You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/customers/how-to-single-page-app-vanillajs-configure-authentication.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -98,8 +98,8 @@ The application uses the [Implicit Grant Flow](../../develop/v2-oauth2-implicit-
98
98
99
99
1. Replace the following values with the values from the Azure portal:
100
100
- Find the `Enter_the_Application_Id_Here` value and replace it with the **Application ID (clientId)**of the app you registered in the Microsoft Entra admin center.
101
-
- In **Authority**, find `Enter_the_Tenant_Subdomain_Here` and replace it with the subdomain of your tenant. For example, if your tenant primary domain is *caseyjensen@onmicrosoft.com*, the value you should enter is *casyjensen*.
102
-
1. Save the file.
101
+
- In **Authority**, find `Enter_the_Tenant_Subdomain_Here` and replace it with the subdomain of your tenant. For example, if your tenant primary domain is `contoso.onmicrosoft.com`, use `contoso`. Ifyou don't have your tenant name, [learn how to read your tenant details](how-to-create-customer-tenant-portal.md#get-the-customer-tenant-details).
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/customers/how-to-single-page-app-vanillajs-prepare-tenant.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ ms.date: 06/09/2023
18
18
19
19
This tutorial series demonstrates how to build a vanilla JavaScript single-page application (SPA) and prepare it for authentication using the Microsoft Entra admin center. You'll use the [Microsoft Authentication Library for JavaScript](/javascript/api/overview/msal-overview) library to authenticate your app with your Azure Active Directory (Azure AD) for customers tenant. Finally, you'll run the application and test the sign-in and sign-out experiences.
20
20
21
-
In this tutorial, you'll;
21
+
In this tutorial;
22
22
23
23
> [!div class="checklist"]
24
24
> * Register a SPA in the Microsoft Entra admin center, and record its identifiers
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/customers/how-to-single-page-application-react-prepare-app.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -150,9 +150,10 @@ Identity related **npm** packages must be installed in the project to enable use
150
150
// };
151
151
```
152
152
153
-
1. Replace the following values with the values from the Azure admin center:
154
-
- Replace `Enter_the_Application_Id_Here` with the **Application (client) ID** value that was recorded earlier from the **Overview** page of the registered application.
155
-
- In **Authority**, find `Enter_the_Tenant_Subdomain_Here` and replace it with the subdomain of your tenant. For example, if your tenant primary domain is *[email protected]*, the value you should enter is *casyjensen*.
153
+
1. Replace the following values with the values from the Azure portal:
154
+
- Find the `Enter_the_Application_Id_Here` value and replace it with the **Application ID (clientId)** of the app you registered in the Microsoft Entra admin center.
155
+
- In **Authority**, find `Enter_the_Tenant_Subdomain_Here` and replace it with the subdomain of your tenant. For example, if your tenant primary domain is `contoso.onmicrosoft.com`, use `contoso`. If you don't have your tenant name, [learn how to read your tenant details](how-to-create-customer-tenant-portal.md#get-the-customer-tenant-details).
156
+
2. Save the file.
156
157
157
158
## Modify *index.js* to include the authentication provider
Copy file name to clipboardExpand all lines: articles/azure-resource-manager/management/azure-services-resource-providers.md
+34-8Lines changed: 34 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,8 +2,10 @@
2
2
title: Resource providers by Azure services
3
3
description: Lists all resource provider namespaces for Azure Resource Manager and shows the Azure service for that namespace.
4
4
ms.topic: conceptual
5
-
ms.date: 02/28/2023
5
+
ms.date: 07/14/2023
6
6
ms.custom: ignite-2022, devx-track-arm-template
7
+
content_well_notification:
8
+
- AI-contribution
7
9
---
8
10
9
11
# Resource providers for Azure services
@@ -186,26 +188,26 @@ The resources providers that are marked with **- registered** are registered by
186
188
187
189
## Registration
188
190
189
-
The resources providers in the preceding section that are marked with **- registered**are registered by default for your subscription. To use the other resource providers, you must [register them](resource-providers-and-types.md). However, many resource providers are registered for you when you take certain actions. For example, if you create a resource through the portal, the portal automatically registers any unregistered resource providers that are needed. When deploy resources through an [Azure Resource Manager template](../templates/overview.md), any required resource providers are also registered.
191
+
Resource providers marked with **- registered**in the previous section are automatically registered for your subscription. For other resource providers, you need to [register them](resource-providers-and-types.md). However, many resource providers are registered automatically when you perform specific actions. For example, when you create resources through the portal or by deploying an [Azure Resource Manager template](../templates/overview.md), Azure Resource Manager automatically registers any required unregistered resource providers.
190
192
191
193
> [!IMPORTANT]
192
-
> Only register a resource provider when you're ready to use it. The registration step enables you to maintain least privileges within your subscription. A malicious user can't use resource providers that aren't registered.
194
+
> Register a resource provider only when you're ready to use it. This registration step helps maintain least privileges within your subscription. A malicious user can't use unregistered resource providers.
193
195
>
194
-
> When you register resource providers that aren't needed, you may see apps in your Azure Active Directory tenant that you don't recognize. Microsoft adds the app for a resource provider when you register it. These applications are typically added by Windows Azure Service Management API. To avoid having unnecessary apps in your tenant, only register resource providers that are needed.
196
+
> Registering unnecessary resource providers may result in unrecognized apps appearing in your Azure Active Directory tenant. Microsoft adds the app for a resource provider when you register it. These apps are typically added by the Windows Azure Service Management API. To prevent unnecessary apps in your tenant, only register needed resource providers.
195
197
196
198
## Find resource provider
197
199
198
-
If you have existing infrastructure in Azure, but aren't sure which resource provider is used, you can use either Azure CLI or PowerShell to find the resource provider. Specify the name of the resource group that contains the resources to find.
200
+
To identify resource providers used for your existing Azure infrastructure, list the deployed resources. Specify the resource group containing the resources.
199
201
200
202
The following example uses Azure CLI:
201
203
202
204
```azurecli-interactive
203
-
az resource list -g examplegroup
205
+
az resource list --resource-group examplegroup
204
206
```
205
207
206
208
The results include the resource type. The resource provider namespace is the first part of the resource type. The following example shows the **Microsoft.KeyVault** resource provider.
The results include the resource type. The resource provider namespace is the first part of the resource type. The following example shows the **Microsoft.KeyVault** resource provider.
224
226
225
-
```azurepowershell
227
+
```output
226
228
Name : examplekey
227
229
ResourceGroupName : examplegroup
228
230
ResourceType : Microsoft.KeyVault/vaults
229
231
...
230
232
```
231
233
234
+
The following example uses Python:
235
+
236
+
```python
237
+
import os
238
+
from azure.identity import DefaultAzureCredential
239
+
from azure.mgmt.resource import ResourceManagementClient
The results list the resource type. The resource provider namespace is the first part of the resource type. The following example shows the **Microsoft.KeyVault** resource provider.
253
+
254
+
```output
255
+
Microsoft.KeyVault/vaults
256
+
```
257
+
232
258
## Next steps
233
259
234
260
For more information about resource providers, including how to register a resource provider, see [Azure resource providers and types](resource-providers-and-types.md).
| processName | Name of a process running on a VM (without the .exe). |
406
+
| processName | Name of a process to continuously kill (without the .exe). The process does not need to be running when the fault begins executing. |
407
407
| killIntervalInMilliseconds | Amount of time the fault waits in between successive kill attempts in milliseconds. |
408
408
| virtualMachineScaleSetInstances | An array of instance IDs when this fault is applied to a virtual machine scale set. Required for virtual machine scale sets. |
409
409
@@ -536,6 +536,11 @@ Currently, the Windows agent doesn't reduce memory pressure when other applicati
536
536
}
537
537
```
538
538
539
+
### Limitations
540
+
541
+
* The agent-based network faults currently only support IPv4 addresses.
542
+
543
+
539
544
## Network disconnect
540
545
541
546
| Property | Value |
@@ -580,8 +585,11 @@ Currently, the Windows agent doesn't reduce memory pressure when other applicati
580
585
}
581
586
```
582
587
583
-
> [!WARNING]
584
-
> The network disconnect fault only affects new connections. Existing *active* connections continue to persist. You can restart the service or process to force connections to break.
588
+
### Limitations
589
+
590
+
* The agent-based network faults currently only support IPv4 addresses.
591
+
* The network disconnect fault only affects new connections. Existing active connections continue to persist. You can restart the service or process to force connections to break.
592
+
* On Windows, the network disconnect fault currently only works with TCP or UDP packets.
585
593
586
594
## Network disconnect with firewall rule
587
595
@@ -627,6 +635,63 @@ Currently, the Windows agent doesn't reduce memory pressure when other applicati
627
635
}
628
636
```
629
637
638
+
### Limitations
639
+
640
+
* The agent-based network faults currently only support IPv4 addresses.
641
+
642
+
## Network packet loss
643
+
644
+
| Property | Value |
645
+
|-|-|
646
+
| Capability name | NetworkPacketLoss-1.0 |
647
+
| Target type | Microsoft-Agent |
648
+
| Supported OS types | Windows, Linux |
649
+
| Description | Introduces packet loss for outbound traffic at a specified rate, between 0.0 (no packets lost) and 1.0 (all packets lost). This can help simulate scenarios like network congestion or network hardware issues. |
650
+
| Prerequisites | Agent must run as administrator. If the agent is installed as a VM extension, it runs as administrator by default. |
| lossRate | The rate at which packets matching the destination filters will be lost, ranging from 0.0 to 1.0. |
654
+
| virtualMachineScaleSetInstances | An array of instance IDs when this fault is applied to a virtual machine scale set. Required for virtual machine scale sets. |
655
+
| destinationFilters | Delimited JSON array of packet filters (parameters below) that define which outbound packets to target for fault injection. Maximum of three.|
656
+
| address | IP address that indicates the start of the IP range. |
657
+
| subnetMask | Subnet mask for the IP address range. |
658
+
| portLow | (Optional) Port number of the start of the port range. |
659
+
| portHigh | (Optional) Port number of the end of the port range. |
@@ -663,7 +728,7 @@ Currently, the Windows agent doesn't reduce memory pressure when other applicati
663
728
664
729
## Azure Resource Manager virtual machine scale set instance shutdown
665
730
666
-
This fault has two available versions that you can use, Version 1.0 and Version 2.0.
731
+
This fault has two available versions that you can use, Version 1.0 and Version 2.0. The main difference is that Version 2.0 allows you to filter by availability zones, only shutting down instances within a specified zone or zones.
667
732
668
733
### Version 1.0
669
734
@@ -864,7 +929,7 @@ Currently, only virtual machine scale sets configured with the **Uniform** orche
@@ -1089,8 +1154,8 @@ Currently, only virtual machine scale sets configured with the **Uniform** orche
1089
1154
| Parameters (key, value) ||
1090
1155
| name | A unique name for the security rule that's created. The fault fails if another rule already exists on the NSG with the same name. Must begin with a letter or number. Must end with a letter, number, or underscore. May contain only letters, numbers, underscores, periods, or hyphens. |
1091
1156
| protocol | Protocol for the security rule. Must be Any, TCP, UDP, or ICMP. |
1092
-
| sourceAddresses | A string that represents a JSON-delimited array of CIDR-formatted IP addresses. Can also be a service tag name for an inbound rule, for example, `AppService`. An asterisk `*` can also be used to match all source IPs. |
1093
-
| destinationAddresses | A string that represents a JSON-delimited array of CIDR-formatted IP addresses. Can also be a service tag name for an outbound rule, for example, `AppService`. An asterisk `*` can also be used to match all destination IPs. |
1157
+
| sourceAddresses | A string that represents a JSON-delimited array of CIDR-formatted IP addresses. Can also be a [service tag name](../virtual-network/service-tags-overview.md) for an inbound rule, for example, `AppService`. An asterisk `*` can also be used to match all source IPs. |
1158
+
| destinationAddresses | A string that represents a JSON-delimited array of CIDR-formatted IP addresses. Can also be a [service tag name](../virtual-network/service-tags-overview.md) for an outbound rule, for example, `AppService`. An asterisk `*` can also be used to match all destination IPs. |
1094
1159
| action | Security group access type. Must be either Allow or Deny. |
1095
1160
| destinationPortRanges | A string that represents a JSON-delimited array of single ports and/or port ranges, such as 80 or 1024-65535. |
1096
1161
| sourcePortRanges | A string that represents a JSON-delimited array of single ports and/or port ranges, such as 80 or 1024-65535. |
@@ -1456,3 +1521,32 @@ Currently, only virtual machine scale sets configured with the **Uniform** orche
1456
1521
]
1457
1522
}
1458
1523
```
1524
+
1525
+
## App Service Stop
1526
+
1527
+
| Property | Value |
1528
+
| ---- | --- |
1529
+
| Capability name | Stop-1.0 |
1530
+
| Target type | Microsoft-AppService |
1531
+
| Description | Stops the targeted App Service applications, then restarts them at the end of the fault duration. This applies to resources of the "Microsoft.Web/sites" type, including App Service, API Apps, Mobile Apps, and Azure Functions. |
0 commit comments