You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/managed-identities-azure-resources/tutorial-linux-vm-access-cosmos-db.md
+12-10Lines changed: 12 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -125,16 +125,18 @@ To complete these steps, you need an SSH client. If you are using Windows, you c
125
125
> In the previous request, the value of the "resource" parameter must be an exact match for what is expected by Azure AD. When using the Azure Resource Manager resource ID, you must include the trailing slash on the URI.
126
126
> In the following response, the access_token element as been shortened for brevity.
### Get access keys from Azure Resource Manager to make Azure Cosmos DB calls
139
141
140
142
Now use CURL to call Resource Manager using the access token retrieved in the previous section to retrieve the Azure Cosmos DB account access key. Once we have the access key, we can query Azure Cosmos DB. Be sure to replace the `<SUBSCRIPTION ID>`, `<RESOURCE GROUP>`, and `<COSMOS DB ACCOUNT NAME>` parameter values with your own values. Replace the `<ACCESS TOKEN>` value with the access token you retrieved earlier. If you want to retrieve read/write keys, use key operation type`listKeys`. If you want to retrieve read-only keys, use the key operation type`readonlykeys`:
Copy file name to clipboardExpand all lines: articles/active-directory/managed-identities-azure-resources/tutorial-linux-vm-access-storage-access-key.md
+13-11Lines changed: 13 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -88,16 +88,18 @@ To complete these steps, you will need an SSH client. If you are using Windows,
88
88
> In the previous request, the value of the "resource" parameter must be an exact match for what is expected by Azure AD. When using the Azure Resource Manager resource ID, you must include the trailing slash on the URI.
89
89
> In the following response, the access_token element as been shortened for brevity.
90
90
91
-
```bash
92
-
{"access_token":"eyJ0eXAiOiJ...",
93
-
"refresh_token":"",
94
-
"expires_in":"3599",
95
-
"expires_on":"1504130527",
96
-
"not_before":"1504126627",
97
-
"resource":"https://management.azure.com",
98
-
"token_type":"Bearer"}
99
-
```
100
-
91
+
```json
92
+
{
93
+
"access_token": "eyJ0eXAiOiJ...",
94
+
"refresh_token": "",
95
+
"expires_in": "3599",
96
+
"expires_on": "1504130527",
97
+
"not_before": "1504126627",
98
+
"resource": "https://management.azure.com",
99
+
"token_type": "Bearer"
100
+
}
101
+
```
102
+
101
103
## Get storage account access keys from Azure Resource Manager to make storage calls
102
104
103
105
Now use CURL to call Resource Manager using the access token we retrieved in the previous section, to retrieve the storage access key. Once we have the storage access key, we can call storage upload/download operations. Be sure to replace the `<SUBSCRIPTION ID>`, `<RESOURCE GROUP>`, and `<STORAGE ACCOUNT NAME>` parameter values with your own values. Replace the `<ACCESS TOKEN>` value with the access token you retrieved earlier:
@@ -192,4 +194,4 @@ Response:
192
194
In this tutorial, you learned how to use a Linux VM system-assigned managed identity to access Azure Storage using an access key. To learn more about Azure Storage access keys see:
193
195
194
196
> [!div class="nextstepaction"]
195
-
>[Manage your storage access keys](../../storage/common/storage-account-create.md)
197
+
>[Manage your storage access keys](../../storage/common/storage-account-create.md)
Copy file name to clipboardExpand all lines: articles/active-directory/managed-identities-azure-resources/tutorial-linux-vm-access-storage-sas.md
+12-10Lines changed: 12 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -99,15 +99,17 @@ Now that you have your SSH client continue to the steps below:
99
99
> In the previous request, the value of the "resource" parameter must be an exact match for what is expected by Azure AD. When using the Azure Resource Manager resource ID, you must include the trailing slash on the URI.
100
100
> In the following response, the access_token element has been shortened for brevity.
101
101
102
-
```bash
103
-
{"access_token":"eyJ0eXAiOiJ...",
104
-
"refresh_token":"",
105
-
"expires_in":"3599",
106
-
"expires_on":"1504130527",
107
-
"not_before":"1504126627",
108
-
"resource":"https://management.azure.com",
109
-
"token_type":"Bearer"}
110
-
```
102
+
```json
103
+
{
104
+
"access_token":"eyJ0eXAiOiJ...",
105
+
"refresh_token":"",
106
+
"expires_in":"3599",
107
+
"expires_on":"1504130527",
108
+
"not_before":"1504126627",
109
+
"resource":"https://management.azure.com",
110
+
"token_type":"Bearer"
111
+
}
112
+
```
111
113
112
114
## Get a SAS credential from Azure Resource Manager to make storage calls
113
115
@@ -227,4 +229,4 @@ Response:
227
229
In this tutorial, you learned how to use a Linux VM system-assigned managed identity to access Azure Storage using a SAS credential. To learn more about Azure Storage SAS, see:
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/fortigate-ssl-vpn-tutorial.md
+34-35Lines changed: 34 additions & 35 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -87,13 +87,12 @@ Follow these steps to enable Azure AD SSO in the Azure portal:
87
87
d. In the **Logout URL** box, enter a URL in the pattern
88
88
`https://<FortiGate IP or FQDN address>:<Custom SSL VPN port><FQDN>/remote/saml/logout`.
89
89
90
-
> [!NOTE]
91
-
> These values are just patterns. You need to use the actual **Sign on URL**, **Identifier**, **Reply URL**, and **Logout URL** that is configured on the FortiGate.
90
+
> [!NOTE]
91
+
> These values are just patterns. You need to use the actual **Sign on URL**, **Identifier**, **Reply URL**, and **Logout URL** that is configured on the FortiGate.
92
92
93
93
1. The FortiGate SSL VPN application expects SAML assertions in a specific format, which requires you to add custom attribute mappings to the configuration. The following screenshot shows the list of default attributes.
94
94
95
-

96
-
95
+

97
96
98
97
1. The claims required by FortiGate SSL VPN are shown in the following table. The names of these claims must match the names used in the **Perform FortiGate command-line configuration** section of this tutorial. Names are case-sensitive.
99
98
@@ -129,11 +128,11 @@ Follow these steps to enable Azure AD SSO in the Azure portal:
129
128
130
129
1. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, select the **Download** link next to **Certificate (Base64)** to download the certificate and save it on your computer:
131
130
132
-

131
+

133
132
134
133
1. In the **Set up FortiGate SSL VPN** section, copy the appropriate URL or URLs, based on your requirements:
135
134
136
-

135
+

137
136
138
137
#### Create an Azure AD test user
139
138
@@ -198,8 +197,8 @@ To complete these steps, you'll need the values you recorded earlier:
@@ -214,23 +213,22 @@ To complete these steps, you'll need the values you recorded earlier:
214
213
1. Establish an SSH session to your FortiGate appliance, and sign in with a FortiGate Administrator account.
215
214
1. Run these commands and substitute the `<values>` with the information that you collected previously:
216
215
217
-
```console
216
+
```console
218
217
config user saml
219
-
edit azure
220
-
set cert <FortiGate VPN Server Certificate Name>
221
-
set entity-id < Identifier (Entity ID)Entity ID>
222
-
set single-sign-on-url < Reply URL Reply URL>
223
-
set single-logout-url <Logout URL>
224
-
set idp-entity-id <Azure AD Identifier>
225
-
set idp-single-sign-on-url <Azure Login URL>
226
-
set idp-single-logout-url <Azure Logout URL>
227
-
set idp-cert <Base64 SAML Certificate Name>
228
-
set user-name username
229
-
set group-name group
230
-
next
218
+
edit azure
219
+
set cert <FortiGate VPN Server Certificate Name>
220
+
set entity-id < Identifier (Entity ID)Entity ID>
221
+
set single-sign-on-url < Reply URL Reply URL>
222
+
set single-logout-url <Logout URL>
223
+
set idp-entity-id <Azure AD Identifier>
224
+
set idp-single-sign-on-url <Azure Login URL>
225
+
set idp-single-logout-url <Azure Logout URL>
226
+
set idp-cert <Base64 SAML Certificate Name>
227
+
set user-name username
228
+
set group-name group
229
+
next
231
230
end
232
-
233
-
```
231
+
```
234
232
235
233
#### Configure FortiGate for group matching
236
234
@@ -239,22 +237,23 @@ In this section, you'll configure FortiGate to recognize the Object ID of the se
239
237
To complete these steps, you'll need the Object ID of the FortiGateAccess security group that you created earlier in this tutorial.
240
238
241
239
1. Establish an SSH session to your FortiGate appliance, and sign in with a FortiGate Administrator account.
240
+
242
241
1. Run these commands:
243
242
244
-
```console
243
+
```console
245
244
config user group
246
-
edit FortiGateAccess
247
-
set member azure
248
-
config match
249
-
edit 1
250
-
set server-name azure
251
-
set group-name <Object Id>
252
-
next
253
-
end
254
-
next
245
+
edit FortiGateAccess
246
+
set member azure
247
+
config match
248
+
edit 1
249
+
set server-name azure
250
+
set group-name <Object Id>
251
+
next
252
+
end
253
+
next
255
254
end
256
-
```
257
-
255
+
```
256
+
258
257
#### Create a FortiGate VPN Portals and Firewall Policy
259
258
260
259
In this section, you'll configure a FortiGate VPN Portals and Firewall Policy that grants access to the FortiGateAccess security group you created earlier in this tutorial.
Copy file name to clipboardExpand all lines: articles/api-management/how-to-configure-service-fabric-backend.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -113,13 +113,13 @@ Add the [`set-backend-service`](api-management-transformation-policies.md#SetBac
113
113
1. On the **Design** tab, in the **Inbound processing** section, select the code editor (**</>**) icon.
114
114
1. Position the cursor inside the **<inbound>** element
115
115
1. Add the `set-service-backend` policy statement.
116
-
* In `backend-id`, substitute the name of your Service Fabric backend.
116
+
* In `backend-id`, substitute the name of your Service Fabric backend.
117
117
118
-
* The `sf-resolve-condition` is a condition for re-resolving a service location and resending a request. The number of retries was set when configuring the backend. For example:
118
+
* The `sf-resolve-condition` is a condition for re-resolving a service location and resending a request. The number of retries was set when configuring the backend. For example:
0 commit comments