Skip to content

Commit 209d606

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into upcoming-fixes
2 parents 7ea065a + d4ea04d commit 209d606

File tree

71 files changed

+776
-560
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

71 files changed

+776
-560
lines changed

articles/active-directory/develop/includes/web-api/quickstart-aspnet-core.md

Lines changed: 5 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: develop
99
ms.topic: include
1010
ms.workload: identity
11-
ms.date: 12/09/2022
11+
ms.date: 04/16/2023
1212
ms.author: cwerner
1313
ms.reviewer: jmprieur
1414
ms.custom: devx-track-csharp, "scenarios:getting-started", "languages:aspnet-core", mode-api, engagement-fy23
@@ -48,10 +48,6 @@ First, register the web API in your Azure AD tenant and add a scope by following
4848

4949
[Download the ASP.NET Core solution](https://github.com/Azure-Samples/active-directory-dotnet-native-aspnetcore-v2/archive/aspnetcore3-1.zip) from GitHub.
5050

51-
> [!Note]
52-
> The code sample currently targets ASP.NET Core 3.1. The sample can be updated to use .NET Core 6.0 and is covered in the following steps: [Update the sample code to ASP.NET Core 6.0](#step-4-update-the-sample-code-to-aspnet-core-60)
53-
This quickstart will be deprecated in the near future and will be updated to use .NET 6.0.
54-
5551
## Step 3: Configure the ASP.NET Core project
5652

5753
In this step, the sample code will be configured to work with the app registration that was created earlier.
@@ -74,26 +70,7 @@ In this step, the sample code will be configured to work with the app registrati
7470

7571
For this quickstart, don't change any other values in the *appsettings.json* file.
7672

77-
### Step 4: Update the sample code to ASP.NET Core 6.0
78-
79-
To update this code sample to target ASP.NET Core 6.0, follow these steps:
80-
81-
1. Open webapi.csproj
82-
1. Remove the following line:
83-
84-
```xml
85-
<TargetFramework>netcoreapp3.1</TargetFramework>
86-
```
87-
88-
1. Add the following line in its place:
89-
90-
```xml
91-
<TargetFramework>netcoreapp6.0</TargetFramework>
92-
```
93-
94-
This step will ensure that the sample is targeting the .NET Core 6.0 framework.
95-
96-
### Step 5: Run the sample
73+
### Step 4: Run the sample
9774

9875
1. Open a terminal and change directory to the project folder.
9976

@@ -167,31 +144,28 @@ public void Configure(IApplicationBuilder app, IHostingEnvironment env)
167144
namespace webapi.Controllers
168145
{
169146
[Authorize]
147+
[RequiredScope("access_as_user")]
170148
[ApiController]
171149
[Route("[controller]")]
172150
public class WeatherForecastController : ControllerBase
173151
```
174152

175153
### Validation of scope in the controller
176154

177-
The code in the API verifies that the required scopes are in the token by using `HttpContext.VerifyUserHasAnyAcceptedScope(scopeRequiredByApi);`:
155+
The code in the API verifies that the required scopes are in the token by using `[RequiredScope("access_as_user")]` attribute:
178156

179157
```csharp
180158
namespace webapi.Controllers
181159
{
182160
[Authorize]
161+
[RequiredScope("access_as_user")]
183162
[ApiController]
184163
[Route("[controller]")]
185164
public class WeatherForecastController : ControllerBase
186165
{
187-
// The web API will only accept tokens 1) for users, and 2) having the "access_as_user" scope for this API
188-
static readonly string[] scopeRequiredByApi = new string[] { "access_as_user" };
189-
190166
[HttpGet]
191167
public IEnumerable<WeatherForecast> Get()
192168
{
193-
HttpContext.VerifyUserHasAnyAcceptedScope(scopeRequiredByApi);
194-
195169
// some code here
196170
}
197171
}

articles/active-directory/develop/includes/web-app/quickstart-aspnet-core.md

Lines changed: 2 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.subservice: develop
1010
ms.topic: quickstart
1111
ms.workload: identity
1212

13-
ms.date: 12/19/2022
13+
ms.date: 04/16/2023
1414
ms.author: cwerner
1515

1616
ms.reviewer: jmprieur
@@ -50,10 +50,6 @@ See [How the sample works](#how-the-sample-works) for an illustration.
5050

5151
[Download the ASP.NET Core solution](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/archive/aspnetcore3-1-callsgraph.zip)
5252

53-
> [!Note]
54-
> The code sample currently targets ASP.NET Core 3.1. The sample can be updated to use .NET Core 6.0 and is covered in the following steps: [Update the sample code to ASP.NET Core 6.0](#step-4-update-the-sample-code-to-aspnet-core-60)
55-
This quickstart will be deprecated in the near future and will be updated to use .NET 6.0.
56-
5753
### Step 3: Configure your ASP.NET Core project
5854

5955
1. Extract the *.zip* file to a local folder that's close to the root of the disk to avoid errors caused by path length limitations on Windows. For example, extract to *C:\Azure-Samples*.
@@ -74,27 +70,8 @@ This quickstart will be deprecated in the near future and will be updated to use
7470
- Replace `Enter_the_Client_Secret_Here` with the **Client secret** that was created and recorded in an earlier step.
7571

7672
For this quickstart, don't change any other values in the *appsettings.json* file.
77-
78-
### Step 4: Update the sample code to ASP.NET Core 6.0
79-
80-
To update this code sample to target ASP.NET Core 6.0, follow these steps:
81-
82-
1. Open WebApp-OpenIDConnect-DotNet.csproj
83-
1. Remove the following line:
84-
85-
```xml
86-
<TargetFramework>netcoreapp3.1</TargetFramework>
87-
```
88-
89-
1. Add the following line in its place:
90-
91-
```xml
92-
<TargetFramework>netcoreapp6.0</TargetFramework>
93-
```
94-
95-
This step will ensure that the sample is targeting the .NET Core 6.0 framework.
9673

97-
### Step 5: Build and run the application
74+
### Step 4: Build and run the application
9875

9976
Build and run the app in Visual Studio by selecting the **Debug** menu > **Start Debugging**, or by pressing the F5 key.
10077

articles/active-directory/develop/web-app-quickstart-portal-node-js-ciam.md

Lines changed: 4 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -16,25 +16,13 @@ ms.date: 04/12/2023
1616
# Portal quickstart for React SPA
1717

1818
> In this quickstart, you download and run a code sample that demonstrates how a React single-page application (SPA) can sign in users with Azure AD CIAM.
19-
20-
> [!div renderon="portal" id="display-on-portal" class="sxs-lookup"]
21-
> ## Prerequisites
22-
>
23-
> * Azure subscription - [Create an Azure subscription for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F)
24-
> * [Node.js](https://nodejs.org/en/download/)
25-
> * [Visual Studio Code](https://code.visualstudio.com/download) or another code editor
26-
>
27-
> ## Run the sample
2819
>
29-
> 1. Unzip the downloaded file.
30-
>
31-
> 1. In your terminal, locate the folder that contains the `package.json` file, then run the following command:
20+
> [!div renderon="portal" id="display-on-portal" class="sxs-lookup"]
21+
> 1. Make sure you've installed [Node.js](https://nodejs.org/en/download/).
3222
>
23+
> 1. Unzip the sample, `cd` into the folder that contains `package.json`, then run the following commands:
3324
> ```console
3425
> npm install && npm start
3526
> ```
36-
>
37-
> 1. Open your browser and visit `http://locahost:3000`.
38-
>
39-
> 1. Select the **Sign-in** link on the navigation bar, then follow the prompts.
27+
> 1. Open your browser, visit `http://locahost:3000`, select **Sign-in** link, then follow the prompts.
4028
>

articles/active-directory/manage-apps/configure-permission-classifications.md

Lines changed: 11 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.workload: identity
1010
ms.topic: how-to
1111
ms.date: 3/28/2023
1212
ms.author: jomondi
13-
ms.reviewer: arvindh, luleon, phsignor, jawoods
13+
ms.reviewer: phsignor, jawoods
1414
ms.custom: contperf-fy21q2
1515
zone_pivot_groups: enterprise-apps-all
1616

@@ -21,7 +21,7 @@ zone_pivot_groups: enterprise-apps-all
2121

2222
In this article, you learn how to configure permissions classifications in Azure Active Directory (Azure AD). Permission classifications allow you to identify the impact that different permissions have according to your organization's policies and risk evaluations. For example, you can use permission classifications in consent policies to identify the set of permissions that users are allowed to consent to.
2323

24-
Currently, only the "Low impact" permission classification is supported. Only delegated permissions that don't require admin consent can be classified as "Low impact".
24+
Three permission classifications are supported: "Low", "Medium" (preview), and "High" (preview). Currently, only delegated permissions that don't require admin consent can be classified.
2525

2626
The minimum permissions needed to do basic sign-in are `openid`, `profile`, `email`, and `offline_access`, which are all delegated permissions on the Microsoft Graph. With these permissions an app can read details of the signed-in user's profile, and can maintain this access even when the user is no longer using the app.
2727

@@ -30,7 +30,7 @@ The minimum permissions needed to do basic sign-in are `openid`, `profile`, `ema
3030
To configure permission classifications, you need:
3131

3232
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
33-
- One of the following roles: A global administrator, or owner of the service principal.
33+
- One of the following roles: Global Administrator, Application Administrator, or Cloud Application Administrator
3434

3535
## Manage permission classifications
3636

@@ -40,7 +40,8 @@ Follow these steps to classify permissions using the Azure portal:
4040

4141
1. Sign in to the [Azure portal](https://portal.azure.com) as a [Global Administrator](../roles/permissions-reference.md#global-administrator), [Application Administrator](../roles/permissions-reference.md#application-administrator), or [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator)
4242
1. Select **Azure Active Directory** > **Enterprise applications** > **Consent and permissions** > **Permission classifications**.
43-
1. Choose **Add permissions** to classify another permission as "Low impact".
43+
1. Choose the tab for the permission classification you'd like to update.
44+
1. Choose **Add permissions** to classify another permission.
4445
1. Select the API and then select the delegated permission(s).
4546

4647
In this example, we've classified the minimum set of permission required for single sign-on:
@@ -57,7 +58,7 @@ You can use the latest [Azure AD PowerShell](/powershell/module/azuread/?preserv
5758
Run the following command to connect to Azure AD PowerShell. To consent to the required scopes, sign in with one of the roles listed in the prerequisite section of this article.
5859

5960
```powershell
60-
Connect-AzureAD -Scopes
61+
Connect-AzureAD
6162
```
6263

6364
### List the current permission classifications
@@ -169,13 +170,9 @@ Connect-MgGraph -Scopes "Policy.ReadWrite.PermissionGrant".
169170

170171
```powershell
171172
$params = @{
172-
173-
PermissionId = $delegatedPermission.Id
174-
175-
PermissionName = $delegatedPermission.Value
176-
177-
Classification = "Low"
178-
173+
PermissionId = $delegatedPermission.Id
174+
PermissionName = $delegatedPermission.Value
175+
Classification = "Low"
179176
}
180177
181178
New-MgServicePrincipalDelegatedPermissionClassification -ServicePrincipalId $api.Id -BodyParameter $params
@@ -192,7 +189,7 @@ Connect-MgGraph -Scopes "Policy.ReadWrite.PermissionGrant".
192189
1. Find the delegated permission classification you wish to remove:
193190

194191
```powershell
195-
$classifications= Get-MgServicePrincipalDelegatedPermissionClassification -ServicePrincipalId $api.Id
192+
$classifications = Get-MgServicePrincipalDelegatedPermissionClassification -ServicePrincipalId $api.Id
196193
197194
$classificationToRemove = $classifications | Where-Object {$_.PermissionName -eq "openid"}
198195
```
@@ -242,4 +239,4 @@ DELETE https://graph.microsoft.com/v1.0/servicePrincipals(appId='00000003-0000-0
242239
## Next steps
243240

244241
- [Manage app consent policies](manage-app-consent-policies.md)
245-
- [Permissions and consent in the Microsoft identity platform](../develop/v2-permissions-and-consent.md)
242+
- [Permissions and consent in the Microsoft identity platform](../develop/v2-permissions-and-consent.md)

articles/aks/azure-blob-csi.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Use Container Storage Interface (CSI) driver for Azure Blob storage on Azure Kubernetes Service (AKS)
33
description: Learn how to use the Container Storage Interface (CSI) driver for Azure Blob storage in an Azure Kubernetes Service (AKS) cluster.
44
ms.topic: article
5-
ms.date: 03/29/2023
5+
ms.date: 04/13/2023
66

77
---
88

@@ -141,9 +141,8 @@ To have a storage volume persist for your workload, you can use a StatefulSet. T
141141
volumeClaimTemplates:
142142
- metadata:
143143
name: persistent-storage
144-
annotations:
145-
volume.beta.kubernetes.io/storage-class: azureblob-nfs-premium
146144
spec:
145+
storageClassName: azureblob-nfs-premium
147146
accessModes: ["ReadWriteMany"]
148147
resources:
149148
requests:
@@ -191,9 +190,8 @@ To have a storage volume persist for your workload, you can use a StatefulSet. T
191190
volumeClaimTemplates:
192191
- metadata:
193192
name: persistent-storage
194-
annotations:
195-
volume.beta.kubernetes.io/storage-class: azureblob-fuse-premium
196193
spec:
194+
storageClassName: azureblob-fuse-premium
197195
accessModes: ["ReadWriteMany"]
198196
resources:
199197
requests:

0 commit comments

Comments
 (0)