Skip to content

Commit 2e7b137

Browse files
authored
Merge pull request #159053 from MicrosoftDocs/master
5/17 AM Publish
2 parents b515ef6 + 2627139 commit 2e7b137

File tree

109 files changed

+1288
-651
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

109 files changed

+1288
-651
lines changed

.openpublishing.redirection.json

Lines changed: 14 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -230,10 +230,13 @@
230230
"redirect_url": "/previous-versions/azure/virtual-machines/windows/tutorial-govern-resources",
231231
"redirect_document_id": false
232232
},
233+
{
234+
"source_path": "articles/container-registry/container-registry-diagnostics-audit-logs.md",
235+
"redirect_url": "/azure/container-registry/monitor-service",
236+
},
233237
{
234238
"source_path": "articles/confidential-computing/how-to-fortanix-enclave-manager.md",
235239
"redirect_url": "/azure/confidential-computing/how-to-fortanix-confidential-computing-manager-node-agent",
236-
"redirect_document_id": false
237240
},
238241
{
239242
"source_path": "articles/azure-percept/advanced-development-cloud.md",
@@ -23282,27 +23285,22 @@
2328223285
},
2328323286
{
2328423287
"source_path_from_root": "/articles/iot-central/howto-version-devicetemplate.md",
23285-
"redirect_url": "/azure/iot-central/core/howto-version-device-template",
23286-
"redirect_document_id": true
23287-
},
23288-
{
23289-
"source_path_from_root": "/articles/iot-central/core/howto-version-device-template-pnp.md",
23290-
"redirect_url": "/azure/iot-central/core/howto-version-device-template/",
23288+
"redirect_url": "/azure/iot-central/core/howto-edit-device-template",
2329123289
"redirect_document_id": false
2329223290
},
2329323291
{
23294-
"source_path_from_root": "/articles/iot-central/howto-version-device-template.md",
23295-
"redirect_url": "/azure/iot-central/core/howto-version-device-template/",
23292+
"source_path_from_root": "/articles/iot-central/core/howto-version-device-template-pnp.md",
23293+
"redirect_url": "/azure/iot-central/core/howto-edit-device-template",
2329623294
"redirect_document_id": false
2329723295
},
2329823296
{
2329923297
"source_path_from_root": "/articles/iot-central/howto-version-device-template-pnp.md",
23300-
"redirect_url": "/azure/iot-central/core/howto-version-device-template/",
23298+
"redirect_url": "/azure/iot-central/core/howto-edit-device-template",
2330123299
"redirect_document_id": false
2330223300
},
2330323301
{
2330423302
"source_path_from_root": "/articles/iot-central/preview/howto-version-device-template.md",
23305-
"redirect_url": "/azure/iot-central/core/howto-version-device-template/",
23303+
"redirect_url": "/azure/iot-central/core/howto-edit-device-template",
2330623304
"redirect_document_id": false
2330723305
},
2330823306
{
@@ -24050,6 +24048,11 @@
2405024048
"redirect_url": "/azure/iot-central/",
2405124049
"redirect_document_id": false
2405224050
},
24051+
{
24052+
"source_path_from_root": "/articles/iot-central/core/howto-version-device-template.md",
24053+
"redirect_url": "/azure/iot-central/core/howto-edit-device-template",
24054+
"redirect_document_id": true
24055+
},
2405324056
{
2405424057
"source_path_from_root": "/articles/iot-hub/iot-hub-arduino-huzzah-esp8266-get-started.md",
2405524058
"redirect_url": "/azure/iot-hub/",

articles/active-directory/app-proxy/what-is-application-proxy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -179,7 +179,7 @@ Up to this point, we've focused on using Application Proxy to publish on-premise
179179

180180
* **Securely publish REST APIs**. When you have business logic or APIs running on-premises or hosted on virtual machines in the cloud, Application Proxy provides a public endpoint for API access. API endpoint access lets you control authentication and authorization without requiring incoming ports. It provides additional security through Azure AD Premium features such as multi-factor authentication and device-based Conditional Access for desktops, iOS, MAC, and Android devices using Intune. To learn more, see [How to enable native client applications to interact with proxy applications](../manage-apps/application-proxy-configure-native-client-application.md) and [Protect an API by using OAuth 2.0 with Azure Active Directory and API Management](../../api-management/api-management-howto-protect-backend-with-aad.md).
181181
* **Remote Desktop Services** **(RDS)**. Standard RDS deployments require open inbound connections. However, the [RDS deployment with Application Proxy](../manage-apps/application-proxy-integrate-with-remote-desktop-services.md) has a permanent outbound connection from the server running the connector service. This way, you can offer more applications to end users by publishing on-premises applications through Remote Desktop Services. You can also reduce the attack surface of the deployment with a limited set of two-step verification and Conditional Access controls to RDS.
182-
* **Publish applications that connect using WebSockets**. Support with [Qlik Sense](../manage-apps/application-proxy-qlik.md) is in Public Preview and will be expanded to other apps in the future.
182+
* **Publish applications that connect using WebSockets**. Support with [Qlik Sense](/azure/active-directory/app-proxy/application-proxy-qlik) is in Public Preview and will be expanded to other apps in the future.
183183
* **Enable native client applications to interact with proxy applications**. You can use Azure AD Application Proxy to publish web apps, but it also can be used to publish [native client applications](../manage-apps/application-proxy-configure-native-client-application.md) that are configured with the Azure AD Authentication Library (ADAL). Native client applications differ from web apps because they're installed on a device, while web apps are accessed through a browser.
184184

185185
## Conclusion

articles/active-directory/authentication/concept-authentication-passwordless.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -143,7 +143,7 @@ The following providers offer FIDO2 security keys of different form factors that
143143
> [!NOTE]
144144
> If you purchase and plan to use NFC-based security keys, you need a supported NFC reader for the security key. The NFC reader isn't an Azure requirement or limitation. Check with the vendor for your NFC-based security key for a list of supported NFC readers.
145145
146-
If you're a vendor and want to get your device on this list of supported devices, contact [Fido2Request@Microsoft.com](mailto:Fido2Request@Microsoft.com).
146+
If you're a vendor and want to get your device on this list of supported devices, check out our guidance on how to [become a Microsoft-compatible FIDO2 security key vendor](https://docs.microsoft.com/security/zero-trust/isv/fido2-hardware-vendor).
147147

148148
To get started with FIDO2 security keys, complete the following how-to:
149149

articles/active-directory/reports-monitoring/howto-download-logs.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.service: active-directory
1212
ms.topic: how-to
1313
ms.workload: identity
1414
ms.subservice: report-monitor
15-
ms.date: 05/05/2021
15+
ms.date: 05/14/2021
1616
ms.author: markvi
1717
ms.reviewer: besiler
1818

@@ -57,6 +57,8 @@ This article explains how to download activity logs in Azure AD.
5757

5858
The option to download the data of an activity log is available in all editions of Azure AD.
5959

60+
You can also download activity logs using Microsoft Graph; however, downloading logs grammatically requires a premium incense.
61+
6062

6163
## Who can do it?
6264

articles/aks/cluster-container-registry-integration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -147,7 +147,7 @@ nginx0-deployment-669dfc4d4b-xdpd6 1/1 Running 0 20s
147147

148148
### Troubleshooting
149149
* Run the [az aks check-acr](/cli/azure/aks#az_aks_check_acr) command to validate that the registry is accessible from the AKS cluster.
150-
* Learn more about [ACR Diagnostics](../container-registry/container-registry-diagnostics-audit-logs.md)
150+
* Learn more about [ACR Monitoring](../container-registry/monitor-service.md)
151151
* Learn more about [ACR Health](../container-registry/container-registry-check-health.md)
152152

153153
<!-- LINKS - external -->

articles/api-management/api-management-howto-policies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ See [Policy samples](./policy-reference.md) for more code examples.
7272

7373
### Apply policies specified at different scopes
7474

75-
If you have a policy at the global level and a policy configured for an API, then whenever that particular API is used both policies will be applied. API Management allows for deterministic ordering of combined policy statements via the base element.
75+
If you have a policy at the global level and a policy configured for an API, then whenever that particular API is used both policies will be applied. API Management allows for deterministic ordering of combined policy statements via the `base` element.
7676

7777
```xml
7878
<policies>

articles/api-management/api-management-howto-use-managed-service-identity.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.service: api-management
1111
ms.workload: integration
1212
ms.topic: article
1313
ms.date: 03/09/2021
14-
ms.author: apimpm
14+
ms.author: apimpm
1515
ms.custom: devx-track-azurepowershell
1616
---
1717

@@ -40,7 +40,7 @@ To set up a managed identity in the Azure portal, you'll first create an API Man
4040

4141
[!INCLUDE [updated-for-az](../../includes/updated-for-az.md)]
4242

43-
The following steps walk you through creating an API Management instance and assigning it an identity by using Azure PowerShell.
43+
The following steps walk you through creating an API Management instance and assigning it an identity by using Azure PowerShell.
4444

4545
1. If needed, install Azure PowerShell by using the instructions in the [Azure PowerShell guide](/powershell/azure/install-az-ps). Then run `Connect-AzAccount` to create a connection with Azure.
4646

@@ -294,7 +294,7 @@ To set up a managed identity in the portal, you'll first create an API Managemen
294294

295295
[!INCLUDE [updated-for-az](../../includes/updated-for-az.md)]
296296

297-
The following steps walk you through creating an API Management instance and assigning it an identity by using Azure PowerShell.
297+
The following steps walk you through creating an API Management instance and assigning it an identity by using Azure PowerShell.
298298

299299
1. If needed, install the Azure PowerShell by using the instructions in the [Azure PowerShell guide](/powershell/azure/install-az-ps). Then run `Connect-AzAccount` to create a connection with Azure.
300300

@@ -368,7 +368,7 @@ For example, a complete Azure Resource Manager template might look like the foll
368368
"[resourceId('Microsoft.ManagedIdentity/userAssignedIdentities', variables('identityName'))]": {}
369369
}
370370
},
371-
"dependsOn": [
371+
"dependsOn": [
372372
"[resourceId('Microsoft.ManagedIdentity/userAssignedIdentities', variables('identityName'))]"
373373
]
374374
}]
@@ -397,7 +397,7 @@ The `principalId` property is a unique identifier for the identity that's used f
397397
## Supported scenarios using User Assigned Managed Identity
398398

399399
### <a name="use-ssl-tls-certificate-from-azure-key-vault-ua"></a>Obtain a custom TLS/SSL certificate for the API Management instance from Azure Key Vault
400-
You can use any user-assigned identity to establish trust between an API Management instance and KeyVault. This trust can then be used to retrieve custom TLS/SSL certificates stored in Azure Key Vault. You can then assign these certificates to custom domains in the API Management instance.
400+
You can use any user-assigned identity to establish trust between an API Management instance and KeyVault. This trust can then be used to retrieve custom TLS/SSL certificates stored in Azure Key Vault. You can then assign these certificates to custom domains in the API Management instance.
401401

402402
Keep these considerations in mind:
403403

@@ -407,7 +407,7 @@ Keep these considerations in mind:
407407
> [!Important]
408408
> If you don't provide the object version of the certificate, API Management will automatically obtain the newer version of the certificate within four hours after it's updated in Key Vault.
409409
410-
For the complete template, see [API Management with KeyVault based SSL using User Assigned Identity](https://github.com/Azure/azure-quickstart-templates/blob/master/101-api-management-key-vault-create/azuredeploy.json).
410+
For the complete template, see [API Management with KeyVault based SSL using User Assigned Identity](https://github.com/Azure/azure-quickstart-templates/blob/master/quickstarts/microsoft.apimanagement/api-management-key-vault-create/azuredeploy.json).
411411

412412
In this template, you will deploy:
413413

articles/app-service/app-service-ip-restrictions.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -141,11 +141,11 @@ As part of any rule, you can add additional http header filters. The following h
141141
* X-Azure-FDID
142142
* X-FD-HealthProbe
143143

144-
For each header name you can add up to 8 values separated by comma. The http header filters are evaluated after the rule itself and both conditions must be true for the rule to apply.
144+
For each header name, you can add up to eight values separated by comma. The http header filters are evaluated after the rule itself and both conditions must be true for the rule to apply.
145145

146146
### Multi-source rules
147147

148-
Multi-source rules allow you to combine up to 8 IP ranges or 8 Service Tags in a single rule. You might use this if you have more than 512 IP ranges or you want to create logical rules where multiple IP ranges are combined with a single http header filter.
148+
Multi-source rules allow you to combine up to eight IP ranges or eight Service Tags in a single rule. You might use this if you have more than 512 IP ranges or you want to create logical rules where multiple IP ranges are combined with a single http header filter.
149149

150150
Multi-source rules are defined the same way you define single-source rules, but with each range separated with comma.
151151

@@ -196,6 +196,9 @@ You can add access restrictions programmatically by doing either of the followin
196196
--rule-name 'IP example rule' --action Allow --ip-address 122.133.144.0/24 --priority 100
197197
```
198198

199+
> [!NOTE]
200+
> Working with service tags, http headers or multi-source rules in Azure CLI requires at least version 2.23.0. You can verify the version of the installed module with: ```az version```
201+
199202
* Use [Azure PowerShell](/powershell/module/Az.Websites/Add-AzWebAppAccessRestrictionRule). For example:
200203

201204

@@ -204,7 +207,7 @@ You can add access restrictions programmatically by doing either of the followin
204207
-Name "Ip example rule" -Priority 100 -Action Allow -IpAddress 122.133.144.0/24
205208
```
206209
> [!NOTE]
207-
> Working with service tags, http headers or multi-source rules requires at least version 5.7.0. You can verify the version of the installed module with: **Get-InstalledModule -Name Az**
210+
> Working with service tags, http headers or multi-source rules in Azure PowerShell requires at least version 5.7.0. You can verify the version of the installed module with: ```Get-InstalledModule -Name Az```
208211
209212
You can also set values manually by doing either of the following:
210213

articles/app-service/deploy-resource-manager-template.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ You deploy resources in the following order:
4949

5050
Typically, your solution includes only some of these resources and tiers. For missing tiers, map lower resources to the next-higher tier.
5151

52-
The following example shows part of a template. The value of the connection string configuration depends on the MSDeploy extension. The MSDeploy extension depends on the web app and database.
52+
The following example shows part of a template. The value of the connection string configuration depends on the MSDeploy extension. The MSDeploy extension depends on the web app and database.
5353

5454
```json
5555
{
@@ -78,7 +78,7 @@ The following example shows part of a template. The value of the connection stri
7878
}
7979
```
8080

81-
For a ready-to-run sample that uses the code above, see [Template: Build a simple Umbraco Web App](https://github.com/Azure/azure-quickstart-templates/tree/master/umbraco-webapp-simple).
81+
For a ready-to-run sample that uses the code above, see [Template: Build a simple Umbraco Web App](https://github.com/Azure/azure-quickstart-templates/tree/master/application-workloads/umbraco/umbraco-webapp-simple).
8282

8383
## Find information about MSDeploy errors
8484

articles/app-service/networking/app-gateway-with-service-endpoints.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ You can now access the App Service through Application Gateway, but if you try t
4040
![Screenshot shows the text of an Error 403 - Forbidden.](./media/app-gateway-with-service-endpoints/website-403-forbidden.png)
4141

4242
## Using Azure Resource Manager template
43-
The [Resource Manager deployment template][template-app-gateway-app-service-complete] will provision a complete scenario. The scenario consists of an App Service instance locked down with service endpoints and access restriction to only receive traffic from Application Gateway. The template includes many Smart Defaults and unique postfixes added to the resource names for it to be simple. To override them, you'll have to clone the repo or download the template and edit it.
43+
The [Resource Manager deployment template][template-app-gateway-app-service-complete] will provision a complete scenario. The scenario consists of an App Service instance locked down with service endpoints and access restriction to only receive traffic from Application Gateway. The template includes many Smart Defaults and unique postfixes added to the resource names for it to be simple. To override them, you'll have to clone the repo or download the template and edit it.
4444

4545
To apply the template you can use the Deploy to Azure button found in the description of the template, or you can use appropriate PowerShell/CLI.
4646

@@ -54,7 +54,7 @@ az webapp config access-restriction add --resource-group myRG --name myWebApp --
5454
In the default configuration, the command will ensure both setup of the service endpoint configuration in the subnet and the access restriction in the App Service.
5555

5656
## Considerations for ILB ASE
57-
ILB ASE isn't exposed to the internet and traffic between the instance and an Application Gateway is therefore already isolated to the Virtual Network. The following [how-to guide](../environment/integrate-with-application-gateway.md) configures an ILB ASE and integrates it with an Application Gateway using Azure portal.
57+
ILB ASE isn't exposed to the internet and traffic between the instance and an Application Gateway is therefore already isolated to the Virtual Network. The following [how-to guide](../environment/integrate-with-application-gateway.md) configures an ILB ASE and integrates it with an Application Gateway using Azure portal.
5858

5959
If you want to ensure that only traffic from the Application Gateway subnet is reaching the ASE, you can configure a Network security group (NSG) which affect all web apps in the ASE. For the NSG, you are able to specify the subnet IP range and optionally the ports (80/443). Make sure you don't override the [required NSG rules](../environment/network-info.md#network-security-groups) for ASE to function correctly.
6060

@@ -63,7 +63,7 @@ To isolate traffic to an individual web app you'll need to use ip-based access r
6363
## Considerations for External ASE
6464
External ASE has a public facing load balancer like multi-tenant App Service. Service endpoints don't work for ASE, and that's why you'll have to use ip-based access restrictions using the public IP of the Application Gateway instance. To create an External ASE using the Azure portal, you can follow this [Quickstart](../environment/create-external-ase.md)
6565

66-
[template-app-gateway-app-service-complete]: https://github.com/Azure/azure-quickstart-templates/tree/master/201-web-app-with-app-gateway-v2/ "Azure Resource Manager template for complete scenario"
66+
[template-app-gateway-app-service-complete]: https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.web/web-app-with-app-gateway-v2/ "Azure Resource Manager template for complete scenario"
6767

6868
## Considerations for kudu/scm site
6969
The scm site, also known as kudu, is an admin site, which exists for every web app. It isn't possible to reverse proxy the scm site and you most likely also want to lock it down to individual IP addresses or a specific subnet.

0 commit comments

Comments
 (0)