Skip to content

Commit 213993e

Browse files
author
duongau
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into overviewpdns
2 parents 67302e5 + f0fcb82 commit 213993e

File tree

8 files changed

+370
-333
lines changed

8 files changed

+370
-333
lines changed

articles/active-directory/develop/scenario-desktop-acquire-token.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1009,7 +1009,7 @@ This flow isn't supported on MSAL for macOS.
10091009

10101010
# [Node.js](#tab/nodejs)
10111011

1012-
This extract is from the [MSAL Node dev samples](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/samples/msal-node-samples/standalone-samples/username-password). In the code snippet below, the username and password are hardcoded for illustration purposes only. This should be avoided in production. Instead, a basic UI prompting the user to enter her username/password would be recommended.
1012+
This extract is from the [MSAL Node dev samples](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/samples/msal-node-samples/username-password). In the code snippet below, the username and password are hardcoded for illustration purposes only. This should be avoided in production. Instead, a basic UI prompting the user to enter her username/password would be recommended.
10131013

10141014
```JavaScript
10151015
const msal = require("@azure/msal-node");
@@ -1252,7 +1252,7 @@ This flow doesn't apply to macOS.
12521252

12531253
# [Node.js](#tab/nodejs)
12541254

1255-
This extract is from the [MSAL Node dev samples](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/samples/msal-node-samples/standalone-samples/device-code).
1255+
This extract is from the [MSAL Node dev samples](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/samples/msal-node-samples/device-code).
12561256

12571257
```JavaScript
12581258
const msal = require('@azure/msal-node');

articles/azure-sql/database/sql-vulnerability-assessment.md

Lines changed: 40 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.topic: how-to
1111
author: davidtrigano
1212
ms.author: datrigan
1313
ms.reviewer: vanto
14-
ms.date: 02/11/2021
14+
ms.date: 04/09/2021
1515
tags: azure-synapse
1616
---
1717
# SQL vulnerability assessment helps you identify database vulnerabilities
@@ -120,6 +120,44 @@ Select **Export Scan Results** to create a downloadable Excel report of your sca
120120

121121
Select **Scan History** in the vulnerability assessment pane to view a history of all scans previously run on this database. Select a particular scan in the list to view the detailed results of that scan.
122122

123+
### Disable specific findings from Azure Security Center (preview)
124+
125+
If you have an organizational need to ignore a finding, rather than remediate it, you can optionally disable it. Disabled findings don't impact your secure score or generate unwanted noise.
126+
127+
When a finding matches the criteria you've defined in your disable rules, it won't appear in the list of findings. Typical scenarios include:
128+
129+
- Disable findings with severity below medium
130+
- Disable findings that are non-patchable
131+
- Disable findings from benchmarks that aren't of interest for a defined scope
132+
133+
> [!IMPORTANT]
134+
> To disable specific findings, you need permissions to edit a policy in Azure Policy. Learn more in [Azure RBAC permissions in Azure Policy](../../governance/policy/overview.md#azure-rbac-permissions-in-azure-policy).
135+
136+
To create a rule:
137+
138+
1. From the recommendations detail page for **Vulnerability assessment findings on your SQL servers on machines should be remediated**, select **Disable rule**.
139+
140+
1. Select the relevant scope.
141+
142+
1. Define your criteria. You can use any of the following criteria:
143+
- Finding ID
144+
- Severity
145+
- Benchmarks
146+
147+
:::image type="content" source="../../security-center/media/defender-for-sql-on-machines-vulnerability-assessment/disable-rule-vulnerability-findings-sql.png" alt-text="Create a disable rule for VA findings on SQL servers on machines":::
148+
149+
1. Select **Apply rule**. Changes might take up to 24hrs to take effect.
150+
151+
1. To view, override, or delete a rule:
152+
153+
1. Select **Disable rule**.
154+
155+
1. From the scope list, subscriptions with active rules show as **Rule applied**.
156+
157+
:::image type="content" source="../../security-center/media/remediate-vulnerability-findings-vm/modify-rule.png" alt-text="Modify or delete an existing rule":::
158+
159+
1. To view or delete the rule, select the ellipsis menu ("...").
160+
123161
## Manage vulnerability assessments programmatically
124162

125163
### Using Azure PowerShell
@@ -241,4 +279,4 @@ To handle Boolean types as true/false, set the baseline result with binary input
241279

242280
- Learn more about [Azure Defender for SQL](azure-defender-for-sql.md).
243281
- Learn more about [data discovery and classification](data-discovery-and-classification-overview.md).
244-
- Learn more about [Storing vulnerability assessment scan results in a storage account accessible behind firewalls and VNets](sql-database-vulnerability-assessment-storage.md).
282+
- Learn more about [Storing vulnerability assessment scan results in a storage account accessible behind firewalls and VNets](sql-database-vulnerability-assessment-storage.md).

articles/static-web-apps/authentication-authorization.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ description: Learn to use different authorization providers to secure your stati
44
services: static-web-apps
55
author: craigshoemaker
66
ms.service: static-web-apps
7-
ms.topic: conceptual
8-
ms.date: 05/08/2020
7+
ms.topic: conceptual
8+
ms.date: 04/09/2021
99
ms.author: cshoe
1010
---
1111

@@ -19,26 +19,26 @@ Azure Static Web Apps streamlines the authentication experience by managing auth
1919
- Google<sup>1</sup>
2020
- Twitter
2121

22-
Provider-specific [invitations](#invitations) associate users with roles, and authorized users are granted access to [routes](routes.md) by rules defined in the _routes.json_ file.
22+
Provider-specific [invitations](#invitations) associate users with roles, and authorized users are granted access to [routes](routes.md) by rules defined in the _staticwebapp.config.json_ file.
2323

2424
All authentication providers are enabled by default. To restrict an authentication provider, [block access](#block-an-authorization-provider) with a custom route rule.
2525

2626
The topics of authentication and authorization significantly overlap with routing concepts. Make sure to read the [routing guide](routes.md) along with this article.
2727

2828
## Roles
2929

30-
Every user who accesses a static web app belongs to one or more roles. There are two built-in roles that users can belong to:
30+
Every user who accesses a static web app belongs to one or more roles. There are two built-in roles that users can belong to:
3131

3232
- **anonymous**: All users automatically belong to the _anonymous_ role.
3333
- **authenticated**: All users who are logged in belong to the _authenticated_ role.
3434

35-
Beyond the built-in roles, you can create new roles, assign them to users via invitations, and reference them in the _routes.json_ file.
35+
Beyond the built-in roles, you can create new roles, assign them to users via invitations, and reference them in the _staticwebapp.config.json_ file.
3636

3737
## Role management
3838

3939
### Add a user to a role
4040

41-
To add users to your web site, you generate invitations which allow you to associate users to specific roles. Roles are defined and maintained in the _routes.json_ file.
41+
To add users to your web site, you generate invitations which allow you to associate users to specific roles. Roles are defined and maintained in the _staticwebapp.config.json_ file.
4242

4343
<a name="invitations" id="invitations"></a>
4444

@@ -48,25 +48,25 @@ Invitations are specific to individual authorization-providers, so consider the
4848

4949
<a name="provider-user-details" id="provider-user-details"></a>
5050

51-
| Authorization provider | Exposes a user's |
52-
| ---------------------- | ----------------- |
53-
| Azure Active Directory | email address |
54-
| Facebook | email address |
55-
| GitHub | username |
56-
| Google<sup>1</sup> | email address |
57-
| Twitter | username |
51+
| Authorization provider | Exposes a user's |
52+
| ---------------------- | ---------------- |
53+
| Azure Active Directory | email address |
54+
| Facebook | email address |
55+
| GitHub | username |
56+
| Google<sup>1</sup> | email address |
57+
| Twitter | username |
5858

5959
1. Navigate to a Static Web Apps resource in the [Azure portal](https://portal.azure.com).
6060
1. Under _Settings_, click on **Role Management**.
6161
1. Click on the **Invite** button.
6262
1. Select an _Authorization provider_ from the list of options.
6363
1. Add either the username or email address of the recipient in the _Invitee details_ box.
64-
- For GitHub and Twitter, you enter the username. For all others, enter the recipient's email address.
64+
- For GitHub and Twitter, you enter the username. For all others, enter the recipient's email address.
6565
1. Select the domain of your static site from the _Domain_ drop-down.
66-
- The domain you select is the domain that appears in the invitation. If you have a custom domain associated with your site, you probably want to choose the custom domain.
66+
- The domain you select is the domain that appears in the invitation. If you have a custom domain associated with your site, you probably want to choose the custom domain.
6767
1. Add a comma-separated list of role names in the _Role_ box.
6868
1. Enter the maximum number of hours you want the invitation to remain valid.
69-
- The maximum possible limit is 168 hours, which is 7 days.
69+
- The maximum possible limit is 168 hours, which is 7 days.
7070
1. Click the **Generate** button.
7171
1. Copy the link from the _Invite link_ box.
7272
1. Email the invitation link to the person you're granting access to your app.

0 commit comments

Comments
 (0)