Skip to content

Commit 2acf52e

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 0d3484d + 5eed7d5 commit 2acf52e

File tree

156 files changed

+2773
-1766
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

156 files changed

+2773
-1766
lines changed

articles/active-directory-b2c/whats-new-docs.md

Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,29 @@ manager: CelesteDG
1515

1616
Welcome to what's new in Azure Active Directory B2C documentation. This article lists new docs that have been added and those that have had significant updates in the last three months. To learn what's new with the B2C service, see [What's new in Azure Active Directory](../active-directory/fundamentals/whats-new.md) and [Azure AD B2C developer release notes](custom-policy-developer-notes.md)
1717

18+
## March 2023
19+
20+
### Updated articles
21+
22+
- [Configure SAML identity provider options with Azure Active Directory B2C](identity-provider-generic-saml-options.md)
23+
- [Tutorial: Configure BioCatch with Azure Active Directory B2C](partner-biocatch.md)
24+
- [Tutorial: Configure Nok Nok Passport with Azure Active Directory B2C for passwordless FIDO2 authentication](partner-nok-nok.md)
25+
- [Pass an identity provider access token to your application in Azure Active Directory B2C](idp-pass-through-user-flow.md)
26+
- [Tutorial: Configure Haventec Authenticate with Azure Active Directory B2C for single-step, multi-factor passwordless authentication](partner-haventec.md)
27+
- [Configure Trusona Authentication Cloud with Azure Active Directory B2C](partner-trusona.md)
28+
- [Tutorial: Configure IDEMIA Mobile ID with Azure Active Directory B2C](partner-idemia.md)
29+
- [Configure Azure Active Directory B2C with Bluink eID-Me for identity verification](partner-eid-me.md)
30+
- [Tutorial: Configure Azure Active Directory B2C with BlokSec for passwordless authentication](partner-bloksec.md)
31+
- [Tutorial: Configure Azure Active Directory B2C with Azure Web Application Firewall](partner-azure-web-application-firewall.md)
32+
- [Tutorial to configure Saviynt with Azure Active Directory B2C](partner-saviynt.md)
33+
- [Tutorial: Configure Keyless with Azure Active Directory B2C](partner-keyless.md)
34+
- [Tutorial: Configure security analytics for Azure Active Directory B2C data with Microsoft Sentinel](azure-sentinel.md)
35+
- [Configure authentication in a sample Python web app by using Azure AD B2C](configure-authentication-sample-python-web-app.md)
36+
- [Billing model for Azure Active Directory B2C](billing.md)
37+
- [Azure Active Directory B2C: Region availability & data residency](data-residency.md)
38+
- ['Azure AD B2C: Frequently asked questions (FAQ)'](faq.yml)
39+
- [Tutorial: Create an Azure Active Directory B2C tenant](tutorial-create-tenant.md)
40+
1841
## February 2023
1942

2043
### Updated articles

articles/active-directory-domain-services/migrate-from-classic-vnet.md

Lines changed: 29 additions & 147 deletions
Large diffs are not rendered by default.

articles/active-directory/authentication/concept-authentication-phone-options.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 01/29/2023
9+
ms.date: 04/17/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -44,7 +44,11 @@ Microsoft doesn't guarantee consistent SMS or voice-based Azure AD Multi-Factor
4444

4545
### Text message verification
4646

47-
With text message verification during SSPR or Azure AD Multi-Factor Authentication, an SMS is sent to the mobile phone number containing a verification code. To complete the sign-in process, the verification code provided is entered into the sign-in interface.
47+
With text message verification during SSPR or Azure AD Multi-Factor Authentication, a Short Message Service (SMS) text is sent to the mobile phone number containing a verification code. To complete the sign-in process, the verification code provided is entered into the sign-in interface.
48+
49+
Android users can enable Rich Communication Services (RCS) on their devices. RCS offers encryption and other improvements over SMS. For Android, MFA text messages may be sent over RCS rather than SMS. The MFA text message is similar to SMS, but RCS messages have more Microsoft branding and a verified checkmark so users know they can trust the message.
50+
51+
:::image type="content" source="media/concept-authentication-methods/brand.png" alt-text="Screenshot of Microsoft branding in RCS messages.":::
4852

4953
### Phone call verification
5054

63 KB
Loading

articles/active-directory/manage-apps/index.yml

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ metadata:
1010
ms.subservice: app-mgmt
1111
ms.workload: identity
1212
ms.topic: landing-page
13-
ms.date: 07/08/2021
13+
ms.date: 04/17/2023
1414
author: CelesteDG
1515
ms.author: CelesteDG
1616

@@ -89,6 +89,8 @@ landingContent:
8989
links:
9090
- text: Identity governance
9191
url: ../governance/identity-governance-overview.md
92+
- text: User and admin consent
93+
url: user-admin-consent-overview.md
9294
- linkListType: how-to-guide
9395
links:
9496
- text: Assign roles
@@ -139,6 +141,8 @@ landingContent:
139141
url: ../reports-monitoring/howto-download-logs.md
140142
- text: Set up access reviews
141143
url: ../governance/deploy-access-reviews.md
144+
- text: Assign owners
145+
url: assign-app-owners.md
142146
- title: Remote access to on-premises apps
143147
linkLists:
144148
- linkListType: concept
@@ -147,7 +151,7 @@ landingContent:
147151
url: ../app-proxy/application-proxy.md
148152
- linkListType: how-to-guide
149153
links:
150-
- text: Application Proxy deployment
154+
- text: Plan application Proxy deployment
151155
url: ../app-proxy/application-proxy-deployment-plan.md
152156
- text: Set up connectors
153157
url: ../app-proxy/application-proxy-connectors.md

articles/active-directory/manage-apps/protect-against-consent-phishing.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ Administrators, users, or Microsoft security researchers may flag OAuth applicat
3535
When Azure AD disables an OAuth application, the following actions occur:
3636

3737
- The malicious application and related service principals are placed into a fully disabled state. Any new token requests or requests for refresh tokens are denied, but existing access tokens are still valid until their expiration.
38-
- The disabled state is surfaced through an exposed property called *disabledByMicrosoftStatus* on the related [application](/graph/api/resources/application) and [service principal](/graph/api/resources/serviceprincipal) resource types in Microsoft Graph.
38+
- These applications will show `DisabledDueToViolationOfServicesAgreement` on the `disabledByMicrosoftStatus` property on the related [application](/graph/api/resources/application) and [service principal](/graph/api/resources/serviceprincipal) resource types in Microsoft Graph. To prevent them from being instantiated in your organization again in the future, you cannot delete these objects.
3939
- An email is sent to a global administrator when a user in an organization consented to an application before it was disabled. The email specifies the action taken and recommended steps they can do to investigate and improve their security posture.
4040

4141
## Recommended response and remediation
@@ -73,3 +73,4 @@ Administrators should be in control of application use by providing the right in
7373
- [Managing access to applications](./what-is-access-management.md)
7474
- [Restrict user consent operations in Azure AD](../../security/fundamentals/steps-secure-identity.md#restrict-user-consent-operations)
7575
- [Compromised and malicious applications investigation](/security/compass/incident-response-playbook-compromised-malicious-app)
76+

articles/aks/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -365,7 +365,7 @@
365365
href: workload-identity-overview.md
366366
- name: Deploy and configure cluster
367367
href: workload-identity-deploy-cluster.md
368-
- name: Modernize your app with workload identity
368+
- name: Migrate your app from pod identity to workload identity
369369
href: workload-identity-migrate-from-pod-identity.md
370370
- name: Use Azure AD pod identity (preview)
371371
href: use-azure-ad-pod-identity.md
@@ -411,6 +411,8 @@
411411
href: configure-azure-cni-dynamic-ip-allocation.md
412412
- name: Use Azure CNI Overlay
413413
href: azure-cni-overlay.md
414+
- name: Deploy Isovalent Cilium Enterprise
415+
href: cilium-enterprise-marketplace.md
414416
- name: DNS
415417
items:
416418
- name: Use a static IP address and DNS label

articles/aks/azure-netapp-files.md

Lines changed: 20 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Provision Azure NetApp Files volumes on Azure Kubernetes Service
33
description: Learn how to provision Azure NetApp Files volumes on an Azure Kubernetes Service cluster.
44
ms.topic: article
55
ms.custom: devx-track-azurecli
6-
ms.date: 02/08/2023
6+
ms.date: 04/18/2023
77
---
88

99
# Provision Azure NetApp Files volumes on Azure Kubernetes Service
@@ -272,14 +272,7 @@ Before proceeding to the next section, you need to:
272272
273273
This section walks you through the installation of Astra Trident using the operator.
274274
275-
1. Download Astra Trident from its [GitHub repository](https://github.com/NetApp/trident/releases). Choose from the desired version and download the installer bundle.
276-
277-
```bash
278-
wget https://github.com/NetApp/trident/releases/download/v21.07.1/trident-installer-21.07.1.tar.gz
279-
tar xzvf trident-installer-21.07.1.tar.gz
280-
```
281-
282-
2. Run the [kubectl create][kubectl-create] command to create the *trident* namespace:
275+
1. Run the [kubectl create][kubectl-create] command to create the *trident* namespace:
283276
284277
```bash
285278
kubectl create ns trident
@@ -291,10 +284,15 @@ This section walks you through the installation of Astra Trident using the opera
291284
namespace/trident created
292285
```
293286
294-
3. Run the [kubectl apply][kubectl-apply] command to deploy the Trident operator using the bundle file:
287+
2. Run the [kubectl apply][kubectl-apply] command to deploy the Trident operator using the bundle file:
295288
289+
- For AKS cluster version less than 1.25, run following command:
290+
```bash
291+
kubectl apply -f https://raw.githubusercontent.com/NetApp/trident/v23.01.1/deploy/bundle_pre_1_25.yaml -n trident
292+
```
293+
- For AKS cluster 1.25+ version, run following command:
296294
```bash
297-
kubectl apply -f trident-installer/deploy/bundle.yaml -n trident
295+
kubectl apply -f https://raw.githubusercontent.com/NetApp/trident/v23.01.1/deploy/bundle_post_1_25.yaml -n trident
298296
```
299297
300298
The output of the command resembles the following example:
@@ -307,10 +305,10 @@ This section walks you through the installation of Astra Trident using the opera
307305
podsecuritypolicy.policy/tridentoperatorpods created
308306
```
309307
310-
4. Run the following command to create a `TridentOrchestrator` to install Astra Trident.
308+
3. Run the following command to create a `TridentOrchestrator` to install Astra Trident.
311309
312310
```bash
313-
kubectl apply -f trident-installer/deploy/crds/tridentorchestrator_cr.yaml
311+
kubectl apply -f https://raw.githubusercontent.com/NetApp/trident/v23.01.1/deploy/crds/tridentorchestrator_cr.yaml
314312
```
315313
316314
The output of the command resembles the following example:
@@ -321,7 +319,7 @@ This section walks you through the installation of Astra Trident using the opera
321319
322320
The operator installs by using the parameters provided in the `TridentOrchestrator` spec. You can learn about the configuration parameters and example backends from the [Trident install guide][trident-install-guide] and [backend guide][trident-backend-install-guide].
323321
324-
5. To confirm Astra Trident was installed successfully, run the following [kubectl describe][kubectl-describe] command:
322+
4. To confirm Astra Trident was installed successfully, run the following [kubectl describe][kubectl-describe] command:
325323
326324
```bash
327325
kubectl describe torc trident
@@ -344,7 +342,7 @@ This section walks you through the installation of Astra Trident using the opera
344342
Current Installation Params:
345343
IPv6: false
346344
Autosupport Hostname:
347-
Autosupport Image: netapp/trident-autosupport:21.01
345+
Autosupport Image: netapp/trident-autosupport:23.01
348346
Autosupport Proxy:
349347
Autosupport Serial Number:
350348
Debug: true
@@ -355,11 +353,11 @@ This section walks you through the installation of Astra Trident using the opera
355353
Kubelet Dir: /var/lib/kubelet
356354
Log Format: text
357355
Silence Autosupport: false
358-
Trident Image: netapp/trident:21.07.1
356+
Trident Image: netapp/trident:23.01.1
359357
Message: Trident installed
360358
Namespace: trident
361359
Status: Installed
362-
Version: v21.07.1
360+
Version: v23.01.1
363361
Events:
364362
Type Reason Age From Message
365363
---- ------ ---- ---- -------
@@ -369,7 +367,7 @@ This section walks you through the installation of Astra Trident using the opera
369367
370368
### Create a backend
371369
372-
1. Before creating a backend, you need to update `backend-anf.yaml` to include details about the Azure NetApp Files subscription, such as:
370+
1. Before creating a backend, you need to update [backend-anf.yaml][backend-anf.yaml] to include details about the Azure NetApp Files subscription, such as:
373371
374372
* `subscriptionID` for the Azure subscription where Azure NetApp Files will be enabled.
375373
* `tenantID`, `clientID`, and `clientSecret` from an [App Registration][azure-ad-app-registration] in Azure Active Directory (AD) with sufficient permissions for the Azure NetApp Files service. The App Registration include the `Owner` or `Contributor` role that's predefined by Azure.
@@ -380,7 +378,7 @@ This section walks you through the installation of Astra Trident using the opera
380378
2. After Astra Trident is installed, create a backend that points to your Azure NetApp Files subscription by running the following command.
381379
382380
```bash
383-
kubectl apply -f trident-installer/sample-input/backends-samples/azure-netapp-files/backend-anf.yaml -n trident
381+
kubectl apply -f backend-anf.yaml -n trident
384382
```
385383
386384
The output of the command resembles the following example:
@@ -487,7 +485,7 @@ After the PVC is created, a pod can be spun up to access the Azure NetApp Files
487485
spec:
488486
containers:
489487
- name: nginx
490-
image: mcr.microsoft.com/oss/nginx/nginx:latest1.15.5-alpine
488+
image: mcr.microsoft.com/oss/nginx/nginx:1.15.5-alpine
491489
resources:
492490
requests:
493491
cpu: 100m
@@ -560,6 +558,7 @@ Astra Trident supports many features with Azure NetApp Files. For more informati
560558
561559
<!-- EXTERNAL LINKS -->
562560
[astra-trident]: https://docs.netapp.com/us-en/trident/index.html
561+
[kubectl-create]: https://kubernetes.io/docs/reference/generated/kubectl/kubectl-commands#create
563562
[kubectl-apply]: https://kubernetes.io/docs/reference/generated/kubectl/kubectl-commands#apply
564563
[kubectl-describe]: https://kubernetes.io/docs/reference/generated/kubectl/kubectl-commands#describe
565564
[kubectl-exec]: https://kubernetes.io/docs/reference/generated/kubectl/kubectl-commands#exec
@@ -573,6 +572,7 @@ Astra Trident supports many features with Azure NetApp Files. For more informati
573572
[expand-trident-volumes]: https://docs.netapp.com/us-en/trident/trident-use/vol-expansion.html
574573
[on-demand-trident-volume-snapshots]: https://docs.netapp.com/us-en/trident/trident-use/vol-snapshots.html
575574
[importing-trident-volumes]: https://docs.netapp.com/us-en/trident/trident-use/vol-import.html
575+
[backend-anf.yaml]: https://raw.githubusercontent.com/NetApp/trident/v23.01.1/trident-installer/sample-input/backends-samples/azure-netapp-files/backend-anf.yaml
576576
577577
<!-- INTERNAL LINKS -->
578578
[aks-quickstart-cli]: ./learn/quick-kubernetes-deploy-cli.md

articles/aks/certificate-rotation.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -19,10 +19,6 @@ This article shows you how certificate rotation works in your AKS cluster.
1919

2020
This article requires that you are running the Azure CLI version 2.0.77 or later. Run `az --version` to find the version. If you need to install or upgrade, see [Install Azure CLI][azure-cli-install].
2121

22-
## Limitation
23-
24-
Certificate rotation is not supported for stopped AKS clusters.
25-
2622
## AKS certificates, Certificate Authorities, and Service Accounts
2723

2824
AKS generates and uses the following certificates, Certificate Authorities, and Service Accounts:

0 commit comments

Comments
 (0)