Skip to content

Commit 42748f8

Browse files
authored
Merge pull request #91103 from MicrosoftDocs/master
10/09 AM Publish
2 parents 0f93895 + e9dd3bc commit 42748f8

File tree

51 files changed

+508
-410
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

51 files changed

+508
-410
lines changed

.vscode/extensions.json

Lines changed: 0 additions & 5 deletions
This file was deleted.

articles/active-directory/fundamentals/whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -133,7 +133,7 @@ New cmdlets were added to the AzureADPreview module, to help define and assign c
133133
**Service category:** Other
134134
**Product capability:** Directory
135135

136-
We've released an updated version of Azure AD Connect for auto-upgrade customers. This new version includes several new features, improvements, and bug fixes. For more information about this new version, see [Azure AD Connect: Version release history](https://docs.microsoft.com/azure/active-directory/hybrid/reference-connect-version-history#14x0).
136+
We've released an updated version of Azure AD Connect for auto-upgrade customers. This new version includes several new features, improvements, and bug fixes. For more information about this new version, see [Azure AD Connect: Version release history](https://docs.microsoft.com/azure/active-directory/hybrid/reference-connect-version-history#14250).
137137

138138
---
139139

articles/active-directory/users-groups-roles/users-bulk-download.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -20,10 +20,6 @@ ms.collection: M365-identity-device-management
2020

2121
Azure Active Directory (Azure AD) supports bulk user import (create) operations.
2222

23-
## Bulk download service limits
24-
25-
Each bulk activity to create a list of users can run for up to one hour. This enables creation and download of a list of at least 500,000 users.
26-
2723
## Required permissions
2824

2925
To download the list of users from the Azure AD admin center, you must be signed in with a user assigned to one or more organization-level administrator roles in Azure AD. Guest inviter and application developer are not considered administrator roles.
@@ -42,6 +38,10 @@ You can see the status of your pending bulk requests in the **Bulk operation res
4238

4339
![Check upload status in the Bulk Operations Results page](./media/users-bulk-download/bulk-center.png)
4440

41+
## Bulk download service limits
42+
43+
Each bulk activity to create a list of users can run for up to one hour. This enables creation and download of a list of at least 500,000 users.
44+
4545
## Next steps
4646

4747
- [Bulk add users](users-bulk-add.md)

articles/aks/operator-best-practices-storage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ For more information about storage class options, see [storage reclaim policies]
8888

8989
**Best practice guidance** - Back up your data using an appropriate tool for your storage type, such as Velero or Azure Site Recovery. Verify the integrity, and security, of those backups.
9090

91-
When your applications store and consume data persisted on disks or in files, you need to take regular backups or snapshots of that data. Azure Disks can use built-in snapshot technologies. You may need to a hook for your applications to flush writes to disk before you perform the snapshot operation. [Velero][velero] can back up persistent volumes along with additional cluster resources and configurations. If you can't [remove state from your applications][remove-state], back up the data from persistent volumes and regularly test the restore operations to verify data integrity and the processes required.
91+
When your applications store and consume data persisted on disks or in files, you need to take regular backups or snapshots of that data. Azure Disks can use built-in snapshot technologies. You may need to look for your applications to flush writes to disk before you perform the snapshot operation. [Velero][velero] can back up persistent volumes along with additional cluster resources and configurations. If you can't [remove state from your applications][remove-state], back up the data from persistent volumes and regularly test the restore operations to verify data integrity and the processes required.
9292

9393
Understand the limitations of the different approaches to data backups and if you need to quiesce your data prior to snapshot. Data backups don't necessarily let you restore your application environment of cluster deployment. For more information about those scenarios, see [Best practices for business continuity and disaster recovery in AKS][best-practices-multi-region].
9494

articles/app-service/configure-authentication-provider-aad.md

Lines changed: 67 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -18,56 +18,83 @@ ms.custom: seodec18
1818
ms.custom: fasttrack-edit
1919

2020
---
21-
# Configure your App Service app to use Azure Active Directory sign-in
21+
22+
# Configure your App Service app to use Azure AD login
2223

2324
[!INCLUDE [app-service-mobile-selector-authentication](../../includes/app-service-mobile-selector-authentication.md)]
2425

26+
This article shows you how to configure Azure App Service to use Azure Active Directory (Azure AD) as an authentication provider.
27+
2528
> [!NOTE]
26-
> At this time, AAD V2 (including MSAL) is not supported for Azure App Service and Azure Functions.
27-
>
29+
> At this time, Azure App Service and Azure Functions are only supported by Azure AD v1.0. They're not supported by the [Microsoft identity platform v2.0](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-overview), which includes Microsoft Authentication Libraries (MSAL).
2830
29-
This article shows you how to configure Azure App Service to use Azure Active Directory as an authentication provider.
31+
Follow these best practices when setting up your app and authentication:
3032

31-
It's recommended that you configure each App Service app with its own registration, so it has its own permissions and consent. Also, consider using separate app registrations for separate deployment slots. This avoids permission sharing between environments, so that an issue in new code you're testing does not affect production.
33+
- Give each App Service app its own permissions and consent.
34+
- Configure each App Service app with its own registration.
35+
- Avoid permission sharing between environments by using separate app registrations for separate deployment slots. When testing new code, this practice can help prevent issues from affecting the production app.
3236

3337
## <a name="express"> </a>Configure with express settings
3438

35-
1. In the [Azure portal], navigate to your App Service app. In the left navigation, select **Authentication / Authorization**.
36-
2. If **Authentication / Authorization** is not enabled, select **On**.
37-
3. Select **Azure Active Directory**, and then select **Express** under **Management Mode**.
38-
4. Select **OK** to register the App Service app in Azure Active Directory. This creates a new app registration. If you want to choose an existing app registration instead, click **Select an existing app** and then search for the name of a previously created app registration within your tenant. Click the app registration to select it and click **OK**. Then click **OK** on the Azure Active Directory settings page.
39-
By default, App Service provides authentication but does not restrict authorized access to your site content and APIs. You must authorize users in your app code.
40-
5. (Optional) To restrict access to your app to only users authenticated by Azure Active Directory, set **Action to take when request is not authenticated** to **Log in with Azure Active Directory**. This requires that all requests be authenticated, and all unauthenticated requests are redirected to Azure Active Directory for authentication.
39+
1. In the [Azure portal], go to your App Service app.
40+
1. Select **Settings** > **Authentication / Authorization** in the left pane, and make sure that **App Service Authentication** is **On**.
41+
1. Select **Azure Active Directory**, and then select **Express** under **Management Mode**.
42+
1. Select **OK** to register the App Service app in Azure Active Directory. A new app registration is created.
4143

42-
> [!NOTE]
43-
> Restricting access in this way applies to all calls to your app, which may not be desirable for apps wanting a publicly available home page, as in many single-page applications. For such applications, **Allow anonymous requests (no action)** may be preferred, with the app manually starting login itself, as described [here](overview-authentication-authorization.md#authentication-flow).
44-
6. Click **Save**.
44+
If you want to choose an existing app registration instead:
45+
46+
1. Choose **Select an existing app** and then search for the name of a previously created app registration within your tenant.
47+
1. Select the app registration and then select **OK**.
48+
1. Then select **OK** on the Azure Active Directory settings page.
49+
50+
By default, App Service provides authentication but doesn't restrict authorized access to your site content and APIs. You must authorize users in your app code.
51+
1. (Optional) To restrict app access only to users authenticated by Azure Active Directory, set **Action to take when request is not authenticated** to **Log in with Azure Active Directory**. When you set this functionality, your app requires all requests to be authenticated. It also redirects all unauthenticated to Azure Active Directory for authentication.
52+
53+
> [!CAUTION]
54+
> Restricting access in this way applies to all calls to your app, which might not be desirable for apps that have a publicly available home page, as in many single-page applications. For such applications, **Allow anonymous requests (no action)** might be preferred, with the app manually starting login itself. For more information, see [Authentication flow](overview-authentication-authorization.md#authentication-flow).
55+
1. Select **Save**.
4556

4657
## <a name="advanced"> </a>Configure with advanced settings
4758

48-
You can also provide configuration settings manually, if the Azure Active Directory tenant you want to use is different from the tenant with which you sign into Azure. To complete the configuration, you must first create a registration in Azure Active Directory, and then you must provide some of the registration details to App Service.
59+
You can configure app settings manually if you want to use an Azure AD tenant that's different from the one you use to sign in to Azure. To complete this custom configuration, you'll need to:
60+
61+
1. Create a registration in Azure AD.
62+
1. Provide some of the registration details to App Service.
4963

5064
### <a name="register"> </a>Create an app registration in Azure AD for your App Service app
5165

52-
When creating an app registration manually, note three pieces of information that you will need later when configuring your App Service app: the client ID, the tenant ID, and optionally the client secret and the application ID URI.
66+
You'll need the following information when you configure your App Service app:
67+
68+
- Client ID
69+
- Tenant ID
70+
- Client secret (optional)
71+
- Application ID URI
72+
73+
Perform the following steps:
5374

54-
1. In the [Azure portal], navigate to your App Service app and note your app's **URL**. You will use it to configure your Azure Active Directory app registration.
55-
1. In the [Azure portal], from the left menu, select **Active Directory** > **App registrations** > **New registration**.
75+
1. Sign in to the [Azure portal] and go to your App Service app. Note your app's **URL**. You'll use it to configure your Azure Active Directory app registration.
76+
1. Select **Azure Active Directory** > **App registrations** > **New registration**.
5677
1. In the **Register an application** page, enter a **Name** for your app registration.
57-
1. In **Redirect URI**, select **Web** and type the URL of your App Service app and append the path `/.auth/login/aad/callback`. For example, `https://contoso.azurewebsites.net/.auth/login/aad/callback`. Then select **Create**.
58-
1. Once the app registration is created, copy the **Application (client) ID** and the **Directory (tenant) ID** for later.
59-
1. Select **Branding**. In **Home page URL**, type the URL of your App Service app and select **Save**.
78+
1. In **Redirect URI**, select **Web** and enter the URL of your App Service app and append the path `/.auth/login/aad/callback`. For example, `https://contoso.azurewebsites.net/.auth/login/aad/callback`.
79+
1. Select **Create**.
80+
1. After the app registration is created, copy the **Application (client) ID** and the **Directory (tenant) ID** for later.
81+
1. Select **Branding**. In **Home page URL**, enter the URL of your App Service app and select **Save**.
6082
1. Select **Expose an API** > **Set**. Paste in the URL of your App Service app and select **Save**.
6183

62-
> [!NOTE]
63-
> This value is the **Application ID URI** of the app registration. If you want to have a front-end web app to access a back-end API, for example, and you want the back end to explicitly grant access to the front end, you need the **Application ID URI** of the *front end* when you configure the App Service app resource of the *back end*.
64-
1. Select **Add a scope**. In **Scope name**, type *user_impersonation*. In the text boxes, type the consent scope name and description you want users to see on the consent page, such as *Access my app*. When finished, click **Add scope**.
65-
1. (Optional) To create a client secret, select **Certificates & secrets** > **New client secret** > **Add**. Copy the client secret value shown in the page. Once you navigate away, it won't be shown again.
66-
1. (Optional) To add multiple **Reply URLs**, select **Authentication** in the menu.
84+
> [!NOTE]
85+
> This value is the **Application ID URI** of the app registration. If your web app requires access to an API in the cloud, you need the **Application ID URI** of the web app when you configure the cloud App Service resource. You can use this, for example, if you want the cloud service to explicitly grant access to the web app.
86+
87+
1. Select **Add a scope**.
88+
1. In **Scope name**, enter *user_impersonation*.
89+
1. In the text boxes, enter the consent scope name and description you want users to see on the consent page. For example, enter *Access my app*.
90+
1. Select **Add scope**.
91+
1. (Optional) To create a client secret, select **Certificates & secrets** > **New client secret** > **Add**. Copy the client secret value shown in the page. It won't be shown again.
92+
1. (Optional) To add multiple **Reply URLs**, select **Authentication**.
6793

6894
### <a name="secrets"> </a>Add Azure Active Directory information to your App Service app
6995

70-
1. In the [Azure portal], navigate to your App Service app. From the left menu, select **Authentication / Authorization**. If the Authentication/Authorization feature is not enabled, select **On**.
96+
1. In the [Azure portal], go to your App Service app.
97+
1. Select **Settings > Authentication / Authorization** in the left pane, and make sure that **App Service Authentication** is **On**.
7198
1. (Optional) By default, App Service authentication allows unauthenticated access to your app. To enforce user authentication, set **Action to take when request is not authenticated** to **Log in with Azure Active Directory**.
7299
1. Under Authentication Providers, select **Azure Active Directory**.
73100
1. In **Management mode**, select **Advanced** and configure App Service authentication according to the following table:
@@ -77,31 +104,33 @@ When creating an app registration manually, note three pieces of information tha
77104
|Client ID| Use the **Application (client) ID** of the app registration. |
78105
|Issuer ID| Use `https://login.microsoftonline.com/<tenant-id>`, and replace *\<tenant-id>* with the **Directory (tenant) ID** of the app registration. |
79106
|Client Secret (Optional)| Use the client secret you generated in the app registration.|
80-
|Allowed Token Audiences| If this is a *back-end* app and you want to allow authentication tokens from a front-end app, add the **Application ID URI** of the *front end* here. |
107+
|Allowed Token Audiences| If this is a cloud or server app and you want to allow authentication tokens from a web app, add the **Application ID URI** of the web app here. |
81108

82109
> [!NOTE]
83110
> The configured **Client ID** is *always* implicitly considered to be an allowed audience, regardless of how you configured the **Allowed Token Audiences**.
84-
1. Select **OK**, then select **Save**.
111+
1. Select **OK**, and then select **Save**.
85112

86-
You are now ready to use Azure Active Directory for authentication in your App Service app.
113+
You're now ready to use Azure Active Directory for authentication in your App Service app.
87114

88115
## Configure a native client application
89-
You can register native clients if you wish to perform sign-ins using a client library such as the **Active Directory Authentication Library**.
90116

91-
1. In the [Azure portal], from the left menu, select **Active Directory** > **App registrations** > **New registration**.
117+
You can register native clients to allow authentication using a client library such as the **Active Directory Authentication Library**.
118+
119+
1. In the [Azure portal], select **Active Directory** > **App registrations** > **New registration**.
92120
1. In the **Register an application** page, enter a **Name** for your app registration.
93-
1. In **Redirect URI**, select **Public client (mobile & desktop)** and type the URL of your App Service app and append the path `/.auth/login/aad/callback`. For example, `https://contoso.azurewebsites.net/.auth/login/aad/callback`. Then select **Create**.
121+
1. In **Redirect URI**, select **Public client (mobile & desktop)** and enter the URL of your App Service app and append the path `/.auth/login/aad/callback`. For example, `https://contoso.azurewebsites.net/.auth/login/aad/callback`.
122+
1. Select **Create**.
94123

95124
> [!NOTE]
96125
> For a Windows application, use the [package SID](../app-service-mobile/app-service-mobile-dotnet-how-to-use-client-library.md#package-sid) as the URI instead.
97-
1. Once the app registration is created, copy the value of **Application (client) ID**.
98-
1. From the left menu, select **API permissions** > **Add a permission** > **My APIs**.
99-
1. Select the app registration you created earlier for your App Service app. If you don't see the app registration, check that you've added the **user_impersonation** scope in [Create an app registration in Azure AD for your App Service app](#register).
100-
1. Select **user_impersonation** and click **Add permissions**.
126+
1. After the app registration is created, copy the value of **Application (client) ID**.
127+
1. Select **API permissions** > **Add a permission** > **My APIs**.
128+
1. Select the app registration you created earlier for your App Service app. If you don't see the app registration, make sure that you've added the **user_impersonation** scope in [Create an app registration in Azure AD for your App Service app](#register).
129+
1. Select **user_impersonation**, and then select **Add permissions**.
101130

102131
You have now configured a native client application that can access your App Service app.
103132

104-
## <a name="related-content"> </a>Related Content
133+
## <a name="related-content"> </a>Next steps
105134

106135
[!INCLUDE [app-service-mobile-related-content-get-started-users](../../includes/app-service-mobile-related-content-get-started-users.md)]
107136

0 commit comments

Comments
 (0)