Skip to content

Commit 5ce04ef

Browse files
authored
Merge pull request #266491 from MicrosoftDocs/main
Publish to live, Friday 4 AM PST, 2/16
2 parents 89a4cf9 + 71d72d6 commit 5ce04ef

File tree

93 files changed

+1785
-907
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

93 files changed

+1785
-907
lines changed

articles/active-directory-b2c/custom-domain.md

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: Enable Azure AD B2C custom domains
2+
title: Enable custom domains in Azure Active Directory B2C
33
titleSuffix: Azure AD B2C
4-
description: Learn how to enable custom domains in your redirect URLs for Azure Active Directory B2C.
4+
description: Learn how to enable custom domains in your redirect URLs for Azure Active Directory B2C, so that my users have a seamless experience.
55
author: kengaderdus
66
manager: CelesteDG
77
ms.service: active-directory
88
ms.topic: how-to
9-
ms.date: 01/26/2024
9+
ms.date: 02/14/2024
1010
ms.author: kengaderdus
1111
ms.subservice: B2C
1212
ms.custom: "b2c-support"
@@ -15,7 +15,7 @@ zone_pivot_groups: b2c-policy-type
1515
#Customer intent: As a developer, I want to use my own domain name for the sign-in and sign-up experience, so that my users have a seamless experience.
1616
---
1717

18-
# Enable custom domains for Azure Active Directory B2C
18+
# Enable custom domains in Azure Active Directory B2C
1919

2020
[!INCLUDE [active-directory-b2c-choose-user-flow-or-custom-policy](../../includes/active-directory-b2c-choose-user-flow-or-custom-policy.md)]
2121

@@ -52,8 +52,12 @@ When using custom domains, consider the following:
5252

5353
- You can set up multiple custom domains. For the maximum number of supported custom domains, see [Microsoft Entra service limits and restrictions](/entra/identity/users/directory-service-limits-restrictions) for Azure AD B2C and [Azure subscription and service limits, quotas, and constraints](/azure/azure-resource-manager/management/azure-subscription-service-limits#azure-front-door-classic-limits) for Azure Front Door.
5454
- Azure Front Door is a separate Azure service, so extra charges will be incurred. For more information, see [Front Door pricing](https://azure.microsoft.com/pricing/details/frontdoor).
55-
- After you configure custom domains, users will still be able to access the Azure AD B2C default domain name *<tenant-name>.b2clogin.com* (unless you're using a custom policy and you [block access](#optional-block-access-to-the-default-domain-name).
56-
- If you have multiple applications, migrate them all to the custom domain because the browser stores the Azure AD B2C session under the domain name currently being used.
55+
- If you've multiple applications, migrate all oft them to the custom domain because the browser stores the Azure AD B2C session under the domain name currently being used.
56+
- After you configure custom domains, users will still be able to access the Azure AD B2C default domain name *<tenant-name>.b2clogin.com*. You need to block access to the default domain so that attackers can't use it to access your apps or run distributed denial-of-service (DDoS) attacks. [Submit a support ticket](find-help-open-support-ticket.md) to request for the blocking of access to the default domain.
57+
58+
> [!WARNING]
59+
> Don't request blocking of the default domain until your custom domain works properly.
60+
5761

5862
## Prerequisites
5963

articles/ai-services/openai/concepts/models.md

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -160,14 +160,6 @@ See [model versions](../concepts/model-versions.md) to learn about how Azure Ope
160160

161161
**<sup>1</sup>** This model will accept requests > 4,096 tokens. It is not recommended to exceed the 4,096 input token limit as the newer version of the model are capped at 4,096 tokens. If you encounter issues when exceeding 4,096 input tokens with this model this configuration is not officially supported.
162162

163-
#### Azure Government regions
164-
165-
The following GPT-3 models are available with [Azure Government](/azure/azure-government/documentation-government-welcome):
166-
167-
|Model ID | Model Availability |
168-
|--|--|
169-
|`gpt-35-turbo` (1106) |US Gov Virginia<br>US Gov Arizona |
170-
171163
### Embeddings models
172164

173165
These models can only be used with Embedding API requests.

articles/ai-studio/how-to/deploy-models-llama.md

Lines changed: 159 additions & 123 deletions
Large diffs are not rendered by default.
-231 KB
Loading
-68.9 KB
Loading
70.3 KB
Loading
-55.6 KB
Loading

articles/automation/runtime-environment-overview.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Runtime environment in Azure Automation
33
description: This article provides an overview on Runtime environment in Azure Automation.
44
services: automation
55
ms.subservice: process-automation
6-
ms.date: 01/24/2024
6+
ms.date: 02/16/2024
77
ms.topic: conceptual
88
ms.custom: references_regions, devx-track-azurecli
99
---
@@ -80,6 +80,7 @@ You can't edit these Runtime environments. However, any changes that are made in
8080
- Existing runbooks that are automatically moved from old experience to Runtime environment experience would be able to execute as both cloud and hybrid job.
8181
- When the runbook is [updated](manage-runtime-environment.md) and linked to a different Runtime environment, it can be executed as cloud job only.
8282
- PowerShell Workflow, Graphical PowerShell, and Graphical PowerShell Workflow runbooks only work with System-generated PowerShell-5.1 Runtime environment.
83+
- Runbooks created in Runtime environment experience with Runtime version PowerShell 7.2 would show as PowerShell 5.1 runbooks in old experience.
8384
- RBAC permissions cannot be assigned to Runtime environment.
8485
- Runtime environment can't be configured through Azure Automation extension for Visual Studio Code.
8586
- Deleted Runtime environments cannot be recovered.
Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
---
2+
ms.service: azure-arc
3+
ms.topic: include
4+
ms.date: 02/15/2024
5+
---
6+
7+
> [!IMPORTANT]
8+
> Azure Arc agents require the following outbound URLs on `https://:443` to function.
9+
> For `*.servicebus.chinacloudapi.cn`, websockets need to be enabled for outbound access on firewall and proxy.
10+
11+
| Endpoint (DNS) | Description |
12+
| ----------------- | ------------- |
13+
| `https://management.chinacloudapi.cn` | Required for the agent to connect to Azure and register the cluster. |
14+
| `https://<region>.dp.kubernetesconfiguration.azure.cn` | Data plane endpoint for the agent to push status and fetch configuration information. |
15+
| `https://login.chinacloudapi.cn`<br/>`https://<region>.login.chinacloudapi.cn`<br/>`login.partner.microsoftonline.cn`| Required to fetch and update Azure Resource Manager tokens. |
16+
| `mcr.azk8s.cn` | Required to pull container images for Azure Arc agents. |
17+
| `https://gbl.his.arc.azure.cn` | Required to get the regional endpoint for pulling system-assigned Managed Identity certificates. |
18+
| `https://*.his.arc.azure.cn` | Required to pull system-assigned Managed Identity certificates. |
19+
|`https://k8connecthelm.azureedge.net` | `az connectedk8s connect` uses Helm 3 to deploy Azure Arc agents on the Kubernetes cluster. This endpoint is needed for Helm client download to facilitate deployment of the agent helm chart. |
20+
|`guestnotificationservice.azure.cn`<br/>`*.guestnotificationservice.azure.cn`<br/>`sts.chinacloudapi.cn`<br/>`https://k8sconnectcsp.azureedge.net` | For [Cluster Connect](../cluster-connect.md) and for [Custom Location](../custom-locations.md) based scenarios. |
21+
|`*.servicebus.chinacloudapi.cn` | For [Cluster Connect](../cluster-connect.md) and for [Custom Location](../custom-locations.md) based scenarios. |
22+
|`https://graph.chinacloudapi.cn/` | Required when [Azure RBAC](../azure-rbac.md) is configured. |
23+
|`*.arc.azure.cn` | Required to manage connected clusters in Azure portal.|
24+
|`https://<region>.obo.arc.azure.cn:8084/` | Required when [Cluster Connect](../cluster-connect.md) is configured. |
25+
|`dl.k8s.io`| Required when [automatic agent upgrade](../agent-upgrade.md#toggle-automatic-upgrade-on-or-off-when-connecting-a-cluster-to-azure-arc) is enabled. |
26+
|`quay.azk8s.cn`<br/>`registryk8s.azk8s.cn`<br/>`k8sgcr.azk8s.cn`<br/>`usgcr.azk8s.cn`<br/>`dockerhub.azk8s.cn/<repo-name>/<image-name>:<version>`|Container registry proxy servers for Azure China VMs.|
Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
---
2+
ms.service: azure-arc
3+
ms.topic: include
4+
ms.date: 02/15/2024
5+
---
6+
7+
> [!IMPORTANT]
8+
> Azure Arc agents require the following outbound URLs on `https://:443` to function.
9+
> For `*.servicebus.windows.net`, websockets need to be enabled for outbound access on firewall and proxy.
10+
11+
| Endpoint (DNS) | Description |
12+
| ----------------- | ------------- |
13+
| `https://management.azure.com` | Required for the agent to connect to Azure and register the cluster. |
14+
| `https://<region>.dp.kubernetesconfiguration.azure.com` | Data plane endpoint for the agent to push status and fetch configuration information. |
15+
| `https://login.microsoftonline.com`<br/>`https://<region>.login.microsoft.com`<br/>`login.windows.net`| Required to fetch and update Azure Resource Manager tokens. |
16+
| `https://mcr.microsoft.com`<br/>`https://*.data.mcr.microsoft.com` | Required to pull container images for Azure Arc agents. |
17+
| `https://gbl.his.arc.azure.com` | Required to get the regional endpoint for pulling system-assigned Managed Identity certificates. |
18+
| `https://*.his.arc.azure.com` | Required to pull system-assigned Managed Identity certificates. |
19+
|`https://k8connecthelm.azureedge.net` | `az connectedk8s connect` uses Helm 3 to deploy Azure Arc agents on the Kubernetes cluster. This endpoint is needed for Helm client download to facilitate deployment of the agent helm chart. |
20+
|`guestnotificationservice.azure.com`<br/>`*.guestnotificationservice.azure.com`<br/>`sts.windows.net`<br/>`https://k8sconnectcsp.azureedge.net` | For [Cluster Connect](../cluster-connect.md) and for [Custom Location](../custom-locations.md) based scenarios. |
21+
|`*.servicebus.windows.net` | For [Cluster Connect](../cluster-connect.md) and for [Custom Location](../custom-locations.md) based scenarios. |
22+
|`https://graph.microsoft.com/` | Required when [Azure RBAC](../azure-rbac.md) is configured. |
23+
| `*.arc.azure.net`| Required to manage connected clusters in Azure portal. |
24+
|`https://<region>.obo.arc.azure.com:8084/` | Required when [Cluster Connect](../cluster-connect.md) is configured. |
25+
|`dl.k8s.io`| Required when [automatic agent upgrade](../agent-upgrade.md#toggle-automatic-upgrade-on-or-off-when-connecting-a-cluster-to-azure-arc) is enabled. |
26+
27+
To translate the `*.servicebus.windows.net` wildcard into specific endpoints, use the command:
28+
29+
```rest
30+
GET https://guestnotificationservice.azure.com/urls/allowlist?api-version=2020-01-01&location=<region>
31+
```
32+
33+
[!INCLUDE [arc-region-note](../../includes/arc-region-note.md)]

0 commit comments

Comments
 (0)