Skip to content

Commit 3142073

Browse files
Merge branch 'MicrosoftDocs:main' into mc-user-assigned-identity
2 parents cb909e2 + 24a0ec9 commit 3142073

File tree

495 files changed

+15365
-8166
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

495 files changed

+15365
-8166
lines changed

articles/active-directory-b2c/partner-asignio.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: gargi-sinha
66
manager: martinco
77
ms.service: active-directory
88
ms.topic: how-to
9-
ms.date: 06/21/2024
9+
ms.date: 10/03/2024
1010
ms.author: gasinh
1111
ms.reviewer: kengaderdus
1212
ms.subservice: B2C
@@ -65,7 +65,7 @@ The following diagram illustrates the implementation.
6565

6666
1. User opens Azure AD B2C sign in page on their mobile or web application, and then signs in or signs up.
6767
2. Azure AD B2C redirects the user to Asignio using an OpenID Connect (OIDC) request.
68-
3. The user is redirected to the Asignio web application for biometric sign in. If the user hasn't registered their Asignio Signature, they can use an SMS One-Time-Password (OTP) to authenticate. After authentication, user receives a registration link to create their Asignio Signature.
68+
3. The user is redirected to the Asignio web application for biometric sign in. If the user didn't register their Asignio Signature, they can use an SMS One-Time-Password (OTP) to authenticate. After authentication, user receives a registration link to create their Asignio Signature.
6969
4. The user authenticates with Asignio Signature and facial verification, or voice and facial verification.
7070
5. The challenge response goes to Asignio.
7171
6. Asignio returns the OIDC response to Azure AD B2C sign in.
@@ -76,11 +76,11 @@ The following diagram illustrates the implementation.
7676

7777
Configurating an application with Asignio is with the Asignio Partner Administration site.
7878

79-
1. Go to asignio.com [Asignio Partner Administration](https://partner.asignio.com) page to request access for your organization.
79+
1. To request access for your organization, go to asignio.com [Asignio Partner Administration](https://partner.asignio.com) page.
8080
2. With credentials, sign into Asignio Partner Administration.
8181
3. Create a record for the Azure AD B2C application using your Azure AD B2C tenant. When you use Azure AD B2C with Asignio, Azure AD B2C manages connected applications. Asignio apps represent apps in the Azure portal.
8282
4. In the Asignio Partner Administration site, generate a Client ID and Client Secret.
83-
5. Note and store Client ID and Client Secret. You'll use them later. Asignio doesn't store Client Secrets.
83+
5. Note and store Client ID and Client Secret. You use them later. Asignio doesn't store Client Secrets.
8484
6. Enter the redirect URI in your site the user is returned to after authentication. Use the following URI pattern.
8585

8686
`[https://<your-b2c-domain>.b2clogin.com/<your-b2c-domain>.onmicrosoft.com/oauth2/authresp]`.
@@ -99,6 +99,9 @@ For this tutorial, you're registering `https://jwt.ms`, a Microsoft web applica
9999

100100
Complete [Tutorial: Register a web application in Azure Active Directory B2C](tutorial-register-applications.md?tabs=app-reg-ga)
101101

102+
>[!NOTE]
103+
>Enable implicit flow only for testing purposes. Don’t enable implicit flow in production.
104+
102105
## Configure Asignio as an identity provider in Azure AD B2C
103106

104107
For the following instructions, use the Microsoft Entra tenant with the Azure subscription.

articles/active-directory-b2c/partner-trusona.md

Lines changed: 22 additions & 19 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/partner-xid.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: gargi-sinha
66
manager: martinco
77
ms.service: active-directory
88
ms.topic: how-to
9-
ms.date: 01/26/2024
9+
ms.date: 10/03/2024
1010
ms.author: gasinh
1111
ms.subservice: B2C
1212

@@ -40,7 +40,7 @@ The following diagram shows the architecture.
4040

4141
![Diagram of the xID architecture.](./media/partner-xid/partner-xid-architecture-diagram.png)
4242

43-
1. At the Azure AD B2C sign-in page user signs in or signs up.
43+
1. At the Azure AD B2C sign-in page, the user signs in or signs up.
4444
2. Azure AD B2C redirects the user to xID authorize API endpoint using an OpenID Connect (OIDC) request. An OIDC endpoint has endpoint information. xID identity provider (IdP) redirects the user to the xID authorization sign in page. User enters email address.
4545
3. xID IdP sends push notification to user mobile device.
4646
4. User opens the xID app, checks the request, enters a PIN, or uses biometrics. xID app activates the private key and creates an electronic signature.
@@ -56,7 +56,7 @@ The following diagram shows the architecture.
5656

5757
## Install xID
5858

59-
1. To request API documents, fill out the request form. Go to [Contact Us](https://xid.inc/contact-us).
59+
1. To request API documents, fill out the request form. Go to [Contact Us](https://xid.inc/contact-us).
6060
2. In the message, indicate you're using Azure AD B2C.
6161
3. An xID sales representative contacts you.
6262
4. Follow the instructions in the xID API document.
@@ -78,6 +78,9 @@ For testing, you register `https://jwt.ms`, a Microsoft web application with dec
7878

7979
Complete [Tutorial: Register a web application in Azure AD B2C](tutorial-register-applications.md?tabs=app-reg-ga)
8080

81+
>[!NOTE]
82+
>Enable implicit flow only for testing purposes. Don’t enable implicit flow in production.
83+
8184
<a name='create-a-xid-policy-key'></a>
8285

8386
## Create an xID policy key
@@ -407,7 +410,7 @@ There are identity claims xID supports referenced as part of the policy. Claims
407410

408411
The relying party policy, for example [SignUpSignIn.xml](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/blob/main/LocalAccounts/SignUpOrSignin.xml), specifies the user journey the Azure AD B2C executes.
409412

410-
1. In the relying party,locate the **DefaultUserJourney** element.
413+
1. In the relying party, locate the **DefaultUserJourney** element.
411414
2. Update the **ReferenceId** to match the user journey ID you added to the identity provider.
412415

413416
In the following example, for the xID user journey, the **ReferenceId** is set to `CombinedSignInAndSignUp`.

articles/app-service/configure-common.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn to configure common settings for an App Service app. App sett
44
keywords: azure app service, web app, app settings, environment variables
55
ms.assetid: 9af8a367-7d39-4399-9941-b80cbc5f39a0
66
ms.topic: article
7-
ms.date: 06/04/2024
7+
ms.date: 10/03/2024
88
ms.custom: devx-track-csharp, devx-track-azurecli, devx-track-azurepowershell, AppServiceConnectivity
99
ms.devlang: azurecli
1010
author: cephalin
@@ -446,7 +446,8 @@ Here, you can configure some common settings for the app. Some settings require
446446
- **Always On**: Keeps the app loaded even when there's no traffic. When **Always On** isn't turned on (default), the app is unloaded after 20 minutes without any incoming requests. The unloaded app can cause high latency for new requests because of its warm-up time. When **Always On** is turned on, the front-end load balancer sends a GET request to the application root every five minutes. The continuous ping prevents the app from being unloaded.
447447

448448
Always On is required for continuous WebJobs or for WebJobs that are triggered using a CRON expression.
449-
- **ARR affinity**: In a multi-instance deployment, ensure that the client is routed to the same instance for the life of the session. You can set this option to **Off** for stateless applications.
449+
- **Session affinity**: In a multi-instance deployment, ensure that the client is routed to the same instance for the life of the session. You can set this option to **Off** for stateless applications.
450+
- **Session affinity proxy**: Session affinity proxy can be turned on if your app is behind a reverse proxy (like Azure Application Gateway or Azure Front Door) and you are using the default host name. The domain for the session affinity cookie will align with the forwarded host name from the reverse proxy.
450451
- **HTTPS Only**: When enabled, all HTTP traffic is redirected to HTTPS.
451452
- **Minimum TLS version**: Select the minimum TLS encryption version required by your app.
452453
- **Debugging**: Enable remote debugging for [ASP.NET](troubleshoot-dotnet-visual-studio.md#remotedebug), [ASP.NET Core](/visualstudio/debugger/remote-debugging-azure), or [Node.js](configure-language-nodejs.md#debug-remotely) apps. This option turns off automatically after 48 hours.

articles/app-service/deploy-staging-slots.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -547,7 +547,7 @@ Here are some common swap errors:
547547

548548
- Local cache initialization might fail when the app content exceeds the local disk quota specified for the local cache. For more information, see [Local cache overview](overview-local-cache.md).
549549

550-
- During a site update operation, the following error may occur "_The slot cannot be changed because its configuration settings have been prepared for swap_". This can occur if either [swap with preview (multi-phase swap)](#swap-with-preview-multi-phase-swap) phase 1 has been completed but phase 2 has not yet been performed, or a swap has failed. There are two ways resolve the issue:
550+
- During a site update operation, the following error may occur "_The slot cannot be changed because its configuration settings have been prepared for swap_". This can occur if either [swap with preview (multi-phase swap)](#swap-with-preview-multi-phase-swap) phase 1 has been completed but phase 2 has not yet been performed, or a swap has failed. There are two ways to resolve this issue:
551551

552552
1. Cancel the swap operation which will reset the site back to the old state
553553
1. Complete the swap operation which will update site to the desired new state

articles/app-service/overview-tls.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,9 @@ ms.collection: ce-skilling-ai-copilot
1111
---
1212
# Azure App Service TLS overview
1313

14+
> [!NOTE]
15+
> Customers may be aware of [the retirement notification of TLS 1.0 and 1.1 for interactions with Azure services](https://azure.microsoft.com/updates/azure-support-tls-will-end-by-31-october-2024-2/). This retirement does not affect applications running on App Service or Azure Functions. Applications on either App Service or Azure Functions configured to accept TLS 1.0 or TLS 1.1 for incoming requests will continue to run unaffected.
16+
1417
## What does TLS do in App Service?
1518

1619
Transport Layer Security (TLS) is a widely adopted security protocol designed to secure connections and communications between servers and clients. App Service allows customers to use TLS/SSL certificates to secure incoming requests to their web apps. App Service currently supports different set of TLS features for customers to secure their web apps.
@@ -29,6 +32,17 @@ Transport Layer Security (TLS) is a widely adopted security protocol designed to
2932

3033
For incoming requests to your web app, App Service supports TLS versions 1.0, 1.1, 1.2, and 1.3.
3134

35+
### Set Minimum TLS Version
36+
Follow these steps to change the Minimum TLS version of your App Service resource:
37+
1. Browse to your app in the [Azure portal](https://portal.azure.com/)
38+
1. In the left menu, select **configuration** and then select the **General settings** tab.
39+
1. On __Minimum Inbound TLS Version__, using the dropdown, select your desired version.
40+
1. Select **Save** to save the changes.
41+
42+
### Minimum TLS Version with Azure Policy
43+
44+
You can use Azure Policy to help audit your resources when it comes to minimum TLS version. You can refer to [App Service apps should use the latest TLS version policy definition](https://ms.portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2Ff0e6e85b-9b9f-4a4b-b67b-f730d42f1b0b) and change the values to your desired minimum TLS version. For similar policy definitions for other App Service resources, refer to [List of built-in policy definitions - Azure Policy for App Service](../governance/policy/samples/built-in-policies.md#app-service).
45+
3246
### Minimum TLS Version and SCM Minimum TLS Version
3347

3448
App Service also allows you to set minimum TLS version for incoming requests to your web app and to SCM site. By default, the minimum TLS version for incoming requests to your web app and to SCM would be set to 1.2 on both portal and API.

articles/application-gateway/configuration-http-settings.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: application-gateway
55
author: greg-lindsay
66
ms.service: azure-application-gateway
77
ms.topic: conceptual
8-
ms.date: 09/30/2023
8+
ms.date: 10/03/2024
99
ms.author: greglin
1010
---
1111

@@ -26,7 +26,7 @@ The [Chromium browser](https://www.chromium.org/Home) [v80 update](https://chrom
2626

2727
To support this change, starting February 17 2020, Application Gateway (all the SKU types) will inject another cookie called *ApplicationGatewayAffinityCORS* in addition to the existing *ApplicationGatewayAffinity* cookie. The *ApplicationGatewayAffinityCORS* cookie has two more attributes added to it (*"SameSite=None; Secure"*) so that sticky sessions are maintained even for cross-origin requests.
2828

29-
Note that the default affinity cookie name is *ApplicationGatewayAffinity* and you can change it. If you deploy multiple application gateway instances in the same network topology, you must set unique cookie names for each instance. If you're using a custom affinity cookie name, an additional cookie is added with `CORS` as suffix. For example: *CustomCookieNameCORS*.
29+
Note that the default affinity cookie name is *ApplicationGatewayAffinity* and you can change it. If in your network topology, you deploy multiple application gateways in line, you must set unique cookie names for each resource. If you're using a custom affinity cookie name, an additional cookie is added with `CORS` as suffix. For example: *CustomCookieNameCORS*.
3030

3131
> [!NOTE]
3232
> If the attribute *SameSite=None* is set, it is mandatory that the cookie also contains the *Secure* flag, and must be sent over HTTPS. If session affinity is required over CORS, you must migrate your workload to HTTPS.
@@ -35,8 +35,7 @@ Please refer to TLS offload and End-to-End TLS documentation for Application Gat
3535
## Connection draining
3636

3737
Connection draining helps you gracefully remove backend pool members during planned service updates. It applies to backend instances that are
38-
- explicitly removed from the backend pool,
39-
- removed during scale-in operations, or
38+
- explicitly removed from the backend pool, or
4039
- reported as unhealthy by the health probes.
4140

4241
You can apply this setting to all backend pool members by enabling Connection Draining in the Backend Setting. It ensures that all deregistering instances in a backend pool don't receive any new requests/connections while maintaining the existing connections until the configured timeout value. This is also true for WebSocket connections.

articles/application-gateway/features.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -105,9 +105,8 @@ For more information, see [WebSocket support](application-gateway-websocket.md)
105105
## Connection draining
106106

107107
Connection draining helps you achieve graceful removal of backend pool members during planned service updates or problems with backend health. This setting is enabled via the [Backend Setting](configuration-http-settings.md) and is applied to all backend pool members during rule creation. Once enabled, the application gateway ensures all deregistering instances of a backend pool don't receive any new requests while allowing existing requests to complete within a configured time limit. It applies to cases where backend instances are:
108-
- explicitly removed from the backend pool after a configuration change by a user
109-
- reported as unhealthy by the health probes, or
110-
- removed during a scale-in operation
108+
- explicitly removed from the backend pool after a configuration change by a user, or
109+
- reported as unhealthy by the health probes
111110

112111
The only exception is when requests continue to be proxied to the deregistering instances because of gateway-managed session affinity.
113112

0 commit comments

Comments
 (0)