Skip to content

Commit 4c36fc9

Browse files
committed
Merge branch 'main' into release-migrate-new-structure
2 parents 17b042c + ddb8cf7 commit 4c36fc9

File tree

61 files changed

+502
-144
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

61 files changed

+502
-144
lines changed

articles/application-gateway/tutorial-ingress-controller-add-on-existing.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -57,6 +57,9 @@ To configure more parameters for the above command, see [az aks create](/cli/azu
5757
>[!NOTE]
5858
>If you are planning on using AGIC with an AKS cluster using CNI Overlay, specify the parameter `--aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/AppGatewayWithOverlayPreview` to configure AGIC to handle connectivity to the CNI Overlay enabled cluster.
5959
60+
>[!WARNING]
61+
>This document assumes Azure CNI is installed in the AKS cluster. If you are planning on using CNI Overlay, you must ensure Application Gateway and the AKS cluster are part of the same virtual network.
62+
6063
## Deploy a new application gateway
6164

6265
You'll now deploy a new application gateway, to simulate having an existing application gateway that you want to use to load balance traffic to your AKS cluster, **myCluster**. The name of the application gateway will be **myApplicationGateway**, but you'll need to first create a public IP resource, named **myPublicIp**, and a new virtual network called **myVnet** with address space 10.0.0.0/16, and a subnet with address space 10.0.0.0/24 called **mySubnet**, and deploy your application gateway in **mySubnet** using **myPublicIp**.

articles/azure-functions/functions-bindings-signalr-service-input.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -149,7 +149,7 @@ The following table explains the properties of the `SignalRConnectionInfoInput`
149149
|**HubName**| Required. The hub name. |
150150
|**ConnectionStringSetting**| The name of the app setting or settings collection that contains the SignalR Service connection string, which defaults to `AzureSignalRConnectionString`. |
151151
|**UserId**| Optional. The user identifier of a SignalR connection. You can use a [binding expression](#binding-expressions-for-http-trigger) to bind the value to an HTTP request header or query. |
152-
|**IdToken**| Optional. A JWT token whose claims will be added to the user claims. It should be used together with **ClaimTypeList**. You can use a [binding expression](#binding-expressions-for-http-trigger) to bind the value to an HTTP request header or query. |
152+
|**IdToken**| Optional. A JWT whose claims will be added to the user claims. It should be used together with **ClaimTypeList**. You can use a [binding expression](#binding-expressions-for-http-trigger) to bind the value to an HTTP request header or query. |
153153
|**ClaimTypeList**| Optional. A list of claim types, which filter the claims in **IdToken** . |
154154

155155
# [In-process model](#tab/in-process)
@@ -161,7 +161,7 @@ The following table explains the properties of the `SignalRConnectionInfo` attri
161161
|**HubName**| Required. The hub name. |
162162
|**ConnectionStringSetting**| The name of the app setting or settings collection that contains the SignalR Service connection string, which defaults to `AzureSignalRConnectionString`. |
163163
|**UserId**| Optional. The user identifier of a SignalR connection. You can use a [binding expression](#binding-expressions-for-http-trigger) to bind the value to an HTTP request header or query. |
164-
|**IdToken**| Optional. A JWT token whose claims will be added to the user claims. It should be used together with **ClaimTypeList**. You can use a [binding expression](#binding-expressions-for-http-trigger) to bind the value to an HTTP request header or query. |
164+
|**IdToken**| Optional. A JWT whose claims will be added to the user claims. It should be used together with **ClaimTypeList**. You can use a [binding expression](#binding-expressions-for-http-trigger) to bind the value to an HTTP request header or query. |
165165
|**ClaimTypeList**| Optional. A list of claim types, which filter the claims in **IdToken** . |
166166

167167
---
@@ -179,7 +179,7 @@ The following table explains the supported settings for the `SignalRConnectionIn
179179
|**hubName**| Required. The hub name. |
180180
|**connectionStringSetting**| The name of the app setting or settings collection that contains the SignalR Service connection string, which defaults to `AzureSignalRConnectionString`. |
181181
|**userId**| Optional. The user identifier of a SignalR connection. You can use a [binding expression](#binding-expressions-for-http-trigger) to bind the value to an HTTP request header or query. |
182-
|**idToken**| Optional. A JWT token whose claims will be added to the user claims. It should be used together with **claimTypeList**. You can use a [binding expression](#binding-expressions-for-http-trigger) to bind the value to an HTTP request header or query. |
182+
|**idToken**| Optional. A JWT whose claims will be added to the user claims. It should be used together with **claimTypeList**. You can use a [binding expression](#binding-expressions-for-http-trigger) to bind the value to an HTTP request header or query. |
183183
|**claimTypeList**| Optional. A list of claim types, which filter the claims in **idToken** . |
184184

185185
::: zone-end
@@ -196,7 +196,7 @@ The following table explains the supported settings for the `SignalRConnectionIn
196196
|**hubName**| Required. The hub name. |
197197
|**connectionStringSetting**| The name of the app setting or settings collection that contains the SignalR Service connection string, which defaults to `AzureSignalRConnectionString`. |
198198
|**userId**| Optional. The user identifier of a SignalR connection. You can use a [binding expression](#binding-expressions-for-http-trigger) to bind the value to an HTTP request header or query. |
199-
|**idToken**| Optional. A JWT token whose claims will be added to the user claims. It should be used together with **claimTypeList**. You can use a [binding expression](#binding-expressions-for-http-trigger) to bind the value to an HTTP request header or query. |
199+
|**idToken**| Optional. A JWT whose claims will be added to the user claims. It should be used together with **claimTypeList**. You can use a [binding expression](#binding-expressions-for-http-trigger) to bind the value to an HTTP request header or query. |
200200
|**claimTypeList**| Optional. A list of claim types, which filter the claims in **idToken** . |
201201

202202
::: zone-end
@@ -213,7 +213,7 @@ The following table explains the binding configuration properties that you set i
213213
|**hubName**| Required. The hub name. |
214214
|**connectionStringSetting**| The name of the app setting or settings collection that contains the SignalR Service connection string, which defaults to `AzureSignalRConnectionString`. |
215215
|**userId**| Optional. The user identifier of a SignalR connection. You can use a [binding expression](#binding-expressions-for-http-trigger) to bind the value to an HTTP request header or query. |
216-
|**idToken**| Optional. A JWT token whose claims will be added to the user claims. It should be used together with **claimTypeList**. You can use a [binding expression](#binding-expressions-for-http-trigger) to bind the value to an HTTP request header or query. |
216+
|**idToken**| Optional. A JWT whose claims will be added to the user claims. It should be used together with **claimTypeList**. You can use a [binding expression](#binding-expressions-for-http-trigger) to bind the value to an HTTP request header or query. |
217217
|**claimTypeList**| Optional. A list of claim types, which filter the claims in **idToken** . |
218218

219219
::: zone-end

articles/azure-resource-manager/templates/deployment-script-template.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -61,6 +61,9 @@ For deployment script API version 2020-10-01 or later, there are two principals
6161
"Microsoft.Resources/deployments/*",
6262
"Microsoft.Resources/deploymentScripts/*"
6363
],
64+
"dataActions": [
65+
"Microsoft.Storage/storageAccounts/fileServices/*"
66+
]
6467
}
6568
],
6669
"assignableScopes": [

articles/azure-vmware/configure-azure-native-pure-storage-cloud.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Pure Storage manages onboarding of Azure Native Pure Storage Cloud for Azure VMw
2525

2626
For more information, see the following resources:
2727

28-
- [Azure Native Pure Storage Cloud - Overview](https://learn.microsoft.com/azure/partner-solutions/pure-storage/overview)
28+
- [Azure Native Pure Storage Cloud - Overview](/azure/partner-solutions/pure-storage/overview)
2929
- [Azure Native Pure Storage Cloud - Deployment Guide](https://support.purestorage.com/bundle/m_azure_native_pure_storage_cloud/page/Production/Pure_Cloud_Block_Store/Azure_Native_Pure_Storage_Cloud/deployment/c_psc_deployment.html)
3030
- [Azure Native Pure Storage Cloud - Management Guide](https://support.purestorage.com/bundle/m_azure_native_pure_storage_cloud/page/Production/Pure_Cloud_Block_Store/Azure_Native_Pure_Storage_Cloud/management/c_psc_management.html)
3131
- [Azure Native Pure Storage Cloud - Troubleshooting Guide](https://support.purestorage.com/bundle/m_azure_native_pure_storage_cloud/page/Production/Pure_Cloud_Block_Store/Azure_Native_Pure_Storage_Cloud/troubleshooting/c_troubleshooting.html)

articles/azure-web-pubsub/policy-definitions.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22
title: Built-in policy definitions for Azure Web PubSub
33
description: Lists Azure Policy built-in policy definitions for Azure Web PubSub. These built-in policy definitions provide common approaches to managing your Azure resources.
4-
author: cebundy
5-
ms.author: v-catherbund
4+
author: yjin81
5+
ms.author: yajin1
66
ms.date: 01/03/2022
77
ms.topic: reference
88
ms.service: azure-web-pubsub
@@ -27,4 +27,4 @@ the link in the **Version** column to view the source on the
2727

2828
- See the built-ins on the [Azure Policy GitHub repo](https://github.com/Azure/azure-policy).
2929
- Review the [Azure Policy definition structure](../governance/policy/concepts/definition-structure.md).
30-
- Review [Understanding policy effects](../governance/policy/concepts/effects.md).
30+
- Review [Understanding policy effects](../governance/policy/concepts/effects.md).

articles/communication-services/how-tos/call-automation/includes/secure-webhook-endpoint-java.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,9 +35,9 @@ Each mid-call webhook callback sent by Call Automation uses a signed JSON Web To
3535
```
3636

3737
4. Configure your application to validate the JWT and the configuration of your Azure Communication Services resource. You need the `audience` values as it is present in the JWT payload.
38-
5. Validate the issuer, audience and the JWT token.
38+
5. Validate the issuer, audience and the JWT.
3939
- The audience is your Azure Communication Services resource ID you used to set up your Call Automation client. Refer [here](../../../quickstarts/voice-video-calling/get-resource-id.md) about how to get it.
40-
- The JSON Web Key Set (JWKS) endpoint in the OpenId configuration contains the keys used to validate the JWT token. When the signature is valid and the token hasn't expired (within 5 minutes of generation), the client can use the token for authorization.
40+
- The JSON Web Key Set (JWKS) endpoint in the OpenId configuration contains the keys used to validate the JWT. When the signature is valid and the token hasn't expired (within 5 minutes of generation), the client can use the token for authorization.
4141

4242
This sample code demonstrates how to configure OIDC client to validate webhook payload using JWT
4343

articles/communication-services/how-tos/call-automation/includes/secure-webhook-endpoint-javascript.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,9 +26,9 @@ npm install express jwks-rsa jsonwebtoken
2626
```
2727

2828
3. Configure your application to validate the JWT and the configuration of your Azure Communication Services resource. You need the `audience` values as it is present in the JWT payload.
29-
4. Validate the issuer, audience and the JWT token.
29+
4. Validate the issuer, audience and the JWT.
3030
- The audience is your Azure Communication Services resource ID you used to set up your Call Automation client. Refer [here](../../../quickstarts/voice-video-calling/get-resource-id.md) about how to get it.
31-
- The JSON Web Key Set (JWKS) endpoint in the OpenId configuration contains the keys used to validate the JWT token. When the signature is valid and the token hasn't expired (within 5 minutes of generation), the client can use the token for authorization.
31+
- The JSON Web Key Set (JWKS) endpoint in the OpenId configuration contains the keys used to validate the JWT. When the signature is valid and the token hasn't expired (within 5 minutes of generation), the client can use the token for authorization.
3232

3333
This sample code demonstrates how to configure OIDC client to validate webhook payload using JWT
3434

articles/communication-services/how-tos/call-automation/includes/secure-webhook-endpoint-python.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,9 +25,9 @@ pip install flask pyjwt
2525
```
2626

2727
3. Configure your application to validate the JWT and the configuration of your Azure Communication Services resource. You need the `audience` values as it is present in the JWT payload.
28-
4. Validate the issuer, audience and the JWT token.
28+
4. Validate the issuer, audience and the JWT.
2929
- The audience is your Azure Communication Services resource ID you used to set up your Call Automation client. Refer [here](../../../quickstarts/voice-video-calling/get-resource-id.md) about how to get it.
30-
- The JSON Web Key Set (JWKS) endpoint in the OpenId configuration contains the keys used to validate the JWT token. When the signature is valid and the token hasn't expired (within 5 minutes of generation), the client can use the token for authorization.
30+
- The JSON Web Key Set (JWKS) endpoint in the OpenId configuration contains the keys used to validate the JWT. When the signature is valid and the token hasn't expired (within 5 minutes of generation), the client can use the token for authorization.
3131

3232
This sample code demonstrates how to configure OIDC client to validate webhook payload using JWT
3333

articles/confidential-computing/skr-flow-confidential-vm-sev-snp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -689,7 +689,7 @@ $cert | Format-List *
689689
# Subject : CN=vault.azure.net, O=Microsoft Corporation, L=Redmond, S=WA, C=US
690690
```
691691

692-
The response's JWT token body looks incredibly similar to the response that you get when invoking the `get` key operation. However, the `release` operation includes the `key_hsm` property, amongst other things.
692+
The response's JWT body looks incredibly similar to the response that you get when invoking the `get` key operation. However, the `release` operation includes the `key_hsm` property, amongst other things.
693693
694694
```json
695695
{

articles/cost-management-billing/costs/understand-work-scopes.md

Lines changed: 32 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -46,10 +46,10 @@ Azure supports three scopes for resource management. Each scope supports managin
4646

4747
Resource type: [Microsoft.Resources/subscriptions](/rest/api/resources/subscriptions)
4848

49-
- [**Resource groups**](../../azure-resource-manager/management/overview.md#resource-groups) - Logical groupings of related resources for an Azure solution that share the same lifecycle. For example resources that are deployed and deleted together.
49+
- **[Resource groups](../../azure-resource-manager/management/overview.md#resource-groups)** - Logical groupings of related resources for an Azure solution that share the same lifecycle. For example resources that are deployed and deleted together.
5050

5151
Resource type: [Microsoft.Resources/subscriptions/resourceGroups](/rest/api/resources/resourcegroups)
52-
52+
5353
Management groups allow you to organize subscriptions into a hierarchy. For example, you might create a logical organization hierarchy using management groups. Then, give teams subscriptions for production and dev/test workloads. And then create resource groups in the subscriptions to manage each subsystem or component.
5454

5555
Creating an organizational hierarchy allows cost and policy compliance to roll up organizationally. Then, each leader can view and analyze their current costs. And then they can create budgets to curb bad spending patterns and optimize costs with Advisor recommendations at the lowest level.
@@ -78,6 +78,36 @@ Management groups are only supported if they contain up to 3,000 Enterprise Agre
7878

7979
If you have a mix of subscriptions, move the unsupported subscriptions to a separate arm of the management group hierarchy to enable Cost Management for the supported subscriptions. As an example, create two management groups under the root management group: **Microsoft Entra ID** and **My Org**. Move your Microsoft Entra subscription to the **Microsoft Entra ID** management group and then view and manage costs using the **My Org** management group.
8080

81+
### Managed resource groups
82+
83+
Managed resource groups created by certain resource providers - such as Azure Red Hat OpenShift (ARO) or Azure Databricks - can't be used as scopes for Cost Management features like budgets or exports. These resource groups typically include deny assignments that restrict modifications to protect critical resources, which can result in authorization errors. For more information on deny assignments, please refer to [List Azure deny assignments](/azure/role-based-access-control/deny-assignments?tabs=azure-portal).
84+
85+
To avoid these issues, use a higher-level scope such as the subscription scope which contains this managed resource group when configuring budgets or exports.
86+
87+
#### Required permissions for exports at RBAC scope
88+
89+
- Microsoft.CostManagement/exports/Read – View exports
90+
91+
- Microsoft.CostManagement/exports/Write – Create or update exports
92+
93+
- Microsoft.CostManagement/exports/Delete – Delete exports
94+
95+
- Microsoft.CostManagement/exports/Action – Run export
96+
97+
*Note: Deny assignments can result in permission errors, so please check even with these permissions if there are any deny assignments at this scope.*
98+
99+
#### Required permissions for budgets at RBAC scope
100+
101+
- Microsoft.Consumption/budgets/Read – View budgets
102+
103+
- Microsoft.Consumption/budgets/Write – Create or update budgets
104+
105+
- Microsoft.Consumption/budgets/Delete – Delete budgets
106+
107+
- (Optional) Microsoft.Insights/actionGroups/Read – If action groups are configured for alerts
108+
109+
*Note: Deny assignments can result in permission errors, so please check even with these permissions if there are any deny assignments at this scope.*
110+
81111
### Feature behavior for each role
82112

83113
The following table shows how Cost Management features are used by each role. The following behavior is applicable to all Azure RBAC scopes.

0 commit comments

Comments
 (0)