You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/scenario-desktop-acquire-token.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1009,7 +1009,7 @@ This flow isn't supported on MSAL for macOS.
1009
1009
1010
1010
# [Node.js](#tab/nodejs)
1011
1011
1012
-
This extract is from the [MSAL Node dev samples](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/samples/msal-node-samples/standalone-samples/username-password). In the code snippet below, the username and password are hardcoded for illustration purposes only. This should be avoided in production. Instead, a basic UI prompting the user to enter her username/password would be recommended.
1012
+
This extract is from the [MSAL Node dev samples](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/samples/msal-node-samples/username-password). In the code snippet below, the username and password are hardcoded for illustration purposes only. This should be avoided in production. Instead, a basic UI prompting the user to enter her username/password would be recommended.
1013
1013
1014
1014
```JavaScript
1015
1015
constmsal=require("@azure/msal-node");
@@ -1252,7 +1252,7 @@ This flow doesn't apply to macOS.
1252
1252
1253
1253
# [Node.js](#tab/nodejs)
1254
1254
1255
-
This extract is from the [MSAL Node dev samples](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/samples/msal-node-samples/standalone-samples/device-code).
1255
+
This extract is from the [MSAL Node dev samples](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/samples/msal-node-samples/device-code).
Copy file name to clipboardExpand all lines: articles/azure-sql/database/sql-vulnerability-assessment.md
+40-2Lines changed: 40 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ ms.topic: how-to
11
11
author: davidtrigano
12
12
ms.author: datrigan
13
13
ms.reviewer: vanto
14
-
ms.date: 02/11/2021
14
+
ms.date: 04/09/2021
15
15
tags: azure-synapse
16
16
---
17
17
# SQL vulnerability assessment helps you identify database vulnerabilities
@@ -120,6 +120,44 @@ Select **Export Scan Results** to create a downloadable Excel report of your sca
120
120
121
121
Select **Scan History** in the vulnerability assessment pane to view a history of all scans previously run on this database. Select a particular scan in the list to view the detailed results of that scan.
122
122
123
+
### Disable specific findings from Azure Security Center (preview)
124
+
125
+
If you have an organizational need to ignore a finding, rather than remediate it, you can optionally disable it. Disabled findings don't impact your secure score or generate unwanted noise.
126
+
127
+
When a finding matches the criteria you've defined in your disable rules, it won't appear in the list of findings. Typical scenarios include:
128
+
129
+
- Disable findings with severity below medium
130
+
- Disable findings that are non-patchable
131
+
- Disable findings from benchmarks that aren't of interest for a defined scope
132
+
133
+
> [!IMPORTANT]
134
+
> To disable specific findings, you need permissions to edit a policy in Azure Policy. Learn more in [Azure RBAC permissions in Azure Policy](../../governance/policy/overview.md#azure-rbac-permissions-in-azure-policy).
135
+
136
+
To create a rule:
137
+
138
+
1. From the recommendations detail page for **Vulnerability assessment findings on your SQL servers on machines should be remediated**, select **Disable rule**.
139
+
140
+
1. Select the relevant scope.
141
+
142
+
1. Define your criteria. You can use any of the following criteria:
143
+
- Finding ID
144
+
- Severity
145
+
- Benchmarks
146
+
147
+
:::image type="content" source="../../security-center/media/defender-for-sql-on-machines-vulnerability-assessment/disable-rule-vulnerability-findings-sql.png" alt-text="Create a disable rule for VA findings on SQL servers on machines":::
148
+
149
+
1. Select **Apply rule**. Changes might take up to 24hrs to take effect.
150
+
151
+
1. To view, override, or delete a rule:
152
+
153
+
1. Select **Disable rule**.
154
+
155
+
1. From the scope list, subscriptions with active rules show as **Rule applied**.
156
+
157
+
:::image type="content" source="../../security-center/media/remediate-vulnerability-findings-vm/modify-rule.png" alt-text="Modify or delete an existing rule":::
158
+
159
+
1. To view or delete the rule, select the ellipsis menu ("...").
@@ -241,4 +279,4 @@ To handle Boolean types as true/false, set the baseline result with binary input
241
279
242
280
- Learn more about [Azure Defender for SQL](azure-defender-for-sql.md).
243
281
- Learn more about [data discovery and classification](data-discovery-and-classification-overview.md).
244
-
- Learn more about [Storing vulnerability assessment scan results in a storage account accessible behind firewalls and VNets](sql-database-vulnerability-assessment-storage.md).
282
+
- Learn more about [Storing vulnerability assessment scan results in a storage account accessible behind firewalls and VNets](sql-database-vulnerability-assessment-storage.md).
Copy file name to clipboardExpand all lines: articles/static-web-apps/authentication-authorization.md
+16-16Lines changed: 16 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,8 +4,8 @@ description: Learn to use different authorization providers to secure your stati
4
4
services: static-web-apps
5
5
author: craigshoemaker
6
6
ms.service: static-web-apps
7
-
ms.topic: conceptual
8
-
ms.date: 05/08/2020
7
+
ms.topic: conceptual
8
+
ms.date: 04/09/2021
9
9
ms.author: cshoe
10
10
---
11
11
@@ -19,26 +19,26 @@ Azure Static Web Apps streamlines the authentication experience by managing auth
19
19
- Google<sup>1</sup>
20
20
- Twitter
21
21
22
-
Provider-specific [invitations](#invitations) associate users with roles, and authorized users are granted access to [routes](routes.md) by rules defined in the _routes.json_ file.
22
+
Provider-specific [invitations](#invitations) associate users with roles, and authorized users are granted access to [routes](routes.md) by rules defined in the _staticwebapp.config.json_ file.
23
23
24
24
All authentication providers are enabled by default. To restrict an authentication provider, [block access](#block-an-authorization-provider) with a custom route rule.
25
25
26
26
The topics of authentication and authorization significantly overlap with routing concepts. Make sure to read the [routing guide](routes.md) along with this article.
27
27
28
28
## Roles
29
29
30
-
Every user who accesses a static web app belongs to one or more roles. There are two built-in roles that users can belong to:
30
+
Every user who accesses a static web app belongs to one or more roles. There are two built-in roles that users can belong to:
31
31
32
32
-**anonymous**: All users automatically belong to the _anonymous_ role.
33
33
-**authenticated**: All users who are logged in belong to the _authenticated_ role.
34
34
35
-
Beyond the built-in roles, you can create new roles, assign them to users via invitations, and reference them in the _routes.json_ file.
35
+
Beyond the built-in roles, you can create new roles, assign them to users via invitations, and reference them in the _staticwebapp.config.json_ file.
36
36
37
37
## Role management
38
38
39
39
### Add a user to a role
40
40
41
-
To add users to your web site, you generate invitations which allow you to associate users to specific roles. Roles are defined and maintained in the _routes.json_ file.
41
+
To add users to your web site, you generate invitations which allow you to associate users to specific roles. Roles are defined and maintained in the _staticwebapp.config.json_ file.
42
42
43
43
<aname="invitations"id="invitations"></a>
44
44
@@ -48,25 +48,25 @@ Invitations are specific to individual authorization-providers, so consider the
1. Navigate to a Static Web Apps resource in the [Azure portal](https://portal.azure.com).
60
60
1. Under _Settings_, click on **Role Management**.
61
61
1. Click on the **Invite** button.
62
62
1. Select an _Authorization provider_ from the list of options.
63
63
1. Add either the username or email address of the recipient in the _Invitee details_ box.
64
-
- For GitHub and Twitter, you enter the username. For all others, enter the recipient's email address.
64
+
- For GitHub and Twitter, you enter the username. For all others, enter the recipient's email address.
65
65
1. Select the domain of your static site from the _Domain_ drop-down.
66
-
- The domain you select is the domain that appears in the invitation. If you have a custom domain associated with your site, you probably want to choose the custom domain.
66
+
- The domain you select is the domain that appears in the invitation. If you have a custom domain associated with your site, you probably want to choose the custom domain.
67
67
1. Add a comma-separated list of role names in the _Role_ box.
68
68
1. Enter the maximum number of hours you want the invitation to remain valid.
69
-
- The maximum possible limit is 168 hours, which is 7 days.
69
+
- The maximum possible limit is 168 hours, which is 7 days.
70
70
1. Click the **Generate** button.
71
71
1. Copy the link from the _Invite link_ box.
72
72
1. Email the invitation link to the person you're granting access to your app.
0 commit comments