Skip to content

Commit 5f075b6

Browse files
authored
Merge branch 'release-asa-consumption' into rambotzhong/spring-autoscale
2 parents aba5b13 + e20dcb6 commit 5f075b6

File tree

96 files changed

+23503
-22906
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

96 files changed

+23503
-22906
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,6 @@
11
{
22
"redirections": [
3-
{
4-
"source_path_from_root": "/articles/azure-monitor/snapshot-debugger/snapshot-debugger-troubleshoot.md",
5-
"redirect_url": "https://learn.microsoft.com/troubleshoot/azure/azure-monitor/app-insights/snapshot-debugger-troubleshoot",
6-
"redirect_document_id": false
7-
},
8-
{
3+
{
94
"source_path_from_root": "/articles/azure-monitor/best-practices.md",
105
"redirect_url": "/azure/azure-monitor/getting-started",
116
"redirect_document_id": false

.openpublishing.redirection.json

Lines changed: 22461 additions & 22450 deletions
Large diffs are not rendered by default.

articles/active-directory/fundamentals/whats-new-sovereign-clouds.md

Lines changed: 85 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,91 @@ Azure AD receives improvements on an ongoing basis. To stay up to date with the
2121

2222
This page is updated monthly, so revisit it regularly.
2323

24+
## February 2023
25+
26+
### General Availability - Filter and transform group names in token claims configuration using regular expression
27+
28+
**Type:** New feature
29+
**Service category:** Enterprise Apps
30+
**Product capability:** SSO
31+
32+
Filter and transform group names in token claims configuration using regular expression. Many application configurations on ADFS and other IdPs rely on the ability to create authorization claims based on the content of Group Names using regular expression functions in the claim rules. Azure AD now has the capability to use a regular expression match and replace function to create claim content based on Group **onpremisesSAMAccount** names. This functionality will allow those applications to be moved to Azure AD for authentication using the same group management patterns. For more information, see: [Configure group claims for applications by using Azure Active Directory](../hybrid/how-to-connect-fed-group-claims.md).
33+
34+
---
35+
36+
### General Availability - Filter groups in tokens using a substring match
37+
38+
**Type:** New feature
39+
**Service category:** Enterprise Apps
40+
**Product capability:** SSO
41+
42+
Azure AD now has the capability to filter the groups included in the token using substring match on the display name or **onPremisesSAMAccountName** attributes of the group object. Only Groups the user is a member of will be included in the token.This was a blocker for some of our customers to migrate their apps from ADFS to Azure AD. This feature will unblock those challenges.
43+
44+
For more information, see:
45+
- [Group Filter](../develop/reference-claims-mapping-policy-type.md#group-filter).
46+
- [Configure group claims for applications by using Azure Active Directory](../hybrid/how-to-connect-fed-group-claims.md).
47+
48+
49+
50+
---
51+
52+
### General Availability - New SSO claims transformation features
53+
54+
**Type:** New feature
55+
**Service category:** Enterprise Apps
56+
**Product capability:** SSO
57+
58+
Azure AD now supports claims transformations on multi-valued attributes and can emit multi-valued claims. More functions to allow match and string operations on claims processing to enable apps to be migrated from other IdPs to Azure AD. This includes: Match on Empty(), NotEmpty(), Prefix(), Suffix(), and extract substring operators. For more information, see: [Claims mapping policy type](../develop/reference-claims-mapping-policy-type.md).
59+
60+
---
61+
62+
### General Availability - New Detection for Service Principal Behavior Anomalies
63+
64+
**Type:** New feature
65+
**Service category:** Access Reviews
66+
**Product capability:** Identity Security & Protection
67+
68+
Post-authentication anomalous activity detection for workload identities. This detection focuses specifically on detection of post authenticated anomalous behavior performed by a workload identity (service principal). Post-authentication behavior will be assessed for anomalies based on an action and/or sequence of actions occurring for the account. Based on the scoring of anomalies identified, the offline detection may score the account as low, medium, or high risk. The risk allocation from the offline detection will be available within the Risky workload identities reporting blade. A new detection type identified as Anomalous service principal activity will appear in filter options. For more information, see: [Securing workload identities](../identity-protection/concept-workload-identity-risk.md).
69+
70+
---
71+
72+
### General Availability - Microsoft cloud settings for Azure AD B2B
73+
74+
**Type:** New feature
75+
**Service category:** B2B
76+
**Product capability:** B2B/B2C
77+
78+
Microsoft cloud settings let you collaborate with organizations from different Microsoft Azure clouds. With Microsoft cloud settings, you can establish mutual B2B collaboration between the following clouds:
79+
80+
- Microsoft Azure commercial and Microsoft Azure Government
81+
- Microsoft Azure commercial and Microsoft Azure China 21Vianet
82+
83+
For more information about Microsoft cloud settings for B2B collaboration., see: [Microsoft cloud settings](../external-identities/cross-tenant-access-overview.md#microsoft-cloud-settings).
84+
85+
---
86+
87+
### Public Preview - Support for Directory Extensions using Azure AD cloud sync
88+
89+
**Type:** New feature
90+
**Service category:** Provisioning
91+
**Product capability:** Azure AD Connect Cloud Sync
92+
93+
Hybrid IT Admins now can sync both Active Directory and Azure AD Directory Extensions using Azure AD Cloud Sync. This new capability adds the ability to dynamically discover the schema for both Active Directory and Azure AD, allowing customers to map the needed attributes using Cloud Sync's attribute mapping experience.
94+
95+
For more information on how to enable this feature, see: [Cloud Sync directory extensions and custom attribute mapping](../cloud-sync/custom-attribute-mapping.md)
96+
97+
98+
---
99+
100+
### General Availability - On-premises application provisioning
101+
102+
**Type:** Changed feature
103+
**Service category:** Provisioning
104+
**Product capability:** Outbound to On-premises Applications
105+
106+
Azure AD supports provisioning users into applications hosted on-premises or in a virtual machine, without having to open up any firewalls. If your application supports [SCIM](https://techcommunity.microsoft.com/t5/identity-standards-blog/provisioning-with-scim-getting-started/ba-p/880010), or you've built a SCIM gateway to connect to your legacy application, you can use the Azure AD Provisioning agent to [directly connect](../app-provisioning/on-premises-scim-provisioning.md) with your application and automate provisioning and deprovisioning. If you have legacy applications that don't support SCIM and rely on an [LDAP](../app-provisioning/on-premises-ldap-connector-configure.md) user store, or a [SQL](../app-provisioning/tutorial-ecma-sql-connector.md) database, Azure AD can support those as well.
107+
108+
---
24109

25110
## January 2023
26111

articles/active-directory/governance/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -234,6 +234,8 @@
234234
href: manage-workflow-tasks.md
235235
- name: Run a workflow on-demand
236236
href: on-demand-workflow.md
237+
- name: Customize emails
238+
href: customize-workflow-email.md
237239
- name: Check the status of a workflow
238240
href: check-status-workflow.md
239241
- name: Check execution user scope

articles/active-directory/manage-apps/plan-sso-deployment.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.topic: conceptual
1010
ms.workload: identity
11-
ms.date: 12/07/2022
11+
ms.date: 03/20/2023
1212
ms.author: jomondi
1313
ms.reviewer: alamaral
1414
ms.collection: M365-identity-device-management
@@ -21,10 +21,10 @@ ms.custom: has-adal-ref
2121
This article provides information that you can use to plan your [single sign-on (SSO)](what-is-single-sign-on.md) deployment in Azure Active Directory (Azure AD). When you plan your SSO deployment with your applications in Azure AD, you need to consider the following questions:
2222

2323
- What are the administrative roles required for managing the application?
24-
- Does the certificate need to be renewed?
24+
- Does the Security Assertion Markup Language (SAML) application certificate need to be renewed?
2525
- Who needs to be notified of changes related to the implementation of SSO?
2626
- What licenses are needed to ensure effective management of the application?
27-
- Are shared user accounts used to access the application?
27+
- Are shared and guest user accounts used to access the application?
2828
- Do I understand the options for SSO deployment?
2929

3030
## Administrative Roles
@@ -33,17 +33,17 @@ Always use the role with the fewest permissions available to accomplish the requ
3333

3434
| Persona | Roles | Azure AD role (if necessary) |
3535
| ------- | ----- | --------------------------- |
36-
| Help desk admin | Tier 1 support | None |
37-
| Identity admin | Configure and debug when issues involve Azure AD | Global Administrator |
36+
| Help desk admin | Tier 1 support view the sign-in logs to resolve issues. | None |
37+
| Identity admin | Configure and debug when issues involve Azure AD | Cloud Application Administrator |
3838
| Application admin | User attestation in application, configuration on users with permissions | None |
39-
| Infrastructure admins | Certificate rollover owner | Global Administrator |
39+
| Infrastructure admins | Certificate rollover owner | Cloud Application Administrator |
4040
| Business owner/stakeholder | User attestation in application, configuration on users with permissions | None |
4141

4242
To learn more about Azure AD administrative roles, see [Azure AD built-in roles](../users-groups-roles/directory-assign-admin-roles.md).
4343

4444
## Certificates
4545

46-
When you enable federated SSO for your application, Azure AD creates a certificate that is by default valid for three years. You can customize the expiration date for that certificate if needed. Ensure that you have processes in place to renew certificates prior to their expiration.
46+
When you enable federation on SAML application, Azure AD creates a certificate that is by default valid for three years. You can customize the expiration date for that certificate if needed. Ensure that you have processes in place to renew certificates prior to their expiration.
4747

4848
You change that certificate duration in the Azure portal. Make sure to document the expiration and know how you'll manage your certificate renewal. It’s important to identify the right roles and email distribution lists involved with managing the lifecycle of the signing certificate. The following roles are recommended:
4949

articles/active-directory/workload-identities/workload-identities-faqs.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,7 @@ intended to expand.
116116

117117
## Do these licenses require individual workload identities assignment?
118118

119-
No, license assignment isn't required. One license in the tenant unlocks features for workload identities.
119+
No, license assignment isn't required.
120120

121121
## Can I get a free trial of Workload Identities Premium?
122122

@@ -130,4 +130,4 @@ Yes, it's available.
130130

131131
## Is it possible to have a mix of Azure AD Premium P1, Azure AD Premium P2 and Workload Identities Premium licenses in one tenant?
132132

133-
Yes, customers can have a mixture of license plans in one tenant.
133+
Yes, customers can have a mixture of license plans in one tenant.

articles/aks/nat-gateway.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
2-
title: Managed NAT Gateway
2+
title: Create a managed or user-assigned NAT gateway
33
titleSuffix: Azure Kubernetes Service
4-
description: Learn how to create an AKS cluster with managed NAT integration
4+
description: Learn how to create an AKS cluster with managed NAT integration and user-assigned NAT gateway.
55
author: asudbring
66
ms.subservice: aks-networking
77
ms.custom: devx-track-azurecli
@@ -10,21 +10,21 @@ ms.date: 10/26/2021
1010
ms.author: allensu
1111
---
1212

13-
# Managed NAT Gateway
13+
# Create a managed or user-assigned NAT gateway
1414

1515
While you can route egress traffic through an Azure Load Balancer, there are limitations on the amount of outbound flows of traffic you can have. Azure NAT Gateway allows up to 64,512 outbound UDP and TCP traffic flows per IP address with a maximum of 16 IP addresses.
1616

17-
This article shows you how to create an AKS cluster with a Managed NAT Gateway for egress traffic and how to disable OutboundNAT on Windows.
17+
This article shows you how to create an AKS cluster with a managed NAT gateway and a user-assigned NAT gateway for egress traffic and how to disable OutboundNAT on Windows.
1818

1919
## Before you begin
2020

2121
* Make sure you're using the latest version of [Azure CLI][az-cli].
2222
* Make sure you're using Kubernetes version 1.20.x or above.
2323
* Managed NAT Gateway is incompatible with custom virtual networks.
2424

25-
## Create an AKS cluster with a Managed NAT Gateway
25+
## Create an AKS cluster with a managed NAT gateway
2626

27-
To create an AKS cluster with a new Managed NAT Gateway, use `--outbound-type managedNATGateway`, `--nat-gateway-managed-outbound-ip-count`, and `--nat-gateway-idle-timeout` when running `az aks create`. If you want the NAT gateway to be able to operate out of availability zones, specify the zones using `--zones`.
27+
To create an AKS cluster with a new managed NAT Gateway, use `--outbound-type managedNATGateway`, `--nat-gateway-managed-outbound-ip-count`, and `--nat-gateway-idle-timeout` when running `az aks create`. If you want the NAT gateway to be able to operate out of availability zones, specify the zones using `--zones`.
2828

2929
The following example creates a *myResourceGroup* resource group, then creates a *natCluster* AKS cluster in *myResourceGroup* with a Managed NAT Gateway, two outbound IPs, and an idle timeout of 30 seconds.
3030

@@ -56,9 +56,9 @@ az aks update \
5656
--nat-gateway-managed-outbound-ip-count 5
5757
```
5858

59-
## Create an AKS cluster with a user-assigned NAT Gateway
59+
## Create an AKS cluster with a user-assigned NAT gateway
6060

61-
To create an AKS cluster with a user-assigned NAT Gateway, use `--outbound-type userAssignedNATGateway` when running `az aks create`. This configuration requires bring-your-own networking (via [Kubenet][byo-vnet-kubenet] or [Azure CNI][byo-vnet-azure-cni]) and that the NAT Gateway is preconfigured on the subnet. The following commands create the required resources for this scenario. Make sure to run them all in the same session so that the values stored to variables are still available for the `az aks create` command.
61+
To create an AKS cluster with a user-assigned NAT gateway, use `--outbound-type userAssignedNATGateway` when running `az aks create`. This configuration requires bring-your-own networking (via [Kubenet][byo-vnet-kubenet] or [Azure CNI][byo-vnet-azure-cni]) and that the NAT Gateway is preconfigured on the subnet. The following commands create the required resources for this scenario. Make sure to run them all in the same session so that the values stored to variables are still available for the `az aks create` command.
6262

6363
1. Create the resource group.
6464

articles/aks/trusted-access-feature.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Enable Azure resources to access Azure Kubernetes Service (AKS) clusters
33
description: Learn how to use the Trusted Access feature to enable Azure resources to access Azure Kubernetes Service (AKS) clusters.
44
author: schaffererin
55
ms.topic: article
6-
ms.date: 03/03/2023
6+
ms.date: 03/20/2023
77
ms.author: schaffererin
88
---
99

@@ -33,9 +33,11 @@ Trusted Access enables you to give explicit consent to your system-assigned MSI
3333

3434
* An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
3535
* Resource types that support [system-assigned managed identity](../active-directory/managed-identities-azure-resources/overview.md).
36-
* Pre-defined Roles with appropriate [AKS permissions](concepts-identity.md).
37-
* To learn about what Roles to use in various scenarios, see [AzureML access to AKS clusters with special configurations](https://github.com/Azure/AML-Kubernetes/blob/master/docs/azureml-aks-ta-support.md).
38-
* If you're using Azure CLI, the **aks-preview** extension version **0.5.74 or later** is required.
36+
* * If you're using Azure CLI, the **aks-preview** extension version **0.5.74 or later** is required.
37+
* To learn about what Roles to use in various scenarios, see:
38+
* [AzureML access to AKS clusters with special configurations](https://github.com/Azure/AML-Kubernetes/blob/master/docs/azureml-aks-ta-support.md).
39+
* [AKS backup using Azure Backup][aks-azure-backup]
40+
3941

4042
First, install the aks-preview extension by running the following command:
4143

@@ -160,3 +162,4 @@ For more information on AKS, see:
160162
[az-feature-register]: /cli/azure/feature#az-feature-register
161163
[az-feature-show]: /cli/azure/feature#az-feature-show
162164
[az-provider-register]: /cli/azure/provider#az-provider-register
165+
[aks-azure-backup]: ../backup/azure-kubernetes-service-backup-overview.md

0 commit comments

Comments
 (0)