Skip to content

Commit 47e4cbf

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into heidist-work
2 parents 10448bc + c4c3c3b commit 47e4cbf

File tree

13 files changed

+77
-71
lines changed

13 files changed

+77
-71
lines changed
68.3 KB
Loading

articles/active-directory-b2c/partner-datawiza.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.subservice: B2C
1616

1717
# Tutorial: Configure Azure Active Directory B2C with Datawiza to provide secure hybrid access
1818

19-
In this tutorial, learn how to integrate Azure Active Directory B2C (Azure AD B2C) with [Datawiza Access Broker (DAB)](https://www.datawiza.com/access-broker). DAB enables single sign-on (SSO) and granular access control, helping Azure AD B2C protect on-premises legacy applications. With this solution, enterprises can transition from legacy to Azure AD B2C without rewriting applications.
19+
In this tutorial, learn how to integrate Azure Active Directory B2C (Azure AD B2C) with [Datawiza Access Proxy (DAP)](https://www.datawiza.com/), which enables single sign-on (SSO) and granular access control, helping Azure AD B2C protect on-premises legacy applications. With this solution, enterprises can transition from legacy to Azure AD B2C without rewriting applications.
2020

2121
## Prerequisites
2222

@@ -29,7 +29,7 @@ To get started, you'll need:
2929
- Your applications can run on platforms such as virtual machine and bare metal
3030
- An on-premises application to transition from a legacy identity system, to Azure AD B2C
3131
- In this tutorial, DAB is deployed on the same server as the application
32-
- The application runs on localhost: 3001 and DAB proxies traffic to applications via localhost: 9772
32+
- The application runs on localhost: 3001 and DAP proxies traffic to applications via localhost: 9772
3333
- The application traffic reaches DAB first and then is proxied to the application
3434

3535
## Scenario description
@@ -38,17 +38,17 @@ Datawiza integration includes the following components:
3838

3939
- **Azure AD B2C**: The authorization server to verify user credentials
4040
- Authenticated users access on-premises applications using a local account stored in the Azure AD B2C directory
41-
- **Datawiza Access Broker (DAB)**: The service that passes identity to applications through HTTP headers
41+
- **Datawiza Access Proxy (DAP)**: The service that passes identity to applications through HTTP headers
4242
- **Datawiza Cloud Management Console (DCMC)**: A management console for DAB. DCMC UI and RESTful APIs help manage DAB configurations and access control policies
4343

4444
The following architecture diagram shows the implementation.
4545

4646
![Diagram of the architecture of an Azure AD B2C integration with Datawiza for secure access to hybrid applications.](./media/partner-datawiza/datawiza-architecture-diagram.png)
4747

4848
1. The user requests access to an on-premises application. DAB proxies the request to the application.
49-
2. DAB checks user authentication state. With no session token, or an invalid token, the user goes to Azure AD B2C for authentication.
50-
3. Azure AD B2C sends the user request to the endpoint specified during DAB registration in the Azure AD B2C tenant.
51-
4. The DAB evaluates access policies and calculates attribute values in HTTP headers forwarded to the application. The DAB might call to the identity provider (IdP) to retrieve information to set the header values. The DAB sets the header values and sends the request to the application.
49+
2. DAP checks user authentication state. With no session token, or an invalid token, the user goes to Azure AD B2C for authentication.
50+
3. Azure AD B2C sends the user request to the endpoint specified during DAP registration in the Azure AD B2C tenant.
51+
4. The DAP evaluates access policies and calculates attribute values in HTTP headers forwarded to the application. The DAP might call to the identity provider (IdP) to retrieve information to set the header values. The DAP sets the header values and sends the request to the application.
5252
5. The user is authenticated with access to the application.
5353

5454
## Onboard with Datawiza
@@ -74,11 +74,11 @@ Go to docs.datawiza.com to:
7474

7575
## Run DAB with a header-based application
7676

77-
You can use Docker or Kubernetes to run DAB. Use the Docker image for users to create a sample header-based application.
77+
You can use Docker or Kubernetes to run DAP. Use the Docker image for users to create a sample header-based application.
7878

79-
Learn more: To configure DAB and SSO integration, see [Deploy Datawiza Access Proxy With Your App](https://docs.datawiza.com/step-by-step/step3.html)
79+
Learn more: To configure DAP and SSO integration, see [Deploy Datawiza Access Proxy With Your App](https://docs.datawiza.com/step-by-step/step3.html)
8080

81-
A sample docker image `docker-compose.yml file` is provided. Sign in to the container registry to download DAB images and the header-based application.
81+
A sample docker image `docker-compose.yml file` is provided. Sign in to the container registry to download DAP images and the header-based application.
8282

8383
1. [Deploy Datawiza Access Proxy With Your App](https://docs.datawiza.com/step-by-step/step3.html#important-step).
8484

@@ -114,17 +114,17 @@ A sample docker image `docker-compose.yml file` is provided. Sign in to the cont
114114

115115
DAB gets user attributes from IdP and passes them to the application with header or cookie. After you configure user attributes, the green check sign appears for user attributes.
116116

117-
![Screenshot of passed user attributes.](./media/partner-datawiza/pass-user-attributes.png)
117+
![Screenshot of passed user attributes.](./media/partner-datawiza/pass-user-attributes-new.png)
118118

119119
Learn more: [Pass User Attributes](https://docs.datawiza.com/step-by-step/step4.html) such as email address, firstname, and lastname to the header-based application.
120120

121121
## Test the flow
122122

123123
1. Navigate to the on-premises application URL.
124-
2. The DAB redirects to the page you configured in your user flow.
124+
2. The DAP redirects to the page you configured in your user flow.
125125
3. From the list, select the IdP.
126126
4. At the prompt, enter your credentials. If necessary, include an Azure AD Multi-Factor Authentication (MFA) token.
127-
5. You're redirected to Azure AD B2C, which forwards the application request to the DAB redirect URI.
127+
5. You're redirected to Azure AD B2C, which forwards the application request to the DAP redirect URI.
128128
6. The DAB evaluates policies, calculates headers, and sends the user to the upstream application.
129129
7. The requested application appears.
130130

articles/active-directory-b2c/partner-ping-identity.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.reviewer: kengaderdus
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 12/9/2022
12+
ms.date: 01/20/2023
1313
ms.author: gasinh
1414
ms.subservice: B2C
1515
---
@@ -22,7 +22,7 @@ Many e-commerce sites and web applications exposed to the internet are deployed
2222

2323
Generally, configurations include an authentication translation layer that externalizes the authentication from the web application. Reverse proxies provide the authenticated user context to the web applications, such as a header value in clear or digest form. The applications aren't using industry standard tokens such as Security Assertion Markup Language (SAML), OAuth, or Open ID Connect (OIDC). Instead, the proxy provides authentication context and maintains the session with the end-user agent such as browser or native application. As a service running as a man-in-the-middle, proxies provide significant session control. The proxy service is efficient and scalable, not a bottleneck for applications behind the proxy service. The diagram is a reverse-proxy implementation and communications flow.
2424

25-
![Reverse proxy implementation](./media/partner-ping/reverse-proxy.png)
25+
![Diagram of the reverse proxy implementation.](./media/partner-ping/reverse-proxy.png)
2626

2727
## Modernization
2828

@@ -45,7 +45,7 @@ Proxies support the modern authentication protocols and use the redirect-based (
4545
In Azure AD B2C, you define policies that drive user experiences and behaviors, also called user journeys. Each such policy exposes a protocol endpoint that can perform the authentication as an IdP. On the application side, there's no special handling required for certain policies. An application makes a standard authentication request to the protocol-specific authentication endpoint exposed by a policy.
4646
You can configure Azure AD B2C to share the same issuer across policies or unique issuer for each policy. Each application can point to policies by making a protocol-native authentication request, which drives user behaviors such as sign-in, sign-up, and profile edits. The diagram shows OIDC and SAML application workflows.
4747

48-
![O I D C and S A M L implementation](./media/partner-ping/azure-ad-identity-provider.png)
48+
![Diagram of the OIDC and SAML application workflows.](./media/partner-ping/azure-ad-identity-provider.png)
4949

5050
The scenario can be challenging for the legacy applications to redirect the user accurately. The access request to the applications might not include the user experience context. In most cases, the proxy layer, or an integrated agent on the web application, intercepts the access request.
5151

@@ -55,27 +55,27 @@ You can deploy PingAccess as the reverse proxy. PingAccess intercepts a direct r
5555

5656
Configure PingAccess with OIDC, OAuth2, or SAML for authentication with an upstream authentication provider. You can configure an upstream IdP for this purpose on the PingAccess server. See the following diagram.
5757

58-
![PingAccess with O I D C implementation](./media/partner-ping/authorization-flow.png)
58+
![Diagram of an upstream IDP on a PingAccess server.](./media/partner-ping/authorization-flow.png)
5959

6060
In a typical Azure AD B2C deployment with policies exposing IdPs, there's a challenge. PingAccess is configured with one, upstream IdP.
6161

6262
### PingFederate federation proxy
6363

64-
You can configure PingFederate as an authentication provider, or a proxy. for upstream IdPs. See the following diagram.
64+
You can configure PingFederate as an authentication provider, or a proxy, for upstream IdPs. See the following diagram.
6565

66-
![PingFederate implementation](./media/partner-ping/pingfederate.png)
66+
![Diagram of PingFederate configured an authentication provider, or a proxy, for upstream IDPs.](./media/partner-ping/pingfederate.png)
6767

6868
Use this function to contextually, dynamically, or declaratively switch an inbound request to an Azure AD B2C policy. See the following diagram of protocol sequence flow.
6969

70-
![image shows the PingAccess and PingFederate workflow](./media/partner-ping/pingaccess-pingfederate-workflow.png)
70+
![Diagram of the protocol sequence flow for PingAccess, PingFederate, Azure AD B2C, and the applicaiton.](./media/partner-ping/pingaccess-pingfederate-workflow.png)
7171

7272
## Prerequisites
7373

7474
To get started, you'll need:
7575

7676
- An Azure subscription
7777
- If you don't have one, get an [Azure free account](https://azure.microsoft.com/free/)
78-
- An [Azure AD B2C tenant](/tutorial-create-tenant.md) linked to your Azure subscription
78+
- An [Azure AD B2C tenant](tutorial-create-tenant.md) linked to your Azure subscription
7979
- PingAccess and PingFederate deployed in Docker containers or on Azure virtual machines (VMs)
8080

8181
## Connectivity and communication
@@ -93,15 +93,15 @@ Confirm the following connectivity and communication.
9393

9494
You can use basic user flows or advanced Identity Enterprise Framework (IEF) policies. PingAccess generates the metadata endpoint, based on the issuer value, by using the [WebFinger](https://tools.ietf.org/html/rfc7033) protocol for discovery convention. To follow this convention, update the Azure AD B2C issuer using user-flow policy properties.
9595

96-
![image shows the token settings](./media/partner-ping/token-setting.png)
96+
![Screenshot of the subject sub claim URL on the Token compatibility dialog.](./media/partner-ping/token-setting.png)
9797

9898
In the advanced policies, configuration includes the IssuanceClaimPattern metadata element to AuthorityWithTfp value in the [JWT token issuer technical profile](./jwt-issuer-technical-profile.md).
9999

100100
## Configure PingAccess and PingFederate
101101

102102
Use the instructions in the following sections to configure PingAccess and PingFederate. See the following diagram of the overall integration user flow.
103103

104-
![PingAccess and PingFederate integration](./media/partner-ping/pingaccess.png)
104+
![Diagram of the PingAccess and PingFederate integration user flow](./media/partner-ping/pingaccess.png)
105105

106106
### Configure PingFederate as the token provider
107107

@@ -116,7 +116,7 @@ Use the following instructions to create a PingAccess application for the target
116116
#### Create a virtual host
117117

118118
>[!IMPORTANT]
119-
>Create a virtual host for every application. For more information, see [What can I configure with PingAccess?]([https://docs.pingidentity.com/bundle/pingaccess-43/page/reference/pa_c_KeyConsiderations.html](https://docs.pingidentity.com/bundle/pingaccess-71/page/kkj1564006722708.html).
119+
>Create a virtual host for every application. For more information, see [What can I configure with PingAccess?]([https://docs.pingidentity.com/bundle/pingaccess-43/page/reference/pa_c_KeyConsiderations.html].
120120
121121
To create a virtual host:
122122

articles/azure-functions/TOC.yml

Lines changed: 3 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,9 @@
4343
- name: Maven
4444
displayName: Java, quickstart, get started
4545
href: create-first-function-cli-java.md
46+
- name: Quarkus
47+
displayName: Java, quickstart, get started
48+
href: functions-create-first-quarkus.md
4649
- name: Spring Cloud
4750
displayName: Java, quickstart, get started
4851
href: /azure/developer/java/spring-framework/getting-started-with-spring-cloud-function-in-azure?toc=/azure/azure-functions/toc.json
@@ -405,20 +408,6 @@
405408
items:
406409
- name: Azure portal
407410
href: functions-create-function-app-portal.md
408-
- name: Command line
409-
href: ./create-first-function-cli-csharp.md
410-
- name: Visual Studio
411-
href: ./functions-create-your-first-function-visual-studio.md
412-
- name: Visual Studio Code
413-
href: ./create-first-function-vs-code-csharp.md
414-
- name: Java with Quarkus
415-
href: functions-create-first-quarkus.md
416-
- name: Java using Gradle
417-
href: functions-create-first-java-gradle.md
418-
- name: Java using Eclipse
419-
href: functions-create-maven-eclipse.md
420-
- name: Java using IntelliJ IDEA
421-
href: functions-create-maven-intellij.md
422411
- name: Kotlin using Maven
423412
href: functions-create-first-kotlin-maven.md
424413
- name: Kotlin using IntelliJ

articles/azure-resource-manager/management/move-support-resources.md

Lines changed: 19 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Move operation support by resource type
33
description: Lists the Azure resource types that can be moved to a new resource group, subscription, or region.
44
ms.topic: conceptual
5-
ms.date: 01/05/2023
5+
ms.date: 01/23/2023
66
---
77

88
# Move operation support for resources
@@ -1249,6 +1249,24 @@ Before starting your move operation, review the [checklist](./move-resource-grou
12491249
> | remoterenderingaccounts | **Yes** | **Yes** | No |
12501250
> | spatialanchorsaccounts | **Yes** | **Yes** | No |
12511251
1252+
## Microsoft.MobileNetwork
1253+
1254+
> [!div class="mx-tableFixed"]
1255+
> | Resource type | Resource group | Subscription | Region move |
1256+
> | ------------- | ----------- | ---------- | ---------- |
1257+
> | mobileNetworks | No | No | Yes<br><br>[Move your private mobile network resources to a different region](../../private-5g-core/region-move-private-mobile-network-resources.md) |
1258+
> | mobileNetworks / dataNetworks | No | No | Yes<br><br>[Move your private mobile network resources to a different region](../../private-5g-core/region-move-private-mobile-network-resources.md) |
1259+
> | mobileNetworks / simPolicies | No | No | Yes<br><br>[Move your private mobile network resources to a different region](../../private-5g-core/region-move-private-mobile-network-resources.md) |
1260+
> | mobileNetworks / sites | No | No | Yes<br><br>[Move your private mobile network resources to a different region](../../private-5g-core/region-move-private-mobile-network-resources.md) |
1261+
> | mobileNetworks / slices | No | No | Yes<br><br>[Move your private mobile network resources to a different region](../../private-5g-core/region-move-private-mobile-network-resources.md) |
1262+
> | packetCoreControlPlanes | No | No | Yes<br><br>[Move your private mobile network resources to a different region](../../private-5g-core/region-move-private-mobile-network-resources.md) |
1263+
> | packetCoreControlPlanes / packetCoreDataPlanes | No | No | Yes<br><br>[Move your private mobile network resources to a different region](../../private-5g-core/region-move-private-mobile-network-resources.md) |
1264+
> | packetCoreControlPlanes / packetCoreDataPlanes / attachedDataNetworks | No | No | Yes<br><br>[Move your private mobile network resources to a different region](../../private-5g-core/region-move-private-mobile-network-resources.md) |
1265+
> | sims | No | No | Yes<br><br>[Move your private mobile network resources to a different region](../../private-5g-core/region-move-private-mobile-network-resources.md) |
1266+
> | simGroups | No | No | Yes<br><br>[Move your private mobile network resources to a different region](../../private-5g-core/region-move-private-mobile-network-resources.md) |
1267+
> | simGroups / sims | No | No | Yes<br><br>[Move your private mobile network resources to a different region](../../private-5g-core/region-move-private-mobile-network-resources.md) |
1268+
> | packetCoreControlPlaneVersions | No | No | Yes<br><br>[Move your private mobile network resources to a different region](../../private-5g-core/region-move-private-mobile-network-resources.md) |
1269+
12521270
## Microsoft.NetApp
12531271

12541272
> [!div class="mx-tableFixed"]

0 commit comments

Comments
 (0)