Skip to content

Commit 55efd27

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into tamram23-0406
2 parents fd404db + 8673538 commit 55efd27

26 files changed

+695
-524
lines changed

articles/active-directory/app-provisioning/on-premises-scim-provisioning.md

Lines changed: 24 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -24,24 +24,37 @@ The Azure Active Directory (Azure AD) provisioning service supports a [SCIM 2.0]
2424
- Administrator role for configuring the application in the cloud (application administrator, cloud application administrator, global administrator, or a custom role with permissions).
2525
- A computer with at least 3 GB of RAM, to host a provisioning agent. The computer should have Windows Server 2016 or a later version of Windows Server, with connectivity to the target application, and with outbound connectivity to login.microsoftonline.com, other Microsoft Online Services and Azure domains. An example is a Windows Server 2016 virtual machine hosted in Azure IaaS or behind a proxy.
2626

27-
## Deploying Azure AD provisioning agent
28-
The Azure AD Provisioning agent can be deployed on the same server hosting a SCIM enabled application, or a separate server, providing it has line of sight to the application's SCIM endpoint. A single agent also supports provision to multiple applications hosted locally on the same server or separate hosts, again as long as each SCIM endpoint is reachable by the agent.
29-
30-
1. [Download](https://aka.ms/OnPremProvisioningAgent) the provisioning agent and copy it onto the virtual machine or server that your SCIM application endpoint is hosted on.
31-
2. Run the provisioning agent installer, agree to the terms of service, and select **Install**.
32-
3. Once installed, locate and launch the **AAD Connect Provisioning Agent wizard**, and when prompted for an extensions select **On-premises provisioning**
33-
4. For the agent to register itself with your tenant, provide credentials for an Azure AD admin with Hybrid administrator or global administrator permissions.
34-
5. Select **Confirm** to confirm the installation was successful.
27+
## Download, install, and configure the Azure AD Connect Provisioning Agent Package
28+
29+
If you have already downloaded the provisioning agent and configured it for another on-premises application, then continue reading in the next section.
30+
31+
1. In the Azure portal, select **Azure Active Directory**.
32+
2. On the left, select **Azure AD Connect**.
33+
3. On the left, select **Cloud sync**.
34+
35+
:::image type="content" source="../../../includes/media/active-directory-cloud-sync-how-to-install/new-ux-1.png" alt-text="Screenshot of new UX screen." lightbox="../../../includes/media/active-directory-cloud-sync-how-to-install/new-ux-1.png":::
36+
37+
4. On the left, select **Agent**.
38+
5. Select **Download on-premises agent**, and select **Accept terms & download**.
39+
40+
>[!NOTE]
41+
>Please use different provisioning agents for on-premises application provisioning and Azure AD Connect Cloud Sync / HR-driven provisioning. All three scenarios should not be managed on the same agent.
42+
43+
1. Open the provisioning agent installer, agree to the terms of service, and select **next**.
44+
1. When the provisioning agent wizard opens, continue to the **Select Extension** tab and select **On-premises application provisioning** when prompted for the extension you want to enable.
45+
1. The provisioning agent will use the operating system's web browser to display a popup window for you to authenticate to Azure AD, and potentially also your organization's identity provider. If you are using Internet Explorer as the browser on Windows Server, then you may need to add Microsoft web sites to your browser's trusted site list to allow JavaScript to run correctly.
46+
1. Provide credentials for an Azure AD administrator when you're prompted to authorize. The user is required to have the Hybrid Identity Administrator or Global Administrator role.
47+
1. Select **Confirm** to confirm the setting. Once installation is successful, you can select **Exit**, and also close the Provisioning Agent Package installer.
3548

3649
## Provisioning to SCIM-enabled application
37-
Once the agent is installed, no further configuration is necesary on-prem, and all provisioning configurations are then managed from the portal. Repeat the below steps for every on-premises application being provisioned via SCIM.
50+
Once the agent is installed, no further configuration is necessary on-premises, and all provisioning configurations are then managed from the portal. Repeat the below steps for every on-premises application being provisioned via SCIM.
3851

3952
1. In the Azure portal navigate to the Enterprise applications and add the **On-premises SCIM app** from the [gallery](../../active-directory/manage-apps/add-application-portal.md).
4053
2. From the left hand menu navigate to the **Provisioning** option and select **Get started**.
4154
3. Select **Automatic** from the dropdown list and expand the **On-Premises Connectivity** option.
4255
4. Select the agent that you installed from the dropdown list and select **Assign Agent(s)**.
4356
5. Now either wait 10 minutes or restart the **Microsoft Azure AD Connect Provisioning Agent** before proceeding to the next step & testing the connection.
44-
6. In the **Tenant URL** field, provide the SCIM endpoint URL for your application. The URL is typically unique to each target application and must be resolveable by DNS. An example for a scenario where the agent is installed on the same host as the application is https://localhost:8585/scim ![Screenshot that shows assigning an agent.](./media/on-premises-scim-provisioning/scim-2.png)
57+
6. In the **Tenant URL** field, provide the SCIM endpoint URL for your application. The URL is typically unique to each target application and must be resolvable by DNS. An example for a scenario where the agent is installed on the same host as the application is https://localhost:8585/scim ![Screenshot that shows assigning an agent.](./media/on-premises-scim-provisioning/scim-2.png)
4558
7. Select **Test Connection**, and save the credentials. The application SCIM endpoint must be actively listening for inbound provisioning requests, otherwise the test will fail. Use the steps [here](on-premises-ecma-troubleshoot.md#troubleshoot-test-connection-issues) if you run into connectivity issues.
4659
>[!NOTE]
4760
> If the test connection fails, you will see the request made. Please note that while the URL in the test connection error message is truncated, the actual request sent to the aplication contains the entire URL provided above.
@@ -53,7 +66,7 @@ Once the agent is installed, no further configuration is necesary on-prem, and a
5366
12. Go to the **Provisioning** pane, and select **Start provisioning**.
5467
13. Monitor using the [provisioning logs](../../active-directory/reports-monitoring/concept-provisioning-logs.md).
5568

56-
The following video provides an overview of on-premises provisoning.
69+
The following video provides an overview of on-premises provisioning.
5770
> [!VIDEO https://www.youtube.com/embed/QdfdpaFolys]
5871
5972
## Additional requirements

articles/active-directory/enterprise-users/licensing-groups-migrate-users.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ The most important thing to keep in mind is that you should avoid a situation wh
4444

4545
1. Verify that no license assignments failed by checking each group for users in error state. For more information, see [Identifying and resolving license problems for a group](licensing-groups-resolve-problems.md).
4646

47-
Consider removing the original direct assignments. We recommend that you do it gradually, and monitor the outcome on a subset of users first. If you could leave the original direct assignments on users, but when the users leave their licensed groups they retain the directly assigned licenses, which might not be what you want.
47+
Consider removing the original direct assignments. We recommend that you do it gradually, and monitor the outcome on a subset of users first. You could leave the original direct assignments on users, but when the users leave their licensed groups they retain the directly assigned licenses, which might not be what you want.
4848

4949
## An example
5050

articles/aks/open-service-mesh-about.md

Lines changed: 29 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -1,72 +1,71 @@
11
---
2-
title: Open Service Mesh
3-
description: Open Service Mesh (OSM) in Azure Kubernetes Service (AKS)
2+
title: Open Service Mesh in Azure Kubernetes Service (AKS)
3+
description: Learn about the Open Service Mesh (OSM) add-on in Azure Kubernetes Service (AKS).
44
ms.topic: article
5-
ms.date: 12/20/2021
5+
ms.date: 04/06/2023
66
ms.author: pgibson
77
---
88

9-
# Open Service Mesh AKS add-on
9+
# Open Service Mesh (OSM) add-on in Azure Kubernetes Service (OSM)
1010

11-
[Open Service Mesh (OSM)](https://docs.openservicemesh.io/) is a lightweight, extensible, cloud native service mesh that allows users to uniformly manage, secure, and get out-of-the-box observability features for highly dynamic microservice environments.
11+
[Open Service Mesh (OSM)](https://docs.openservicemesh.io/) is a lightweight, extensible, cloud native service mesh that allows you to uniformly manage, secure, and get out-of-the-box observability features for highly dynamic microservice environments.
1212

13-
OSM runs an Envoy-based control plane on Kubernetes and can be configured with [SMI](https://smi-spec.io/) APIs. OSM works by injecting an Envoy proxy as a sidecar container with each instance of your application. The Envoy proxy contains and executes rules around access control policies, implements routing configuration, and captures metrics. The control plane continually configures the Envoy proxies to ensure policies and routing rules are up to date and ensures proxies are healthy.
13+
OSM runs an Envoy-based control plane on Kubernetes and can be configured with [SMI](https://smi-spec.io/) APIs. OSM works by injecting an Envoy proxy as a sidecar container with each instance of your application. The Envoy proxy contains and executes rules around access control policies, implements routing configuration, and captures metrics. The control plane continually configures the Envoy proxies to ensure policies and routing rules are up to date and proxies are healthy.
1414

15-
The OSM project was originated by Microsoft and has since been donated and is governed by the [Cloud Native Computing Foundation (CNCF)](https://www.cncf.io/).
15+
Microsoft started the OSM project, but it's now governed by the [Cloud Native Computing Foundation (CNCF)](https://www.cncf.io/).
1616

17-
## Installation and version
17+
## Enable the OSM add-on
1818

19-
OSM can be added to your Azure Kubernetes Service (AKS) cluster by enabling the OSM add-on using the [Azure CLI][osm-azure-cli] or a [Bicep template][osm-bicep]. The OSM add-on provides a fully supported installation of OSM that is integrated with AKS.
19+
OSM can be added to your Azure Kubernetes Service (AKS) cluster by enabling the OSM add-on using the [Azure CLI][osm-azure-cli] or a [Bicep template][osm-bicep]. The OSM add-on provides a fully supported installation of OSM that's integrated with AKS.
2020

2121
> [!IMPORTANT]
22-
> Based on the version of Kubernetes your cluster is running, the OSM add-on installs a different version of OSM:
23-
> - If your cluster is running Kubernetes version 1.24.0 or greater, the OSM add-on installs version *1.2.3* of OSM.
24-
> - If your cluster is running a version of Kubernetes between 1.23.5 and 1.24.0, the OSM add-on installs version *1.1.3* of OSM.
25-
> - If your cluster is running a version of Kubernetes below 1.23.5, the OSM add-on installs version *1.0.0* of OSM.
22+
> Based on the version of Kubernetes your cluster is running, the OSM add-on installs a different version of OSM.
23+
>
24+
> |Kubernetes version | OSM version installed |
25+
> |---------------------------|-----------------------|
26+
> | 1.24.0 or greater | 1.2.3 |
27+
> | Between 1.23.5 and 1.24.0 | 1.1.3 |
28+
> | Below 1.23.5 | 1.0.0 |
2629
2730
## Capabilities and features
2831

2932
OSM provides the following capabilities and features:
3033

31-
- Secure service to service communication by enabling mutual TLS (mTLS).
34+
- Secure service-to-service communication by enabling mutual TLS (mTLS).
3235
- Onboard applications onto the OSM mesh using automatic sidecar injection of Envoy proxy.
3336
- Transparently configure traffic shifting on deployments.
34-
- Define and execute fine grained access control policies for services.
37+
- Define and execute fine-grained access control policies for services.
3538
- Monitor and debug services using observability and insights into application metrics.
36-
- Integrate with external certificate management.
37-
- Integrates with existing ingress solutions such as [NGINX][nginx], [Contour][contour], and [Web Application Routing][web-app-routing]. For more details on how ingress works with OSM, see [Using Ingress to manage external access to services within the cluster][osm-ingress]. For an example on integrating OSM with Contour for ingress, see [Ingress with Contour][osm-contour]. For an example on integrating OSM with ingress controllers that use the `networking.k8s.io/v1` API, such as NGINX, see [Ingress with Kubernetes Nginx Ingress Controller][osm-nginx]. For more details on using Web Application Routing, which automatically integrates with OSM, see [Web Application Routing][web-app-routing].
38-
39-
## Example scenarios
40-
41-
OSM can be used to help your AKS deployments in many different ways. For example:
42-
4339
- Encrypt communications between service endpoints deployed in the cluster.
4440
- Enable traffic authorization of both HTTP/HTTPS and TCP traffic.
4541
- Configure weighted traffic controls between two or more services for A/B testing or canary deployments.
4642
- Collect and view KPIs from application traffic.
43+
- Integrate with external certificate management.
44+
- Integrate with existing ingress solutions such as [NGINX][nginx], [Contour][contour], and [Web Application Routing][web-app-routing].
45+
46+
For more information on ingress and OSM, see [Using ingress to manage external access to services within the cluster][osm-ingress] and [Integrate OSM with Contour for ingress][osm-contour]. For an example of how to integrate OSM with ingress controllers using the `networking.k8s.io/v1` API, see [Ingress with Kubernetes Nginx ingress controller][osm-nginx]. For more information on using Web Application Routing, which automatically integrates with OSM, see [Web Application Routing][web-app-routing].
4747

48-
## Add-on limitations
48+
## Limitations
4949

5050
The OSM AKS add-on has the following limitations:
5151

52-
* [Iptables redirection][ip-tables-redirection] for port IP address and port range exclusion must be enabled using `kubectl patch` after installation. For more details, see [iptables redirection][ip-tables-redirection].
53-
* Pods that are onboarded to the mesh that need access to IMDS, Azure DNS, or the Kubernetes API server must have their IP addresses to the global list of excluded outbound IP ranges using [Global outbound IP range exclusions][global-exclusion].
54-
* At this time, OSM does not support Windows Server containers.
52+
- After installation, you must enable Iptables redirection for port IP address and port range exclusion using `kubectl patch`. For more information, see [iptables redirection][ip-tables-redirection].
53+
- Any pods that need access to IMDS, Azure DNS, or the Kubernetes API server must have their IP addresses added to the global list of excluded outbound IP ranges using [Global outbound IP range exclusions][global-exclusion].
54+
- OSM doesn't support Windows Server containers.
5555

5656
## Next steps
5757

5858
After enabling the OSM add-on using the [Azure CLI][osm-azure-cli] or a [Bicep template][osm-bicep], you can:
59-
* [Deploy a sample application][osm-deploy-sample-app]
60-
* [Onboard an existing application][osm-onboard-app]
59+
60+
- [Deploy a sample application][osm-deploy-sample-app]
61+
- [Onboard an existing application][osm-onboard-app]
6162

6263
[ip-tables-redirection]: https://release-v1-2.docs.openservicemesh.io/docs/guides/traffic_management/iptables_redirection/
6364
[global-exclusion]: https://release-v1-2.docs.openservicemesh.io/docs/guides/traffic_management/iptables_redirection/#global-outbound-ip-range-exclusions
6465
[osm-azure-cli]: open-service-mesh-deploy-addon-az-cli.md
6566
[osm-bicep]: open-service-mesh-deploy-addon-bicep.md
6667
[osm-deploy-sample-app]: https://release-v1-2.docs.openservicemesh.io/docs/getting_started/install_apps/
6768
[osm-onboard-app]: https://release-v1-2.docs.openservicemesh.io/docs/guides/app_onboarding/
68-
[ip-tables-redirection]: https://docs.openservicemesh.io/docs/guides/traffic_management/iptables_redirection/
69-
[global-exclusion]: https://docs.openservicemesh.io/docs/guides/traffic_management/iptables_redirection/#global-outbound-ip-range-exclusions
7069
[nginx]: https://github.com/kubernetes/ingress-nginx
7170
[contour]: https://projectcontour.io/
7271
[osm-ingress]: https://release-v1-2.docs.openservicemesh.io/docs/guides/traffic_management/ingress/

0 commit comments

Comments
 (0)