You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/governance/entitlement-management-access-package-approval-policy.md
+15Lines changed: 15 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -114,6 +114,21 @@ If you selected a multi-stage approval, you'll need to add an approver for each
114
114
115
115
1. Specify the number of days the second approver has to approve the request in the box under **Decision must be made in how many days?**.
116
116
117
+
1. Set the Require approver justification toggle to **Yes** or **No**.
118
+
119
+
You also have the option to add an additional stage for a three-stage approval process. For example, you might want an employee’s manager to be the first stage approver for an access package. But, one of the resources in the access package contains confidential information. In this case, you could designate the resource owner as a second approver and a security reviewer as the third approver (Preview).
120
+
121
+
1. Add the **Third Approver (Preview)**:
122
+
123
+
If the users are in your directory, add a specific user as the third approver by clicking **Add approvers** under Choose specific approvers.
124
+
125
+
If the users aren't in your directory, select **Internal sponsor** or **External sponsor** as the third approver. After selecting the approver, add the fallback approvers.
126
+
127
+
> [!NOTE]
128
+
> <ul>Like the second stage, if the users are in your directory and **Manager as approver** is selected in either the first or second stage of approval, you will only see an option to select specific approvers for the third stage of approval.</ul><ul>If you want to designate the manager as a third approver, you can adjust your selections in the previous approval stages to ensure that **Manager as approver** isn’t selected. Then, you should see **Manager as approver** as an option in the dropdown.</ul><ul>If the users aren’t in your directory and you have not selected **Internal sponsor** or **External sponsor** as approvers in previous stages, you will see them as options for **Third Approver**. Otherwise, you will only be able to select **Choose specific approvers**.</ul>
129
+
130
+
1. Specify the number of days the third approver (Preview) has to approve the request in the box under **Decision must be made in how many days?**.
131
+
117
132
1. Set the Require approver justification toggle to **Yes** or **No**.
Copy file name to clipboardExpand all lines: articles/active-directory/managed-identities-azure-resources/managed-identities-status.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,7 +38,7 @@ The following Azure services support managed identities for Azure resources:
38
38
| Azure Container Registry |[Use an Azure-managed identity in ACR Tasks](../../container-registry/container-registry-tasks-authentication-managed-identity.md)|
39
39
| Azure Cognitive Services |[Configure customer-managed keys with Azure Key Vault for Cognitive Services](../../cognitive-services/encryption/cognitive-services-encryption-keys-portal.md)|
40
40
| Azure Data Box |[Use customer-managed keys in Azure Key Vault for Azure Data Box](../../databox/data-box-customer-managed-encryption-key-portal.md)|
41
-
| Azure Data Explorer |[Configure managed identities for your Azure Data Explorer cluster](https://docs.microsoft.com/azure/data-explorer/configure-managed-identities-cluster?tabs=portal)|
41
+
| Azure Data Explorer |[Configure managed identities for your Azure Data Explorer cluster](/azure/data-explorer/configure-managed-identities-cluster?tabs=portal)|
42
42
| Azure Data Factory |[Managed identity for Data Factory](../../data-factory/data-factory-service-identity.md)|
43
43
| Azure Data Lake Storage Gen1 |[Customer-managed keys for Azure Storage encryption](../../storage/common/customer-managed-keys-overview.md)|
44
44
| Azure Data Share |[Roles and requirements for Azure Data Share](../../data-share/concepts-roles-permissions.md)|
@@ -50,7 +50,7 @@ The following Azure services support managed identities for Azure resources:
50
50
| Azure Kubernetes Service (AKS) |[Use managed identities in Azure Kubernetes Service](../../aks/use-managed-identity.md)|
51
51
| Azure Logic Apps |[Authenticate access to Azure resources using managed identities in Azure Logic Apps](../../logic-apps/create-managed-service-identity.md)|
| Azure Managed Disk |[Use the Azure portal to enable server-side encryption with customer-managed keys for managed disks](../../virtual-machines/disks-enable-customer-managed-keys-portal.md)|
55
55
| Azure Media services |[Managed identities](../../media-services/latest/concept-managed-identities.md)|
Copy file name to clipboardExpand all lines: articles/active-directory/managed-identities-azure-resources/services-azure-active-directory-support.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,19 +23,19 @@ The following services support Azure AD authentication. New services are added t
23
23
| Azure Batch |[Authenticate Batch service solutions with Active Directory](../../batch/batch-aad-auth.md)|
24
24
| Azure Container Registry |[Authenticate with an Azure container registry](../../container-registry/container-registry-authentication.md)|
25
25
| Azure Cognitive Services |[Authenticate requests to Azure Cognitive Services](../../cognitive-services/authentication.md?tabs=powershell#authenticate-with-azure-active-directory)|
26
-
| Azure Databricks | [Authenticate using Azure Active Directory tokens](https://docs.microsoft.com/azure/databricks/dev-tools/api/latest/aad/)
27
-
| Azure Data Explorer |[How-To Authenticate with Azure Active Directory for Azure Data Explorer Access](https://docs.microsoft.com/azure/data-explorer/kusto/management/access-control/how-to-authenticate-with-aad)|
26
+
| Azure Databricks | [Authenticate using Azure Active Directory tokens](/azure/databricks/dev-tools/api/latest/aad/)
27
+
| Azure Data Explorer |[How-To Authenticate with Azure Active Directory for Azure Data Explorer Access](/azure/data-explorer/kusto/management/access-control/how-to-authenticate-with-aad)|
28
28
| Azure Data Lake Storage Gen1 |[Authentication with Azure Data Lake Storage Gen1 using Azure Active Directory](../../data-lake-store/data-lakes-store-authentication-using-azure-active-directory.md)|
29
29
| Azure Digital Twins |[Set up an Azure Digital Twins instance and authentication (portal)](../../digital-twins/how-to-set-up-instance-portal.md#set-up-user-access-permissions)|
30
30
| Azure Event Hubs | [Authenticate an application with Azure Active Directory to access Event Hubs resources](../../event-hubs/authenticate-application.md)
31
31
| Azure IoT Hub |[Control access to IoT Hub](../../iot-hub/iot-hub-devguide-security.md)|
32
32
| Azure Key Vault | [Authentication in Azure Key Vault](../../key-vault/general/authentication.md)
33
33
| Azure Kubernetes Service (AKS) |[Control access to cluster resources using Kubernetes role-based access control and Azure Active Directory identities in Azure Kubernetes Service](../../aks/azure-ad-rbac.md)|
34
-
| Azure Machine Learning Services |[Set up authentication for Azure Machine Learning resources and workflows](/machine-learning/how-to-setup-authentication.md)|
34
+
| Azure Machine Learning Services |[Set up authentication for Azure Machine Learning resources and workflows](/azure/machine-learning/how-to-setup-authentication)|
35
35
| Azure Maps |[Manage authentication in Azure Maps](../../azure-maps/how-to-manage-authentication.md)|
36
36
| Azure Media services |[Access the Azure Media Services API with Azure AD authentication](../../media-services/previous/media-services-use-aad-auth-to-access-ams-api.md)|
37
37
| Azure Monitor |[Azure AD authentication for Application Insights (Preview)](../../azure-monitor/app/azure-ad-authentication.md?tabs=net)|
| Azure Service Fabric |[Set up Azure Active Directory for client authentication](../../service-fabric/service-fabric-cluster-creation-setup-aad.md)|
40
40
| Azure Service Bus | [Service Bus authentication and authorization](../../service-bus-messaging/service-bus-authentication-and-authorization.md)
41
41
| Azure SignalR Service |[Authorize access with Azure Active Directory for Azure SignalR Service](../../azure-signalr/signalr-concept-authorize-azure-active-directory.md)|
@@ -47,6 +47,6 @@ The following services support Azure AD authentication. New services are added t
47
47
48
48
## Next steps
49
49
50
-
-[Azure China developer guide](https://docs.microsoft.com/azure/china/resources-developer-guide)
50
+
-[Azure China developer guide](/azure/china/resources-developer-guide)
51
51
-[Compare Azure Government and global Azure](../../azure-government/compare-azure-government-global-azure.md)
52
52
-[Azure services that can use Managed identities to access other services](managed-identities-status.md)
Copy file name to clipboardExpand all lines: articles/application-gateway/configuration-infrastructure.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,6 +35,9 @@ Application Gateway (Standard_v2 or WAF_v2 SKU) can support up to 125 instances
35
35
> [!IMPORTANT]
36
36
> Although a /24 subnet is not required per Application Gateway v2 SKU deployment, it is highly recommended. This is to ensure that Application Gateway v2 has sufficient space for autoscaling expansion and maintenance upgrades. You should ensure that the Application Gateway v2 subnet has sufficient address space to accommodate the number of instances required to serve your maximum expected traffic. If you specify the maximum instance count, then the subnet should have capacity for at least that many addresses. For capacity planning around instance count, see [instance count details](understanding-pricing.md#instance-count).
37
37
38
+
> [!TIP]
39
+
> IP addresses are allocated from the beginning of the defined subnet space for gateway instances. As instances are created and removed due to creation of gateways or scaling events, it can become difficult to understand what the next available address is in the subnet. To be able to determine the next address to use for a future gateway and have a contiguous addressing theme for frontend IPs, consider assigning frontend IP addresses from the upper half of the defined subset space. For example, if my subnet address space is 10.5.5.0/24, consider setting the frontend IP of your gateways starting with 10.5.5.254 and then following with 10.5.5.253, 10.5.5.252, 10.5.5.251, and so forth for future gateways.
40
+
38
41
> [!TIP]
39
42
> It is possible to change the subnet of an existing Application Gateway within the same virtual network. You can do this using Azure PowerShell or Azure CLI. For more information, see [Frequently asked questions about Application Gateway](application-gateway-faq.yml#can-i-change-the-virtual-network-or-subnet-for-an-existing-application-gateway)
Copy file name to clipboardExpand all lines: articles/azure-functions/functions-how-to-azure-devops.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,11 +18,11 @@ YAML pipelines aren't available for Azure DevOps 2019 and earlier.
18
18
19
19
* A GitHub account, where you can create a repository. If you don't have one, you can [create one for free](https://github.com).
20
20
21
-
* An Azure DevOps organization. If you don't have one, you can [create one for free](//azure/devops/get-started/pipelines-sign-up.md). (An Azure DevOps organization is different from your GitHub organization. You can give your DevOps organization and your GitHub organization the same name if you want alignment between them.)
21
+
* An Azure DevOps organization. If you don't have one, you can [create one for free](/azure/devops/pipelines/get-started/pipelines-sign-up). (An Azure DevOps organization is different from your GitHub organization. You can give your DevOps organization and your GitHub organization the same name if you want alignment between them.)
22
22
23
23
If your team already has one, then make sure you're an administrator of the Azure DevOps project that you want to use.
24
24
25
-
* An ability to run pipelines on Microsoft-hosted agents. You can either purchase a [parallel job](/azure/devops/licensing/concurrent-jobs.md) or you can request a free tier. To request a free tier, follow the instructions in [this article](/azure/devops/licensing/concurrent-jobs.md). Note that it may take us 2-3 business days to grant access to the free tier.
25
+
* An ability to run pipelines on Microsoft-hosted agents. You can either purchase a [parallel job](/azure/devops/pipelines/licensing/concurrent-jobs) or you can request a free tier. To request a free tier, follow the instructions in [this article](/azure/devops/pipelines/licensing/concurrent-jobs). Note that it may take us 2-3 business days to grant access to the free tier.
26
26
27
27
## Create your function app
28
28
@@ -235,7 +235,7 @@ steps:
235
235
236
236
## Deploy your app
237
237
238
-
You'll deploy with the [Azure Function App Deploy](/azure/devops/pipelines/tasks/deploy/azure-function-app.md) task. This task requires an [Azure service connection](/azure/devops/pipelines/library/service-endpoints) as an input. An Azure service connection stores the credentials to connect from Azure Pipelines to Azure.
238
+
You'll deploy with the [Azure Function App Deploy](/azure/devops/pipelines/tasks/deploy/azure-function-app) task. This task requires an [Azure service connection](/azure/devops/pipelines/library/service-endpoints) as an input. An Azure service connection stores the credentials to connect from Azure Pipelines to Azure.
239
239
240
240
# [YAML](#tab/yaml)
241
241
@@ -282,7 +282,7 @@ You can automatically deploy your code to Azure Functions as a custom container
282
282
283
283
# [YAML](#tab/yaml/)
284
284
285
-
The simplest way to deploy to a container is to use the [Azure Function App on Container Deploy task](/azure/devops/pipelines/tasks/deploy/azure-rm-functionapp-containers.md).
285
+
The simplest way to deploy to a container is to use the [Azure Function App on Container Deploy task](/azure/devops/pipelines/tasks/deploy/azure-rm-functionapp-containers).
286
286
287
287
To deploy, add the following snippet at the end of your YAML file:
288
288
@@ -312,7 +312,7 @@ The snippet pushes the Docker image to your Azure Container Registry. The **Azur
312
312
313
313
# [Classic](#tab/classic/)
314
314
315
-
The best way to deploy your function app as a container is to use the [Azure Function App on Container Deploy task](/azure/devops/pipelines/tasks/deploy/azure-rm-functionapp-containers.md) in your release pipeline.
315
+
The best way to deploy your function app as a container is to use the [Azure Function App on Container Deploy task](/azure/devops/pipelines/tasks/deploy/azure-rm-functionapp-containers) in your release pipeline.
316
316
317
317
318
318
How you deploy your app depends on your app's programming language. Each language has a template with specific deploy steps. If you can't find a template for your language, select the generic **Azure App Service Deployment** template.
0 commit comments