Skip to content

Commit 3aab2cd

Browse files
authored
Merge pull request #191569 from MicrosoftDocs/main
Merge main to live, 4 AM
2 parents 94beb2f + 59eefc3 commit 3aab2cd

29 files changed

+245
-190
lines changed

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@
6262
},
6363
{
6464
"source_path_from_root": "/articles/defender-for-cloud/supported-machines-endpoint-solutions-clouds.md",
65-
"redirect_url": "/articles/defender-for-cloud/supported-machines-endpoint-solutions-clouds-containers",
65+
"redirect_url": "/azure/defender-for-cloud/supported-machines-endpoint-solutions-clouds-containers",
6666
"redirect_document_id": false
6767
},
6868
{

articles/active-directory-b2c/configure-authentication-sample-web-app.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: CelesteDG
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: reference
10-
ms.date: 09/15/2021
10+
ms.date: 03/11/2022
1111
ms.author: kengaderdus
1212
ms.subservice: B2C
1313
ms.custom: "b2c-support"
@@ -134,13 +134,13 @@ Your final configuration file should look like the following JSON:
134134
1. Go to `https://localhost:44316`.
135135
1. Select **Sign Up/In**.
136136

137-
![Screenshot of the "Sign Up/In" button on the project Welcome page.](./media/configure-authentication-sample-web-app/web-app-sign-in.png)
137+
:::image type="content" source="./media/configure-authentication-sample-web-app/web-app-sign-in.png" alt-text="Screenshot of the sign in and sign up button on the project Welcome page.":::
138138

139139
1. Complete the sign-up or sign-in process.
140140

141141
After successful authentication, you'll see your display name on the navigation bar. To view the claims that the Azure AD B2C token returns to your app, select **Claims**.
142142

143-
![Screenshot of the web app token claims.](./media/configure-authentication-sample-web-app/web-app-token-claims.png)
143+
:::image type="content" source="./media/configure-authentication-sample-web-app/web-app-token-claims.png" alt-text="Screenshot of the web app token claims.":::
144144

145145
## Deploy your application
146146

50.2 KB
Loading
24.5 KB
Loading

articles/active-directory/external-identities/direct-federation.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -142,10 +142,10 @@ Required attributes for the SAML 2.0 response from the IdP:
142142

143143
Required claims for the SAML 2.0 token issued by the IdP:
144144

145-
|Attribute |Value |
145+
|Attribute Name |Value |
146146
|---------|---------|
147147
|NameID Format |`urn:oasis:names:tc:SAML:2.0:nameid-format:persistent` |
148-
|emailaddress |`http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress` |
148+
|`http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress` | emailaddress |
149149

150150
### WS-Fed configuration
151151

articles/active-directory/roles/list-role-assignments-users.md

Lines changed: 14 additions & 81 deletions
Original file line numberDiff line numberDiff line change
@@ -46,111 +46,44 @@ Follow these steps to list Azure AD roles for a user using the Azure portal. You
4646

4747
Follow these steps to list Azure AD roles assigned to a user using PowerShell.
4848

49-
1. Install AzureADPreview and Microsoft.Graph module using [Install-module](/powershell/azure/active-directory/install-adv2).
49+
1. Install Microsoft.Graph module using [Install-module](/powershell/azure/active-directory/install-adv2).
5050

5151
```powershell
52-
Install-module -name AzureADPreview
5352
Install-module -name Microsoft.Graph
5453
```
55-
56-
2. Open a PowerShell window and use [Import-Module](/powershell/module/microsoft.powershell.core/import-module) to import the AzureADPreview module. For more information, see [Prerequisites to use PowerShell or Graph Explorer](prerequisites.md).
57-
58-
```powershell
59-
Import-Module -Name AzureADPreview -Force
60-
```
61-
62-
3. In a PowerShell window, use [Connect-AzureAD](/powershell/module/azuread/connect-azuread) to sign in to your tenant.
6354
64-
```powershell
65-
Connect-AzureAD
66-
```
67-
4. Use [Get-AzureADMSRoleAssignment](/powershell/module/azuread/get-azureadmsroleassignment) to get roles assigned directly to a user.
68-
69-
```powershell
70-
#Get the user
71-
$userId = (Get-AzureADUser -Filter "userPrincipalName eq '[email protected]'").ObjectId
72-
73-
#Get direct role assignments to the user
74-
$directRoles = (Get-AzureADMSRoleAssignment -Filter "principalId eq '$userId'").RoleDefinitionId
75-
```
76-
77-
5. To get transitive roles assigned to the user, use the following cmdlets.
78-
79-
a. Use [Get-AzureADMSGroup](/powershell/module/azuread/get-azureadmsgroup) to get the list of all role assignable groups.
55+
3. In a PowerShell window, Use [Connect-MgGraph](/graph/powershell/get-started) to sign into and use Microsoft Graph PowerShell cmdlets.
8056
8157
```powershell
82-
$roleAssignableGroups = (Get-AzureADMsGroup -All $true | Where-Object IsAssignableToRole -EQ 'True').Id
58+
Connect-MgGraph
8359
```
8460
85-
b. Use [Connect-MgGraph](/graph/powershell/get-started) to sign into and use Microsoft Graph PowerShell cmdlets.
86-
87-
```powershell
88-
Connect-MgGraph -Scopes "User.Read.All”
89-
```
90-
91-
c. Use [checkMemberObjects](/graph/api/user-checkmemberobjects) API to figure out which of the role assignable groups the user is member of.
92-
93-
```powershell
94-
$uri = "https://graph.microsoft.com/v1.0/directoryObjects/$userId/microsoft.graph.checkMemberObjects"
61+
4. Use the [List transitiveRoleAssignments](/graph/api/rbacapplication-list-transitiveroleassignments) API to get roles assigned directly and transitively to a user.
9562
96-
$userRoleAssignableGroups = (Invoke-MgGraphRequest -Method POST -Uri $uri -Body @{"ids"= $roleAssignableGroups}).value
97-
```
98-
99-
d. Use [Get-AzureADMSRoleAssignment](/powershell/module/azuread/get-azureadmsroleassignment) to loop through the groups and get the roles assigned to them.
100-
10163
```powershell
102-
$transitiveRoles=@()
103-
foreach($item in $userRoleAssignableGroups){
104-
$transitiveRoles += (Get-AzureADMSRoleAssignment -Filter "principalId eq '$item'").RoleDefinitionId
105-
}
64+
$response = $null
65+
$uri = "https://graph.microsoft.com/beta/roleManagement/directory/transitiveRoleAssignments?`$count=true&`$filter=principalId eq '6b937a9d-c731-465b-a844-2d5b5368c161'"
66+
$method = 'GET'
67+
$headers = @{'ConsistencyLevel' = 'eventual'}
68+
69+
$response = (Invoke-MgGraphRequest -Uri $uri -Headers $headers -Method $method -Body $null).value
10670
```
10771
108-
6. Combine both direct and transitive role assignments of the user.
109-
110-
```powershell
111-
$allRoles = $directRoles + $transitiveRoles
112-
```
113-
11472
## Microsoft Graph API
11573
11674
Follow these steps to list Azure AD roles assigned to a user using the Microsoft Graph API in [Graph Explorer](https://aka.ms/ge).
11775
11876
1. Sign in to the [Graph Explorer](https://aka.ms/ge).
11977
120-
1. Use the [List unifiedRoleAssignments](/graph/api/rbacapplication-list-roleassignments) API to get roles assigned directly to a user. Add following query to the URL and select **Run query**.
78+
1. Use the [List transitiveRoleAssignments](/graph/api/rbacapplication-list-transitiveroleassignments) API to get roles assigned directly and transitively to a user. Add following query to the URL.
12179
12280
```http
123-
GET https://graph.microsoft.com/v1.0/rolemanagement/directory/roleAssignments?$filter=principalId eq '55c07278-7109-4a46-ae60-4b644bc83a31'
81+
GET https://graph.microsoft.com/beta/rolemanagement/directory/transitiveRoleAssignments?$count=true&$filter=principalId eq '6b937a9d-c731-465b-a844-2d5b5368c161'
12482
```
12583

126-
3. To get transitive roles assigned to the user, follow these steps.
84+
3. Navigate to **Request headers** tab. Add `ConsistencyLevel` as key and `Eventual` as its value.
12785

128-
a. Use the [List groups](/graph/api/group-list) API to get the list of all role assignable groups.
129-
130-
```http
131-
GET https://graph.microsoft.com/v1.0/groups?$filter=isAssignableToRole eq true
132-
```
133-
134-
b. Pass this list to the [checkMemberObjects](/graph/api/user-checkmemberobjects) API to figure out which of the role assignable groups the user is member of.
135-
136-
```http
137-
POST https://graph.microsoft.com/v1.0/users/55c07278-7109-4a46-ae60-4b644bc83a31/checkMemberObjects
138-
{
139-
"ids": [
140-
"936aec09-47d5-4a77-a708-db2ff1dae6f2",
141-
"5425a4a0-8998-45ca-b42c-4e00920a6382",
142-
"ca9631ad-2d2a-4a7c-88b7-e542bd8a7e12",
143-
"ea3cee12-360e-411d-b0ba-2173181daa76",
144-
"c3c263bb-b796-48ee-b4d2-3fbc5be5f944"
145-
]
146-
}
147-
```
148-
149-
c. Use the [List unifiedRoleAssignments](/graph/api/rbacapplication-list-roleassignments) API to loop through the groups and get the roles assigned to them.
150-
151-
```http
152-
GET https://graph.microsoft.com/v1.0/roleManagement/directory/roleAssignments?$filter=principalId eq '5425a4a0-8998-45ca-b42c-4e00920a6382'
153-
```
86+
5. Select **Run query**.
15487

15588
## Next steps
15689

articles/api-management/api-management-role-based-access-control.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ If none of the built-in roles meet your specific needs, custom roles can be crea
4646
> [!NOTE]
4747
> To be able to see an API Management instance in the Azure portal, a custom role must include the ```Microsoft.ApiManagement/service/read``` action.
4848
49-
When you create a custom role, it's easier to start with one of the built-in roles. Edit the attributes to add **Actions**, **NotActions**, or **AssignableScopes**, and then save the changes as a new role. The following example begins with the "API Management Service Reader" role and creates a custom role called "Calculator API Editor." You can assign the custom role to a specific API. Consequently, this role only has access to that API.
49+
When you create a custom role, it's easier to start with one of the built-in roles. Edit the attributes to add **Actions**, **NotActions**, or **AssignableScopes**, and then save the changes as a new role. The following example begins with the "API Management Service Reader" role and creates a custom role called "Calculator API Editor." You can assign the custom role at the scope of a specific API. Consequently, this role only has access to that API.
5050

5151
```powershell
5252
$role = Get-AzRoleDefinition "API Management Service Reader Role"
@@ -56,9 +56,9 @@ $role.Description = 'Has read access to Contoso APIM instance and write access t
5656
$role.Actions.Add('Microsoft.ApiManagement/service/apis/write')
5757
$role.Actions.Add('Microsoft.ApiManagement/service/apis/*/write')
5858
$role.AssignableScopes.Clear()
59-
$role.AssignableScopes.Add('/subscriptions/<subscription ID>/resourceGroups/<resource group name>/providers/Microsoft.ApiManagement/service/<service name>/apis/<api ID>')
59+
$role.AssignableScopes.Add('/subscriptions/<Azure subscription ID>/resourceGroups/<resource group name>/providers/Microsoft.ApiManagement/service/<APIM service instance name>/apis/<API name>')
6060
New-AzRoleDefinition -Role $role
61-
New-AzRoleAssignment -ObjectId <object ID of the user account> -RoleDefinitionName 'Calculator API Contributor' -Scope '/subscriptions/<subscription ID>/resourceGroups/<resource group name>/providers/Microsoft.ApiManagement/service/<service name>/apis/<api ID>'
61+
New-AzRoleAssignment -ObjectId <object ID of the user account> -RoleDefinitionName 'Calculator API Contributor' -Scope '/subscriptions/<subscription ID>/resourceGroups/<resource group name>/providers/Microsoft.ApiManagement/service/<APIM service instance name>/apis/<API name>'
6262
```
6363

6464
The [Azure Resource Manager resource provider operations](../role-based-access-control/resource-provider-operations.md#microsoftapimanagement) article contains the list of permissions that can be granted on the API Management level.

articles/app-service/quickstart-java.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,9 @@ author: jasonfreeberg
66
ms.assetid: 582bb3c2-164b-42f5-b081-95bfcb7a502a
77
ms.devlang: java
88
ms.topic: quickstart
9-
ms.date: 12/10/2021
9+
ms.date: 03/03/2022
1010
ms.author: jafreebe
11-
ms.custom: mvc, seo-java-july2019, seo-java-august2019, seo-java-september2019, mode-other
11+
ms.custom: mvc, seo-java-july2019, seo-java-august2019, seo-java-september2019, mode-other, devdivchpfy22
1212
zone_pivot_groups: app-service-platform-windows-linux
1313
adobe-target: true
1414
adobe-target-activity: DocsExp–386541–A/B–Enhanced-Readability-Quickstarts–2.19.2021
@@ -18,7 +18,7 @@ adobe-target-content: ./quickstart-java-uiex
1818

1919
# Quickstart: Create a Java app on Azure App Service
2020

21-
[Azure App Service](overview.md) provides a highly scalable, self-patching web hosting service. This quickstart shows how to use the [Azure CLI](/cli/azure/get-started-with-azure-cli) with the [Azure Web App Plugin for Maven](https://github.com/Microsoft/azure-maven-plugins/tree/develop/azure-webapp-maven-plugin) to deploy a .jar file, or .war file. Use the tabs to switch between Java SE and Tomcat instructions.
21+
[Azure App Service](overview.md) provides a highly scalable, self-patching web hosting service. This quickstart shows how to use the [Azure CLI](/cli/azure/get-started-with-azure-cli) with the [Azure Web App Plugin for Maven](https://github.com/Microsoft/azure-maven-plugins/tree/develop/azure-webapp-maven-plugin) to deploy a .jar file, or .war file. Use the tabs to switch between Java SE and Tomcat instructions.
2222

2323
# [Java SE](#tab/javase)
2424

@@ -110,12 +110,12 @@ cd agoncal-application-petstore-ee7
110110

111111
## Configure the Maven plugin
112112

113-
The deployment process to Azure App Service will use your Azure credentials from the Azure CLI automatically. If the Azure CLI is not installed locally, then the Maven plugin will authenticate with Oauth or device login. For more information, see [authentication with Maven plugins](https://github.com/microsoft/azure-maven-plugins/wiki/Authentication).
113+
The deployment process to Azure App Service will use your Azure credentials from the Azure CLI automatically. If the Azure CLI isn't installed locally, then the Maven plugin will authenticate with Oauth or device sign in. For more information, see [authentication with Maven plugins](https://github.com/microsoft/azure-maven-plugins/wiki/Authentication).
114114

115115
Run the Maven command below to configure the deployment. This command will help you to set up the App Service operating system, Java version, and Tomcat version.
116116

117117
```azurecli-interactive
118-
mvn com.microsoft.azure:azure-webapp-maven-plugin:2.3.0:config
118+
mvn com.microsoft.azure:azure-webapp-maven-plugin:2.5.0:config
119119
```
120120

121121
::: zone pivot="platform-windows"
@@ -288,7 +288,7 @@ JBoss EAP is only available on the Linux version of App Service. Select the **Li
288288
289289
::: zone-end
290290
291-
You can modify the configurations for App Service directly in your `pom.xml` if needed. Some common ones are listed below:
291+
You can modify the configurations for App Service directly in your `pom.xml`. Some common configurations are listed below:
292292
293293
Property | Required | Description | Version
294294
---|---|---|---
@@ -297,11 +297,11 @@ Property | Required | Description | Version
297297
`<resourceGroup>` | true | Azure Resource Group for your Web App. | 0.1.0+
298298
`<appName>` | true | The name of your Web App. | 0.1.0+
299299
`<region>` | false | Specifies the region where your Web App will be hosted; the default value is **centralus**. All valid regions at [Supported Regions](https://azure.microsoft.com/global-infrastructure/services/?products=app-service) section. | 0.1.0+
300-
`<pricingTier>` | false | The pricing tier for your Web App. The default value is **P1v2** for production workload, while **B2** is the recommended minimum for Java dev/test. [Learn more](https://azure.microsoft.com/pricing/details/app-service/linux/)| 0.1.0+
301-
`<runtime>` | false | The runtime environment configuration, you could see the detail [here](https://github.com/microsoft/azure-maven-plugins/wiki/Azure-Web-App:-Configuration-Details). | 0.1.0+
302-
`<deployment>` | false | The deployment configuration, you could see the details [here](https://github.com/microsoft/azure-maven-plugins/wiki/Azure-Web-App:-Configuration-Details). | 0.1.0+
300+
`<pricingTier>` | false | The pricing tier for your Web App. The default value is **P1v2** for production workload, while **B2** is the recommended minimum for Java dev/test. For more information, see [App Service Pricing](https://azure.microsoft.com/pricing/details/app-service/linux/)| 0.1.0+
301+
`<runtime>` | false | The runtime environment configuration. For more information, see [Configuration Details](https://github.com/microsoft/azure-maven-plugins/wiki/Azure-Web-App:-Configuration-Details). | 0.1.0+
302+
`<deployment>` | false | The deployment configuration. For more information, see [Configuration Details](https://github.com/microsoft/azure-maven-plugins/wiki/Azure-Web-App:-Configuration-Details). | 0.1.0+
303303
304-
Be careful about the values of `<appName>` and `<resourceGroup>` (`helloworld-1590394316693` and `helloworld-1590394316693-rg` accordingly in the demo), they will be used later.
304+
Be careful about the values of `<appName>` and `<resourceGroup>` (`helloworld-1590394316693` and `helloworld-1590394316693-rg` accordingly in the demo), they'll be used later.
305305
306306
> [!div class="nextstepaction"]
307307
> [I ran into an issue](https://www.research.net/r/javae2e?tutorial=quickstart-java&step=config)
@@ -336,7 +336,7 @@ mvn package azure-webapp:deploy -DskipTests
336336

337337
-----
338338

339-
Once deployment has completed, your application will be ready at `http://<appName>.azurewebsites.net/` (`http://helloworld-1590394316693.azurewebsites.net` in the demo). Open the url with your local web browser, you should see
339+
Once deployment is completed, your application will be ready at `http://<appName>.azurewebsites.net/` (`http://helloworld-1590394316693.azurewebsites.net` in the demo). Open the url with your local web browser, you should see
340340

341341
# [Java SE](#tab/javase)
342342

@@ -369,7 +369,7 @@ JBoss EAP is only available on the Linux version of App Service. Select the **Li
369369
370370
## Clean up resources
371371

372-
In the preceding steps, you created Azure resources in a resource group. If you don't expect to need these resources in the future, delete the resource group from portal, or by running the following command in the Cloud Shell:
372+
In the preceding steps, you created Azure resources in a resource group. If you don't need the resources in the future, delete the resource group from portal, or by running the following command in the Cloud Shell:
373373

374374
```azurecli-interactive
375375
az group delete --name <your resource group name; for example: helloworld-1558400876966-rg> --yes

0 commit comments

Comments
 (0)