Skip to content

Commit 1c50792

Browse files
authored
Merge pull request #203838 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 99d33a5 + 8d230dd commit 1c50792

File tree

33 files changed

+113
-101
lines changed

33 files changed

+113
-101
lines changed

articles/active-directory-b2c/partner-akamai.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ Akamai WAF integration includes the following components:
4848

4949
- **Azure AD B2C Tenant** – The authorization server, responsible for verifying the user’s credentials using the custom policies defined in the tenant. It's also known as the identity provider.
5050

51-
- [**Azure Front Door**](../frontdoor/front-door-overview.md) – Responsible for enabling custom domains for Azure B2C tenant. All traffic from Cloudflare WAF will be routed to Azure Front Door before arriving at Azure AD B2C tenant.
51+
- [**Azure Front Door**](../frontdoor/front-door-overview.md) – Responsible for enabling custom domains for Azure B2C tenant. All traffic from Akamai WAF will be routed to Azure Front Door before arriving at Azure AD B2C tenant.
5252

5353
- [**Akamai WAF**](https://www.akamai.com/us/en/resources/waf.jsp) – The web application firewall, which manages all traffic that is sent to the authorization server.
5454

articles/active-directory/develop/scenario-web-api-call-api-app-configuration.md

Lines changed: 48 additions & 49 deletions
Original file line numberDiff line numberDiff line change
@@ -41,17 +41,16 @@ In the following example, the `GraphBeta` section specifies these settings.
4141
"AzureAd": {
4242
"Instance": "https://login.microsoftonline.com/",
4343
"ClientId": "[Client_id-of-web-api-eg-2ec40e65-ba09-4853-bcde-bcb60029e596]",
44-
"TenantId": "common"
45-
46-
// To call an API
47-
"ClientSecret": "[Copy the client secret added to the app from the Azure portal]",
48-
"ClientCertificates": [
49-
]
50-
},
51-
"GraphBeta": {
44+
"TenantId": "common",
45+
46+
// To call an API
47+
"ClientSecret": "[Copy the client secret added to the app from the Azure portal]",
48+
"ClientCertificates": []
49+
},
50+
"GraphBeta": {
5251
"BaseUrl": "https://graph.microsoft.com/beta",
5352
"Scopes": "user.read"
54-
}
53+
}
5554
}
5655
```
5756

@@ -62,16 +61,16 @@ Instead of a client secret, you can provide a client certificate. The following
6261
"AzureAd": {
6362
"Instance": "https://login.microsoftonline.com/",
6463
"ClientId": "[Client_id-of-web-api-eg-2ec40e65-ba09-4853-bcde-bcb60029e596]",
65-
"TenantId": "common"
66-
67-
// To call an API
68-
"ClientCertificates": [
64+
"TenantId": "common",
65+
66+
// To call an API
67+
"ClientCertificates": [
6968
{
7069
"SourceType": "KeyVault",
7170
"KeyVaultUrl": "https://msidentitywebsamples.vault.azure.net",
7271
"KeyVaultCertificateName": "MicrosoftIdentitySamplesCert"
7372
}
74-
]
73+
]
7574
},
7675
"GraphBeta": {
7776
"BaseUrl": "https://graph.microsoft.com/beta",
@@ -91,17 +90,17 @@ using Microsoft.Identity.Web;
9190

9291
public class Startup
9392
{
94-
// ...
95-
public void ConfigureServices(IServiceCollection services)
96-
{
97-
// ...
98-
services.AddAuthentication(JwtBearerDefaults.AuthenticationScheme)
99-
.AddMicrosoftIdentityWebApi(Configuration, Configuration.GetSection("AzureAd"))
100-
.EnableTokenAcquisitionToCallDownstreamApi()
101-
.AddInMemoryTokenCaches();
102-
// ...
103-
}
104-
// ...
93+
// ...
94+
public void ConfigureServices(IServiceCollection services)
95+
{
96+
// ...
97+
services.AddAuthentication(JwtBearerDefaults.AuthenticationScheme)
98+
.AddMicrosoftIdentityWebApi(Configuration, Configuration.GetSection("AzureAd"))
99+
.EnableTokenAcquisitionToCallDownstreamApi()
100+
.AddInMemoryTokenCaches();
101+
// ...
102+
}
103+
// ...
105104
}
106105
```
107106

@@ -119,18 +118,18 @@ using Microsoft.Identity.Web;
119118

120119
public class Startup
121120
{
122-
// ...
123-
public void ConfigureServices(IServiceCollection services)
124-
{
125-
// ...
126-
services.AddAuthentication(JwtBearerDefaults.AuthenticationScheme)
127-
.AddMicrosoftIdentityWebApi(Configuration, Configuration.GetSection("AzureAd"))
128-
.EnableTokenAcquisitionToCallDownstreamApi()
129-
.AddMicrosoftGraph(Configuration.GetSection("GraphBeta"))
130-
.AddInMemoryTokenCaches();
131-
// ...
132-
}
133-
// ...
121+
// ...
122+
public void ConfigureServices(IServiceCollection services)
123+
{
124+
// ...
125+
services.AddAuthentication(JwtBearerDefaults.AuthenticationScheme)
126+
.AddMicrosoftIdentityWebApi(Configuration, Configuration.GetSection("AzureAd"))
127+
.EnableTokenAcquisitionToCallDownstreamApi()
128+
.AddMicrosoftGraph(Configuration.GetSection("GraphBeta"))
129+
.AddInMemoryTokenCaches();
130+
// ...
131+
}
132+
// ...
134133
}
135134
```
136135

@@ -143,18 +142,18 @@ using Microsoft.Identity.Web;
143142

144143
public class Startup
145144
{
146-
// ...
147-
public void ConfigureServices(IServiceCollection services)
148-
{
149-
// ...
150-
services.AddAuthentication(JwtBearerDefaults.AuthenticationScheme)
151-
.AddMicrosoftIdentityWebApi(Configuration, "AzureAd")
152-
.EnableTokenAcquisitionToCallDownstreamApi()
153-
.AddDownstreamWebApi("MyApi", Configuration.GetSection("GraphBeta"))
154-
.AddInMemoryTokenCaches();
155-
// ...
156-
}
157-
// ...
145+
// ...
146+
public void ConfigureServices(IServiceCollection services)
147+
{
148+
// ...
149+
services.AddAuthentication(JwtBearerDefaults.AuthenticationScheme)
150+
.AddMicrosoftIdentityWebApi(Configuration, "AzureAd")
151+
.EnableTokenAcquisitionToCallDownstreamApi()
152+
.AddDownstreamWebApi("MyApi", Configuration.GetSection("GraphBeta"))
153+
.AddInMemoryTokenCaches();
154+
// ...
155+
}
156+
// ...
158157
}
159158
```
160159

articles/active-directory/reports-monitoring/howto-integrate-activity-logs-with-log-analytics.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ If you want to know for how long the activity data is stored in a Premium tenant
8282
* To send audit logs to the Log Analytics workspace, select the **AuditLogs** check box.
8383
* To send sign-in logs to the Log Analytics workspace, select the **SignInLogs** check box.
8484
* To send non-interactive user sign-in logs to the Log Analytics workspace, select the **NonInteractiveUserSignInLogs** check box.
85-
* To send service principle sign-in logs to the Log Analytics workspace, select the **ServicePrincipleSignInLogs** check box.
85+
* To send service principal sign-in logs to the Log Analytics workspace, select the **ServicePrincipalSignInLogs** check box.
8686
* To send managed identity sign-in logs to the Log Analytics workspace, select the **ManagedIdentitySignInLogs** check box.
8787
* To send provisioning logs to the Log Analytics workspace, select the **ProvisioningLogs** check box.
8888
* To send Active Directory Federation Services (ADFS) sign-in logs to the Log Analytics workspace, select **ADFSSignInLogs**.

articles/api-management/howto-protect-backend-frontend-azure-ad-b2c.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -167,7 +167,7 @@ Open the Azure AD B2C blade in the portal and do the following steps.
167167
```
168168

169169
> [!TIP]
170-
> The c# script function code you just pasted simply logs a line to the functions logs, and returns the text "Hello World" with some dynamic data (the date and time).
170+
> The C# script function code you just pasted simply logs a line to the functions logs, and returns the text "Hello World" with some dynamic data (the date and time).
171171
172172
1. Select “Integration” from the left-hand blade, then click the http (req) link inside the 'Trigger' box.
173173
1. From the 'Selected HTTP methods' dropdown, uncheck the http POST method, leaving only GET selected, then click Save.

articles/attestation/overview.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.custom: references_regions
1212
---
1313
# Microsoft Azure Attestation
1414

15-
Microsoft Azure Attestation is a unified solution for remotely verifying the trustworthiness of a platform and integrity of the binaries running inside it. The service supports attestation of the platforms backed by Trusted Platform Modules (TPMs) alongside the ability to attest to the state of Trusted Execution Environments (TEEs) such as [Intel® Software Guard Extensions](https://www.intel.com/content/www/us/en/architecture-and-technology/software-guard-extensions.html) (SGX) enclaves, [Virtualization-based Security](/windows-hardware/design/device-experiences/oem-vbs) (VBS) enclaves, [Trusted Platform Modules (TPMs)](/windows/security/information-protection/tpm/trusted-platform-module-overview), [Trusted launch for Azure VMs](../virtual-machines/trusted-launch.md) and [Azure confidential VMs](../confidential-computing/confidential-vm-overview.md).
15+
Microsoft Azure Attestation is a unified solution for remotely verifying the trustworthiness of a platform and integrity of the binaries running inside it. The service supports attestation of the platforms backed by Trusted Platform Modules (TPMs) alongside the ability to attest to the state of Trusted Execution Environments (TEEs) such as [Intel® Software Guard Extensions](https://www.intel.com/content/www/us/en/architecture-and-technology/software-guard-extensions.html) (SGX) enclaves, [Virtualization-based Security](/windows-hardware/design/device-experiences/oem-vbs) (VBS) enclaves, [Trusted Platform Modules (TPMs)](/windows/security/information-protection/tpm/trusted-platform-module-overview), [Trusted launch for Azure VMs](../virtual-machines/trusted-launch.md) and [Azure confidential VMs](../confidential-computing/confidential-vm-overview.md).
1616

1717
Attestation is a process for demonstrating that software binaries were properly instantiated on a trusted platform. Remote relying parties can then gain confidence that only such intended software is running on trusted hardware. Azure Attestation is a unified customer-facing service and framework for attestation.
1818

@@ -26,11 +26,11 @@ Azure Attestation provides comprehensive attestation services for multiple envir
2626

2727
### SGX enclave attestation
2828

29-
[Intel® Software Guard Extensions](https://www.intel.com/content/www/us/en/architecture-and-technology/software-guard-extensions.html) (SGX) refers to hardware-grade isolation, which is supported on certain Intel CPUs models. SGX enables code to run in sanitized compartments known as SGX enclaves. Access and memory permissions are then managed by hardware to ensure a minimal attack surface with proper isolation.
29+
[Intel® Software Guard Extensions](https://www.intel.com/content/www/us/en/architecture-and-technology/software-guard-extensions.html) (SGX) refers to hardware-grade isolation, which is supported on certain Intel CPU models. SGX enables code to run in sanitized compartments known as SGX enclaves. Access and memory permissions are then managed by hardware to ensure a minimal attack surface with proper isolation.
3030

3131
Client applications can be designed to take advantage of SGX enclaves by delegating security-sensitive tasks to take place inside those enclaves. Such applications can then make use of Azure Attestation to routinely establish trust in the enclave and its ability to access sensitive data.
3232

33-
Intel® Xeon® Scalable processors only support [ECDSA-based attestation solutions](https://software.intel.com/content/www/us/en/develop/topics/software-guard-extensions/attestation-services.html#Elliptic%20Curve%20Digital%20Signature%20Algorithm%20(ECDSA)%20Attestation) for remotely attesting SGX enclaves. Utilizing ECDSA based attestation model, Azure Attestation supports validation of Intel® Xeon® E3 processors and Intel® Xeon® Scalable processor-based server platforms.
33+
Intel® Xeon® Scalable processors only support [ECDSA-based attestation solutions](https://software.intel.com/content/www/us/en/develop/topics/software-guard-extensions/attestation-services.html#Elliptic%20Curve%20Digital%20Signature%20Algorithm%20(ECDSA)%20Attestation) for remotely attesting SGX enclaves. Utilizing ECDSA based attestation model, Azure Attestation supports validation of Intel® Xeon® E3 processors and Intel® Xeon® Scalable processor-based server platforms.
3434

3535
> [!NOTE]
3636
> To perform attestation of Intel® Xeon® Scalable processor-based server platforms using Azure Attestation, users are expected to install [Azure DCAP version 1.10.0](https://github.com/microsoft/Azure-DCAP-Client) or higher.
@@ -42,7 +42,7 @@ OE standardizes specific requirements for verification of an enclave evidence. T
4242

4343
### TPM attestation
4444

45-
[Trusted Platform Modules (TPM)](/windows/security/information-protection/tpm/trusted-platform-module-overview) based attestation is critical to provide proof of a platforms’ state. TPM acts as the root of trust and the security coprocessor to provide cryptographic validity to the measurements(evidence). Devices with a TPM, can rely on attestation to prove that boot integrity is not compromised along with using the claims to detect feature states enablement’s during boot.
45+
[Trusted Platform Modules (TPM)](/windows/security/information-protection/tpm/trusted-platform-module-overview) based attestation is critical to provide proof of a platform's state. A TPM acts as the root of trust and the security coprocessor to provide cryptographic validity to the measurements (evidence). Devices with a TPM can rely on attestation to prove that boot integrity is not compromised and use the claims to detect feature state enablement during boot.
4646

4747
Client applications can be designed to take advantage of TPM attestation by delegating security-sensitive tasks to only take place after a platform has been validated to be secure. Such applications can then make use of Azure Attestation to routinely establish trust in the platform and its ability to access sensitive data.
4848

@@ -52,7 +52,7 @@ Azure [Confidential VM](../confidential-computing/confidential-vm-overview.md) (
5252

5353
### Trusted Launch attestation
5454

55-
Azure customers can [prevent bootkit and rootkit infections](https://www.youtube.com/watch?v=CQqu_rTSi0Q) by enabling [Trusted launch](../virtual-machines/trusted-launch.md)) for their virtual machines (VMs). When the VM is Secure Boot and vTPM enabled with guest attestation extension installed, vTPM measurements get submitted to Azure Attestation periodically for monitoring of boot integrity. An attestation failure indicates potential malware, which is surfaced to customers via Microsoft Defender for Cloud, through Alerts and Recommendations.
55+
Azure customers can [prevent bootkit and rootkit infections](https://www.youtube.com/watch?v=CQqu_rTSi0Q) by enabling [trusted launch](../virtual-machines/trusted-launch.md) for their virtual machines (VMs). When the VM is Secure Boot and vTPM enabled with guest attestation extension installed, vTPM measurements get submitted to Azure Attestation periodically for monitoring boot integrity. An attestation failure indicates potential malware, which is surfaced to customers via Microsoft Defender for Cloud, through Alerts and Recommendations.
5656

5757
## Azure Attestation runs in a TEE
5858

articles/azure-maps/clustering-point-data-web-sdk.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ The `DataSource` class provides the following methods related to clustering as w
4646
|--------|-------------|-------------|
4747
| getClusterChildren(clusterId: number) | Promise<Array<Feature<Geometry, any> \| Shape>> | Retrieves the children of the given cluster on the next zoom level. These children may be a combination of shapes and subclusters. The subclusters will be features with properties matching ClusteredProperties. |
4848
| getClusterExpansionZoom(clusterId: number) | Promise<number> | Calculates a zoom level at which the cluster will start expanding or break apart. |
49-
| getClusterLeaves(clusterId: number, limit: number, offset: number) | Promise<Array<Feature<Geometry, any> \| Shape>> | Retrieves all points in a cluster. Set the `limit` to return a subset of the points, and use the `offset` to page through the points. |
49+
| getClusterLeaves(clusterId: number, limit: number, offset: number) | Promise<Array<Feature<Geometry, any> \| Shape>> | Retrieves the points in a cluster. By default the first 10 points are returned. To page through the points, use `limit` to specify the number of points to return, and `offset` to step through the index of points. To return all points, set `limit` to `Infinity` and don't set `offset`. |
5050

5151
## Display clusters using a bubble layer
5252

@@ -149,4 +149,4 @@ See code examples to add functionality to your app:
149149
> [Add a symbol layer](map-add-pin.md)
150150
151151
> [!div class="nextstepaction"]
152-
> [Add a heat map layer](map-add-heat-map-layer.md)
152+
> [Add a heat map layer](map-add-heat-map-layer.md)

articles/azure-monitor/best-practices-cost.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ See [Azure Monitor Logs pricing details](logs/cost-logs.md) for details on commi
2929
### Optimize workspace configuration
3030
As your monitoring environment becomes more complex, you will need to consider whether to create additional Log Analytics workspaces. This may be as you place resources in additional regions or as you implement additional services that use workspaces such as Azure Sentinel and Microsoft Defender for Cloud.
3131

32-
There can be cost implications with your workspace design, most notably when you combine different services such as operational data from Azure Monitor and security data from . See [Workspaces with Microsoft Sentinel](logs/cost-logs.md#workspaces-with-microsoft-sentinel) and [Workspaces with Microsoft Defender for Cloud](logs/cost-logs.md#workspaces-with-microsoft-defender-for-cloud) for a description of these implications and guidance on determining the most cost-effective solution for your environment.
32+
There can be cost implications with your workspace design, most notably when you combine different services such as operational data from Azure Monitor and security data from Microsoft Sentinel. See [Workspaces with Microsoft Sentinel](logs/cost-logs.md#workspaces-with-microsoft-sentinel) and [Workspaces with Microsoft Defender for Cloud](logs/cost-logs.md#workspaces-with-microsoft-defender-for-cloud) for a description of these implications and guidance on determining the most cost-effective solution for your environment.
3333

3434
## Configure tables in each workspace
3535
Except for [tables that don't incur charges](logs/cost-logs.md#data-size-calculation), all data in a Log Analytics workspace is billed at the same rate by default. You may be collecting data though that you query infrequently or that you need to archive for compliance but rarely access. You can significantly reduce your costs by configuring Basic Logs and by optimizing your data retention and archiving.

articles/azure-resource-manager/bicep/bicep-functions-deployment.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ This function returns the object that is passed during deployment. The propertie
2626
* deploying a local Bicep file.
2727
* deploying to a resource group or deploying to one of the other scopes ([Azure subscription](deploy-to-subscription.md), [management group](deploy-to-management-group.md), or [tenant](deploy-to-tenant.md)).
2828

29-
When deploying a local Bicep file to a resource group: the function returns the following format:
29+
When deploying a local Bicep file to a resource group, the function returns the following format:
3030

3131
```json
3232
{
@@ -48,7 +48,7 @@ When deploying a local Bicep file to a resource group: the function returns the
4848
}
4949
```
5050

51-
When you deploy to an Azure subscription, management group, or tenant, the return object includes a `location` property. The location property is included when deploying a local Bicep file. The format is:
51+
When you deploy to an Azure subscription, management group, or tenant, the return object includes a `location` property. The `location` property is not included when deploying a local Bicep file. The format is:
5252

5353
```json
5454
{

articles/cloud-services/cloud-services-dotnet-install-dotnet.md

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -94,9 +94,9 @@ You can use startup tasks to perform operations before a role starts. Installing
9494
REM ***** To install .NET 4.7 set the variable netfx to "NDP47" *****
9595
REM ***** To install .NET 4.7.1 set the variable netfx to "NDP471" ***** https://go.microsoft.com/fwlink/?LinkId=852095
9696
REM ***** To install .NET 4.7.2 set the variable netfx to "NDP472" ***** https://go.microsoft.com/fwlink/?LinkId=863262
97-
set netfx="NDP472"
9897
REM ***** To install .NET 4.8 set the variable netfx to "NDP48" ***** https://dotnet.microsoft.com/download/thank-you/net48
99-
98+
set netfx="NDP48"
99+
100100
REM ***** Set script start timestamp *****
101101
set timehour=%time:~0,2%
102102
set timestamp=%date:~-4,4%%date:~-10,2%%date:~-7,2%-%timehour: =0%%time:~3,2%
@@ -110,6 +110,7 @@ You can use startup tasks to perform operations before a role starts. Installing
110110
set TEMP=%PathToNETFXInstall%
111111

112112
REM ***** Setup .NET filenames and registry keys *****
113+
if %netfx%=="NDP48" goto NDP48
113114
if %netfx%=="NDP472" goto NDP472
114115
if %netfx%=="NDP471" goto NDP471
115116
if %netfx%=="NDP47" goto NDP47
@@ -148,7 +149,12 @@ You can use startup tasks to perform operations before a role starts. Installing
148149

149150
:NDP472
150151
set "netfxinstallfile=NDP472-KB4054531-Web.exe"
151-
set netfxregkey="0x70BF6"
152+
set netfxregkey="0x70BF0"
153+
goto logtimestamp
154+
155+
:NDP48
156+
set "netfxinstallfile=NDP48-Web.exe"
157+
set netfxregkey="0x80EA8"
152158
goto logtimestamp
153159

154160
:logtimestamp

0 commit comments

Comments
 (0)