Skip to content

Commit 2aa32c8

Browse files
committed
Merge remote-tracking branch 'refs/remotes/MicrosoftDocs/master' into nitinme-form-reco-tutorial
2 parents 381494e + 0e369b6 commit 2aa32c8

File tree

11 files changed

+245
-93
lines changed

11 files changed

+245
-93
lines changed

articles/active-directory/develop/quickstart-v2-java-webapp.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -140,7 +140,7 @@ Add MSAL4J to your application by using Maven or Gradle to manage your dependenc
140140
<dependency>
141141
<groupId>com.microsoft.azure</groupId>
142142
<artifactId>msal4j</artifactId>
143-
<version>0.5.0-preview</version>
143+
<version>0.6.0-preview</version>
144144
</dependency>
145145
```
146146

@@ -171,6 +171,6 @@ To know more about the auth flow for this scenario, see the Oauth 2.0 authorizat
171171
Help us improve the Microsoft identity platform. Tell us what you think by completing a short two-question survey.
172172

173173
> [!div class="nextstepaction"]
174-
> [Microsoft identity platform survey](https://forms.office.com/Pages/ResponsePage.aspxid=v4j5cvGGr0GRqy180BHbRyKrNDMV_xBIiPGgSvnbQZdUQjFIUUFGUE1SMEVFTkdaVU5YT0EyOEtJVi4u)
174+
> [Microsoft identity platform survey](https://forms.office.com/Pages/ResponsePage.aspx?id=v4j5cvGGr0GRqy180BHbRyKrNDMV_xBIiPGgSvnbQZdUQjFIUUFGUE1SMEVFTkdaVU5YT0EyOEtJVi4u)
175175
176176
[!INCLUDE [Help and support](../../../includes/active-directory-develop-help-support-include.md)]

articles/iot-hub/iot-hub-bulk-identity-mgmt.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ Only 1 active device import or export job is allowed at a time for all IoT Hub t
8686

8787
## Export devices
8888

89-
Use the **ExportDevicesAsync** method to export the entirety of an IoT hub identity registry to an [Azure Storage](../storage/index.yml) blob container using a [Shared Access Signature](../storage/common/storage-security-guide.md#data-plane-security).
89+
Use the **ExportDevicesAsync** method to export the entirety of an IoT hub identity registry to an [Azure Storage](../storage/index.yml) blob container using a [Shared Access Signature](../storage/common/storage-security-guide.md#authorization).
9090

9191
This method enables you to create reliable backups of your device information in a blob container that you control.
9292

articles/security/develop/index.yml

Lines changed: 55 additions & 52 deletions
Original file line numberDiff line numberDiff line change
@@ -1,64 +1,67 @@
1-
### YamlMime:YamlDocument
2-
documentType: LandingData
1+
### YamlMime:Landing
2+
33
title: Secure development documentation
4+
summary: Learn how to develop and deploy secure applications on Azure with our sample apps, best practices, and guidance.
5+
46
metadata:
5-
document_id:
67
title: Secure development documentation on Microsoft Azure
7-
meta.description: Learn how to develop secure apps on Azure.
8+
description: Learn how to develop secure apps on Azure.
89
services: security
9-
author: TerryLanfear
10-
manager: rkarlin
1110
ms.service: security
1211
ms.subservice: develop
13-
ms.tgt_pltfrm: na
14-
ms.devlang: na
1512
ms.topic: landing-page
16-
ms.date: 09/30/2019
13+
author: TerryLanfear
1714
ms.author: terrylan
18-
abstract:
19-
description: "Learn how to develop and deploy secure applications on Azure with our sample apps, best practices, and guidance."
15+
manager: rkarlin
16+
ms.date: 10/24/2019
17+
18+
# linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | tutorial | whats-new
2019

21-
sections:
22-
- items:
23-
- type: list
24-
style: cards
25-
className: cardsM
26-
columns: 2
27-
items:
28-
- href: /azure/security/develop/secure-dev-overview
29-
html: <p>Develop a secure web application on Azure</p>
30-
image:
31-
src: https://docs.microsoft.com/media/common/i_get-started.svg
32-
title: Get started
33-
- href: https://docs.microsoft.com/learn/modules/top-5-security-items-to-consider
34-
html: <p>Top five security items for web apps</p>
35-
image:
36-
src: https://docs.microsoft.com/media/common/i_learn-about.svg
37-
title: Build your skills with Microsoft Learn
20+
landingContent:
21+
# Cards and links should be based on top customer tasks or top subjects
22+
# Start card title with a verb
23+
# Card
24+
- title: Develop secure sample apps
25+
linkLists:
26+
- linkListType: tutorial
27+
links:
28+
- text: Web app in a Linux container
29+
url: secure-web-app.md
30+
- text: Web app with Azure Active Directory
31+
url: secure-aad-app.md
32+
- text: Payment card industry
33+
url: secure-pci-web-app.md
3834

39-
- title: Secure sample apps
40-
items:
41-
- type: list
42-
style: unordered
43-
className: spaced noBullet
44-
items:
45-
- html: <a href="/azure/security/develop/secure-web-app">Web app in a Linux container</a>
46-
- html: <a href="/azure/security/develop/secure-aad-app">Web app with Azure Active Directory</a>
47-
- html: <a href="/azure/security/develop/secure-pci-web-app">Payment card industry</a>
35+
# Card
36+
- title: Get started
37+
linkLists:
38+
- linkListType: concept
39+
links:
40+
- text: Secure development best practices
41+
url: secure-dev-overview.md
42+
- text: Desgin phase
43+
url: secure-design.md
44+
- text: Development phase
45+
url: secure-develop.md
46+
- text: Deployment phase
47+
url: secure-deploy.md
4848

49-
- title: Concepts
50-
items:
51-
- type: list
52-
style: unordered
53-
className: spaced noBullet
54-
items:
55-
- html: <a href="/azure/security/develop/secure-dev-overview">Secure development best practices</a>
49+
# Card
50+
- title: Add analysis tools to your secure development
51+
linkLists:
52+
- linkListType: concept
53+
links:
54+
- text: Security code analysis
55+
url: security-code-analysis-overview.md
56+
- text: Threat modeling
57+
url: threat-modeling-tool.md
5658

57-
- title: Resources
58-
items:
59-
- type: list
60-
style: unordered
61-
className: spaced noBullet
62-
items:
63-
- html: <a href="/azure/security/develop/security-code-analysis-overview">Microsoft Security Code Analysis</a>
64-
- html: <a href="/azure/security/develop/threat-modeling-tool">Threat modeling tool</a>
59+
# Card
60+
- title: Build your skills
61+
linkLists:
62+
- linkListType: learn
63+
links:
64+
- text: Top 5 security items
65+
url: https://docs.microsoft.com/learn/modules/top-5-security-items-to-consider
66+
- text: Secure your cloud applications in Azure
67+
url: https://docs.microsoft.com/learn/paths/secure-your-cloud-apps

articles/storage/blobs/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -120,6 +120,8 @@
120120
href: ../common/storage-advanced-threat-protection.md?toc=%2fazure%2fstorage%2fblobs%2ftoc.json
121121
- name: Built-in security controls
122122
href: ../common/storage-security-controls.md?toc=%2fazure%2fstorage%2fblobs%2ftoc.json
123+
- name: Use Azure Private Endpoints
124+
href: ../common/storage-private-endpoints.md?toc=%2fazure%2fstorage%2fblobs%2ftoc.json
123125
- name: Data redundancy
124126
href: ../common/storage-redundancy.md?toc=%2fazure%2fstorage%2fblobs%2ftoc.json
125127
items:
199 KB
Loading

articles/storage/common/storage-network-security.md

Lines changed: 18 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -8,30 +8,34 @@ ms.service: storage
88
ms.topic: conceptual
99
ms.date: 03/21/2019
1010
ms.author: tamram
11-
ms.reviewer: cbrooks
11+
ms.reviewer: santoshc
1212
ms.subservice: common
1313
---
1414

1515
# Configure Azure Storage firewalls and virtual networks
1616

17-
Azure Storage provides a layered security model. This model enables you to secure your storage accounts to a specific subset of networks​. When network rules are configured, only applications requesting data over the specified set of networks can access a storage account. You can limit access to your storage account to requests originating from specified IP addresses, IP ranges or from a list of subnets in Azure Virtual Networks.
17+
Azure Storage provides a layered security model. This model enables you to secure and control the level of access to your storage accounts that your applications and enterprise environments demand, based on the type and subset of networks​ used. When network rules are configured, only applications requesting data over the specified set of networks can access a storage account. You can limit access to your storage account to requests originating from specified IP addresses, IP ranges or from a list of subnets in an Azure Virtual Network (VNet).
1818

19-
An application that accesses a storage account when network rules are in effect requires proper authorization for the request. Authorization is supported with Azure Active Directory (Azure AD) credentials for blobs and queues, with a valid account access key, or with an SAS token.
19+
Storage accounts have a public endpoint that is accessible through the internet. You can also create [Private Endpoints for your storage account](storage-private-endpoints.md), which assigns a private IP address from your VNet to the storage account, and secures all traffic between your VNet and the storage account over a private link. The Azure storage firewall provides access control access for the public endpoint of your storage account. You can also use the firewall to block all access through the public endpoint when using private endpoints. Your storage firewall configuration also enables select trusted Azure platform services to access the storage account securely.
20+
21+
An application that accesses a storage account when network rules are in effect still requires proper authorization for the request. Authorization is supported with Azure Active Directory (Azure AD) credentials for blobs and queues, with a valid account access key, or with an SAS token.
2022

2123
> [!IMPORTANT]
22-
> Turning on firewall rules for your storage account blocks incoming requests for data by default, unless the requests originate from a service operating within an Azure Virtual Network (VNet). Requests that are blocked include those from other Azure services, from the Azure portal, from logging and metrics services, and so on.
24+
> Turning on firewall rules for your storage account blocks incoming requests for data by default, unless the requests originate from a service operating within an Azure Virtual Network (VNet) or from allowed public IP addresses. Requests that are blocked include those from other Azure services, from the Azure portal, from logging and metrics services, and so on.
2325
>
24-
> You can grant access to Azure services that operate from within a VNet by allowing traffic from the subnet hosting the service instance. You can also enable a limited number of scenarios through the [Exceptions](#exceptions) mechanism described in the following section. To access data from the storage account through the Azure portal, you would need to be on a machine within the trusted boundary (either IP or VNet) that you set up.
26+
> You can grant access to Azure services that operate from within a VNet by allowing traffic from the subnet hosting the service instance. You can also enable a limited number of scenarios through the [Exceptions](#exceptions) mechanism described below. To access data from the storage account through the Azure portal, you would need to be on a machine within the trusted boundary (either IP or VNet) that you set up.
2527
2628
[!INCLUDE [updated-for-az](../../../includes/updated-for-az.md)]
2729

2830
## Scenarios
2931

30-
To secure your storage account, you should first configure a rule to deny access to traffic from all networks (including internet traffic) by default. Then, you should configure rules that grant access to traffic from specific VNets. This configuration enables you to build a secure network boundary for your applications. You can also configure rules to grant access to traffic from select public internet IP address ranges, enabling connections from specific internet or on-premises clients.
32+
To secure your storage account, you should first configure a rule to deny access to traffic from all networks (including internet traffic) on the public endpoint, by default. Then, you should configure rules that grant access to traffic from specific VNets. You can also configure rules to grant access to traffic from select public internet IP address ranges, enabling connections from specific internet or on-premises clients. This configuration enables you to build a secure network boundary for your applications.
3133

32-
Network rules are enforced on all network protocols to Azure storage, including REST and SMB. To access data using tools such as the Azure portal, Storage Explorer, and AZCopy, explicit network rules must be configured.
34+
You can combine firewall rules that allow access from specific virtual networks and from public IP address ranges on the same storage account. Storage firewall rules can be applied to existing storage accounts, or when creating new storage accounts.
3335

34-
You can apply network rules to existing storage accounts, or when you create new storage accounts.
36+
Storage firewall rules apply to the public endpoint of a storage account. You don't need any firewall access rules to allow traffic for private endpoints of a storage account. The process of approving the creation of a private endpoint grants implicit access to traffic from the subnet that hosts the private endpoint.
37+
38+
Network rules are enforced on all network protocols to Azure storage, including REST and SMB. To access data using tools such as the Azure portal, Storage Explorer, and AZCopy, explicit network rules must be configured.
3539

3640
Once network rules are applied, they're enforced for all requests. SAS tokens that grant access to a specific IP address serve to limit the access of the token holder, but don't grant new access beyond configured network rules.
3741

@@ -215,7 +219,7 @@ You can manage virtual network rules for storage accounts through the Azure port
215219
```
216220
217221
> [!TIP]
218-
> To add a rule for a subnet in a VNet belonging to another Azure AD tenant, use a fully-qualified subnet ID in the form "/subscriptions/subscription-ID/resourceGroups/resourceGroup-Name/providers/Microsoft.Network/virtualNetworks/vNet-name/subnets/subnet-name".
222+
> To add a rule for a subnet in a VNet belonging to another Azure AD tenant, use a fully-qualified subnet ID in the form "/subscriptions/\<subscription-ID\>/resourceGroups/\<resourceGroup-Name\>/providers/Microsoft.Network/virtualNetworks/\<vNet-name\>/subnets/\<subnet-name\>".
219223
>
220224
> You can use the **subscription** parameter to retrieve the subnet ID for a VNet belonging to another Azure AD tenant.
221225
@@ -243,9 +247,12 @@ IP network rules are only allowed for **public internet** IP addresses. IP addre
243247
> [!NOTE]
244248
> IP network rules have no effect on requests originating from the same Azure region as the storage account. Use [Virtual network rules](#grant-access-from-a-virtual-network) to allow same-region requests.
245249
246-
Only IPV4 addresses are supported at this time.
250+
> [!NOTE]
251+
> Services deployed in the same region as the storage account use private Azure IP addresses for communication. Thus, you cannot restrict access to specific Azure services based on their public inbound IP address range.
252+
253+
Only IPV4 addresses are supported for configuration of storage firewall rules.
247254
248-
Each storage account supports up to 100 IP network rules, which may be combined with [Virtual network rules](#grant-access-from-a-virtual-network).
255+
Each storage account supports up to 100 IP network rules.
249256
250257
### Configuring access from on-premises networks
251258

0 commit comments

Comments
 (0)