You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/user-overview.md
+9-6Lines changed: 9 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,27 +1,30 @@
1
1
---
2
-
title: Overview of user accounts in Azure Active Directory B2C | Microsoft Docs
3
-
description: Learn about user accounts in Azure Active Directory B2C.
2
+
title: Overview of user accounts in Azure Active Directory B2C
3
+
description: Learn about the types of user accounts that can be used in Azure Active Directory B2C.
4
4
services: active-directory-b2c
5
5
author: mmacy
6
6
manager: celestedg
7
7
8
8
ms.service: active-directory
9
9
ms.workload: identity
10
10
ms.topic: conceptual
11
-
ms.date: 11/30/2018
11
+
ms.date: 11/05/2019
12
12
ms.author: marsma
13
13
ms.subservice: B2C
14
14
---
15
15
16
16
# Overview of user accounts in Azure Active Directory B2C
17
17
18
-
In Azure Active Directory B2C (Azure AD B2C), you can use different types of accounts. Azure Active Directory, Azure Active Directory B2B, and Azure Active Directory B2C share in the types of user accounts that can be used.
18
+
In Azure Active Directory B2C (Azure AD B2C), there are several types of accounts that can be created. Azure Active Directory, Active Directory B2B, and Active Directory B2C share in the types of user accounts that can be used.
19
19
20
20
The following types of accounts are available:
21
21
22
22
-**Work account** - A work account can access resources in a tenant, and with an administrator role, can manage tenants.
23
23
-**Guest account** - A guest account can only be a Microsoft account or an Azure Active Directory user that can be used to access applications or manage tenants.
24
-
-**Consumer account** - A consumer account is created by going through a sign-up user flow in an Azure AD B2C application or by using Azure AD Graph API, and is used by users of the applications that are registered with Azure AD B2C.
24
+
-**Consumer account** - A consumer account is used by a user of the applications you've registered with Azure AD B2C. Consumer accounts can be created by:
25
+
- The user going through a sign-up user flow in an Azure AD B2C application
26
+
- Using Azure AD Graph API
27
+
- Using the Azure portal
25
28
26
29
## Work account
27
30
@@ -69,7 +72,7 @@ You can also use the [Microsoft Graph API](https://docs.microsoft.com/graph/api/
69
72
70
73
## Consumer user
71
74
72
-
The consumer user can sign in to applications secured by Azure AD B2C, but cannot access Azure resources such as the Azure portal. The consumer user can use a local account or federated accounts, such as Facebook or Twitter. A consumer account is created by using a [sign-up or sign-in user flow](../active-directory-b2c/active-directory-b2c-reference-policies.md).
75
+
The consumer user can sign in to applications secured by Azure AD B2C, but cannot access Azure resources such as the Azure portal. The consumer user can use a local account or federated accounts, such as Facebook or Twitter. A consumer account is created by using a [sign-up or sign-in user flow](../active-directory-b2c/active-directory-b2c-reference-policies.md), using the Azure AD Graph API, or by using the Azure portal.
73
76
74
77
You can specify the data that is collected when a consumer user account is created by using custom user attributes. For more information, see [Define custom attributes in Azure Active Directory B2C](../active-directory-b2c/active-directory-b2c-reference-custom-attr.md).
Copy file name to clipboardExpand all lines: articles/api-management/api-management-howto-developer-portal-customize.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -121,10 +121,10 @@ To make your portal and its latest changes available to visitors, you need to pu
121
121
122
122
## Visit the published portal
123
123
124
-
After you publish the portal, you can access it at the same URL as the administrative panel, for example `https://contoso-api.portal.azure-api.net`. Open it in a new browser tab to view it as an external visitor.
124
+
After you publish the portal, you can access it at the same URL as the administrative panel, for example `https://contoso-api.developer.azure-api.net`. View it in a separate browser session (incognito / private browsing mode) as an external visitor.
125
125
126
126
## Next steps
127
127
128
128
Learn more about the developer portal:
129
129
130
-
-[Azure API Management developer portal overview](api-management-howto-developer-portal.md)
130
+
-[Azure API Management developer portal overview](api-management-howto-developer-portal.md)
Copy file name to clipboardExpand all lines: articles/app-service/containers/deploy-container-github-action.md
+40-29Lines changed: 40 additions & 29 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,55 +3,64 @@ title: Deploy your container from a CI/CD pipeline with GitHub Actions - Azure A
3
3
description: Learn how to use GitHub Actions to deploy your container to App Service
4
4
services: app-service
5
5
documentationcenter: ''
6
-
author: jasonfreeberg
7
-
writer:
8
-
manager:
9
-
editor:
6
+
author: cephalin
7
+
manager: gwallace
10
8
11
-
ms.assetid:
12
9
ms.service: app-service
13
10
ms.workload: na
14
11
ms.tgt_pltfrm: na
15
12
ms.devlang: na
16
13
ms.topic: article
17
-
ms.date: 10/09/2019
14
+
ms.date: 10/25/2019
18
15
ms.author: jafreebe
16
+
ms.reviewer: ushan
19
17
20
18
---
21
19
22
-
# GitHub Actions for deploying to Web App for Containers
20
+
# Deploy a custom container to App Service using GitHub Actions
23
21
24
-
[GitHub Actions](https://help.github.com/en/articles/about-github-actions) gives you the flexibility to build an automated software development lifecycle workflow. With the Azure App Service Actions for GitHub, you can automate your workflow to deploy [Azure Web Apps for Containers](https://azure.microsoft.com/services/app-service/containers/) using GitHub Actions.
22
+
[GitHub Actions](https://help.github.com/en/articles/about-github-actions) gives you the flexibility to build an automated software development lifecycle workflow. With the [Azure App Service Action for Containers](https://github.com/Azure/webapps-container-deploy), you can automate your workflow to deploy apps as [custom containers to App Service](https://azure.microsoft.com/services/app-service/containers/) using GitHub Actions.
25
23
26
24
> [!IMPORTANT]
27
25
> GitHub Actions is currently in beta. You must first [sign-up to join the preview](https://github.com/features/actions) using your GitHub account.
28
26
>
29
27
30
28
A workflow is defined by a YAML (.yml) file in the `/.github/workflows/` path in your repository. This definition contains the various steps and parameters that make up the workflow.
31
29
32
-
For an Azure Web App container workflow, the file has three sections:
30
+
For an Azure App Service container workflow, the file has three sections:
33
31
34
32
|Section |Tasks |
35
33
|---------|---------|
36
-
|**Authentication**| 1. Define a service principal <br /> 2. Create a GitHub secret |
37
-
|**Build**| 1. Set up the environment <br /> 2. Build the container image |
38
-
|**Deploy**| 1. Deploy the container image |
34
+
|**Authentication**| 1. Define a service principal. <br /> 2. Create a GitHub secret.|
35
+
|**Build**| 1. Set up the environment. <br /> 2. Build the container image.|
36
+
|**Deploy**| 1. Deploy the container image.|
39
37
40
38
## Create a service principal
41
39
42
40
You can create a [service principal](https://docs.microsoft.com/azure/active-directory/develop/app-objects-and-service-principals#service-principal-object) by using the [az ad sp create-for-rbac](https://docs.microsoft.com/cli/azure/ad/sp?view=azure-cli-latest#az-ad-sp-create-for-rbac) command in the [Azure CLI](https://docs.microsoft.com/cli/azure/). You can run this command using [Azure Cloud Shell](https://shell.azure.com/) in the Azure portal or by selecting the **Try it** button.
43
41
44
42
```azurecli-interactive
45
-
az ad sp create-for-rbac --name "myApp" --role contributor --scopes /subscriptions/<SUBSCRIPTION_ID>/resourceGroups/<RESOURCE_GROUP>/providers/Microsoft.Web/sites/<APP_NAME> --sdk-auth
43
+
az ad sp create-for-rbac --name "myApp" --role contributor \
# Replace {subscription-id}, {resource-group} with the subscription, resource group details of the WebApp
46
48
```
47
49
48
-
In this example, replace the placeholders in the resource with your subscription ID, resource group and web app name. The output is the role assignment credentials that provides access to your Web App. Copy this JSON object, which you can use to authenticate from GitHub.
50
+
The output is a JSON object with the role assignment credentials that provide access to your App Service app similar to below. Copy this JSON object to authenticate from GitHub.
49
51
50
-
> [!NOTE]
51
-
> You do not need to create a service principal if you decide to use publish profile for authentication.
52
+
```azurecli
53
+
{
54
+
"clientId": "<GUID>",
55
+
"clientSecret": "<GUID>",
56
+
"subscriptionId": "<GUID>",
57
+
"tenantId": "<GUID>",
58
+
(...)
59
+
}
60
+
```
52
61
53
62
> [!IMPORTANT]
54
-
> It is always a good practice to grant minimum access. This is why the scope in the previous example is limited to the specific web app and not the entire resource group.
63
+
> It is always a good practice to grant minimum access. You could restrict scope in the above Az CLI command to the specific App Service app and the Azure Container Registry where the container images are pushed to.
55
64
56
65
## Configure the GitHub secret
57
66
@@ -77,7 +86,7 @@ The below example uses user-level credentials i.e. Azure Service Principal for d
77
86
- REGISTRY_USERNAME
78
87
- REGISTRY_PASSWORD
79
88
80
-
5. You will see the secrets as shown below once defined.
89
+
5. You see the secrets as shown below once defined.
To deploy your image to a web app container, you will need to use the `Azure/appservice-actions/webapp@master` action. This action has 5 parameters:
128
+
To deploy your image to a custom container in App Service, use the `azure/webapps-container-deploy@v1` action. This action has five parameters:
120
129
121
130
|**Parameter**|**Explanation**|
122
131
|---------|---------|
123
-
|**app-name**| (Required) Name of the Azure Web App|
132
+
|**app-name**| (Required) Name of the App Service app|
124
133
|**slot-name**| (Optional) Enter an existing Slot other than the Production slot |
125
-
|**images**| (Required) Specify the fully qualified container image(s) name. For example, 'myregistry.azurecr.io/nginx:latest' or 'python:3.7.2-alpine/'. For multi-container scenario multiple container image names can be provided (multi-line separated) |
126
-
|**configuration-file**| (Optional) Path of the Docker-Compose file. Should be a fully qualified path or relative to the default working directory. Required for multi-container scenario|
127
-
|**container-command**| (Optional) Enter the startup command. For ex. dotnet run or dotnet filename.dll |
134
+
|**images**| (Required) Specify the fully qualified container image(s) name. For example, 'myregistry.azurecr.io/nginx:latest' or 'python:3.7.2-alpine/'. For a multi-container app, multiple container image names can be provided (multi-line separated) |
135
+
|**configuration-file**| (Optional) Path of the Docker-Compose file. Should be a fully qualified path or relative to the default working directory. Required for multi-container apps.|
136
+
|**container-command**| (Optional) Enter the start-up command. For ex. dotnet run or dotnet filename.dll |
128
137
129
-
Below is the sample workflow to build and deploy a Node.js Web app to Azure Web App Container.
138
+
Below is the sample workflow to build and deploy a Node.js app to a custom container in App Service.
130
139
131
140
```yaml
132
141
on: [push]
@@ -142,7 +151,7 @@ jobs:
142
151
uses: actions/checkout@master
143
152
144
153
- name: 'Login via Azure CLI'
145
-
uses: azure/actions/login@v1
154
+
uses: azure/login@v1
146
155
with:
147
156
creds: ${{ secrets.AZURE_CREDENTIALS }}
148
157
@@ -170,7 +179,7 @@ jobs:
170
179
171
180
You can find our set of Actions grouped into different repositories on GitHub, each one containing documentation and examples to help you use GitHub for CI/CD and deploy your apps to Azure.
0 commit comments