You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/partner-asignio.md
+7-4Lines changed: 7 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: gargi-sinha
6
6
manager: martinco
7
7
ms.service: active-directory
8
8
ms.topic: how-to
9
-
ms.date: 06/21/2024
9
+
ms.date: 10/03/2024
10
10
ms.author: gasinh
11
11
ms.reviewer: kengaderdus
12
12
ms.subservice: B2C
@@ -65,7 +65,7 @@ The following diagram illustrates the implementation.
65
65
66
66
1. User opens Azure AD B2C sign in page on their mobile or web application, and then signs in or signs up.
67
67
2. Azure AD B2C redirects the user to Asignio using an OpenID Connect (OIDC) request.
68
-
3. The user is redirected to the Asignio web application for biometric sign in. If the user hasn't registered their Asignio Signature, they can use an SMS One-Time-Password (OTP) to authenticate. After authentication, user receives a registration link to create their Asignio Signature.
68
+
3. The user is redirected to the Asignio web application for biometric sign in. If the user didn't register their Asignio Signature, they can use an SMS One-Time-Password (OTP) to authenticate. After authentication, user receives a registration link to create their Asignio Signature.
69
69
4. The user authenticates with Asignio Signature and facial verification, or voice and facial verification.
70
70
5. The challenge response goes to Asignio.
71
71
6. Asignio returns the OIDC response to Azure AD B2C sign in.
@@ -76,11 +76,11 @@ The following diagram illustrates the implementation.
76
76
77
77
Configurating an application with Asignio is with the Asignio Partner Administration site.
78
78
79
-
1.Go to asignio.com [Asignio Partner Administration](https://partner.asignio.com) page to request access for your organization.
79
+
1.To request access for your organization, go to asignio.com [Asignio Partner Administration](https://partner.asignio.com) page.
80
80
2. With credentials, sign into Asignio Partner Administration.
81
81
3. Create a record for the Azure AD B2C application using your Azure AD B2C tenant. When you use Azure AD B2C with Asignio, Azure AD B2C manages connected applications. Asignio apps represent apps in the Azure portal.
82
82
4. In the Asignio Partner Administration site, generate a Client ID and Client Secret.
83
-
5. Note and store Client ID and Client Secret. You'll use them later. Asignio doesn't store Client Secrets.
83
+
5. Note and store Client ID and Client Secret. You use them later. Asignio doesn't store Client Secrets.
84
84
6. Enter the redirect URI in your site the user is returned to after authentication. Use the following URI pattern.
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/partner-xid.md
+7-4Lines changed: 7 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: gargi-sinha
6
6
manager: martinco
7
7
ms.service: active-directory
8
8
ms.topic: how-to
9
-
ms.date: 01/26/2024
9
+
ms.date: 10/03/2024
10
10
ms.author: gasinh
11
11
ms.subservice: B2C
12
12
@@ -40,7 +40,7 @@ The following diagram shows the architecture.
40
40
41
41

42
42
43
-
1. At the Azure AD B2C sign-in page user signs in or signs up.
43
+
1. At the Azure AD B2C sign-in page, the user signs in or signs up.
44
44
2. Azure AD B2C redirects the user to xID authorize API endpoint using an OpenID Connect (OIDC) request. An OIDC endpoint has endpoint information. xID identity provider (IdP) redirects the user to the xID authorization sign in page. User enters email address.
45
45
3. xID IdP sends push notification to user mobile device.
46
46
4. User opens the xID app, checks the request, enters a PIN, or uses biometrics. xID app activates the private key and creates an electronic signature.
@@ -56,7 +56,7 @@ The following diagram shows the architecture.
56
56
57
57
## Install xID
58
58
59
-
1. To request API documents, fill out the request form. Go to [Contact Us](https://xid.inc/contact-us).
59
+
1. To request API documents, fill out the request form. Go to [Contact Us](https://xid.inc/contact-us).
60
60
2. In the message, indicate you're using Azure AD B2C.
61
61
3. An xID sales representative contacts you.
62
62
4. Follow the instructions in the xID API document.
@@ -78,6 +78,9 @@ For testing, you register `https://jwt.ms`, a Microsoft web application with dec
78
78
79
79
Complete [Tutorial: Register a web application in Azure AD B2C](tutorial-register-applications.md?tabs=app-reg-ga)
80
80
81
+
>[!NOTE]
82
+
>Enable implicit flow only for testing purposes. Don’t enable implicit flow in production.
83
+
81
84
<aname='create-a-xid-policy-key'></a>
82
85
83
86
## Create an xID policy key
@@ -407,7 +410,7 @@ There are identity claims xID supports referenced as part of the policy. Claims
407
410
408
411
The relying party policy, for example [SignUpSignIn.xml](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/blob/main/LocalAccounts/SignUpOrSignin.xml), specifies the user journey the Azure AD B2C executes.
409
412
410
-
1. In the relying party,locate the **DefaultUserJourney** element.
413
+
1. In the relying party,locate the **DefaultUserJourney** element.
411
414
2. Update the **ReferenceId** to match the user journey ID you added to the identity provider.
412
415
413
416
In the following example, for the xID user journey, the **ReferenceId** is set to `CombinedSignInAndSignUp`.
> Customers may be aware of [the retirement notification of TLS 1.0 and 1.1 for interactions with Azure services](https://azure.microsoft.com/updates/azure-support-tls-will-end-by-31-october-2024-2/). This retirement does not affect applications running on App Service or Azure Functions. Applications on either App Service or Azure Functions configured to accept TLS 1.0 or TLS 1.1 for incoming requests will continue to run unaffected.
16
+
14
17
## What does TLS do in App Service?
15
18
16
19
Transport Layer Security (TLS) is a widely adopted security protocol designed to secure connections and communications between servers and clients. App Service allows customers to use TLS/SSL certificates to secure incoming requests to their web apps. App Service currently supports different set of TLS features for customers to secure their web apps.
Copy file name to clipboardExpand all lines: articles/application-gateway/configuration-http-settings.md
+3-4Lines changed: 3 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: application-gateway
5
5
author: greg-lindsay
6
6
ms.service: azure-application-gateway
7
7
ms.topic: conceptual
8
-
ms.date: 09/30/2023
8
+
ms.date: 10/03/2024
9
9
ms.author: greglin
10
10
---
11
11
@@ -26,7 +26,7 @@ The [Chromium browser](https://www.chromium.org/Home) [v80 update](https://chrom
26
26
27
27
To support this change, starting February 17 2020, Application Gateway (all the SKU types) will inject another cookie called *ApplicationGatewayAffinityCORS* in addition to the existing *ApplicationGatewayAffinity* cookie. The *ApplicationGatewayAffinityCORS* cookie has two more attributes added to it (*"SameSite=None; Secure"*) so that sticky sessions are maintained even for cross-origin requests.
28
28
29
-
Note that the default affinity cookie name is *ApplicationGatewayAffinity* and you can change it. If you deploy multiple application gateway instances in the same network topology, you must set unique cookie names for each instance. If you're using a custom affinity cookie name, an additional cookie is added with `CORS` as suffix. For example: *CustomCookieNameCORS*.
29
+
Note that the default affinity cookie name is *ApplicationGatewayAffinity* and you can change it. If in your network topology, you deploy multiple application gateways in line, you must set unique cookie names for each resource. If you're using a custom affinity cookie name, an additional cookie is added with `CORS` as suffix. For example: *CustomCookieNameCORS*.
30
30
31
31
> [!NOTE]
32
32
> If the attribute *SameSite=None* is set, it is mandatory that the cookie also contains the *Secure* flag, and must be sent over HTTPS. If session affinity is required over CORS, you must migrate your workload to HTTPS.
@@ -35,8 +35,7 @@ Please refer to TLS offload and End-to-End TLS documentation for Application Gat
35
35
## Connection draining
36
36
37
37
Connection draining helps you gracefully remove backend pool members during planned service updates. It applies to backend instances that are
38
-
- explicitly removed from the backend pool,
39
-
- removed during scale-in operations, or
38
+
- explicitly removed from the backend pool, or
40
39
- reported as unhealthy by the health probes.
41
40
42
41
You can apply this setting to all backend pool members by enabling Connection Draining in the Backend Setting. It ensures that all deregistering instances in a backend pool don't receive any new requests/connections while maintaining the existing connections until the configured timeout value. This is also true for WebSocket connections.
Copy file name to clipboardExpand all lines: articles/application-gateway/features.md
+2-3Lines changed: 2 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -105,9 +105,8 @@ For more information, see [WebSocket support](application-gateway-websocket.md)
105
105
## Connection draining
106
106
107
107
Connection draining helps you achieve graceful removal of backend pool members during planned service updates or problems with backend health. This setting is enabled via the [Backend Setting](configuration-http-settings.md) and is applied to all backend pool members during rule creation. Once enabled, the application gateway ensures all deregistering instances of a backend pool don't receive any new requests while allowing existing requests to complete within a configured time limit. It applies to cases where backend instances are:
108
-
- explicitly removed from the backend pool after a configuration change by a user
109
-
- reported as unhealthy by the health probes, or
110
-
- removed during a scale-in operation
108
+
- explicitly removed from the backend pool after a configuration change by a user, or
109
+
- reported as unhealthy by the health probes
111
110
112
111
The only exception is when requests continue to be proxied to the deregistering instances because of gateway-managed session affinity.
Recommended for: **High availability**, **Disaster recovery - intra region**
67
67
68
-
Azure Cache for Redis supports zone redundant configurations in the Standard (preview), Premium (preview), and Enterprise tiers. A [zone redundant cache](cache-how-to-zone-redundancy.md) can place its nodes across different [Azure Availability Zones](../reliability/availability-zones-overview.md) in the same region. It eliminates data center or Availability Zone outage as a single point of failure and increases the overall availability of your cache.
68
+
Azure Cache for Redis supports zone redundant configurations in the Standard (preview), Premium, and Enterprise tiers. A [zone redundant cache](cache-how-to-zone-redundancy.md) can place its nodes across different [Azure Availability Zones](../reliability/availability-zones-overview.md) in the same region. It eliminates data center or Availability Zone outage as a single point of failure and increases the overall availability of your cache.
69
+
70
+
> [!NOTE]
71
+
> On the Premium caches, only _automatic zone allocation_ is in public preview. Manual selection of availability zones us unchanged. Manual selection is GA (General Availability).
69
72
70
73
If a cache is configured to use two or more zones as described earlier in the article, the cache nodes are created in different zones. When a zone goes down, cache nodes in other zones are available to keep the cache functioning as usual.
Copy file name to clipboardExpand all lines: articles/azure-cache-for-redis/cache-how-to-zone-redundancy.md
+12-9Lines changed: 12 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,9 +11,9 @@ ms.date: 08/05/2024
11
11
12
12
# Enable zone redundancy for Azure Cache for Redis
13
13
14
-
In this article, you'll learn how to configure a zone-redundant Azure Cache instance using the Azure portal.
14
+
In this article, you learn how to configure a zone-redundant Azure Cache instance using the Azure portal.
15
15
16
-
Azure Cache for Redis Standard (Preview), Premium (Premium), and Enterprise tiers provide built-in redundancy by hosting each cache on two dedicated virtual machines (VMs). Even though these VMs are located in separate [Azure fault and update domains](/azure/virtual-machines/availability) and highly available, they're susceptible to data center-level failures. Azure Cache for Redis also supports zone redundancy in its Standard (preview), Premium (preview) and Enterprise tiers. A zone-redundant cache runs on VMs spread across multiple [Availability Zones](../reliability/availability-zones-overview.md). It provides higher resilience and availability.
16
+
Azure Cache for Redis Standard (preview), Premium, and Enterprise tiers provide built-in redundancy by hosting each cache on two dedicated virtual machines (VMs). Even though these VMs are located in separate [Azure fault and update domains](/azure/virtual-machines/availability) and highly available, they're susceptible to data center-level failures. Azure Cache for Redis also supports zone redundancy in its Standard (preview), Premium, and Enterprise tiers. A zone-redundant cache runs on VMs spread across multiple [Availability Zones](../reliability/availability-zones-overview.md). It provides higher resilience and availability.
17
17
18
18
## Prerequisites
19
19
@@ -36,12 +36,15 @@ To create a cache, follow these steps:
36
36
|**Subscription**| Select your subscription. | The subscription under which to create this new Azure Cache for Redis instance. |
37
37
|**Resource group**| Select a resource group, or select **Create new** and enter a new resource group name. | Name for the resource group in which to create your cache and other resources. By putting all your app resources in one resource group, you can easily manage or delete them together. |
38
38
|**DNS name**| Enter a globally unique name. | The cache name must be a string between 1 and 63 characters that contains only numbers, letters, or hyphens. The name must start and end with a number or letter, and can't contain consecutive hyphens. Your cache instance's *host name* will be *\<DNS name>.redis.cache.windows.net*. |
39
-
|**Location**| Select a location. | Select a [region](https://azure.microsoft.com/regions/) near other services that will use your cache. |
39
+
|**Location**| Select a location. | Select a [region](https://azure.microsoft.com/regions/) near other services that use your cache. |
40
40
|**Cache type**| Select a [Premium or Enterprise tier](https://azure.microsoft.com/pricing/details/cache/) cache. | The pricing tier determines the size, performance, and features that are available for the cache. For more information, see [Azure Cache for Redis Overview](cache-overview.md). |
41
41
42
42
1. For Standard or Premium tier cache, select **Advanced** in the Resource menu. To enable zone resiliency with automatic zone allocation, select **(Preview) Select zones automatically**.
43
43
44
-
:::image type="content" source="media/cache-how-to-zone-redundancy/cache-availability-zone.png" alt-text="Screenshot showing the Advanced tab with a red box around Availability zones.:":::
44
+
> [!NOTE]
45
+
> On the Premium caches, only _automatic zone selection_ is in public preview. Manual selection of availability zones us unchanged. Manual selection is GA (General Availability).
46
+
47
+
:::image type="content" source="media/cache-how-to-zone-redundancy/cache-availability-zone.png" alt-text="Screenshot showing the Advanced tab with a red box around Availability zones.":::
45
48
46
49
For an Enterprise tier cache, select **Advanced** in the Resource menu. For **Zone redundancy**, select **Zone redundant (recommended)**.
47
50
@@ -53,9 +56,9 @@ To create a cache, follow these steps:
53
56
> Automatic Zone Allocation cannot be modified once enabled for a cache.
54
57
55
58
> [!IMPORTANT]
56
-
> Enabling Automatic Zone Allocation is currently NOT supported for Geo Replicated caches or caches with VNET injection.
59
+
> Enabling Automatic Zone Allocation (preview) is currently NOT supported for Geo-replicated caches or caches with VNET injection.
57
60
58
-
1. Availability zones can be selected manually for Premium tier caches. The count of availability zones must always be less than or equal to the Replica count for the cache.
61
+
1. Availability zones can be selected manually for Premium tier caches. The number of availability zones must always be less than or equal to the total number of nodes for the cache.
59
62
60
63
:::image type="content" source="media/cache-how-to-zone-redundancy/cache-premium-replica-count.png" alt-text="Screenshot showing Availability zones set to one and Replica count set to three.":::
61
64
@@ -83,11 +86,11 @@ Zone redundancy is available only in Azure regions that have Availability Zones.
83
86
84
87
### Why can't I select all three zones during cache create?
85
88
86
-
A Premium cache has one primary and one replica node by default. To configure zone redundancy for more than two Availability Zones, you need to add [more replicas](cache-how-to-multi-replicas.md) to the cache you're creating.
89
+
A Premium cache has one primary and one replica node by default. To configure zone redundancy for more than two Availability Zones, you need to add [more replicas](cache-how-to-multi-replicas.md) to the cache you're creating. The total number of availability zones must not exceed the combined count of nodes within the cache, including both the primary and replica nodes.
87
90
88
91
### Can I update my existing Standard or Premium cache to use zone redundancy?
89
92
90
-
Yes, updating an existing Standard or Premium cache to use zone redundancy is supported. You can enable it by selecting **Allocate Zones automatically** from the **Advanced settings** on the Resource menu. You cannot disable zone redundancy once you have enabled it.
93
+
Yes, updating an existing Standard or Premium cache to use zone redundancy is supported. You can enable it by selecting **Allocate Zones automatically** from the **Advanced settings** on the Resource menu. You can't disable zone redundancy once you enable it.
91
94
92
95
> [!IMPORTANT]
93
96
> Automatic Zone Allocation cannot be modified once enabled for a cache.
@@ -97,7 +100,7 @@ Yes, updating an existing Standard or Premium cache to use zone redundancy is su
97
100
98
101
### How much does it cost to replicate my data across Azure Availability Zones?
99
102
100
-
When your cache uses zone redundancy configured with multiple Availability Zones, data is replicated from the primary cache node in one zone to the other node(s) in another zone(s). The data transfer charge is the network egress cost of data moving across the selected Availability Zones. For more information, see [Bandwidth Pricing Details](https://azure.microsoft.com/pricing/details/bandwidth/).
103
+
When your cache uses zone redundancy configured with multiple Availability Zones, data is replicated from the primary cache node in one zone to the other nodes in another zone. The data transfer charge is the network egress cost of data moving across the selected Availability Zones. For more information, see [Bandwidth Pricing Details](https://azure.microsoft.com/pricing/details/bandwidth/).
0 commit comments