You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
From the **Renew group** notification email, group owners can directly access the group details page in the Access Panel. There, the users can get more information about the group such as its description, when it was last renewed, when it will expire, and also the ability to renew the group. The group details page now also includes links to the Office 365 group resources, so that the group owner can conveniently view the content and activity in their group.
98
+
From the **Renew group** notification email, group owners can directly access the group details page in the [Access Panel](https://account.activedirectory.windowsazure.com/r#/applications). There, the users can get more information about the group such as its description, when it was last renewed, when it will expire, and also the ability to renew the group. The group details page now also includes links to the Office 365 group resources, so that the group owner can conveniently view the content and activity in their group.
99
99
100
100
When a group expires, the group is deleted one day after the expiration date. An email notification such as this one is sent to the Office 365 group owners informing them about the expiration and subsequent deletion of their Office 365 group.
Copy file name to clipboardExpand all lines: articles/active-directory/users-groups-roles/groups-settings-cmdlets.md
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
9
9
ms.workload: identity
10
10
ms.subservice: users-groups-roles
11
11
ms.topic: article
12
-
ms.date: 02/28/2020
12
+
ms.date: 03/20/2020
13
13
ms.author: curtand
14
14
ms.reviewer: krbain
15
15
ms.custom: it-pro
@@ -144,19 +144,19 @@ Here are the settings defined in the Group.Unified SettingsTemplate. Unless othe
144
144
|**Setting**|**Description**|
145
145
| --- | --- |
146
146
| <ul><li>EnableGroupCreation<li>Type: Boolean<li>Default: True |The flag indicating whether Office 365 group creation is allowed in the directory by non-admin users. This setting does not require an Azure Active Directory Premium P1 license.|
147
-
| <ul><li>GroupCreationAllowedGroupId<li>Type: String<li>Default: “”|GUID of the security group for which the members are allowed to create Office 365 groups even when EnableGroupCreation == false. |
148
-
| <ul><li>UsageGuidelinesUrl<li>Type: String<li>Default: “”|A link to the Group Usage Guidelines. |
149
-
| <ul><li>ClassificationDescriptions<li>Type: String<li>Default: “”| A comma-delimited list of classification descriptions. The value of ClassificationDescriptions is only valid in this format:<br>$setting[“ClassificationDescriptions”] ="Classification:Description,Classification:Description"<br>where Classification matches an entry in the ClassificationList.<br>This setting does not apply when EnableMIPLabels == True.|
150
-
| <ul><li>DefaultClassification<li>Type: String<li>Default: “”| The classification that is to be used as the default classification for a group if none was specified.<br>This setting does not apply when EnableMIPLabels == True.|
151
-
| <ul><li>PrefixSuffixNamingRequirement<li>Type: String<li>Default: “”| String of a maximum length of 64 characters that defines the naming convention configured for Office 365 groups. For more information, see [Enforce a naming policy for Office 365 groups](groups-naming-policy.md). |
152
-
| <ul><li>CustomBlockedWordsList<li>Type: String<li>Default: “”| Comma-separated string of phrases that users will not be permitted to use in group names or aliases. For more information, see [Enforce a naming policy for Office 365 groups](groups-naming-policy.md). |
153
-
| <ul><li>EnableMSStandardBlockedWords<li>Type: Boolean<li>Default: “False” | Do not use
147
+
| <ul><li>GroupCreationAllowedGroupId<li>Type: String<li>Default: ""|GUID of the security group for which the members are allowed to create Office 365 groups even when EnableGroupCreation == false. |
148
+
| <ul><li>UsageGuidelinesUrl<li>Type: String<li>Default: ""|A link to the Group Usage Guidelines. |
149
+
| <ul><li>ClassificationDescriptions<li>Type: String<li>Default: ""| A comma-delimited list of classification descriptions. The value of ClassificationDescriptions is only valid in this format:<br>$setting["ClassificationDescriptions"] ="Classification:Description,Classification:Description"<br>where Classification matches an entry in the ClassificationList.<br>This setting does not apply when EnableMIPLabels == True.|
150
+
| <ul><li>DefaultClassification<li>Type: String<li>Default: ""| The classification that is to be used as the default classification for a group if none was specified.<br>This setting does not apply when EnableMIPLabels == True.|
151
+
| <ul><li>PrefixSuffixNamingRequirement<li>Type: String<li>Default: ""| String of a maximum length of 64 characters that defines the naming convention configured for Office 365 groups. For more information, see [Enforce a naming policy for Office 365 groups](groups-naming-policy.md). |
152
+
| <ul><li>CustomBlockedWordsList<li>Type: String<li>Default: ""| Comma-separated string of phrases that users will not be permitted to use in group names or aliases. For more information, see [Enforce a naming policy for Office 365 groups](groups-naming-policy.md). |
153
+
| <ul><li>EnableMSStandardBlockedWords<li>Type: Boolean<li>Default: "False" | Do not use
154
154
| <ul><li>AllowGuestsToBeGroupOwner<li>Type: Boolean<li>Default: False | Boolean indicating whether or not a guest user can be an owner of groups. |
155
155
| <ul><li>AllowGuestsToAccessGroups<li>Type: Boolean<li>Default: True | Boolean indicating whether or not a guest user can have access to Office 365 groups content. This setting does not require an Azure Active Directory Premium P1 license.|
156
-
| <ul><li>GuestUsageGuidelinesUrl<li>Type: String<li>Default: “”| The url of a link to the guest usage guidelines. |
157
-
| <ul><li>AllowToAddGuests<li>Type: Boolean<li>Default: True | A boolean indicating whether or not is allowed to add guests to this directory. <br>This setting may be overridden and become read-only if *EnableMIPLabels* is set to *True* and a guest policy is associated with the sensitivity label assigned to the group. |
158
-
| <ul><li>ClassificationList<li>Type: String<li>Default: “”| A comma-delimited list of valid classification values that can be applied to Office 365 Groups. <br>This setting does not apply when EnableMIPLabels == True.|
159
-
| <ul><li>EnableMIPLabels<li>Type: Boolean<li>Default: “False”|The flag indicating whether sensitivity labels published in Microsoft 365 Compliance Center can be applied to Office 365 Groups. For more information, see [Assign Sensitivity Labels for Office 365 groups](groups-assign-sensitivity-labels.md). |
156
+
| <ul><li>GuestUsageGuidelinesUrl<li>Type: String<li>Default: ""| The url of a link to the guest usage guidelines. |
157
+
| <ul><li>AllowToAddGuests<li>Type: Boolean<li>Default: True | A boolean indicating whether or not is allowed to add guests to this directory. <br>This setting may be overridden and become read-only if *EnableMIPLabels* is set to *True* and a guest policy is associated with the sensitivity label assigned to the group.<br>If the AllowToAddGuests setting is set to False at the tenant level, any AllowToAddGuests setting at the group level is ignored. If you want to enable guest access for only a few groups, you must set AllowToAddGuests to be true at the tenant level, and then selectively disable it for specific groups.|
158
+
| <ul><li>ClassificationList<li>Type: String<li>Default: ""| A comma-delimited list of valid classification values that can be applied to Office 365 Groups. <br>This setting does not apply when EnableMIPLabels == True.|
159
+
| <ul><li>EnableMIPLabels<li>Type: Boolean<li>Default: "False"|The flag indicating whether sensitivity labels published in Microsoft 365 Compliance Center can be applied to Office 365 Groups. For more information, see [Assign Sensitivity Labels for Office 365 groups](groups-assign-sensitivity-labels.md). |
160
160
161
161
## Example: Configure Guest policy for groups at the directory level
Copy file name to clipboardExpand all lines: articles/aks/azure-disk-volume.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ You also need the Azure CLI version 2.0.59 or later installed and configured. Ru
26
26
27
27
## Create an Azure disk
28
28
29
-
When you create an Azure disk for use with AKS, you can create the disk resource in the **node** resource group. This approach allows the AKS cluster to access and manage the disk resource. If you instead create the disk in a separate resource group, you must grant the Azure Kubernetes Service (AKS) service principal for your cluster the `Contributor` role to the disk's resource group.
29
+
When you create an Azure disk for use with AKS, you can create the disk resource in the **node** resource group. This approach allows the AKS cluster to access and manage the disk resource. If you instead create the disk in a separate resource group, you must grant the Azure Kubernetes Service (AKS) service principal for your cluster the `Contributor` role to the disk's resource group. Alternatively, you can use the system assigned managed identity for permissions instead of the service principal. For more information, see [Use managed identities](use-managed-identity.md).
30
30
31
31
For this article, create the disk in the node resource group. First, get the resource group name with the [az aks show][az-aks-show] command and add the `--query nodeResourceGroup` query parameter. The following example gets the node resource group for the AKS cluster name *myAKSCluster* in the resource group name *myResourceGroup*:
Copy file name to clipboardExpand all lines: articles/aks/configure-azure-cni.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,6 +22,7 @@ This article shows you how to use *Azure CNI* networking to create and use a vir
22
22
* The service principal used by the AKS cluster must have at least [Network Contributor](../role-based-access-control/built-in-roles.md#network-contributor) permissions on the subnet within your virtual network. If you wish to define a [custom role](../role-based-access-control/custom-roles.md) instead of using the built-in Network Contributor role, the following permissions are required:
* Instead of a service principal, you can use the system assigned managed identity for permissions. For more information, see [Use managed identities](use-managed-identity.md).
Copy file name to clipboardExpand all lines: articles/aks/index.yml
+1Lines changed: 1 addition & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -4,6 +4,7 @@ title: Azure Kubernetes Service (AKS)
4
4
metadata:
5
5
title: Azure Kubernetes Service (AKS) Documentation - Tutorials, API Reference | Microsoft Docs
6
6
meta.description: AKS allows you to quickly deploy a production ready Kubernetes cluster in Azure. Learn how to use AKS with these quickstarts, tutorials, and samples.
7
+
description: AKS allows you to quickly deploy a production ready Kubernetes cluster in Azure. Learn how to use AKS with these quickstarts, tutorials, and samples.
Copy file name to clipboardExpand all lines: articles/aks/static-ip.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -69,6 +69,8 @@ az role assignment create \
69
69
--scope /subscriptions/<subscription id>/resourceGroups/<resource group name>
70
70
```
71
71
72
+
Alternatively, you can use the system assigned managed identity for permissions instead of the service principal. For more information, see [Use managed identities](use-managed-identity.md).
73
+
72
74
To create a *LoadBalancer* service with the static public IP address, add the `loadBalancerIP` property and the value of the static public IP address to the YAML manifest. Create a file named `load-balancer-service.yaml` and copy in the following YAML. Provide your own public IP address created in the previous step. The following example also sets the annotation to the resource group named *myResourceGroup*. Provide your own resource group name.
Copy file name to clipboardExpand all lines: articles/aks/use-managed-identity.md
+14-38Lines changed: 14 additions & 38 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,11 +5,11 @@ services: container-service
5
5
author: saudas
6
6
manager: saudas
7
7
ms.topic: article
8
-
ms.date: 09/11/2019
8
+
ms.date: 03/10/2019
9
9
ms.author: saudas
10
10
---
11
11
12
-
# Preview - Use managed identities in Azure Kubernetes Service
12
+
# Use managed identities in Azure Kubernetes Service
13
13
14
14
Currently, an Azure Kubernetes Service (AKS) cluster (specifically, the Kubernetes cloud provider) requires a *service principal* to create additional resources like load balancers and managed disks in Azure. Either you must provide a service principal or AKS creates one on your behalf. Service principals typically have an expiration date. Clusters eventually reach a state in which the service principal must be renewed to keep the cluster working. Managing service principals adds complexity.
15
15
@@ -20,46 +20,13 @@ AKS creates two managed identities:
20
20
-**System-assigned managed identity**: The identity that the Kubernetes cloud provider uses to create Azure resources on behalf of the user. The life cycle of the system-assigned identity is tied to that of the cluster. The identity is deleted when the cluster is deleted.
21
21
-**User-assigned managed identity**: The identity that's used for authorization in the cluster. For example, the user-assigned identity is used to authorize AKS to use access control records (ACRs), or to authorize the kubelet to get metadata from Azure.
22
22
23
-
In this preview period, a service principal is still required. It's used for authorization of add-ons such as monitoring, virtual nodes, Azure Policy, and HTTP application routing. Work is underway to remove the dependency of add-ons on the service principal name (SPN). Eventually, the requirement of an SPN in AKS will be removed completely.
24
-
25
-
> [!IMPORTANT]
26
-
> AKS preview features are available on a self-service, opt-in basis. Previews are provided "as-is" and "as available," and are excluded from the Service Level Agreements and limited warranty. AKS previews are partially covered by customer support on best-effort basis. As such, these features are not meant for production use. For more information, see the following support articles:
27
-
>
28
-
> -[AKS Support Policies](support-policies.md)
29
-
> -[Azure Support FAQ](faq.md)
23
+
Add-ons also authenticate using a managed identity. For each add-on, a managed identity is created by AKS and lasts for the life of the add-on. For creating and using your own VNet, static IP address, or attached Azure disk where the resources are outside of the MC_* resource group, use the PrincipalID of the cluster to perform a role assignment. For more information on role assignment, see [Delegate access to other Azure resources](kubernetes-service-principal.md#delegate-access-to-other-azure-resources).
30
24
31
25
## Before you begin
32
26
33
-
You must have the following resources installed:
34
-
35
-
- The Azure CLI, version 2.0.70 or later
36
-
- The aks-preview 0.4.14 extension
37
-
38
-
To install the aks-preview 0.4.14 extension or later, use the following Azure CLI commands:
39
-
40
-
```azurecli
41
-
az extension add --name aks-preview
42
-
az extension list
43
-
```
44
-
45
-
> [!CAUTION]
46
-
> After you register a feature on a subscription, you can't currently unregister that feature. When you enable some preview features, defaults might be used for all AKS clusters created afterward in the subscription. Don't enable preview features on production subscriptions. Instead, use a separate subscription to test preview features and gather feedback.
47
-
48
-
```azurecli-interactive
49
-
az feature register --name MSIPreview --namespace Microsoft.ContainerService
50
-
```
27
+
You must have the following resource installed:
51
28
52
-
It might take several minutes for the status to show as **Registered**. You can check the registration status by using the [az feature list](https://docs.microsoft.com/cli/azure/feature?view=azure-cli-latest#az-feature-list) command:
53
-
54
-
```azurecli-interactive
55
-
az feature list -o table --query "[?contains(name, 'Microsoft.ContainerService/MSIPreview')].{Name:name,State:properties.state}"
56
-
```
57
-
58
-
When the status shows as registered, refresh the registration of the `Microsoft.ContainerService` resource provider by using the [az provider register](https://docs.microsoft.com/cli/azure/provider?view=azure-cli-latest#az-provider-register) command:
59
-
60
-
```azurecli-interactive
61
-
az provider register --namespace Microsoft.ContainerService
62
-
```
29
+
- The Azure CLI, version 2.2.0 or later
63
30
64
31
## Create an AKS cluster with managed identities
65
32
@@ -78,6 +45,15 @@ Then, create an AKS cluster:
78
45
az aks create -g MyResourceGroup -n MyManagedCluster --enable-managed-identity
79
46
```
80
47
48
+
A successful cluster creation using managed identities contains this service principal profile information:
Copy file name to clipboardExpand all lines: articles/aks/use-multiple-node-pools.md
+1-12Lines changed: 1 addition & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ This article shows you how to create and manage multiple node pools in an AKS cl
18
18
19
19
## Before you begin
20
20
21
-
You need the Azure CLI version 2.0.76 or later installed and configured. Run `az --version` to find the version. If you need to install or upgrade, see [Install Azure CLI][install-azure-cli].
21
+
You need the Azure CLI version 2.2.0 or later installed and configured. Run `az --version` to find the version. If you need to install or upgrade, see [Install Azure CLI][install-azure-cli].
22
22
23
23
## Limitations
24
24
@@ -497,17 +497,6 @@ $ az aks nodepool list -g myResourceGroup --cluster-name myAKSCluster
497
497
498
498
The taint information is visible in Kubernetes for handling scheduling rules for nodes.
499
499
500
-
> [!IMPORTANT]
501
-
> To use node pool labels and tags, you need the *aks-preview* CLI extension version 0.4.35 or higher. Install the *aks-preview* Azure CLI extension using the [az extension add][az-extension-add] command, then check for any available updates using the [az extension update][az-extension-update] command:
502
-
>
503
-
> ```azurecli-interactive
504
-
> # Install the aks-preview extension
505
-
> az extension add --name aks-preview
506
-
>
507
-
> # Update the extension to make sure you have the latest version installed
508
-
> az extension update --name aks-preview
509
-
> ```
510
-
511
500
You can also add labels to a node pool during node pool creation. Labels set at the node pool are added to each node in the node pool. These [labels are visible in Kubernetes][kubernetes-labels] for handling scheduling rules for nodes.
512
501
513
502
To create a node pool with a label, use [az aks nodepool add][az-aks-nodepool-add]. Specify the name *labelnp* and use the `--labels` parameter to specify *dept=IT* and *costcenter=9999* for labels.
0 commit comments