You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
***Unsupported apps** - Some third-party applications may not work as expected if they assume that the `unique_name` or `preferred_username` claims are immutable or will always match a specific user attribute, such as UPN.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/msal-migration.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ If any of your applications use the Azure Active Directory Authentication Librar
29
29
30
30
## Why switch to MSAL?
31
31
32
-
To understand 'Why MSAL?', it's important to first understand the differences between Microsoft identity platform (v2.0) and Azure Active Directory (v1.0) endpoints. The v1.0 endpoint is used by Azure AD Authentication Library (ADAL) while the v2.0 endpoint is used by Microsoft Authentication Library (MSAL). If you've developed apps against the v1.0 endpoint in the past, you're likely using ADAL. Since the v2.0 endpoint has changed significantly enough, the new library (MSAL) was built for the new endpoint entirely.
32
+
If you've developed apps against Azure Active Directory (v1.0) endpoint in the past, you're likely using ADAL. Since Microsoft identity platform (v2.0) endpoint has changed significantly enough, the new library (MSAL) was built for the new endpoint entirely.
33
33
34
34
The following diagram shows the v2.0 vs v1.0 endpoint experience at a high level, including the app registration experience, SDKs, endpoints, and supported identities.
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/azure-ad-account.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
3
-
title: Azure AD Account identity provider
4
-
description: Use Azure Active Directory to enable an external user (guest) to sign in to your Azure AD apps with their Azure AD work account.
3
+
title: Add Azure AD Account as an identity provider
4
+
description: Use Azure Active Directory to enable an external user (guest) to sign in to your Azure AD apps with their Azure AD work or school account.
5
5
6
6
services: active-directory
7
7
ms.service: active-directory
@@ -19,7 +19,7 @@ ms.custom: engagement-fy23
19
19
20
20
# Add Azure Active Directory (Azure AD) as an identity provider for External Identities
21
21
22
-
Azure Active Directory is available as an identity provider option for [B2B collaboration](what-is-b2b.md) by default. If an external guest user has an Azure AD account through work or school, they can redeem your B2B collaboration invitations or complete your sign-up user flows using their Azure AD account.
22
+
Azure Active Directory is available as an identity provider option for [B2B collaboration](what-is-b2b.md#integrate-with-identity-providers) by default. If an external guest user has an Azure AD account through work or school, they can redeem your B2B collaboration invitations or complete your sign-up user flows using their Azure AD account.
23
23
24
24
## Guest sign-in using Azure Active Directory accounts
25
25
@@ -29,7 +29,7 @@ Azure Active Directory is available in the list of External Identities identity
29
29
30
30
### Azure AD account in the invitation flow
31
31
32
-
When you [invite a guest user](add-users-administrator.md) to B2B collaboration, you can specify their Azure AD account as the email address they'll use to sign in.
32
+
When you [invite a guest user](add-users-administrator.md) to B2B collaboration, you can specify their Azure AD account as the **Email address** they'll use to sign in.
33
33
34
34
:::image type="content" source="media/azure-ad-account/azure-ad-account-invite.png" alt-text="Screenshot of inviting a guest user using the Azure AD account." lightbox="media/azure-ad-account/azure-ad-account-invite.png":::
Copy file name to clipboardExpand all lines: articles/aks/azure-files-csi.md
+60-14Lines changed: 60 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,14 +3,14 @@ title: Use Container Storage Interface (CSI) driver for Azure Files on Azure Kub
3
3
description: Learn how to use the Container Storage Interface (CSI) driver for Azure Files in an Azure Kubernetes Service (AKS) cluster.
4
4
services: container-service
5
5
ms.topic: article
6
-
ms.date: 12/06/2022
6
+
ms.date: 01/03/2023
7
7
author: palma21
8
8
9
9
---
10
10
11
11
# Use Azure Files Container Storage Interface (CSI) driver in Azure Kubernetes Service (AKS)
12
12
13
-
The Azure Files Container Storage Interface (CSI) driver is a [CSI specification][csi-specification]-compliant driver used by Azure Kubernetes Service (AKS) to manage the lifecycle of Azure Files shares. The CSI is a standard for exposing arbitrary block and file storage systems to containerized workloads on Kubernetes.
13
+
The Azure Files Container Storage Interface (CSI) driver is a [CSI specification][csi-specification]-compliant driver used by Azure Kubernetes Service (AKS) to manage the lifecycle of Azure file shares. The CSI is a standard for exposing arbitrary block and file storage systems to containerized workloads on Kubernetes.
14
14
15
15
By adopting and using CSI, AKS now can write, deploy, and iterate plug-ins to expose new or improve existing storage systems in Kubernetes. Using CSI drivers in AKS avoids having to touch the core Kubernetes code and wait for its release cycles.
16
16
@@ -31,7 +31,7 @@ In addition to the original in-tree driver features, Azure Files CSI driver supp
31
31
32
32
|Name | Meaning | Available Value | Mandatory | Default value
33
33
|--- | --- | --- | --- | ---
34
-
|skuName | Azure Files storage account type (alias: `storageAccountType`)|`Standard_LRS`, `Standard_ZRS`, `Standard_GRS`, `Standard_RAGRS`, `Standard_RAGZRS`,`Premium_LRS`, `Premium_ZRS`| No |`StandardSSD_LRS`<br> Minimum file share size for Premium account type is 100 GB.<br> ZRS account type is supported in limited regions.<br> NFS file share only supports Premium account type.|
34
+
|skuName | Azure Files storage account type (alias: `storageAccountType`)|`Standard_LRS`, `Standard_ZRS`, `Standard_GRS`, `Standard_RAGRS`, `Standard_RAGZRS`,`Premium_LRS`, `Premium_ZRS`| No |`StandardSSD_LRS`<br> Minimum file share size for Premium account type is 100 GiB.<br> ZRS account type is supported in limited regions.<br> NFS file share only supports Premium account type.|
35
35
|fsType | File System Type |`ext4`, `ext3`, `ext2`, `xfs`| Yes |`ext4` for Linux|
36
36
|location | Specify Azure region where Azure storage account will be created. |`eastus`, `westus`, etc. | No | If empty, driver uses the same location name as current AKS cluster.|
37
37
|resourceGroup | Specify the resource group where the Azure Disks will be created | Existing resource group name | No | If empty, driver uses the same resource group name as current AKS cluster.|
@@ -56,7 +56,7 @@ In addition to the original in-tree driver features, Azure Files CSI driver supp
56
56
|--- |**Following parameters are only for NFS protocol**| --- | --- |
57
57
|rootSquashType | Specify root squashing behavior on the share. The default is `NoRootSquash`|`AllSquash`, `NoRootSquash`, `RootSquash`| No |
58
58
|mountPermissions | Mounted folder permissions. The default is `0777`. If set to `0`, driver doesn't perform `chmod` after mount |`0777`| No |
59
-
|--- |**Following parameters are only for vnet setting, e.g. NFS, private end point**| --- | --- |
59
+
|--- |**Following parameters are only for vnet setting, e.g. NFS, private endpoint**| --- | --- |
60
60
|vnetResourceGroup | Specify Vnet resource group where virtual network is defined. | Existing resource group name. | No | If empty, driver uses the `vnetResourceGroup` value in Azure cloud config file. |
61
61
|vnetName | Virtual network name | Existing virtual network name. | No | If empty, driver uses the `vnetName` value in Azure cloud config file. |
62
62
|subnetName | Subnet name | Existing subnet name of the agent node. | No | If empty, driver uses the `subnetName` value in Azure cloud config file. |
@@ -83,7 +83,7 @@ A storage class is used to define how an Azure file share is created. A storage
83
83
***Premium_ZRS**: Premium zone-redundant storage
84
84
85
85
> [!NOTE]
86
-
> Azure Files supports Azure Premium Storage. The minimum premium file share is 100 GB.
86
+
> Azure Files supports Azure Premium Storage. The minimum premium file share capacity is 100 GiB.
87
87
88
88
When you use storage CSI drivers on AKS, there are two more built-in `StorageClasses` that use the Azure Files CSI storage drivers. The other CSI storage classes are created with the cluster alongside the in-tree default storage classes.
89
89
@@ -231,7 +231,7 @@ You can request a larger volume for a PVC. Edit the PVC object, and specify a la
231
231
> [!NOTE]
232
232
> A new PV is never created to satisfy the claim. Instead, an existing volume is resized.
233
233
234
-
In AKS, the built-in `azurefile-csi` storage class already supports expansion, so use the [PVC created earlier with this storage class](#dynamically-create-azure-files-pvs-by-using-the-built-in-storage-classes). The PVC requested a 100Gi file share. We can confirm that by running:
234
+
In AKS, the built-in `azurefile-csi` storage class already supports expansion, so use the [PVC created earlier with this storage class](#dynamically-create-azure-files-pvs-by-using-the-built-in-storage-classes). The PVC requested a 100GiB file share. We can confirm that by running:
@@ -276,7 +276,7 @@ If your Azure Files resources are protected with a private endpoint, you must cr
276
276
*`storageAccount`: The storage account name.
277
277
*`server`: The FQDN of the storage account's private endpoint (for example, `<storage account name>.privatelink.file.core.windows.net`).
278
278
279
-
Create a file named *private-azure-file-sc.yaml*, and then paste the following example manifest in the file. Replace the values for `<resourceGroup>` and `<storageAccountName>`.
279
+
Create a file named `private-azure-file-sc.yaml`, and then paste the following example manifest in the file. Replace the values for `<resourceGroup>` and `<storageAccountName>`.
280
280
281
281
```yaml
282
282
apiVersion: storage.k8s.io/v1
@@ -314,7 +314,7 @@ The output of the command resembles the following example:
314
314
storageclass.storage.k8s.io/private-azurefile-csi created
315
315
```
316
316
317
-
Create a file named *private-pvc.yaml*, and then paste the following example manifest in the file:
317
+
Create a file named `private-pvc.yaml`, and then paste the following example manifest in the file:
This option is optimized for random access workloads with in-place data updates and provides full POSIX file system support. This section shows you how to use NFS shares with the Azure File CSI driver on an AKS cluster.
344
344
345
-
### Prerequsites
345
+
### Prerequisites
346
346
347
-
- Your AKS clusters service principal or managed identity must be added to the Contributor role to the storage account.
348
347
- Your AKS cluster *Control plane* identity (that is, your AKS cluster name) is added to the [Contributor](../role-based-access-control/built-in-roles.md#contributor) role in the resource group hosting the VNet.
348
+
- Your AKS cluster's service principal or managed service identity (MSI) must be added to the Contributor role to the storage account.
349
+
350
+
> [!NOTE]
351
+
> You can use a private endpoint instead of allowing access to the selected VNet.
349
352
350
353
### Create NFS file share storage class
351
354
@@ -376,10 +379,53 @@ storageclass.storage.k8s.io/azurefile-csi-nfs created
376
379
377
380
### Create a deployment with an NFS-backed file share
378
381
379
-
You can deploy an example [stateful set](https://github.com/kubernetes-sigs/azurefile-csi-driver/blob/master/deploy/example/nfs/statefulset.yaml) that saves timestamps into a file `data.txt` by deploying the following command with the [kubectl apply][kubectl-apply] command:
382
+
You can deploy an example **stateful set** that saves timestamps into a file `data.txt` with the [kubectl apply][kubectl-apply] command:
> Note that since NFS file share is in Premium account, the minimum file share size is 100GB. If you create a PVC with a small storage size, you might encounter an error similar to the following: *failed to create file share ... size (5)...*.
454
+
> Note that because the NFS file share is in a Premium account, the minimum file share size is 100 GiB. If you create a PVC with a small storage size, you might encounter an error similar to the following: *failed to create file share ... size (5)...*.
409
455
410
456
## Windows containers
411
457
@@ -442,7 +488,7 @@ The output of the commands resembles the following example:
442
488
## Next steps
443
489
444
490
- To learn how to use CSI driver for Azure Disks, see [Use Azure Disks with CSI driver][azure-disk-csi].
445
-
- To learn how to use CSI driver for Azure Blob storage (preview), see [Use Azure Blob storage with CSI driver][azure-blob-csi] (preview).
491
+
- To learn how to use CSI driver for Azure Blob storage, see [Use Azure Blob storage with CSI driver][azure-blob-csi].
446
492
- For more about storage best practices, see [Best practices for storage and backups in Azure Kubernetes Service][operator-best-practices-storage].
Copy file name to clipboardExpand all lines: articles/aks/use-kms-etcd-encryption.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,7 +35,7 @@ The following limitations apply when you integrate KMS etcd encryption with AKS:
35
35
* The maximum number of secrets that a cluster enabled with KMS supports is 2,000.
36
36
* Bring your own (BYO) Azure Key Vault from another tenant isn't supported.
37
37
* With KMS enabled, you can't change associated Azure Key Vault model (public, private). To [change associated key vault mode][changing-associated-key-vault-mode], you need to disable and enable KMS again.
38
-
* If a cluster is enabled KMS with private key vault and not using `VNet integration` tunnel, then stop/start cluster is not allowed.
38
+
* If a cluster is enabled KMS with private key vault and not using the `API Server VNet integration` tunnel, then stop/start cluster is not allowed.
39
39
40
40
KMS supports [public key vault][Enable-KMS-with-public-key-vault] and [private key vault][Enable-KMS-with-private-key-vault].
Copy file name to clipboardExpand all lines: articles/app-service/tutorial-multi-container-app.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -203,7 +203,7 @@ To connect the WordPress app to this new MySQL server, you'll configure a few Wo
203
203
To make these changes, use the [az webapp config appsettings set](/cli/azure/webapp/config/appsettings#az-webapp-config-appsettings-set) command in Cloud Shell. App settings are case-sensitive and space-separated.
204
204
205
205
```azurecli-interactive
206
-
az webapp config appsettings set --resource-group myResourceGroup --name <app-name> --settings WORDPRESS_DB_HOST="<mysql-server-name>.mysql.database.azure.com" WORDPRESS_DB_USER="adminuser@<mysql-server-name>" WORDPRESS_DB_PASSWORD="My5up3rStr0ngPaSw0rd!" WORDPRESS_DB_NAME="wordpress" MYSQL_SSL_CA="BaltimoreCyberTrustroot.crt.pem"
206
+
az webapp config appsettings set --resource-group myResourceGroup --name <app-name> --settings WORDPRESS_DB_HOST="<mysql-server-name>.mysql.database.azure.com" WORDPRESS_DB_USER="adminuser" WORDPRESS_DB_PASSWORD="My5up3rStr0ngPaSw0rd!" WORDPRESS_DB_NAME="wordpress" MYSQL_SSL_CA="BaltimoreCyberTrustroot.crt.pem"
207
207
```
208
208
209
209
When the app setting has been created, Cloud Shell shows information similar to the following example:
@@ -218,7 +218,7 @@ When the app setting has been created, Cloud Shell shows information similar to
218
218
{
219
219
"name": "WORDPRESS_DB_USER",
220
220
"slotSetting": false,
221
-
"value": "adminuser@<mysql-server-name>"
221
+
"value": "adminuser"
222
222
},
223
223
{
224
224
"name": "WORDPRESS_DB_NAME",
@@ -424,7 +424,7 @@ When the app setting has been created, Cloud Shell shows information similar to
Copy file name to clipboardExpand all lines: articles/azure-functions/functions-reference-powershell.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -51,7 +51,7 @@ At the root of the project, there's a shared [`host.json`](functions-host-json.m
51
51
52
52
Certain bindings require the presence of an `extensions.csproj` file. Binding extensions, required in [version 2.x and later versions](functions-versions.md) of the Functions runtime, are defined in the `extensions.csproj` file, with the actual library files in the `bin` folder. When developing locally, you must [register binding extensions](functions-bindings-register.md#extension-bundles). When developing functions in the Azure portal, this registration is done for you.
53
53
54
-
In PowerShell Function Apps, you may optionally have a `profile.ps1` which runs when a function app starts to run (otherwise know as a *[cold start](#cold-start)*. For more information, see [PowerShell profile](#powershell-profile).
54
+
In PowerShell Function Apps, you may optionally have a `profile.ps1` which runs when a function app starts to run (otherwise know as a *[cold start](#cold-start)*). For more information, see [PowerShell profile](#powershell-profile).
0 commit comments