Skip to content

Commit 58b2f52

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into linux-fixes
2 parents c63a2f9 + 7f5bb49 commit 58b2f52

File tree

58 files changed

+1256
-452
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

58 files changed

+1256
-452
lines changed

articles/active-directory/governance/configure-logic-app-lifecycle-workflows.md

Lines changed: 63 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: owinfreyATL
55
ms.author: owinfrey
66
ms.service: active-directory
77
ms.topic: reference
8-
ms.date: 01/26/2023
8+
ms.date: 03/17/2023
99
ms.custom: template-how-to
1010
---
1111

@@ -15,16 +15,32 @@ ms.custom: template-how-to
1515

1616
Before you can use an existing Azure Logic App with the custom task extension feature of Lifecycle Workflows, it must first be made compatible. This reference guide provides a list of steps that must be taken to make the Azure Logic App compatible. For a guide on creating a new compatible Logic App via the Lifecycle Workflows portal, see [Trigger Logic Apps based on custom task extensions (preview)](trigger-custom-task.md).
1717

18+
## Determine type of token security of your custom task extension
19+
20+
Before configuring your Azure Logic App custom extension for use with Lifecycle Workflows, you must first figure out what type of token security it has. The two token security types can either be:
21+
22+
- Normal
23+
- Proof of Possession(POP)
24+
25+
26+
To determine the security token type of your custom task extension, you'd check the **Custom extensions (Preview)** page:
27+
28+
:::image type="content" source="media/configure-logic-app-lifecycle-workflows/custom-task-extension-token-type.png" alt-text="Screenshot of custom task extension and token type.":::
29+
30+
31+
> [!NOTE]
32+
> New custom task extensions will only have Proof of Possession(POP) token security type. Only task extensions created before the inclusion of the Proof of Possession token security type will have a type of Normal.
33+
1834
## Configure existing Logic Apps for LCW use
1935

2036
Making an Azure Logic app compatible to run with the **Custom Task Extension** requires the following steps:
2137

2238
- Configure the logic app trigger
23-
- Configure the callback action (only applicable to the callback scenario)
24-
- Enable system assigned managed identity.
25-
- Configure AuthZ policies.
39+
- Configure the callback action (Only applicable to the callback scenario.)
40+
- Enable system assigned managed identity (Always required for Normal security token type extensions. This is also the default for callback scenarios with custom task extensions. For more information on this, and other, custom task extension deployment scenarios, see: [Custom task extension deployment scenarios](lifecycle-workflow-extensibility.md#custom-task-extension-deployment-scenarios).)
41+
- Configure AuthZ policies
2642

27-
To configure those you'll follow these steps:
43+
To configure those you follow these steps:
2844

2945
1. Open the Azure Logic App you want to use with Lifecycle Workflow. Logic Apps may greet you with an introduction screen, which you can close with the X in the upper right corner.
3046

@@ -202,21 +218,59 @@ To configure those you'll follow these steps:
202218
203219
1. Select Save.
204220
205-
1. For Logic Apps authorization policy, we'll need the managed identities **Application ID**. Since the Azure portal only shows the Object ID, we need to look up the Application ID. You can search for the managed identity by Object ID under **Enterprise Applications in the Azure portal** to find the required Application ID.
221+
## Configure authorization policy for custom task extension with POP security token type
222+
If the security token type is **Proof of Possession (POP)** for your custom task extension, you'd set the authorization policy by following these steps:
223+
224+
1. For Logic Apps authorization policy, we need the managed identities **Application ID**. Since the Azure portal only shows the Object ID, we need to look up the Application ID. You can search for the managed identity by Object ID under **Enterprise Applications in the Azure AD Portal** to find the required Application ID.
206225
207226
1. Go back to the logic app you created, and select **Authorization**.
208227
209-
1. Create two authorization policies based on the tables below:
228+
1. Create two authorization policies based on these tables:
210229
211-
Policy name: AzureADLifecycleWorkflowsAuthPolicy
230+
Policy name: POP-Policy
231+
232+
Policy type: (Preview) AADPOP
233+
234+
|Claim |Value |
235+
|---------|---------|
236+
|Issuer | https://sts.windows.net/(Tenant ID)/ |
237+
|appid | ce79fdc4-cd1d-4ea5-8139-e74d7dbe0bb7 |
238+
|m | POST |
239+
|u | management.azure.com |
240+
|p | /subscriptions/(subscriptionId)/resourceGroups/(resourceGroupName)/providers/Microsoft.Logic/workflows/(LogicApp name) |
241+
242+
243+
1. Save the Authorization policy.
244+
245+
246+
> [!CAUTION]
247+
> Please pay attention to the details as minor differences can lead to problems later.
248+
- For Issuer, ensure you did include the slash after your Tenant ID
249+
- For appid, ensure the custom claim is “appid” in all lowercase. The appid value represents Lifecycle Workflows and is always the same.
250+
251+
## Configure authorization policy for custom task extension with normal security token type
252+
253+
If the security token type is **Normal** for your custom task extension, you'd set the authorization policy by following these steps:
254+
255+
1. For Logic Apps authorization policy, we need the managed identities **Application ID**. Since the Azure portal only shows the Object ID, we need to look up the Application ID. You can search for the managed identity by Object ID under **Enterprise Applications in the Azure AD Portal** to find the required Application ID.
256+
257+
1. Go back to the logic app you created, and select **Authorization**.
258+
259+
1. Create two authorization policies based on these tables:
260+
261+
Policy name: AzureADLifecycleWorkflowsAuthPolicy
262+
263+
Policy type: AAD
212264
213265
|Claim |Value |
214266
|---------|---------|
215267
|Issuer | https://sts.windows.net/(Tenant ID)/ |
216268
|Audience | Application ID of your Logic Apps Managed Identity |
217269
|appid | ce79fdc4-cd1d-4ea5-8139-e74d7dbe0bb7 |
218270
219-
Policy name: AzureADLifecycleWorkflowsAuthPolicyV2App
271+
Policy name: AzureADLifecycleWorkflowsAuthPolicyV2App
272+
273+
Policy type: AAD
220274
221275
|Claim |Value |
222276
|---------|---------|
@@ -225,8 +279,6 @@ To configure those you'll follow these steps:
225279
|azp | ce79fdc4-cd1d-4ea5-8139-e74d7dbe0bb7 |
226280
227281
1. Save the Authorization policy.
228-
> [!NOTE]
229-
> Due to a current bug in the Logic Apps UI you may have to save the authorization policy after each claim before adding another.
230282
231283
> [!CAUTION]
232284
> Please pay attention to the details as minor differences can lead to problems later.

articles/active-directory/governance/entitlement-management-logic-apps-integration.md

Lines changed: 17 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ These triggers to Logic Apps are controlled in a tab within access package polic
7070
1. The **Extension Configuration** tab allows you to decide if your extension has “launch and continue” or “launch and wait” behavior. With “Launch and continue” the linked policy action on the access package, such as a request, triggers the Logic App attached to the custom extension. After the Logic App is triggered, the entitlement management process associated with the access package will continue. For “Launch and wait”, we'll pause the associated access package action until after the Logic App linked to the extension completes its task, and a resume action is sent by the admin to continue the process. If no response is sent back in the wait time period defined, this process would be considered a failure. This process is further described below in its own section [Configuring custom extensions that pause entitlement management processes](entitlement-management-logic-apps-integration.md#configuring-custom-extensions-that-pause-entitlement-management-processes).
7171

7272

73-
1. In the **Details** tab, choose whether you’d like to use an existing Logic App. Selecting Yes in the field “Create new logic app” (default) creates a new blank Logic App that is already linked to this custom extension. Regardless, you need to provide:
73+
1. In the **Details** tab, choose whether you’d like to use an existing consumption plan Logic App. Selecting Yes in the field “Create new logic app” (default) creates a new blank consumption plan Logic App that is already linked to this custom extension. Regardless, you need to provide:
7474

7575
1. An Azure subscription.
7676

@@ -161,7 +161,7 @@ A new update to the custom extensions feature is the ability to pause the access
161161

162162
This pause process allows admins to have control of workflows they’d like to run before continuing with access lifecycle tasks in entitlement management. The only exception to this is if a timeout occurs. Launch and wait processes require a timeout of up to 14 days noted in minutes, hours, or days. If a resume response isn't sent back to entitlement management by the time the “timeout” period elapses, the entitlement management request workflow process pauses.
163163

164-
The admin is responsible for configuring an automated process that is able to send the API **resume request** payload back to entitlement management, once the Logic App workflow has completed. To send back the resume request payload, follow the instructions here in the graph API documents. See information here on the [resume request](/graph/api/accesspackageassignmentrequest-resume)
164+
The admin is responsible for configuring an automated process that is able to send the API **resume request** payload back to entitlement management, once the Logic App workflow has completed. To send back the resume request payload, follow the instructions here in the graph API documents. See information here on the [resume request](/graph/api/accesspackageassignmentrequest-resume).
165165

166166
Specifically, when an access package policy has been enabled to call out a custom extension and the request processing is waiting for the callback from the customer, the customer can initiate a resume action. It's performed on an [accessPackageAssignmentRequest](/graph/api/resources/accesspackageassignmentrequest) object whose **requestStatus** is in a **WaitingForCallback** state.
167167

@@ -171,12 +171,25 @@ The resume request can be sent back for the following stages:
171171
microsoft.graph.accessPackageCustomExtensionStage.assignmentRequestCreated
172172
microsoft.graph.accessPackageCustomExtensionStage.assignmentRequestApproved
173173
microsoft.graph.accessPackageCustomExtensionStage.assignmentRequestGranted
174-
Microsoft.graph.accessPackageCustomExtensionStage.assignmentRequestRemoved
174+
microsoft.graph.accessPackageCustomExtensionStage.assignmentRequestRemoved
175175
``
176176

177177
The following flow diagram shows the entitlement management callout to Logic Apps workflow:
178-
:::image type="content" source="media/entitlement-management-logic-apps/extensibility-diagram-flow.png" alt-text="A screenshot of the extensibility user diagram." lightbox="media/entitlement-management-logic-apps/extensibility-diagram-flow.png":::
178+
:::image type="content" source="media/entitlement-management-logic-apps/extensibility-diagram-flow.png" alt-text="A diagram of the entitlement management call to the logic apps workflow." lightbox="media/entitlement-management-logic-apps/extensibility-diagram-flow.png":::
179179

180+
The diagram flow diagram shows:
181+
182+
1. The user creates a custom endpoint able to receive the call from the Identity Service
183+
1. The identity service makes a test call to confirm the endpoint can be called by the Identity Service
184+
1. The User calls Graph API to request to add a user to an access package
185+
1. The Identity Service is added to the queue triggering the backend workflow
186+
1. Entitlement Management Service request processing calls the logic app with the request payload
187+
1. Workflow expects the accepted code
188+
1. The Entitlement Management Service waits for the blocking custom action to resume
189+
1. The customer system calls the request resume API to the identity service to resume processing the request
190+
1. The identity service adds the resume request message to the Entitlement Management Service queue resuming the backend workflow
191+
1. The Entitlement Management Service is resumed from the blocked state
192+
180193
An example of a resume request payload is:
181194

182195
``` http
Loading
128 KB
Loading

articles/aks/TOC.yml

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,9 @@
1414
- name: Getting started
1515
items:
1616
- name: Well-architected considerations
17-
href: /azure/architecture/framework/services/compute/azure-kubernetes-service/azure-kubernetes-service?bc=/azure/aks/breadcrumb/toc.json&toc=/azure/aks/toc.json?WT.mc_id=AKSDOCSTOC
17+
href: /azure/architecture/framework/services/compute/azure-kubernetes-service/azure-kubernetes-service?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
1818
- name: Plan your implementation
19-
href: /azure/architecture/reference-architectures/containers/aks-start-here?bc=/azure/aks/breadcrumb/toc.json&toc=/azure/aks/toc.json?WT.mc_id=AKSDOCSTOC
19+
href: /azure/architecture/reference-architectures/containers/aks-start-here?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
2020
- name: Optimize costs
2121
href: best-practices-cost.md
2222
- name: Quickstarts
@@ -86,7 +86,7 @@
8686
- name: Vulnerability management
8787
href: concepts-vulnerability-management.md
8888
- name: Security Baseline
89-
href: /security/benchmark/azure/baselines/aks-security-baseline?context=/azure/aks/context/aks-context
89+
href: /security/benchmark/azure/baselines/aks-security-baseline?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
9090
- name: Container Security
9191
href: concepts-security.md
9292
- name: Security controls by Azure Policy
@@ -127,7 +127,7 @@
127127
- name: Overview
128128
href: best-practices.md
129129
- name: Baseline architecture for an AKS cluster
130-
href: /azure/architecture/reference-architectures/containers/aks/secure-baseline-aks
130+
href: /azure/architecture/reference-architectures/containers/aks/secure-baseline-aks?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
131131
maintainContext: True
132132
- name: Security
133133
items:
@@ -164,22 +164,22 @@
164164
- name: Plan and execute a migration
165165
href: aks-migration.md
166166
- name: Spring Boot
167-
href: /azure/developer/java/migration/migrate-spring-boot-to-azure-kubernetes-service
167+
href: /azure/developer/java/migration/migrate-spring-boot-to-azure-kubernetes-service?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
168168
maintainContext: false
169169
- name: Tomcat
170-
href: /azure/developer/java/migration/migrate-tomcat-to-containers-on-azure-kubernetes-service
170+
href: /azure/developer/java/migration/migrate-tomcat-to-containers-on-azure-kubernetes-service?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
171171
maintainContext: false
172172
- name: Wildfly
173-
href: /azure/developer/java/migration/migrate-wildfly-to-wildfly-on-azure-kubernetes-service
173+
href: /azure/developer/java/migration/migrate-wildfly-to-wildfly-on-azure-kubernetes-service?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
174174
maintainContext: false
175175
- name: WebLogic
176-
href: /azure/developer/java/migration/migrate-weblogic-to-wildfly-on-azure-kubernetes-service
176+
href: /azure/developer/java/migration/migrate-weblogic-to-wildfly-on-azure-kubernetes-service?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
177177
maintainContext: false
178178
- name: WebSphere
179-
href: /azure/developer/java/migration/migrate-websphere-to-wildfly-on-azure-kubernetes-service
179+
href: /azure/developer/java/migration/migrate-websphere-to-wildfly-on-azure-kubernetes-service?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
180180
maintainContext: false
181181
- name: JBoss EAP
182-
href: /azure/developer/java/migration/migrate-jboss-eap-to-wildfly-on-azure-kubernetes-service
182+
href: /azure/developer/java/migration/migrate-jboss-eap-to-wildfly-on-azure-kubernetes-service?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
183183
maintainContext: false
184184
- name: Java web app containerization and migration
185185
href: ../migrate/tutorial-app-containerization-java-kubernetes.md
@@ -341,7 +341,7 @@
341341
- name: Use Azure Policy
342342
href: use-azure-policy.md
343343
- name: Control deployments with Azure Policy
344-
href: ../governance/policy/concepts/policy-for-kubernetes.md?toc=/azure/aks/toc.json
344+
href: ../governance/policy/concepts/policy-for-kubernetes.md?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
345345
maintainContext: true
346346
- name: Node security
347347
items:
@@ -598,7 +598,7 @@
598598
- name: Kubernetes Event-driven Autoscaler (KEDA) integrations
599599
href: keda-integrations.md
600600
- name: Troubleshoot Kubernetes Event-driven Autoscaler (KEDA)
601-
href: /troubleshoot/azure/azure-kubernetes/troubleshoot-kubernetes-event-driven-autoscaling-add-on?context=/azure/aks/context/aks-context
601+
href: /troubleshoot/azure/azure-kubernetes/troubleshoot-kubernetes-event-driven-autoscaling-add-on?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
602602
- name: Use cluster extensions
603603
href: cluster-extensions.md
604604
- name: DevOps
@@ -607,7 +607,7 @@
607607
href: /azure/developer/ansible/aks-configure-clusters
608608
maintainContext: true
609609
- name: Jenkins continuous deployment
610-
href: /azure/developer/jenkins/deploy-from-github-to-aks
610+
href: /azure/developer/jenkins/deploy-from-github-to-aks?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
611611
- name: Azure DevOps Project
612612
href: ../devops-project/azure-devops-project-aks.md
613613
maintainContext: true

articles/api-management/TOC.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -91,6 +91,9 @@
9191
- name: Observability
9292
href: observability.md
9393
displayName: monitoring
94+
- name: Compute platform
95+
href: compute-infrastructure.md
96+
displayName: stv1, stv2
9497
- name: DevOps and CI/CD
9598
href: devops-api-development-templates.md
9699
- name: APIs
@@ -152,6 +155,8 @@
152155
- name: Recover a deleted instance
153156
displayName: soft delete
154157
href: soft-delete.md
158+
- name: Migrate to stv2 platform
159+
href: migrate-stv1-to-stv2.md
155160
- name: Configure networking
156161
items:
157162
- name: Connect to a virtual network

0 commit comments

Comments
 (0)