Skip to content

Commit 1f6e2d7

Browse files
authored
Merge pull request #206178 from MicrosoftDocs/main
7/27 PM Publish
2 parents b757ec6 + 72dbddf commit 1f6e2d7

File tree

152 files changed

+1174
-499
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

152 files changed

+1174
-499
lines changed

CODEOWNERS

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -25,17 +25,17 @@ articles/advisor @rboucher
2525
articles/service-health @rboucher
2626

2727
# Azure Synapse Analytics
28-
/articles/synapse-analytics/ @julieMSFT @ryanmajidi @saveenr
29-
/articles/synapse-analytics/backuprestore/ @joannapea @julieMSFT
28+
/articles/synapse-analytics/ @SnehaGunda @WilliamDAssafMSFT @ryanmajidi @saveenr
29+
/articles/synapse-analytics/backuprestore/ @joannapea @WilliamDAssafMSFT
3030
/articles/synapse-analytics/catalog-governance/@djpmsft @chanuengg
31-
/articles/synapse-analytics/ccid/ @liudan66 @julieMSFT
31+
/articles/synapse-analytics/ccid/ @liudan66
3232
/articles/synapse-analytics/data-integration/ @kromerm @jonburchel
3333
/articles/synapse-analytics/machine-learning/ @garyericson @NelGson @midesa
34-
/articles/synapse-analytics/metadata/@MikeRys @julieMSFT @jocaplan
35-
/articles/synapse-analytics/security/ @RonyMSFT @nanditavalsan @meenalsri @julieMSFT
34+
/articles/synapse-analytics/metadata/@MikeRys @jocaplan
35+
/articles/synapse-analytics/security/ @RonyMSFT @meenalsri
3636
/articles/synapse-analytics/spark/ @euangms @mlee3gsd @midesa
37-
/articles/synapse-analytics/sql/ @filippopovic @azaricstefan @anumjs @WilliamDAssafMSFT @jovanpop-msft
38-
/articles/synapse-analytics/sql-data-warehouse/ @anumjs @ronortloff @julieMSFT
37+
/articles/synapse-analytics/sql/ @filippopovic @azaricstefan @WilliamDAssafMSFT @jovanpop-msft
38+
/articles/synapse-analytics/sql-data-warehouse/ @SnehaGunda @WilliamDAssafMSFT
3939
/articles/synapse-analytics/synapse-link/ @Rodrigossz @SnehaGunda @jovanpop-msft
4040

4141
# Cognitive Services

articles/active-directory/conditional-access/TOC.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -39,14 +39,16 @@
3939
href: service-dependencies.md
4040
- name: Location conditions
4141
href: location-condition.md
42+
- name: Continuous access evaluation
43+
href: concept-continuous-access-evaluation.md
4244
- name: Workload identities
4345
href: workload-identity.md
46+
- name: CAE for workload identities
47+
href: concept-continuous-access-evaluation-workload.md
4448
- name: Filter for devices
4549
href: concept-condition-filters-for-devices.md
4650
- name: What if tool
4751
href: what-if-tool.md
48-
- name: Continuous access evaluation
49-
href: concept-continuous-access-evaluation.md
5052
- name: How-to guides
5153
expanded: true
5254
items:
Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,63 @@
1+
---
2+
title: Continuous access evaluation for workload identities in Azure AD
3+
description: Respond to changes to applications with continuous access evaluation for workload identities in Azure AD
4+
5+
services: active-directory
6+
ms.service: active-directory
7+
ms.subservice: conditional-access
8+
ms.topic: conceptual
9+
ms.date: 07/22/2022
10+
11+
ms.author: joflore
12+
author: MicrosoftGuyJFlo
13+
manager: karenhoran
14+
ms.reviewer: vmahtani
15+
16+
ms.collection: M365-identity-device-management
17+
---
18+
# Continuous access evaluation for workload identities (preview)
19+
20+
Continuous access evaluation (CAE) for [workload identities](../develop/workload-identities-overview.md) provides security benefits to your organization. It enables real-time enforcement of Conditional Access location and risk policies along with instant enforcement of token revocation events for workload identities.
21+
22+
Continuous access evaluation doesn't currently support managed identities.
23+
24+
## Scope of preview
25+
26+
The continuous access evaluation for workload identities public preview scope includes support for Microsoft Graph as a resource provider.
27+
28+
The preview targets service principals for line of business (LOB) applications.
29+
30+
We support the following revocation events:
31+
32+
- Service principal disable
33+
- Service principal delete
34+
- High service principal risk as detected by Azure AD Identity Protection
35+
36+
Continuous access evaluation for workload identities supports [Conditional Access policies that target location and risk](workload-identity.md#implementation).
37+
38+
## Enable your application
39+
40+
Developers can opt in to Continuous access evaluation for workload identities when their API requests `xms_cc` as an optional claim. The `xms_cc` claim with a value of `cp1` in the access token is the authoritative way to identify a client application is capable of handling a claims challenge. For more information about how to make this work in your application, see the article, [Claims challenges, claims requests, and client capabilities](../develop/claims-challenge.md).
41+
42+
### Disable
43+
44+
In order to opt out, don't send the `xms_cc` claim with a value of `cp1`.
45+
46+
Organizations who have Azure AD Premium can create a [Conditional Access policy to disable continuous access evaluation](concept-conditional-access-session.md#customize-continuous-access-evaluation) applied to specific workload identities as an immediate stop-gap measure.
47+
48+
## Troubleshooting
49+
50+
When a client’s access to a resource is blocked due to CAE being triggered, the client’s session will be revoked, and the client will need to reauthenticate. This behavior can be verified in the sign-in logs.
51+
52+
The following steps detail how an admin can verify sign in activity in the sign-in logs:
53+
54+
1. Sign into the Azure portal as a Conditional Access Administrator, Security Administrator, or Global Administrator.
55+
1. Browse to **Azure Active Directory** > **Sign-in logs** > **Service Principal Sign-ins**. You can use filters to ease the debugging process.
56+
1. Select an entry to see activity details. The **Continuous access evaluation** field indicates whether a CAE token was issued in a particular sign-in attempt.
57+
58+
## Next steps
59+
60+
- [Register an application with Azure AD and create a service principal](../develop/howto-create-service-principal-portal.md#register-an-application-with-azure-ad-and-create-a-service-principal)
61+
- [How to use Continuous Access Evaluation enabled APIs in your applications](../develop/app-resilience-continuous-access-evaluation.md)
62+
- [Sample application using continuous access evaluation](https://github.com/Azure-Samples/ms-identity-dotnetcore-daemon-graph-cae)
63+
- [What is continuous access evaluation?](../conditional-access/concept-continuous-access-evaluation.md)

articles/aks/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -507,6 +507,8 @@
507507
href: deployment-center-launcher.md
508508
- name: GitHub Actions for Kubernetes
509509
href: ../aks/kubernetes-action.md
510+
- name: Configure automated deployments (preview)
511+
href: automated-deployments.md
510512
- name: CI/CD with Azure Pipelines
511513
href: ../aks/devops-pipeline.md
512514
- name: Troubleshoot

articles/aks/automated-deployments.md

Lines changed: 72 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,72 @@
1+
---
2+
title: Automated deployments for Azure Kubernetes Service (Preview)
3+
description: Learn how to use automated deployments to simplify the process of adding GitHub Actions to your Azure Kubernetes Service (AKS) project
4+
ms.author: qpetraroia
5+
ms.topic: tutorial
6+
ms.date: 7/21/2022
7+
author: qpetraroia
8+
---
9+
10+
# Automated Deployments for Azure Kubernetes Service (Preview)
11+
12+
Automated deployments simplify the process of setting up a GitHub Action and creating an automated pipeline for your code releases to your Azure Kubernetes Service (AKS) cluster. Once connected, every new commit will kick off the pipeline, resulting in your application being updated.
13+
14+
[!INCLUDE [preview features callout](./includes/preview/preview-callout.md)]
15+
16+
> [!NOTE]
17+
> This feature is not yet available in all regions.
18+
19+
## Prerequisites
20+
21+
* A GitHub account.
22+
* An AKS cluster.
23+
* An Azure Container Registry (ACR)
24+
25+
## Deploy an application to your AKS cluster
26+
27+
1. In the Azure portal, navigate to the resource group containing the AKS cluster you want to deploy the application to.
28+
29+
1. Select your AKS cluster, and then select **Automated deployments (preview)** on the left blade. Select **Create an automated deployment**.
30+
31+
:::image type="content" source="media/automated-deployments/ad-homescreen.png" alt-text="The automated deployments screen in the Azure portal." lightbox="media/automated-deployments/ad-homescreen-expanded.png":::
32+
33+
1. Name your workflow and click **Authorize** to connect your Azure account with your GitHub account. After your accounts are linked, choose which repository and branch you would like to create the GitHub Action for.
34+
35+
- **GitHub**: Authorize and select the repository for your GitHub account.
36+
37+
:::image type="content" source="media/automated-deployments/ad-ghactivate-repo.png" alt-text="The authorize and repository selection screen." lightbox="media/automated-deployments/ad-ghactivate-repo-expanded.png":::
38+
39+
1. Pick your dockerfile and your ACR and image.
40+
41+
:::image type="content" source="media/automated-deployments/ad-image.png" alt-text="The image selection screen." lightbox="media/automated-deployments/ad-image-expanded.png":::
42+
43+
1. Determine whether you'll deploy with Helm or regular Kubernetes manifests. Once decided, pick the appropriate deployment files from your repository and decide which namespace you want to deploy into.
44+
45+
:::image type="content" source="media/automated-deployments/ad-deployment-details.png" alt-text="The deployment details screen." lightbox="media/automated-deployments/ad-deployment-details-expanded.png":::
46+
47+
1. Review your deployment before creating the pull request.
48+
49+
1. Click **view pull request** to see your GitHub Action.
50+
51+
:::image type="content" source="media/automated-deployments/ad-view-pr.png" alt-text="The final screen of the deployment process. The view pull request button is highlighted." lightbox="media/automated-deployments/ad-view-pr-expanded.png" :::
52+
53+
1. Merge the pull request to kick off the GitHub Action and deploy your application.
54+
55+
:::image type="content" source="media/automated-deployments/ad-accept-pr.png" alt-text="The pull request page in GitHub. The merge pull request button is highlighted." lightbox="media/automated-deployments/ad-accept-pr-expanded.png" :::
56+
57+
1. Once your application is deployed, go back to automated deployments to see your history.
58+
59+
:::image type="content" source="media/automated-deployments/ad-view-history.png" alt-text="The history screen in Azure portal, showing all the previous automated deployments." lightbox="media/automated-deployments/ad-view-history-expanded.png" :::
60+
61+
## Clean up resources
62+
63+
You can remove any related resources that you created when you don't need them anymore individually or by deleting the resource group to which they belong. To delete your automated deployment, navigate to the automated deployment dashboard and select **...**, then select **delete** and confirm your action.
64+
65+
## Next steps
66+
67+
You can modify these GitHub Actions to meet the needs of your team by opening them up in an editor like Visual Studio Code and changing them as you see fit.
68+
69+
Learn more about [GitHub Actions for Kubernetes][kubernetes-action].
70+
71+
<!-- LINKS -->
72+
[kubernetes-action]: kubernetes-action.md
108 KB
Loading
129 KB
Loading
57.1 KB
Loading
103 KB
Loading
58.7 KB
Loading

0 commit comments

Comments
 (0)