate your assignments and view your access directly from blades outside of PIM in the Azure portal. Read more [here](pim-resource-roles-activate-your-roles.md#activate-with-azure-portal).
2828
29+
>[!IMPORTANT]
30+
>When a role is activated, Azure AD PIM temporarily adds active assignment for the role. Azure AD PIM creates active assignment (assigns user to a role) within seconds. When deactivation (manual or through activation time expiration) happens, Azure AD PIM removes the active assignment within seconds as well.
31+
>
32+
>Application may provide access based on the role the user has. In some situations, application access may not immediately reflect the fact that user got role assigned or removed. If application previously cached the fact that user does not have a role – when user tries to access application again, access may not be provided. Similarly, if application previously cached the fact that user has a role – when role is deactivated, user may still get access. Specific situation depends on the application’s architecture. For some applications, signing out and signing back in may help get access added or removed.
33+
2934
## Activate a role
3035

3136
When you need to take on an Azure resource role, you can request activation by using the **My roles** navigation option in Privileged Identity Management.
@@ -215,7 +220,7 @@ If you do not require activation of a role that requires approval, you can cance
215220

216221
## Deactivate a role assignment
217222

218-
When a role assignment is activated, you'll see a **Deactivate** option in the PIM portal for the role assignment. When you select **Deactivate**, there's a short time lag before the role is deactivated. Also, you can't deactivate a role assignment within five minutes after activation.
223+
When a role assignment is activated, you'll see a **Deactivate** option in the PIM portal for the role assignment. Also, you can't deactivate a role assignment within five minutes after activation.
219224

220225
## Activate with Azure portal
221226

@@ -233,15 +238,6 @@ In Access control (IAM) for a resource, you can now select “View my access”
233238

234239
By integrating PIM capabilities into different Azure portal blades, this new feature allows you to gain temporary access to view or edit subscriptions and resources more easily.
235240

236-
## Troubleshoot
237-
238-
### Permissions are not granted after activating a role
239-
240-
When you activate a role in Privileged Identity Management, the activation may not instantly propagate to all portals that require the privileged role. Sometimes, even if the change is propagated, web caching in a portal may result in the change not taking effect immediately. If your activation is delayed, here is what you should do.
241-
242-
1. Sign out of the Azure portal and then sign back in.
243-
1. In Privileged Identity Management, verify that you are listed as the member of the role.
244-
245241
## Next steps
246242

247243
- [Extend or renew Azure resource roles in Privileged Identity Management](pim-resource-roles-renew-extend.md)

articles/aks/concepts-vulnerability-management.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Vulnerability management for Azure Kubernetes Service
33
titleSuffix: Azure Kubernetes Service
44
description: Learn how Microsoft manages security vulnerabilities for Azure Kubernetes Service (AKS) clusters.
55
ms.topic: conceptual
6-
ms.date: 03/02/2023
6+
ms.date: 03/17/2023
77

88
---
99

@@ -27,9 +27,9 @@ Microsoft identifies and patches vulnerabilities and missing security updates fo
2727

2828
## AKS Container Images
2929

30-
While the [Cloud Native Computing Foundation][cloud-native-computing-foundation] (CNCF) owns and maintains most of the code running in AKS, the Azure Container Upstream team takes responsibility for building the open-source packages that we deploy on AKS. With that responsibility, it includes having complete ownership of the build, scan, sign, validate, and hotfix process and control over the binaries in container images. By us having responsibility for building the open-source packages deployed on AKS, it enables us to both establish a software supply chain over the binary, and patch the software as needed.
30+
While the [Cloud Native Computing Foundation][cloud-native-computing-foundation] (CNCF) owns and maintains most of the code running in AKS, Microsoft takes responsibility for building the open-source packages that we deploy on AKS. With that responsibility, it includes having complete ownership of the build, scan, sign, validate, and hotfix process and control over the binaries in container images. By us having responsibility for building the open-source packages deployed on AKS, it enables us to both establish a software supply chain over the binary, and patch the software as needed.  
3131

32-
Microsoft has invested in engineers (the Azure Container Upstream team) and infrastructure in the broader Kubernetes ecosystem to help build the future of cloud-native compute in the wider CNCF community. A notable example of this is the donation of engineering time to help manage Kubernetes releases. This work not only ensures the quality of every Kubernetes release for the world, but also enables AKS quickly get new Kubernetes releases out into production for several years. In some cases, ahead of other cloud providers by several months. Microsoft collaborates with other industry partners in the Kubernetes security organization. For example, the Security Response Committee (SRC) receives, prioritizes, and patches embargoed security vulnerabilities before they're announced to the public. This commitment ensures Kubernetes is secure for everyone, and enables AKS to patch and respond to vulnerabilities faster to keep our customers safe. In addition to Kubernetes, Microsoft has signed up to receive pre-release notifications for software vulnerabilities for products such as Envoy, container runtimes, and many other open-source projects.
32+
Microsoft is active in the broader Kubernetes ecosystem to help build the future of cloud-native compute in the wider CNCF community. This work not only ensures the quality of every Kubernetes release for the world, but also enables AKS quickly get new Kubernetes releases out into production for several years. In some cases, ahead of other cloud providers by several months. Microsoft collaborates with other industry partners in the Kubernetes security organization. For example, the Security Response Committee (SRC) receives, prioritizes, and patches embargoed security vulnerabilities before they're  announced to the public. This commitment ensures Kubernetes is secure for everyone, and enables AKS to patch and respond to vulnerabilities faster to keep our customers safe. In addition to Kubernetes, Microsoft has signed up to receive pre-release notifications for software vulnerabilities for products such as Envoy, container runtimes, and many other open-source projects.
3333

3434
Microsoft scans container images using static analysis to discover vulnerabilities and missing updates in Kubernetes and Microsoft-managed containers. If fixes are available, the scanner automatically begins the update and release process.
3535

@@ -133,4 +133,4 @@ See the overview about [Upgrading Azure Kubernetes Service clusters and node poo
133133
[mrc-create-report]: https://aka.ms/opensource/security/create-report
134134
[msrc-pgp-key-page]: https://aka.ms/opensource/security/pgpkey
135135
[microsoft-security-response-center]: https://aka.ms/opensource/security/msrc
136-
[azure-bounty-program-overview]: https://www.microsoft.com/msrc/bounty-microsoft-azure
136+
[azure-bounty-program-overview]: https://www.microsoft.com/msrc/bounty-microsoft-azure

0 commit comments

Comments
 (0)