Skip to content

Commit 601ea67

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into two-communication-services-articles
2 parents b51e737 + f04ecb6 commit 601ea67

File tree

207 files changed

+941
-892
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

207 files changed

+941
-892
lines changed

articles/active-directory-b2c/partner-asignio.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: gargi-sinha
66
manager: martinco
77
ms.service: active-directory
88
ms.topic: how-to
9-
ms.date: 06/21/2024
9+
ms.date: 10/03/2024
1010
ms.author: gasinh
1111
ms.reviewer: kengaderdus
1212
ms.subservice: B2C
@@ -65,7 +65,7 @@ The following diagram illustrates the implementation.
6565

6666
1. User opens Azure AD B2C sign in page on their mobile or web application, and then signs in or signs up.
6767
2. Azure AD B2C redirects the user to Asignio using an OpenID Connect (OIDC) request.
68-
3. The user is redirected to the Asignio web application for biometric sign in. If the user hasn't registered their Asignio Signature, they can use an SMS One-Time-Password (OTP) to authenticate. After authentication, user receives a registration link to create their Asignio Signature.
68+
3. The user is redirected to the Asignio web application for biometric sign in. If the user didn't register their Asignio Signature, they can use an SMS One-Time-Password (OTP) to authenticate. After authentication, user receives a registration link to create their Asignio Signature.
6969
4. The user authenticates with Asignio Signature and facial verification, or voice and facial verification.
7070
5. The challenge response goes to Asignio.
7171
6. Asignio returns the OIDC response to Azure AD B2C sign in.
@@ -76,11 +76,11 @@ The following diagram illustrates the implementation.
7676

7777
Configurating an application with Asignio is with the Asignio Partner Administration site.
7878

79-
1. Go to asignio.com [Asignio Partner Administration](https://partner.asignio.com) page to request access for your organization.
79+
1. To request access for your organization, go to asignio.com [Asignio Partner Administration](https://partner.asignio.com) page.
8080
2. With credentials, sign into Asignio Partner Administration.
8181
3. Create a record for the Azure AD B2C application using your Azure AD B2C tenant. When you use Azure AD B2C with Asignio, Azure AD B2C manages connected applications. Asignio apps represent apps in the Azure portal.
8282
4. In the Asignio Partner Administration site, generate a Client ID and Client Secret.
83-
5. Note and store Client ID and Client Secret. You'll use them later. Asignio doesn't store Client Secrets.
83+
5. Note and store Client ID and Client Secret. You use them later. Asignio doesn't store Client Secrets.
8484
6. Enter the redirect URI in your site the user is returned to after authentication. Use the following URI pattern.
8585

8686
`[https://<your-b2c-domain>.b2clogin.com/<your-b2c-domain>.onmicrosoft.com/oauth2/authresp]`.
@@ -99,6 +99,9 @@ For this tutorial, you're registering `https://jwt.ms`, a Microsoft web applica
9999

100100
Complete [Tutorial: Register a web application in Azure Active Directory B2C](tutorial-register-applications.md?tabs=app-reg-ga)
101101

102+
>[!NOTE]
103+
>Enable implicit flow only for testing purposes. Don’t enable implicit flow in production.
104+
102105
## Configure Asignio as an identity provider in Azure AD B2C
103106

104107
For the following instructions, use the Microsoft Entra tenant with the Azure subscription.

articles/active-directory-b2c/partner-trusona.md

Lines changed: 22 additions & 19 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/partner-xid.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: gargi-sinha
66
manager: martinco
77
ms.service: active-directory
88
ms.topic: how-to
9-
ms.date: 01/26/2024
9+
ms.date: 10/03/2024
1010
ms.author: gasinh
1111
ms.subservice: B2C
1212

@@ -40,7 +40,7 @@ The following diagram shows the architecture.
4040

4141
![Diagram of the xID architecture.](./media/partner-xid/partner-xid-architecture-diagram.png)
4242

43-
1. At the Azure AD B2C sign-in page user signs in or signs up.
43+
1. At the Azure AD B2C sign-in page, the user signs in or signs up.
4444
2. Azure AD B2C redirects the user to xID authorize API endpoint using an OpenID Connect (OIDC) request. An OIDC endpoint has endpoint information. xID identity provider (IdP) redirects the user to the xID authorization sign in page. User enters email address.
4545
3. xID IdP sends push notification to user mobile device.
4646
4. User opens the xID app, checks the request, enters a PIN, or uses biometrics. xID app activates the private key and creates an electronic signature.
@@ -56,7 +56,7 @@ The following diagram shows the architecture.
5656

5757
## Install xID
5858

59-
1. To request API documents, fill out the request form. Go to [Contact Us](https://xid.inc/contact-us).
59+
1. To request API documents, fill out the request form. Go to [Contact Us](https://xid.inc/contact-us).
6060
2. In the message, indicate you're using Azure AD B2C.
6161
3. An xID sales representative contacts you.
6262
4. Follow the instructions in the xID API document.
@@ -78,6 +78,9 @@ For testing, you register `https://jwt.ms`, a Microsoft web application with dec
7878

7979
Complete [Tutorial: Register a web application in Azure AD B2C](tutorial-register-applications.md?tabs=app-reg-ga)
8080

81+
>[!NOTE]
82+
>Enable implicit flow only for testing purposes. Don’t enable implicit flow in production.
83+
8184
<a name='create-a-xid-policy-key'></a>
8285

8386
## Create an xID policy key
@@ -407,7 +410,7 @@ There are identity claims xID supports referenced as part of the policy. Claims
407410

408411
The relying party policy, for example [SignUpSignIn.xml](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/blob/main/LocalAccounts/SignUpOrSignin.xml), specifies the user journey the Azure AD B2C executes.
409412

410-
1. In the relying party,locate the **DefaultUserJourney** element.
413+
1. In the relying party, locate the **DefaultUserJourney** element.
411414
2. Update the **ReferenceId** to match the user journey ID you added to the identity provider.
412415

413416
In the following example, for the xID user journey, the **ReferenceId** is set to `CombinedSignInAndSignUp`.

articles/app-service/overview-tls.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,9 @@ ms.collection: ce-skilling-ai-copilot
1111
---
1212
# Azure App Service TLS overview
1313

14+
> [!NOTE]
15+
> Customers may be aware of [the retirement notification of TLS 1.0 and 1.1 for interactions with Azure services](https://azure.microsoft.com/updates/azure-support-tls-will-end-by-31-october-2024-2/). This retirement does not affect applications running on App Service or Azure Functions. Applications on either App Service or Azure Functions configured to accept TLS 1.0 or TLS 1.1 for incoming requests will continue to run unaffected.
16+
1417
## What does TLS do in App Service?
1518

1619
Transport Layer Security (TLS) is a widely adopted security protocol designed to secure connections and communications between servers and clients. App Service allows customers to use TLS/SSL certificates to secure incoming requests to their web apps. App Service currently supports different set of TLS features for customers to secure their web apps.

articles/application-gateway/configuration-http-settings.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: application-gateway
55
author: greg-lindsay
66
ms.service: azure-application-gateway
77
ms.topic: conceptual
8-
ms.date: 09/30/2023
8+
ms.date: 10/03/2024
99
ms.author: greglin
1010
---
1111

@@ -26,7 +26,7 @@ The [Chromium browser](https://www.chromium.org/Home) [v80 update](https://chrom
2626

2727
To support this change, starting February 17 2020, Application Gateway (all the SKU types) will inject another cookie called *ApplicationGatewayAffinityCORS* in addition to the existing *ApplicationGatewayAffinity* cookie. The *ApplicationGatewayAffinityCORS* cookie has two more attributes added to it (*"SameSite=None; Secure"*) so that sticky sessions are maintained even for cross-origin requests.
2828

29-
Note that the default affinity cookie name is *ApplicationGatewayAffinity* and you can change it. If you deploy multiple application gateway instances in the same network topology, you must set unique cookie names for each instance. If you're using a custom affinity cookie name, an additional cookie is added with `CORS` as suffix. For example: *CustomCookieNameCORS*.
29+
Note that the default affinity cookie name is *ApplicationGatewayAffinity* and you can change it. If in your network topology, you deploy multiple application gateways in line, you must set unique cookie names for each resource. If you're using a custom affinity cookie name, an additional cookie is added with `CORS` as suffix. For example: *CustomCookieNameCORS*.
3030

3131
> [!NOTE]
3232
> If the attribute *SameSite=None* is set, it is mandatory that the cookie also contains the *Secure* flag, and must be sent over HTTPS. If session affinity is required over CORS, you must migrate your workload to HTTPS.
@@ -35,8 +35,7 @@ Please refer to TLS offload and End-to-End TLS documentation for Application Gat
3535
## Connection draining
3636

3737
Connection draining helps you gracefully remove backend pool members during planned service updates. It applies to backend instances that are
38-
- explicitly removed from the backend pool,
39-
- removed during scale-in operations, or
38+
- explicitly removed from the backend pool, or
4039
- reported as unhealthy by the health probes.
4140

4241
You can apply this setting to all backend pool members by enabling Connection Draining in the Backend Setting. It ensures that all deregistering instances in a backend pool don't receive any new requests/connections while maintaining the existing connections until the configured timeout value. This is also true for WebSocket connections.

articles/application-gateway/features.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -105,9 +105,8 @@ For more information, see [WebSocket support](application-gateway-websocket.md)
105105
## Connection draining
106106

107107
Connection draining helps you achieve graceful removal of backend pool members during planned service updates or problems with backend health. This setting is enabled via the [Backend Setting](configuration-http-settings.md) and is applied to all backend pool members during rule creation. Once enabled, the application gateway ensures all deregistering instances of a backend pool don't receive any new requests while allowing existing requests to complete within a configured time limit. It applies to cases where backend instances are:
108-
- explicitly removed from the backend pool after a configuration change by a user
109-
- reported as unhealthy by the health probes, or
110-
- removed during a scale-in operation
108+
- explicitly removed from the backend pool after a configuration change by a user, or
109+
- reported as unhealthy by the health probes
111110

112111
The only exception is when requests continue to be proxied to the deregistering instances because of gateway-managed session affinity.
113112

articles/azure-cache-for-redis/cache-high-availability.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -61,11 +61,14 @@ Also, Azure Cache for Redis provides more replica nodes in the Premium tier. A [
6161

6262
## Zone redundancy
6363

64-
Applicable tiers: **Standard (preview)**, **Premium (preview)**, **Enterprise**, **Enterprise Flash**
64+
Applicable tiers: **Standard (preview)**, **Premium**, **Enterprise**, **Enterprise Flash**
6565

6666
Recommended for: **High availability**, **Disaster recovery - intra region**
6767

68-
Azure Cache for Redis supports zone redundant configurations in the Standard (preview), Premium (preview), and Enterprise tiers. A [zone redundant cache](cache-how-to-zone-redundancy.md) can place its nodes across different [Azure Availability Zones](../reliability/availability-zones-overview.md) in the same region. It eliminates data center or Availability Zone outage as a single point of failure and increases the overall availability of your cache.
68+
Azure Cache for Redis supports zone redundant configurations in the Standard (preview), Premium, and Enterprise tiers. A [zone redundant cache](cache-how-to-zone-redundancy.md) can place its nodes across different [Azure Availability Zones](../reliability/availability-zones-overview.md) in the same region. It eliminates data center or Availability Zone outage as a single point of failure and increases the overall availability of your cache.
69+
70+
> [!NOTE]
71+
> On the Premium caches, only _automatic zone allocation_ is in public preview. Manual selection of availability zones us unchanged. Manual selection is GA (General Availability).
6972
7073
If a cache is configured to use two or more zones as described earlier in the article, the cache nodes are created in different zones. When a zone goes down, cache nodes in other zones are available to keep the cache functioning as usual.
7174

articles/azure-cache-for-redis/cache-how-to-zone-redundancy.md

Lines changed: 12 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,9 @@ ms.date: 08/05/2024
1111

1212
# Enable zone redundancy for Azure Cache for Redis
1313

14-
In this article, you'll learn how to configure a zone-redundant Azure Cache instance using the Azure portal.
14+
In this article, you learn how to configure a zone-redundant Azure Cache instance using the Azure portal.
1515

16-
Azure Cache for Redis Standard (Preview), Premium (Premium), and Enterprise tiers provide built-in redundancy by hosting each cache on two dedicated virtual machines (VMs). Even though these VMs are located in separate [Azure fault and update domains](/azure/virtual-machines/availability) and highly available, they're susceptible to data center-level failures. Azure Cache for Redis also supports zone redundancy in its Standard (preview), Premium (preview) and Enterprise tiers. A zone-redundant cache runs on VMs spread across multiple [Availability Zones](../reliability/availability-zones-overview.md). It provides higher resilience and availability.
16+
Azure Cache for Redis Standard (preview), Premium, and Enterprise tiers provide built-in redundancy by hosting each cache on two dedicated virtual machines (VMs). Even though these VMs are located in separate [Azure fault and update domains](/azure/virtual-machines/availability) and highly available, they're susceptible to data center-level failures. Azure Cache for Redis also supports zone redundancy in its Standard (preview), Premium, and Enterprise tiers. A zone-redundant cache runs on VMs spread across multiple [Availability Zones](../reliability/availability-zones-overview.md). It provides higher resilience and availability.
1717

1818
## Prerequisites
1919

@@ -36,12 +36,15 @@ To create a cache, follow these steps:
3636
| **Subscription** | Select your subscription. | The subscription under which to create this new Azure Cache for Redis instance. |
3737
| **Resource group** | Select a resource group, or select **Create new** and enter a new resource group name. | Name for the resource group in which to create your cache and other resources. By putting all your app resources in one resource group, you can easily manage or delete them together. |
3838
| **DNS name** | Enter a globally unique name. | The cache name must be a string between 1 and 63 characters that contains only numbers, letters, or hyphens. The name must start and end with a number or letter, and can't contain consecutive hyphens. Your cache instance's *host name* will be *\<DNS name>.redis.cache.windows.net*. |
39-
| **Location** | Select a location. | Select a [region](https://azure.microsoft.com/regions/) near other services that will use your cache. |
39+
| **Location** | Select a location. | Select a [region](https://azure.microsoft.com/regions/) near other services that use your cache. |
4040
| **Cache type** | Select a [Premium or Enterprise tier](https://azure.microsoft.com/pricing/details/cache/) cache. | The pricing tier determines the size, performance, and features that are available for the cache. For more information, see [Azure Cache for Redis Overview](cache-overview.md). |
4141

4242
1. For Standard or Premium tier cache, select **Advanced** in the Resource menu. To enable zone resiliency with automatic zone allocation, select **(Preview) Select zones automatically**.
4343

44-
:::image type="content" source="media/cache-how-to-zone-redundancy/cache-availability-zone.png" alt-text="Screenshot showing the Advanced tab with a red box around Availability zones.:":::
44+
> [!NOTE]
45+
> On the Premium caches, only _automatic zone selection_ is in public preview. Manual selection of availability zones us unchanged. Manual selection is GA (General Availability).
46+
47+
:::image type="content" source="media/cache-how-to-zone-redundancy/cache-availability-zone.png" alt-text="Screenshot showing the Advanced tab with a red box around Availability zones.":::
4548

4649
For an Enterprise tier cache, select **Advanced** in the Resource menu. For **Zone redundancy**, select **Zone redundant (recommended)**.
4750

@@ -53,9 +56,9 @@ To create a cache, follow these steps:
5356
> Automatic Zone Allocation cannot be modified once enabled for a cache.
5457
5558
> [!IMPORTANT]
56-
> Enabling Automatic Zone Allocation is currently NOT supported for Geo Replicated caches or caches with VNET injection.
59+
> Enabling Automatic Zone Allocation (preview) is currently NOT supported for Geo-replicated caches or caches with VNET injection.
5760
58-
1. Availability zones can be selected manually for Premium tier caches. The count of availability zones must always be less than or equal to the Replica count for the cache.
61+
1. Availability zones can be selected manually for Premium tier caches. The number of availability zones must always be less than or equal to the total number of nodes for the cache.
5962

6063
:::image type="content" source="media/cache-how-to-zone-redundancy/cache-premium-replica-count.png" alt-text="Screenshot showing Availability zones set to one and Replica count set to three.":::
6164

@@ -83,11 +86,11 @@ Zone redundancy is available only in Azure regions that have Availability Zones.
8386

8487
### Why can't I select all three zones during cache create?
8588

86-
A Premium cache has one primary and one replica node by default. To configure zone redundancy for more than two Availability Zones, you need to add [more replicas](cache-how-to-multi-replicas.md) to the cache you're creating.
89+
A Premium cache has one primary and one replica node by default. To configure zone redundancy for more than two Availability Zones, you need to add [more replicas](cache-how-to-multi-replicas.md) to the cache you're creating. The total number of availability zones must not exceed the combined count of nodes within the cache, including both the primary and replica nodes.
8790

8891
### Can I update my existing Standard or Premium cache to use zone redundancy?
8992

90-
Yes, updating an existing Standard or Premium cache to use zone redundancy is supported. You can enable it by selecting **Allocate Zones automatically** from the **Advanced settings** on the Resource menu. You cannot disable zone redundancy once you have enabled it.
93+
Yes, updating an existing Standard or Premium cache to use zone redundancy is supported. You can enable it by selecting **Allocate Zones automatically** from the **Advanced settings** on the Resource menu. You can't disable zone redundancy once you enable it.
9194

9295
> [!IMPORTANT]
9396
> Automatic Zone Allocation cannot be modified once enabled for a cache.
@@ -97,7 +100,7 @@ Yes, updating an existing Standard or Premium cache to use zone redundancy is su
97100
98101
### How much does it cost to replicate my data across Azure Availability Zones?
99102

100-
When your cache uses zone redundancy configured with multiple Availability Zones, data is replicated from the primary cache node in one zone to the other node(s) in another zone(s). The data transfer charge is the network egress cost of data moving across the selected Availability Zones. For more information, see [Bandwidth Pricing Details](https://azure.microsoft.com/pricing/details/bandwidth/).
103+
When your cache uses zone redundancy configured with multiple Availability Zones, data is replicated from the primary cache node in one zone to the other nodes in another zone. The data transfer charge is the network egress cost of data moving across the selected Availability Zones. For more information, see [Bandwidth Pricing Details](https://azure.microsoft.com/pricing/details/bandwidth/).
101104

102105
## Next Steps
103106

0 commit comments

Comments
 (0)