Skip to content

Commit 34e36c1

Browse files
authored
Merge pull request #172389 from MicrosoftDocs/master
9/14 AM Publish
2 parents a5bb680 + d6a96a0 commit 34e36c1

File tree

81 files changed

+383
-3724
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

81 files changed

+383
-3724
lines changed

.openpublishing.redirection.json

Lines changed: 70 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -57102,6 +57102,76 @@
5710257102
"source_path_from_root": "/articles/sentinel/normalization-schema.md",
5710357103
"redirect_url": "/azure/sentinel/network-normalization-schema",
5710457104
"redirect_document_id": false
57105+
},
57106+
{
57107+
"source_path_from_root": "/articles/governance/blueprints/samples/azure-security-benchmark.md",
57108+
"redirect_url": "/azure/governance/policy/samples/azure-security-benchmark",
57109+
"redirect_document_id": false
57110+
},
57111+
{
57112+
"source_path_from_root": "/articles/governance/blueprints/samples/dod-impact-level-4/index.md",
57113+
"redirect_url": "/azure/governance/policy/samples/gov-dod-impact-level-4",
57114+
"redirect_document_id": false
57115+
},
57116+
{
57117+
"source_path_from_root": "/articles/governance/blueprints/samples/dod-impact-level-4/control-mapping.md",
57118+
"redirect_url": "/azure/governance/policy/samples/gov-dod-impact-level-4",
57119+
"redirect_document_id": false
57120+
},
57121+
{
57122+
"source_path_from_root": "/articles/governance/blueprints/samples/dod-impact-level-4/deploy.md",
57123+
"redirect_url": "/azure/governance/policy/samples/gov-dod-impact-level-4",
57124+
"redirect_document_id": false
57125+
},
57126+
{
57127+
"source_path_from_root": "/articles/governance/blueprints/samples/dod-impact-level-5/index.md",
57128+
"redirect_url": "/azure/governance/policy/samples/gov-dod-impact-level-5",
57129+
"redirect_document_id": false
57130+
},
57131+
{
57132+
"source_path_from_root": "/articles/governance/blueprints/samples/dod-impact-level-5/control-mapping.md",
57133+
"redirect_url": "/azure/governance/policy/samples/gov-dod-impact-level-5",
57134+
"redirect_document_id": false
57135+
},
57136+
{
57137+
"source_path_from_root": "/articles/governance/blueprints/samples/dod-impact-level-5/deploy.md",
57138+
"redirect_url": "/azure/governance/policy/samples/gov-dod-impact-level-5",
57139+
"redirect_document_id": false
57140+
},
57141+
{
57142+
"source_path_from_root": "/articles/governance/blueprints/samples/fedramp-m/index.md",
57143+
"redirect_url": "/azure/governance/policy/samples/fedramp-moderate",
57144+
"redirect_document_id": false
57145+
},
57146+
{
57147+
"source_path_from_root": "/articles/governance/blueprints/samples/fedramp-m/control-mapping.md",
57148+
"redirect_url": "/azure/governance/policy/samples/fedramp-moderate",
57149+
"redirect_document_id": false
57150+
},
57151+
{
57152+
"source_path_from_root": "/articles/governance/blueprints/samples/fedramp-m/deploy.md",
57153+
"redirect_url": "/azure/governance/policy/samples/fedramp-moderate",
57154+
"redirect_document_id": false
57155+
},
57156+
{
57157+
"source_path_from_root": "/articles/governance/blueprints/samples/fedramp-h/index.md",
57158+
"redirect_url": "/azure/governance/policy/samples/fedramp-high",
57159+
"redirect_document_id": false
57160+
},
57161+
{
57162+
"source_path_from_root": "/articles/governance/blueprints/samples/fedramp-h/control-mapping.md",
57163+
"redirect_url": "/azure/governance/policy/samples/fedramp-high",
57164+
"redirect_document_id": false
57165+
},
57166+
{
57167+
"source_path_from_root": "/articles/governance/blueprints/samples/fedramp-h/deploy.md",
57168+
"redirect_url": "/azure/governance/policy/samples/fedramp-high",
57169+
"redirect_document_id": false
57170+
},
57171+
{
57172+
"source_path_from_root": "/articles/governance/blueprints/samples/nist-sp-800-53-r4.md",
57173+
"redirect_url": "/azure/governance/policy/samples/nist-sp-800-53-r4",
57174+
"redirect_document_id": false
5710557175
}
5710657176
]
5710757177
}

articles/active-directory/authentication/concept-authentication-passwordless.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -142,7 +142,7 @@ The following providers offer FIDO2 security keys of different form factors that
142142
| Kensington | ![y] | ![y]| ![n]| ![n]| ![n] | https://www.kensington.com/solutions/product-category/why-biometrics/ |
143143
| KONA I | ![y] | ![n]| ![y]| ![y]| ![n] | https://konai.com/business/security/fido |
144144
| Nymi | ![y] | ![n]| ![y]| ![n]| ![n] | https://www.nymi.com/product |
145-
| OneSpan Inc. | ![y] | ![n]| ![n]| ![y]| ![n] | https://www.onespan.com/products/fido |
145+
| OneSpan Inc. | ![n] | ![y]| ![n]| ![y]| ![n] | https://www.onespan.com/products/fido |
146146
| Thales Group | ![n] | ![y]| ![y]| ![n]| ![n] | https://cpl.thalesgroup.com/access-management/authenticators/fido-devices |
147147
| Thetis | ![y] | ![y]| ![y]| ![y]| ![n] | https://thetis.io/collections/fido2 |
148148
| Token2 Switzerland | ![y] | ![y]| ![y]| ![n]| ![n] | https://www.token2.swiss/shop/product/token2-t2f2-alu-fido2-u2f-and-totp-security-key |
@@ -218,4 +218,4 @@ To get started with passwordless in Azure AD, complete one of the following how-
218218
### External Links
219219

220220
* [FIDO Alliance](https://fidoalliance.org/)
221-
* [FIDO2 CTAP specification](https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-client-to-authenticator-protocol-v2.0-id-20180227.html)
221+
* [FIDO2 CTAP specification](https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-client-to-authenticator-protocol-v2.0-id-20180227.html)

articles/active-directory/hybrid/reference-connect-tls-enforcement.md

Lines changed: 20 additions & 56 deletions
Original file line numberDiff line numberDiff line change
@@ -20,16 +20,16 @@ ms.collection: M365-identity-device-management
2020

2121
# TLS 1.2 enforcement for Azure AD Connect
2222

23-
Transport Layer Security (TLS) protocol version 1.2 is a cryptography protocol that is designed to provide secure communications. The TLS protocol aims primarily to provide privacy and data integrity. TLS has gone through many iterations with version 1.2 being defined in [RFC 5246](https://tools.ietf.org/html/rfc5246). Azure Active Directory Connect version 1.2.65.0 and later now fully support using only TLS 1.2 for communications with Azure. This document will provide information on how to force your Azure AD Connect server to use only TLS 1.2.
23+
Transport Layer Security (TLS) protocol version 1.2 is a cryptography protocol that is designed to provide secure communications. The TLS protocol aims primarily to provide privacy and data integrity. TLS has gone through many iterations, with version 1.2 being defined in [RFC 5246](https://tools.ietf.org/html/rfc5246). Azure Active Directory Connect version 1.2.65.0 and later now fully support using only TLS 1.2 for communications with Azure. This article provides information about how to force your Azure AD Connect server to use only TLS 1.2.
2424

25-
>[!NOTE]
26-
>All versions of Windows Server that are supported for Azure AD Connect V2.0 already default to TLS 1.2. If TLS 1.2 is not enabled on your server you will need to enable this before you can deploy Azure AD Connect V2.0.
25+
> [!NOTE]
26+
> All versions of Windows Server that are supported for Azure AD Connect V2.0 already default to TLS 1.2. If TLS 1.2 is not enabled on your server you will need to enable this before you can deploy Azure AD Connect V2.0.
2727
2828
## Update the registry
29-
In order to force the Azure AD Connect server to only use TLS 1.2 the registry of the Windows server must be updated. Set the following registry keys on the Azure AD Connect server.
29+
In order to force the Azure AD Connect server to only use TLS 1.2, the registry of the Windows server must be updated. Set the following registry keys on the Azure AD Connect server.
3030

31-
>[!IMPORTANT]
32-
>After you have updated the registry, you must restart the Windows server for the changes to take affect.
31+
> [!IMPORTANT]
32+
> After you have updated the registry, you must restart the Windows server for the changes to take affect.
3333
3434

3535
### Enable TLS 1.2
@@ -48,34 +48,20 @@ In order to force the Azure AD Connect server to only use TLS 1.2 the registry o
4848
- [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client]
4949
- "DisabledByDefault"=dword:00000000
5050

51-
### PowerShell script to enable TLS 1.2
52-
You can use the following PowerShell script to enable TLS 1.2 on your Azure AD Connect server.
51+
### PowerShell cmdlet to check TLS 1.2
52+
You can use the following [Get-ADSyncToolsTls12](reference-connect-adsynctools.md#get-adsynctoolstls12) PowerShell cmdlet to check the current TLS 1.2 settings on your Azure AD Connect server.
5353

5454
```powershell
55-
New-Item 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319' -Force | Out-Null
56-
57-
New-ItemProperty -path 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319' -name 'SystemDefaultTlsVersions' -value '1' -PropertyType 'DWord' -Force | Out-Null
58-
59-
New-ItemProperty -path 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319' -name 'SchUseStrongCrypto' -value '1' -PropertyType 'DWord' -Force | Out-Null
60-
61-
New-Item 'HKLM:\SOFTWARE\Microsoft\.NETFramework\v4.0.30319' -Force | Out-Null
62-
63-
New-ItemProperty -path 'HKLM:\SOFTWARE\Microsoft\.NETFramework\v4.0.30319' -name 'SystemDefaultTlsVersions' -value '1' -PropertyType 'DWord' -Force | Out-Null
55+
Import-module -Name "C:\Program Files\Microsoft Azure Active Directory Connect\Tools\AdSyncTools"
56+
Get-ADSyncToolsTls12
57+
```
6458

65-
New-ItemProperty -path 'HKLM:\SOFTWARE\Microsoft\.NETFramework\v4.0.30319' -name 'SchUseStrongCrypto' -value '1' -PropertyType 'DWord' -Force | Out-Null
59+
### PowerShell cmdlet to enable TLS 1.2
60+
You can use the following [Set-ADSyncToolsTls12](reference-connect-adsynctools.md#set-adsynctoolstls12) PowerShell cmdlet to enforce TLS 1.2 on your Azure AD Connect server.
6661

67-
New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server' -Force | Out-Null
68-
69-
New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server' -name 'Enabled' -value '1' -PropertyType 'DWord' -Force | Out-Null
70-
71-
New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server' -name 'DisabledByDefault' -value 0 -PropertyType 'DWord' -Force | Out-Null
72-
73-
New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client' -Force | Out-Null
74-
75-
New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client' -name 'Enabled' -value '1' -PropertyType 'DWord' -Force | Out-Null
76-
77-
New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client' -name 'DisabledByDefault' -value 0 -PropertyType 'DWord' -Force | Out-Null
78-
Write-Host 'TLS 1.2 has been enabled.'
62+
```powershell
63+
Import-module -Name "C:\Program Files\Microsoft Azure Active Directory Connect\Tools\AdSyncTools"
64+
Set-ADSyncToolsTls12 -Enabled $true
7965
```
8066

8167
### Disable TLS 1.2
@@ -94,34 +80,12 @@ You can use the following PowerShell script to enable TLS 1.2 on your Azure AD C
9480
- [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client]
9581
- "DisabledByDefault"=dword:00000001
9682

97-
### PowerShell script to disable TLS 1.2
98-
You can use the following PowerShell script to disable TLS 1.2 on your Azure AD Connect server.\
83+
### PowerShell script to disable TLS 1.2 (not recommended)
84+
You can use the following [Set-ADSyncToolsTls12](reference-connect-adsynctools.md#set-adsynctoolstls12) PowerShell cmdlet to disable TLS 1.2 on your Azure AD Connect server.
9985

10086
```powershell
101-
New-Item 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319' -Force | Out-Null
102-
103-
New-ItemProperty -path 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319' -name 'SystemDefaultTlsVersions' -value '0' -PropertyType 'DWord' -Force | Out-Null
104-
105-
New-ItemProperty -path 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319' -name 'SchUseStrongCrypto' -value '0' -PropertyType 'DWord' -Force | Out-Null
106-
107-
New-Item 'HKLM:\SOFTWARE\Microsoft\.NETFramework\v4.0.30319' -Force | Out-Null
108-
109-
New-ItemProperty -path 'HKLM:\SOFTWARE\Microsoft\.NETFramework\v4.0.30319' -name 'SystemDefaultTlsVersions' -value '0' -PropertyType 'DWord' -Force | Out-Null
110-
111-
New-ItemProperty -path 'HKLM:\SOFTWARE\Microsoft\.NETFramework\v4.0.30319' -name 'SchUseStrongCrypto' -value '0' -PropertyType 'DWord' -Force | Out-Null
112-
113-
New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server' -Force | Out-Null
114-
115-
New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server' -name 'Enabled' -value '0' -PropertyType 'DWord' -Force | Out-Null
116-
117-
New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server' -name 'DisabledByDefault' -value 1 -PropertyType 'DWord' -Force | Out-Null
118-
119-
New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client' -Force | Out-Null
120-
121-
New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client' -name 'Enabled' -value '0' -PropertyType 'DWord' -Force | Out-Null
122-
123-
New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client' -name 'DisabledByDefault' -value 1 -PropertyType 'DWord' -Force | Out-Null
124-
Write-Host 'TLS 1.2 has been disabled.'
87+
Import-module -Name "C:\Program Files\Microsoft Azure Active Directory Connect\Tools\AdSyncTools"
88+
Set-ADSyncToolsTls12 -Enabled $false
12589
```
12690

12791
## Next steps

articles/active-directory/standards/configure-azure-active-directory-for-fedramp-high-impact.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ The following is a list of FedRAMP resources:
5050

5151
* [Azure Compliance Offerings](https://aka.ms/azurecompliance)
5252

53-
* [FedRAMP High blueprint sample overview](../../governance/blueprints/samples/fedramp-h/index.md)
53+
* [FedRAMP High Azure Policy built-in initiative definition](../../governance/policy/samples/fedramp-high.md)
5454

5555
* [Microsoft 365 compliance center](/microsoft-365/compliance/microsoft-365-compliance-center)
5656

articles/aks/ingress-tls.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -162,7 +162,7 @@ az network public-ip show --ids $PUBLICIPID --query "[dnsSettings.fqdn]" --outpu
162162
```
163163

164164
#### Method 2: Set the DNS label using helm chart settings
165-
You can pass an annotation setting to your helm chard configuration by using the `--set controller.service.annotations."service\.beta\.kubernetes\.io/azure-dns-label-name"` parameter. This can be set either when the ingress controller is first deployed, or it can be configured later.
165+
You can pass an annotation setting to your helm chart configuration by using the `--set controller.service.annotations."service\.beta\.kubernetes\.io/azure-dns-label-name"` parameter. This can be set either when the ingress controller is first deployed, or it can be configured later.
166166
The following example shows how to update this setting after the controller has been deployed.
167167

168168
```
@@ -538,4 +538,4 @@ You can also:
538538
[install-azure-cli]: /cli/azure/install-azure-cli
539539
[aks-supported versions]: supported-kubernetes-versions.md
540540
[aks-integrated-acr]: cluster-container-registry-integration.md?tabs=azure-cli#create-a-new-aks-cluster-with-acr-integration
541-
[acr-helm]: ../container-registry/container-registry-helm-repos.md
541+
[acr-helm]: ../container-registry/container-registry-helm-repos.md

articles/app-service/app-service-key-vault-references.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,9 @@ If your vault is configured with [network restrictions](../key-vault/general/ove
4040
4141
2. Make sure that the vault's configuration accounts for the network or subnet through which your app will access it.
4242
43+
> [!NOTE]
44+
> Windows container currently does not support Key Vault references over VNet Integration.
45+
4346
### Access vaults with a user-assigned identity
4447
4548
Some apps need to reference secrets at creation time, when a system-assigned identity would not yet be available. In these cases, a user-assigned identity can be created and given access to the vault in advance.

0 commit comments

Comments
 (0)