You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> | microsoft.directory/conditionalAccessPolicies/tenantDefault/update | Update the default tenant for conditional access policies |
635
+
> | microsoft.directory/resourceNamespaces/resourceActions/authenticationContext/update | Update Conditional Access authentication context of Microsoft 365 role-based access control (RBAC) resource actions |
635
636
636
637
## Customer LockBox Access Approver
637
638
@@ -1005,6 +1006,7 @@ Users with this role have access to all administrative features in Azure Active
1005
1006
> | microsoft.directory/crossTenantAccessPolicy/partners/tenantRestrictions/update | Update tenant restrictions of cross-tenant access policy for partners |
1006
1007
> | microsoft.directory/privilegedIdentityManagement/allProperties/read | Read all resources in Privileged Identity Management |
1007
1008
> | microsoft.directory/provisioningLogs/allProperties/read | Read all properties of provisioning logs |
1009
+
> | microsoft.directory/resourceNamespaces/resourceActions/authenticationContext/update | Update Conditional Access authentication context of Microsoft 365 role-based access control (RBAC) resource actions |
1008
1010
> | microsoft.directory/roleAssignments/allProperties/allTasks | Create and delete role assignments, and read and update all role assignment properties |
1009
1011
> | microsoft.directory/roleDefinitions/allProperties/allTasks | Create and delete role definitions, and read and update all properties |
1010
1012
> | microsoft.directory/scopedRoleMemberships/allProperties/allTasks | Create and delete scopedRoleMemberships, and read and update all properties |
@@ -1043,9 +1045,13 @@ Users with this role have access to all administrative features in Azure Active
1043
1045
> | microsoft.azure.supportTickets/allEntities/allTasks | Create and manage Azure support tickets |
1044
1046
> | microsoft.cloudPC/allEntities/allProperties/allTasks | Manage all aspects of Windows 365 |
1045
1047
> | microsoft.commerce.billing/allEntities/allProperties/allTasks | Manage all aspects of Office 365 billing |
> | microsoft.dynamics365/allEntities/allTasks | Manage all aspects of Dynamics 365 |
1047
1050
> | microsoft.edge/allEntities/allProperties/allTasks | Manage all aspects of Microsoft Edge |
1048
1051
> | microsoft.flow/allEntities/allTasks | Manage all aspects of Microsoft Power Automate |
1052
+
> | microsoft.hardware.support/shippingAddress/allProperties/allTasks | Create, read, update, and delete shipping addresses for Microsoft hardware warranty claims, including shipping addresses created by others |
1053
+
> | microsoft.hardware.support/shippingStatus/allProperties/read | Read shipping status for open Microsoft hardware warranty claims |
1054
+
> | microsoft.hardware.support/warrantyClaims/allProperties/allTasks | Create and manage all aspects of Microsoft hardware warranty claims |
1049
1055
> | microsoft.insights/allEntities/allProperties/allTasks | Manage all aspects of Insights app |
1050
1056
> | microsoft.intune/allEntities/allTasks | Manage all aspects of Microsoft Intune |
1051
1057
> | microsoft.office365.complianceManager/allEntities/allTasks | Manage all aspects of Office 365 Compliance Manager |
@@ -1159,7 +1165,11 @@ Users with this role **cannot** do the following:
1159
1165
> | microsoft.directory/lifecycleWorkflows/workflows/allProperties/read | Read all properties of lifecycle workflows and tasks in Azure AD |
1160
1166
> | microsoft.cloudPC/allEntities/allProperties/read | Read all aspects of Windows 365 |
1161
1167
> | microsoft.commerce.billing/allEntities/allProperties/read | Read all resources of Office 365 billing |
> | microsoft.edge/allEntities/allProperties/read | Read all aspects of Microsoft Edge |
1170
+
> | microsoft.hardware.support/shippingAddress/allProperties/read | Read shipping addresses for Microsoft hardware warranty claims, including existing shipping addresses created by others |
1171
+
> | microsoft.hardware.support/shippingStatus/allProperties/read | Read shipping status for open Microsoft hardware warranty claims |
1172
+
> | microsoft.hardware.support/warrantyClaims/allProperties/read | Read Microsoft hardware warranty claims |
1163
1173
> | microsoft.insights/allEntities/allProperties/read | Read all aspects of Viva Insights |
1164
1174
> | microsoft.office365.messageCenter/messages/read | Read messages in Message Center in the Microsoft 365 admin center, excluding security messages |
1165
1175
> | microsoft.office365.messageCenter/securityMessages/read | Read security messages in Message Center in the Microsoft 365 admin center |
@@ -1548,6 +1558,9 @@ A warranty claim is a request to have the hardware repaired or replaced in accor
1548
1558
> [!div class="mx-tableFixed"]
1549
1559
> | Actions | Description |
1550
1560
> | --- | --- |
1561
+
> | microsoft.hardware.support/shippingAddress/allProperties/allTasks | Create, read, update, and delete shipping addresses for Microsoft hardware warranty claims, including shipping addresses created by others |
1562
+
> | microsoft.hardware.support/shippingStatus/allProperties/read | Read shipping status for open Microsoft hardware warranty claims |
1563
+
> | microsoft.hardware.support/warrantyClaims/allProperties/allTasks | Create and manage all aspects of Microsoft hardware warranty claims |
1551
1564
> | microsoft.office365.messageCenter/messages/read | Read messages in Message Center in the Microsoft 365 admin center, excluding security messages |
1552
1565
> | microsoft.office365.supportTickets/allEntities/allTasks | Create and manage Microsoft 365 service requests |
1553
1566
> | microsoft.office365.webPortal/allEntities/standard/read | Read basic properties on all resources in the Microsoft 365 admin center |
@@ -1567,8 +1580,12 @@ A warranty claim is a request to have the hardware repaired or replaced in accor
1567
1580
> [!div class="mx-tableFixed"]
1568
1581
> | Actions | Description |
1569
1582
> | --- | --- |
1583
+
> | microsoft.hardware.support/shippingAddress/allProperties/read | Read shipping addresses for Microsoft hardware warranty claims, including existing shipping addresses created by others |
1584
+
> | microsoft.hardware.support/warrantyClaims/createAsOwner | Create Microsoft hardware warranty claims where creator is the owner |
1570
1585
> | microsoft.office365.supportTickets/allEntities/allTasks | Create and manage Microsoft 365 service requests |
1571
1586
> | microsoft.office365.webPortal/allEntities/standard/read | Read basic properties on all resources in the Microsoft 365 admin center |
1587
+
> | microsoft.hardware.support/shippingStatus/allProperties/read | Read shipping status for open Microsoft hardware warranty claims |
1588
+
> | microsoft.hardware.support/warrantyClaims/allProperties/read | Read Microsoft hardware warranty claims |
1572
1589
1573
1590
## Modern Commerce User
1574
1591
@@ -1628,7 +1645,7 @@ Assign the Organizational Messages Writer role to users who need to do the follo
1628
1645
- Write, publish, and delete organizational messages using Microsoft 365 admin center or Microsoft Endpoint Manager
1629
1646
- Manage organizational message delivery options using Microsoft 365 admin center or Microsoft Endpoint Manager
1630
1647
- Read organizational message delivery results using Microsoft 365 admin center or Microsoft Endpoint Manager
1631
-
- View usage reports and most settings in the Microsoft 365 admin center, but can't make changes
1648
+
- View usage reports and most settings in the Microsoft 365 admin center, but can't make changes
1632
1649
1633
1650
> [!div class="mx-tableFixed"]
1634
1651
> | Actions | Description |
@@ -2008,6 +2025,7 @@ Azure Advanced Threat Protection | Monitor and respond to suspicious security ac
2008
2025
> | microsoft.directory/conditionalAccessPolicies/tenantDefault/update | Update the default tenant for conditional access policies |
2009
2026
> | microsoft.directory/privilegedIdentityManagement/allProperties/read | Read all resources in Privileged Identity Management |
2010
2027
> | microsoft.directory/provisioningLogs/allProperties/read | Read all properties of provisioning logs |
2028
+
> | microsoft.directory/resourceNamespaces/resourceActions/authenticationContext/update | Update Conditional Access authentication context of Microsoft 365 role-based access control (RBAC) resource actions |
2011
2029
> | microsoft.directory/servicePrincipals/policies/update | Update policies of service principals |
2012
2030
> | microsoft.directory/signInReports/allProperties/read | Read all properties on sign-in reports, including privileged properties |
2013
2031
> | microsoft.azure.serviceHealth/allEntities/allTasks | Read and configure Azure Service Health |
@@ -2248,7 +2266,7 @@ Users with this role can manage [Teams-certified devices](https://www.microsoft.
2248
2266
> | microsoft.office365.webPortal/allEntities/standard/read | Read basic properties on all resources in the Microsoft 365 admin center |
2249
2267
> | microsoft.teams/devices/standard/read | Manage all aspects of Teams-certified devices including configuration policies |
2250
2268
2251
-
## Tenant Creator
2269
+
## Tenant Creator
2252
2270
2253
2271
Assign the Tenant Creator role to users who need to do the following tasks:
2254
2272
- Create both Azure Active Directory and Azure Active Directory B2C tenants even if the tenant creation toggle is turned off in the user settings
@@ -2259,7 +2277,7 @@ Assign the Tenant Creator role to users who need to do the following tasks:
2259
2277
> | Actions | Description |
2260
2278
> | --- | --- |
2261
2279
> | microsoft.directory/tenantManagement/tenants/create | Create new tenants in Azure Active Directory |
2262
-
2280
+
2263
2281
## Usage Summary Reports Reader
2264
2282
2265
2283
Users with this role can access tenant level aggregated data and associated insights in Microsoft 365 admin center for Usage and Productivity Score but cannot access any user level details or insights. In Microsoft 365 admin center for the two reports, we differentiate between tenant level aggregated data and user level details. This role gives an extra layer of protection on individual user identifiable data, which was requested by both customers and legal teams.
Copy file name to clipboardExpand all lines: articles/aks/operator-best-practices-multi-region.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,19 +50,19 @@ When you deploy your application, add another step to your CI/CD pipeline to dep
50
50
51
51
> **Best practice**
52
52
>
53
-
> Azure Traffic Manager can direct you to your closest AKS cluster and application instance. For the best performance and redundancy, direct all application traffic through Traffic Manager before it goes to your AKS cluster.
53
+
> For the best performance and redundancy, direct all application traffic through Traffic Manager before it goes to your AKS cluster.
54
54
55
-
If you have multiple AKS clusters in different regions, use Traffic Manager to control traffic flow to the applications running in each cluster. [Azure Traffic Manager](../traffic-manager/index.yml) is a DNS-based traffic load balancer that can distribute network traffic across regions. Use Traffic Manager to route users based on cluster response time or based on geography.
55
+
If you have multiple AKS clusters in different regions, use Traffic Manager to control traffic flow to the applications running in each cluster. [Azure Traffic Manager](../traffic-manager/index.yml) is a DNS-based traffic load balancer that can distribute network traffic across regions. Use Traffic Manager to route users based on cluster response time or based on priority.
56
56
57
57

58
58
59
59
If you have a single AKS cluster, you typically connect to the service IP or DNS name of a given application. In a multi-cluster deployment, you should connect to a Traffic Manager DNS name that points to the services on each AKS cluster. Define these services by using Traffic Manager endpoints. Each endpoint is the *service load balancer IP*. Use this configuration to direct network traffic from the Traffic Manager endpoint in one region to the endpoint in a different region.
60
60
61
-

61
+
Traffic Manager performs DNS lookups and returns your most appropriate endpoint. With priority routing you can enable a primary service endpoint and multiple backup endpoints in case the primary or one of the backup endpoints is unavailable.
62
62
63
-
Traffic Manager performs DNS lookups and returns your most appropriate endpoint. Nested profiles can prioritize a primary location. For example, you should connect to their closest geographic region. If that region has a problem, Traffic Manager directs you to a secondary region. This approach ensures that you can connect to an application instance even if your closest geographic region is unavailable.
63
+

64
64
65
-
For information on how to set up endpoints and routing, see [Configure the geographic traffic routing method by using Traffic Manager](../traffic-manager/traffic-manager-configure-geographic-routing-method.md).
65
+
For information on how to set up endpoints and routing, see [Configure priority traffic routing method in Traffic Manager](../traffic-manager/traffic-manager-configure-priority-routing-method.md).
66
66
67
67
### Application routing with Azure Front Door Service
0 commit comments