Skip to content

Commit 47794ec

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents cc19e1b + 9d1565e commit 47794ec

File tree

174 files changed

+2012
-708
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

174 files changed

+2012
-708
lines changed

.openpublishing.publish.config.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -984,8 +984,6 @@
984984
".openpublishing.redirection.baremetal-infrastructure.json",
985985
".openpublishing.redirection.defender-for-cloud.json",
986986
".openpublishing.redirection.defender-for-iot.json",
987-
".openpublishing.redirection.deployment-environments.json",
988-
".openpublishing.redirection.dev-box.json",
989987
".openpublishing.redirection.healthcare-apis.json",
990988
".openpublishing.redirection.iot-hub-device-update.json",
991989
".openpublishing.redirection.json",
@@ -1042,6 +1040,8 @@
10421040
"articles/stream-analytics/.openpublishing.redirection.stream-analytics.json",
10431041
"articles/synapse-analytics/.openpublishing.redirection.synapse-analytics.json",
10441042
"articles/virtual-machine-scale-sets/.openpublishing.redirection.virtual-machine-scale-sets.json",
1045-
"articles/virtual-machines/.openpublishing.redirection.virtual-machines.json"
1043+
"articles/virtual-machines/.openpublishing.redirection.virtual-machines.json",
1044+
"articles/dev-box/.openpublishing.redirection.dev-box.json",
1045+
"articles/deployment-environments/.openpublishing.redirection.deployment-environments.json"
10461046
]
10471047
}

.openpublishing.redirection.dev-box.json

Lines changed: 0 additions & 19 deletions
This file was deleted.

articles/active-directory-b2c/tutorial-create-tenant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ Before you create your Azure AD B2C tenant, you need to take the following consi
4242

4343
## Create an Azure AD B2C tenant
4444
>[!NOTE]
45-
>If you're unable to create Azure AD B2C tenant, [review your user settings page](tenant-management-check-tenant-creation-permission.md) to ensure that tenant creation isn't switched off. If tenant creation is switched off, ask your _Global Administrator_ to assign you a _Tenant Creator_ role.
45+
>If you're unable to create Azure AD B2C tenant, [review your user settings page](tenant-management-check-tenant-creation-permission.md) to ensure that tenant creation isn't switched off. If tenant creation is switched on, ask your _Global Administrator_ to assign you a _Tenant Creator_ role.
4646
4747
1. Sign in to the [Azure portal](https://portal.azure.com/).
4848

articles/active-directory/enterprise-users/domains-manage.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: enterprise-users
1111
ms.workload: identity
1212
ms.topic: how-to
13-
ms.date: 11/11/2022
13+
ms.date: 03/31/2023
1414
ms.author: barclayn
1515
ms.reviewer: sumitp
1616

@@ -20,7 +20,7 @@ ms.collection: M365-identity-device-management
2020
---
2121
# Managing custom domain names in your Azure Active Directory
2222

23-
A domain name is an important part of the identifier for resources in many Azure Active Directory (Azure AD) deployments. It is part of a user name or email address for a user, part of the address for a group, and is sometimes part of the app ID URI for an application. A resource in Azure AD can include a domain name that's owned by the Azure AD organization (sometimes called a tenant) that contains the resource. Only a Global Administrator can manage domains in Azure AD.
23+
A domain name is an important part of the identifier for resources in many Azure Active Directory (Azure AD) deployments. It's part of a user name or email address for a user, part of the address for a group, and is sometimes part of the app ID URI for an application. A resource in Azure AD can include a domain name that's owned by the Azure AD organization (sometimes called a tenant) that contains the resource. [Global Administrators](../roles/permissions-reference.md#global-administrator) and [Domain name administrators](../roles/permissions-reference.md#domain-name-administrator) can manage domains in Azure AD.
2424

2525
## Set the primary domain name for your Azure AD organization
2626

articles/active-directory/managed-identities-azure-resources/tutorial-linux-vm-access-storage.md

Lines changed: 22 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.subservice: msi
1212
ms.topic: tutorial
1313
ms.tgt_pltfrm: na
1414
ms.workload: identity
15-
ms.date: 01/11/2022
15+
ms.date: 03/30/2023
1616
ms.author: barclayn
1717

1818
ms.collection: M365-identity-device-management
@@ -42,12 +42,12 @@ To run the CLI script examples in this tutorial, you have two options:
4242

4343
In this section, you create a storage account.
4444

45-
1. Click the **+ Create a resource** button found on the upper left-hand corner of the Azure portal.
46-
2. Click **Storage**, then **Storage account - blob, file, table, queue**.
45+
1. Select the **+ Create a resource** button found on the upper left-hand corner of the Azure portal.
46+
2. Select **Storage**, then **Storage account - blob, file, table, queue**.
4747
3. Under **Name**, enter a name for the storage account.
4848
4. **Deployment model** and **Account kind** should be set to **Resource manager** and **Storage (general purpose v1)**.
4949
5. Ensure the **Subscription** and **Resource Group** match the ones you specified when you created your VM in the previous step.
50-
6. Click **Create**.
50+
6. Select **Create**.
5151

5252
![Create new storage account](./media/msi-tutorial-linux-vm-access-storage/msi-storage-create.png)
5353

@@ -56,16 +56,16 @@ In this section, you create a storage account.
5656
Files require blob storage so you need to create a blob container in which to store the file. You then upload a file to the blob container in the new storage account.
5757

5858
1. Navigate back to your newly created storage account.
59-
2. Under **Blob Service**, click **Containers**.
60-
3. Click **+ Container** on the top of the page.
59+
2. Under **Blob Service**, select **Containers**.
60+
3. Select **+ Container** on the top of the page.
6161
4. Under **New container**, enter a name for the container and under **Public access level** keep the default value.
6262

6363
![Create storage container](./media/msi-tutorial-linux-vm-access-storage/create-blob-container.png)
6464

6565
5. Using an editor of your choice, create a file titled *hello world.txt* on your local machine. Open the file and add the text (without the quotes) "Hello world! :)" and then save it.
6666

6767
6. Upload the file to the newly created container by clicking on the container name, then **Upload**
68-
7. In the **Upload blob** pane, under **Files**, click the folder icon and browse to the file **hello_world.txt** on your local machine, select the file, then click **Upload**.
68+
7. In the **Upload blob** pane, under **Files**, select the folder icon and browse to the file **hello_world.txt** on your local machine, select the file, then select **Upload**.
6969

7070
![Upload text file](./media/msi-tutorial-linux-vm-access-storage/upload-text-file.png)
7171

@@ -83,7 +83,7 @@ Azure Storage natively supports Azure AD authentication, so it can directly acce
8383

8484
To complete the following steps, you need to work from the VM created earlier and you need an SSH client to connect to it. If you are using Windows, you can use the SSH client in the [Windows Subsystem for Linux](/windows/wsl/about). If you need assistance configuring your SSH client's keys, see [How to Use SSH keys with Windows on Azure](~/articles/virtual-machines/linux/ssh-from-windows.md), or [How to create and use an SSH public and private key pair for Linux VMs in Azure](~/articles/virtual-machines/linux/mac-create-ssh-keys.md).
8585

86-
1. In the Azure portal, navigate to **Virtual Machines**, go to your Linux virtual machine, then from the **Overview** page click **Connect**. Copy the string to connect to your VM.
86+
1. In the Azure portal, navigate to **Virtual Machines**, go to your Linux virtual machine, then from the **Overview** page select **Connect**. Copy the string to connect to your VM.
8787
2. **Connect** to the VM with the SSH client of your choice.
8888
3. In the terminal window, use CURL to make a request to the local Managed Identity endpoint to get an access token for Azure Storage.
8989

@@ -102,6 +102,20 @@ To complete the following steps, you need to work from the VM created earlier an
102102
Hello world! :)
103103
```
104104

105+
Alternatively, you could also store the token in a variable and pass it to the second command as shown:
106+
107+
```bash
108+
# Run the first curl command and capture its output in a variable
109+
access_token=$(curl 'http://169.254.169.254/metadata/identity/oauth2/token?api-version=2018-02-01&resource=https%3A%2F%2Fstorage.azure.com%2F' -H Metadata:true | jq -r '.access_token')
110+
111+
# Run the second curl command with the access token
112+
curl "https://<STORAGE ACCOUNT>.blob.core.windows.net/<CONTAINER NAME>/<FILE NAME>" \
113+
-H "x-ms-version: 2017-11-09" \
114+
-H "Authorization: Bearer $access_token"
115+
116+
```
117+
118+
105119
## Next steps
106120

107121
In this tutorial, you learned how enable a Linux VM system-assigned managed identity to access Azure Storage. To learn more about Azure Storage see:

articles/active-directory/multi-tenant-organizations/cross-tenant-synchronization-configure.md

Lines changed: 13 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -415,6 +415,18 @@ This setting also applies to B2B collaboration and B2B direct connect, so if you
415415

416416
## Troubleshooting tips
417417

418+
#### Delete a configuration
419+
420+
Follows these steps to delete a configuration on the **Configurations** page.
421+
422+
1. In the source tenant, select **Azure Active Directory** > **Cross-tenant synchronization (Preview)**.
423+
424+
1. On the **Configurations** page, add a check mark next to the configuration you want to delete.
425+
426+
1. Select **Delete** and then **OK** to delete the configuration.
427+
428+
:::image type="content" source="./media/cross-tenant-synchronization-configure/configurations-delete.png" alt-text="Screenshot of the Configurations page showing how to delete a configuration." lightbox="./media/cross-tenant-synchronization-configure/configurations-delete.png":::
429+
418430
#### Symptom - Test connection fails with AzureDirectoryB2BManagementPolicyCheckFailure
419431

420432
When configuring cross-tenant synchronization in the source tenant and you test the connection, it fails with the following error message:
@@ -461,26 +473,6 @@ Restoring a previously soft-deleted user in the target tenant isn't supported.
461473

462474
Manually restore the soft-deleted user in the target tenant. For more information, see [Restore or remove a recently deleted user using Azure Active Directory](../fundamentals/active-directory-users-restore.md).
463475

464-
#### Symptom - Unable to delete a configuration
465-
466-
On the **Configurations** page, there isn't a way to delete a configuration.
467-
468-
**Cause**
469-
470-
Currently, there isn't a way to delete a configuration on the **Configurations** page. Instead, you must delete the configuration in **Enterprise applications**.
471-
472-
**Solution**
473-
474-
1. In the source tenant, select **Azure Active Directory** > **Enterprise applications**.
475-
476-
1. In the list of all applications, find the name of your configuration. If necessary, you can search by the configuration name.
477-
478-
1. Select the configuration and then select **Properties**.
479-
480-
1. Select **Delete** and then **Yes** to delete the configuration.
481-
482-
:::image type="content" source="./media/cross-tenant-synchronization-configure/enterprise-applications-configuration-delete.png" alt-text="Screenshot of the Enterprise applications Properties page showing how to delete a configuration." lightbox="./media/cross-tenant-synchronization-configure/enterprise-applications-configuration-delete.png":::
483-
484476
#### Symptom - Users are skipped because SMS sign-in is enabled on the user
485477
Users are skipped from synchronization. The scoping step includes the following filter with status false: "Filter external users.alternativeSecurityIds EQUALS 'None'"
486478

@@ -492,7 +484,7 @@ If SMS sign-in is enabled for a user, they will be skipped by the provisioning s
492484

493485
Disable SMS Sign-in for the users. The script below shows how you can disable SMS Sign-in using PowerShell.
494486

495-
```
487+
```powershell
496488
##### Disable SMS Sign-in options for the users
497489
498490
#### Import module
@@ -502,7 +494,6 @@ Import-Module Microsoft.Graph.Users.Actions
502494
503495
Connect-MgGraph -Scopes "User.Read.All", "Group.ReadWrite.All", "UserAuthenticationMethod.Read.All","UserAuthenticationMethod.ReadWrite","UserAuthenticationMethod.ReadWrite.All"
504496
505-
506497
##### The value for phoneAuthenticationMethodId is 3179e48a-750b-4051-897c-87b9720928f7
507498
508499
$phoneAuthenticationMethodId = "3179e48a-750b-4051-897c-87b9720928f7"
@@ -528,12 +519,9 @@ $smssignin = Get-MgUserAuthenticationPhoneMethod -UserId $userId
528519
529520
}
530521
531-
532-
533522
##### End the script
534523
```
535524

536-
537525
## Next steps
538526

539527
- [Tutorial: Reporting on automatic user account provisioning](../app-provisioning/check-status-user-account-provisioning.md)
Loading

articles/app-service/overview-vnet-integration.md

Lines changed: 4 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Integrate your app with an Azure virtual network
33
description: Integrate your app in Azure App Service with Azure virtual networks.
44
author: madsd
55
ms.topic: conceptual
6-
ms.date: 03/16/2023
6+
ms.date: 03/31/2023
77
ms.author: madsd
88
ms.custom: UpdateFrequency3
99

@@ -66,19 +66,11 @@ The feature supports two virtual interfaces per worker. Two virtual interfaces p
6666

6767
## Subnet requirements
6868

69-
Virtual network integration depends on a dedicated subnet. When you create a subnet, the Azure subnet consumes five IPs from the start. One address is used from the integration subnet for each plan instance. If you scale your app to four instances, then four addresses are used.
69+
Virtual network integration depends on a dedicated subnet. When you create a subnet, the Azure subnet consumes five IPs from the start. One address is used from the integration subnet for each App Service plan instance. If you scale your app to four instances, then four addresses are used.
7070

71-
When you scale up or down in size, the required address space is doubled for a short period of time. The scale operation affects the real, available supported instances for a given subnet size. The following table shows both the maximum available addresses per CIDR block and the effect the available addresses has on horizontal scale.
71+
When you scale up or down in size, the required address space is doubled for a short period of time. The scale operation affects the real, available supported instances for a given subnet size. Platform upgrades need free IP addresses to ensure upgrade can happen without interruptions to outbound traffic. Finally, after scale up, down or in operations complete, there might be a short period of time before IP addresses are released.
7272

73-
| CIDR block size | Maximum available addresses | Maximum horizontal scale (instances)<sup>*</sup> |
74-
|-----------------|-------------------------|---------------------------------|
75-
| /28 | 11 | 5 |
76-
| /27 | 27 | 13 |
77-
| /26 | 59 | 29 |
78-
79-
<sup>*</sup>Assumes that you need to scale up or down in either size or SKU at some point.
80-
81-
Because subnet size can't be changed after assignment, use a subnet that's large enough to accommodate whatever scale your app might reach. To avoid any issues with subnet capacity, use a `/26` with 64 addresses. When you're creating subnets in Azure portal as part of integrating with the virtual network, a minimum size of /27 is required. If the subnet already exists before integrating through the portal, you can use a /28 subnet.
73+
Because subnet size can't be changed after assignment, use a subnet that's large enough to accommodate whatever scale your app might reach. You should also reserve IP addresses for platform upgrades. To avoid any issues with subnet capacity, use a `/26` with 64 addresses. When you're creating subnets in Azure portal as part of integrating with the virtual network, a minimum size of /27 is required. If the subnet already exists before integrating through the portal, you can use a /28 subnet.
8274

8375
>[!NOTE]
8476
> Windows Containers uses an additional IP address per app for each App Service plan instance, and you need to size the subnet accordingly. If you have for example 10 Windows Container App Service plan instances with 4 apps running, you will need 50 IP addresses and additional addresses to support horizontal (up/down) scale.

0 commit comments

Comments
 (0)