Skip to content

Commit 2c00fb3

Browse files
authored
Merge pull request #78448 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/Microsoft/azure-docs (branch master)
2 parents 8b3d1cb + c426e48 commit 2c00fb3

File tree

5 files changed

+46
-33
lines changed

5 files changed

+46
-33
lines changed

articles/active-directory/saas-apps/confluencemicrosoft-tutorial.md

Lines changed: 22 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.devlang: na
1616
ms.topic: tutorial
17-
ms.date: 04/22/2019
17+
ms.date: 05/28/2019
1818
ms.author: jeedes
1919

2020
ms.collection: M365-identity-device-management
@@ -74,6 +74,7 @@ As of now, following versions of Confluence are supported:
7474
- Confluence: 6.10.0
7575
- Confluence: 6.11.0
7676
- Confluence: 6.12.0
77+
- Confluence: 6.15.3
7778

7879
> [!NOTE]
7980
> Please note that our Confluence Plugin also works on Ubuntu Version 16.04
@@ -176,34 +177,40 @@ To configure Azure AD single sign-on with Confluence SAML SSO by Microsoft, perf
176177

177178
5. Perform following steps on configuration page:
178179

179-
![Configure Single Sign-On](./media/confluencemicrosoft-tutorial/addon52.png)
180+
![Configure Single Sign-On](./media/confluencemicrosoft-tutorial/addon53.png)
180181

181182
> [!TIP]
182183
> Ensure that there is only one certificate mapped against the app so that there is no error in resolving the metadata. If there are multiple certificates, admin gets an error upon resolving the metadata.
183184

184-
a. In the **Metadata URL** textbox, paste **App Federation Metadata Url** value which you have copied from the Azure portal and click the **Resolve** button. It reads the IdP metadata URL and populates all the fields information.
185+
1. In the **Metadata URL** textbox, paste **App Federation Metadata Url** value which you have copied from the Azure portal and click the **Resolve** button. It reads the IdP metadata URL and populates all the fields information.
185186

186-
b. Copy the **Identifier, Reply URL and Sign on URL** values and paste them in **Identifier, Reply URL and Sign on URL** textboxes respectively in **Basic SAML Configuration** section on Azure portal.
187+
1. Copy the **Identifier, Reply URL and Sign on URL** values and paste them in **Identifier, Reply URL and Sign on URL** textboxes respectively in **Basic SAML Configuration** section on Azure portal.
187188

188-
c. In **Login Button Name** type the name of button your organization wants the users to see on login screen.
189+
1. In **Login Button Name** type the name of button your organization wants the users to see on login screen.
189190

190-
d. In **SAML User ID Locations**, select either **User ID is in the NameIdentifier element of the Subject statement** or **User ID is in an Attribute element**. This ID has to be the Confluence user ID. If the user ID is not matched, then system will not allow users to sign in.
191+
1. In **SAML User ID Locations**, select either **User ID is in the NameIdentifier element of the Subject statement** or **User ID is in an Attribute element**. This ID has to be the Confluence user ID. If the user ID is not matched, then system will not allow users to sign in.
191192

192-
> [!Note]
193-
> Default SAML User ID location is Name Identifier. You can change this to an attribute option and enter the appropriate attribute name.
193+
> [!Note]
194+
> Default SAML User ID location is Name Identifier. You can change this to an attribute option and enter the appropriate attribute name.
194195

195-
e. If you select **User ID is in an Attribute element** option, then in **Attribute name** textbox type the name of the attribute where User ID is expected.
196+
1. If you select **User ID is in an Attribute element** option, then in **Attribute name** textbox type the name of the attribute where User ID is expected.
196197

197-
f. If you are using the federated domain (like ADFS etc.) with Azure AD, then click on the **Enable Home Realm Discovery** option and configure the **Domain Name**.
198+
1. If you are using the federated domain (like ADFS etc.) with Azure AD, then click on the **Enable Home Realm Discovery** option and configure the **Domain Name**.
198199

199-
g. In **Domain Name** type the domain name here in case of the ADFS-based login.
200+
1. In **Domain Name** type the domain name here in case of the ADFS-based login.
200201

201-
h. Check **Enable Single Sign out** if you wish to sign out from Azure AD when a user signs out from Confluence.
202+
1. Check **Enable Single Sign out** if you wish to sign out from Azure AD when a user signs out from Confluence.
202203

203-
i. Click **Save** button to save the settings.
204+
1. Enable **Force Azure Login** checkbox, if you wish to sign in through Azure AD credentials only.
205+
206+
> [!Note]
207+
> To enable the default login form for admin login on the login page when the force azure login is enabled, add the query parameter in the browser URL.
208+
> `https://<domain:port>/login.action?force_azure_login=false`
209+
210+
1. Click **Save** button to save the settings.
204211

205-
> [!NOTE]
206-
> For more information about installation and troubleshooting, visit [MS Confluence SSO Connector Admin Guide](../ms-confluence-jira-plugin-adminguide.md) and there is also [FAQ](../ms-confluence-jira-plugin-faq.md) for your assistance
212+
> [!NOTE]
213+
> For more information about installation and troubleshooting, visit [MS Confluence SSO Connector Admin Guide](../ms-confluence-jira-plugin-adminguide.md). There is also an [FAQ](../ms-confluence-jira-plugin-faq.md) for your assistance.
207214

208215
### Create an Azure AD test user
209216

articles/active-directory/saas-apps/jiramicrosoft-tutorial.md

Lines changed: 23 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.devlang: na
1616
ms.topic: tutorial
17-
ms.date: 04/22/2019
17+
ms.date: 05/28/2019
1818
ms.author: jeedes
1919

2020
ms.collection: M365-identity-device-management
@@ -40,7 +40,7 @@ Use your Microsoft Azure Active Directory account with Atlassian JIRA server to
4040
To configure Azure AD integration with JIRA SAML SSO by Microsoft, you need the following items:
4141

4242
- An Azure AD subscription
43-
- JIRA Core and Software 6.0 to 7.12 or JIRA Service Desk 3.0 to 3.5 should installed and configured on Windows 64-bit version
43+
- JIRA Core and Software 6.4 to 8.0 or JIRA Service Desk 3.0 to 3.5 should installed and configured on Windows 64-bit version
4444
- JIRA server is HTTPS enabled
4545
- Note the supported versions for JIRA Plugin are mentioned in below section.
4646
- JIRA server is reachable on internet particularly to Azure AD Login page for authentication and should able to receive the token from Azure AD
@@ -58,7 +58,7 @@ To test the steps in this tutorial, you should follow these recommendations:
5858

5959
## Supported versions of JIRA
6060

61-
* JIRA Core and Software: 6.0 to 7.12
61+
* JIRA Core and Software: 6.4 to 8.0
6262
* JIRA Service Desk 3.0.0 to 3.5.0
6363
* JIRA also supports 5.2. For more details, click [Microsoft Azure Active Directory single sign-on for JIRA 5.2](jira52microsoft-tutorial.md)
6464

@@ -178,34 +178,40 @@ To configure Azure AD single sign-on with JIRA SAML SSO by Microsoft, perform th
178178

179179
6. Perform following steps on configuration page:
180180

181-
![Configure Single Sign-On](./media/jiramicrosoft-tutorial/addon52.png)
181+
![Configure Single Sign-On](./media/jiramicrosoft-tutorial/addon53.png)
182182

183183
> [!TIP]
184184
> Ensure that there is only one certificate mapped against the app so that there is no error in resolving the metadata. If there are multiple certificates, upon resolving the metadata, admin gets an error.
185185

186-
a. In the **Metadata URL** textbox, paste **App Federation Metadata Url** value which you have copied from the Azure portal and click the **Resolve** button. It reads the IdP metadata URL and populates all the fields information.
186+
1. In the **Metadata URL** textbox, paste **App Federation Metadata Url** value which you have copied from the Azure portal and click the **Resolve** button. It reads the IdP metadata URL and populates all the fields information.
187187

188-
b. Copy the **Identifier, Reply URL and Sign on URL** values and paste them in **Identifier, Reply URL and Sign on URL** textboxes respectively in **JIRA SAML SSO by Microsoft Domain and URLs** section on Azure portal.
188+
1. Copy the **Identifier, Reply URL and Sign on URL** values and paste them in **Identifier, Reply URL and Sign on URL** textboxes respectively in **JIRA SAML SSO by Microsoft Domain and URLs** section on Azure portal.
189189

190-
c. In **Login Button Name** type the name of button your organization wants the users to see on login screen.
190+
1. In **Login Button Name** type the name of button your organization wants the users to see on login screen.
191191

192-
d. In **SAML User ID Locations** select either **User ID is in the NameIdentifier element of the Subject statement** or **User ID is in an Attribute element**. This ID has to be the JIRA user ID. If the user ID is not matched, then system will not allow users to sign in.
192+
1. In **SAML User ID Locations** select either **User ID is in the NameIdentifier element of the Subject statement** or **User ID is in an Attribute element**. This ID has to be the JIRA user ID. If the user ID is not matched, then system will not allow users to sign in.
193193

194-
> [!Note]
195-
> Default SAML User ID location is Name Identifier. You can change this to an attribute option and enter the appropriate attribute name.
194+
> [!Note]
195+
> Default SAML User ID location is Name Identifier. You can change this to an attribute option and enter the appropriate attribute name.
196196

197-
e. If you select **User ID is in an Attribute element** option, then in **Attribute name** textbox type the name of the attribute where User ID is expected.
197+
1. If you select **User ID is in an Attribute element** option, then in **Attribute name** textbox type the name of the attribute where User ID is expected.
198198

199-
f. If you are using the federated domain (like ADFS etc.) with Azure AD, then click on the **Enable Home Realm Discovery** option and configure the **Domain Name**.
199+
1. If you are using the federated domain (like ADFS etc.) with Azure AD, then click on the **Enable Home Realm Discovery** option and configure the **Domain Name**.
200200

201-
g. In **Domain Name** type the domain name here in case of the ADFS-based login.
201+
1. In **Domain Name** type the domain name here in case of the ADFS-based login.
202202

203-
h. Check **Enable Single Sign out** if you wish to sign out from Azure AD when a user sign out from JIRA.
203+
1. Check **Enable Single Sign out** if you wish to sign out from Azure AD when a user sign out from JIRA.
204+
205+
1. Enable **Force Azure Login** checkbox, if you wish to sign in through Azure AD credentials only.
206+
207+
> [!Note]
208+
> To enable the default login form for admin login on login page when force azure login is enabled, add the query parameter in the browser URL.
209+
> `https://<domain:port>/login.action?force_azure_login=false`
204210

205-
i. Click **Save** button to save the settings.
211+
1. Click **Save** button to save the settings.
206212

207-
> [!NOTE]
208-
> For more information about installation and troubleshooting, visit [MS JIRA SSO Connector Admin Guide](../ms-confluence-jira-plugin-adminguide.md) and there is also [FAQ](../ms-confluence-jira-plugin-faq.md) for your assistance
213+
> [!NOTE]
214+
> For more information about installation and troubleshooting, visit [MS JIRA SSO Connector Admin Guide](../ms-confluence-jira-plugin-adminguide.md). There is also an [FAQ](../ms-confluence-jira-plugin-faq.md) for your assistance.
209215

210216
### Create an Azure AD test user
211217

372 KB
Loading
357 KB
Loading

articles/aks/limit-egress-traffic.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ The following FQDN / application rules are required:
7373

7474
| FQDN | Port | Use |
7575
|---------------------------|-----------|----------|
76-
| *.azmk8s.io | HTTPS:443 | This address is the API server endpoint. |
76+
| *.azmk8s.io | HTTPS:443,22,9000 | This address is the API server endpoint. |
7777
| aksrepos.azurecr.io | HTTPS:443 | This address is required to access images in Azure Container Registry (ACR). |
7878
| *.blob.core.windows.net | HTTPS:443 | This address is the backend store for images stored in ACR. |
7979
| mcr.microsoft.com | HTTPS:443 | This address is required to access images in Microsoft Container Registry (MCR). |

0 commit comments

Comments
 (0)