Skip to content

Commit 648c8d2

Browse files
authored
Merge pull request #127498 from MicrosoftDocs/master
8/27 AM Publish
2 parents e69bb33 + a7e5267 commit 648c8d2

File tree

147 files changed

+640
-533
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

147 files changed

+640
-533
lines changed

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -149,7 +149,7 @@ Within the [SCIM 2.0 protocol specification](http://www.simplecloud.info/#Specif
149149
* Supports querying user by ID and by manager, as per section 3.4.2 of the SCIM protocol.
150150
* Supports querying groups by ID and by member, as per section 3.4.2 of the SCIM protocol.
151151
* Accepts a single bearer token for authentication and authorization of Azure AD to your application.
152-
* Supports soft-deleting a user `active=false` and restoring the user `active=true`.
152+
* Supports soft-deleting a user `active=false` and restoring the user `active=true` (the user object should be returned in a request whether or not the user is active). The only time the user should not be returned is when it is hard deleted from the application.
153153

154154
Follow these general guidelines when implementing a SCIM endpoint to ensure compatibility with Azure AD:
155155

articles/active-directory/develop/v2-oauth2-on-behalf-of-flow.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -149,7 +149,7 @@ The following example shows a success response to a request for an access token
149149
```
150150

151151
> [!NOTE]
152-
> The above access token is a v1.0-formatted token for Microosft Graph. This is because the token format is based on the **resource** being accessed and unrelated to the endpoints used to request it. The Microsoft Graph is setup to accept v1.0 tokens, so Microsoft identity platform produces v1.0 access tokens when a client requests tokens for Microsoft Graph. Other apps may indicate that they want v2.0-format tokens, v1.0-format tokens, or even proprietary or encrypted token formats. Both the v1.0 and v2.0 endpoints can emit either format of token - this way the resource can always get the right format of token regardless of how or where the token was requested by the client.
152+
> The above access token is a v1.0-formatted token for Microsoft Graph. This is because the token format is based on the **resource** being accessed and unrelated to the endpoints used to request it. The Microsoft Graph is setup to accept v1.0 tokens, so Microsoft identity platform produces v1.0 access tokens when a client requests tokens for Microsoft Graph. Other apps may indicate that they want v2.0-format tokens, v1.0-format tokens, or even proprietary or encrypted token formats. Both the v1.0 and v2.0 endpoints can emit either format of token - this way the resource can always get the right format of token regardless of how or where the token was requested by the client.
153153
>
154154
> Only applications should look at access tokens. Clients **must not** inspect them. Inspecting access tokens for other apps in your code will result in your app unexpectedly breaking when that app changes the format of their tokens or starts encrypting them.
155155

articles/app-service/app-service-authentication-how-to.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -141,7 +141,7 @@ App Service passes user claims to your application by using special headers. Ext
141141

142142
Code that is written in any language or framework can get the information that it needs from these headers. For ASP.NET 4.6 apps, the **ClaimsPrincipal** is automatically set with the appropriate values. ASP.NET Core, however, doesn't provide an authentication middleware that integrates with App Service user claims. For a workaround, see [MaximeRouiller.Azure.AppService.EasyAuth](https://github.com/MaximRouiller/MaximeRouiller.Azure.AppService.EasyAuth).
143143

144-
If the [token store](overview-authentication-authorization.md#token-store) is enabled for your app, you can also obtain additional details on the authenticated user by calling `/.auth/me`. The Mobile Apps server SDKs provide helper methods to work with this data. For more information, see [How to use the Azure Mobile Apps Node.js SDK](../app-service-mobile/app-service-mobile-node-backend-how-to-use-server-sdk.md#howto-tables-getidentity), and [Work with the .NET backend server SDK for Azure Mobile Apps](../app-service-mobile/app-service-mobile-dotnet-backend-how-to-use-server-sdk.md#user-info).
144+
If the [token store](overview-authentication-authorization.md#token-store) is enabled for your app, you can also obtain additional details on the authenticated user by calling `/.auth/me`. The Mobile Apps server SDKs provide helper methods to work with this data. For more information, see [How to use the Azure Mobile Apps Node.js SDK](/previous-versions/azure/app-service-mobile/app-service-mobile-node-backend-how-to-use-server-sdk#howto-tables-getidentity), and [Work with the .NET backend server SDK for Azure Mobile Apps](/previous-versions/azure/app-service-mobile/app-service-mobile-dotnet-backend-how-to-use-server-sdk#user-info).
145145

146146
## Retrieve tokens in app code
147147

@@ -484,7 +484,7 @@ You can view the current version of the platform authentication middleware eithe
484484

485485
##### From the Azure CLI
486486

487-
Using the Azure CLI, view the current middleware version with the [az webapp auth show](https://docs.microsoft.com/cli/azure/webapp/auth?view=azure-cli-latest#az-webapp-auth-show) command.
487+
Using the Azure CLI, view the current middleware version with the [az webapp auth show](/cli/azure/webapp/auth?view=azure-cli-latest#az-webapp-auth-show) command.
488488

489489
```azurecli-interactive
490490
az webapp auth show --name <my_app_name> \
@@ -515,7 +515,7 @@ You can also hit /.auth/version endpoint on an app also to view the current midd
515515

516516
#### Update the current runtime version
517517

518-
Using the Azure CLI, you can update the `runtimeVersion` setting in the app with the [az webapp auth update](https://docs.microsoft.com/cli/azure/webapp/auth?view=azure-cli-latest#az-webapp-auth-update) command.
518+
Using the Azure CLI, you can update the `runtimeVersion` setting in the app with the [az webapp auth update](/cli/azure/webapp/auth?view=azure-cli-latest#az-webapp-auth-update) command.
519519

520520
```azurecli-interactive
521521
az webapp auth update --name <my_app_name> \
@@ -525,9 +525,9 @@ az webapp auth update --name <my_app_name> \
525525

526526
Replace `<my_app_name>` with the name of your app. Also replace `<my_resource_group>` with the name of the resource group for your app. Also, replace `<version>` with a valid version of the 1.x runtime or `~1` for the latest version. You can find the release notes on the different runtime versions [here] (https://github.com/Azure/app-service-announcements) to help determine the version to pin to.
527527

528-
You can run this command from the [Azure Cloud Shell](../cloud-shell/overview.md) by choosing **Try it** in the preceding code sample. You can also use the [Azure CLI locally](https://docs.microsoft.com/cli/azure/install-azure-cli) to execute this command after executing [az login](https://docs.microsoft.com/cli/azure/reference-index#az-login) to sign in.
528+
You can run this command from the [Azure Cloud Shell](../cloud-shell/overview.md) by choosing **Try it** in the preceding code sample. You can also use the [Azure CLI locally](/cli/azure/install-azure-cli) to execute this command after executing [az login](/cli/azure/reference-index#az-login) to sign in.
529529

530530
## Next steps
531531

532532
> [!div class="nextstepaction"]
533-
> [Tutorial: Authenticate and authorize users end-to-end](tutorial-auth-aad.md)
533+
> [Tutorial: Authenticate and authorize users end-to-end](tutorial-auth-aad.md)

articles/app-service/app-service-best-practices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ Azure App Service default configuration for Node.js apps is intended to best sui
6363

6464

6565
## Next Steps
66-
For more information on best practices, visit [App Service Diagnostics](https://docs.microsoft.com/azure/app-service/overview-diagnostics) to find out actionable best practices specific to your resource.
66+
For more information on best practices, visit [App Service Diagnostics](./overview-diagnostics.md) to find out actionable best practices specific to your resource.
6767

6868
- Navigate to your Web App in the [Azure portal](https://portal.azure.com).
6969
- Click on **Diagnose and solve problems** in the left navigation, which opens App Service Diagnostics.

articles/app-service/app-service-configure-premium-tier.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -112,4 +112,4 @@ New-AzAppServicePlan -ResourceGroupName <resource_group_name> `
112112
## More resources
113113

114114
[Scale up an app in Azure](manage-scale-up.md)
115-
[Scale instance count manually or automatically](../monitoring-and-diagnostics/insights-how-to-scale.md)
115+
[Scale instance count manually or automatically](../azure-monitor/platform/autoscale-get-started.md)

articles/app-service/app-service-hybrid-connections.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -221,8 +221,8 @@ If you have a command line client for your endpoint, you can test connectivity f
221221
[12]: ./media/app-service-hybrid-connections/hybridconn-bt.png
222222

223223
<!--Links-->
224-
[HCService]: https://docs.microsoft.com/azure/service-bus-relay/relay-hybrid-connections-protocol/
224+
[HCService]: /azure/service-bus-relay/relay-hybrid-connections-protocol/
225225
[portal]: https://portal.azure.com/
226-
[oldhc]: https://docs.microsoft.com/azure/biztalk-services/integration-hybrid-connection-overview/
226+
[oldhc]: /azure/biztalk-services/integration-hybrid-connection-overview/
227227
[sbpricing]: https://azure.microsoft.com/pricing/details/service-bus/
228-
[armclient]: https://github.com/projectkudu/ARMClient/
228+
[armclient]: https://github.com/projectkudu/ARMClient/

articles/app-service/app-service-ip-restrictions.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ In addition to being able to control access to your app, you can also restrict a
9090

9191
## Programmatic manipulation of access restriction rules ##
9292

93-
[Azure CLI](https://docs.microsoft.com/cli/azure/webapp/config/access-restriction?view=azure-cli-latest) and [Azure PowerShell](https://docs.microsoft.com/powershell/module/Az.Websites/Add-AzWebAppAccessRestrictionRule?view=azps-3.1.0) has support for editing access restrictions.
93+
[Azure CLI](/cli/azure/webapp/config/access-restriction?view=azure-cli-latest) and [Azure PowerShell](/powershell/module/Az.Websites/Add-AzWebAppAccessRestrictionRule?view=azps-3.1.0) has support for editing access restrictions.
9494
Example of adding an access restriction using Azure CLI:
9595

9696
```azurecli-interactive
@@ -104,7 +104,7 @@ Add-AzWebAppAccessRestrictionRule -ResourceGroupName "ResourceGroup" -WebAppName
104104
-Name "Ip example rule" -Priority 100 -Action Allow -IpAddress 122.133.144.0/24
105105
```
106106

107-
Values can also be set manually with an [Azure REST API](https://docs.microsoft.com/rest/api/azure/) PUT operation on the app configuration in Resource Manager or using an Azure Resource Manager template. As an example, you can use resources.azure.com and edit the ipSecurityRestrictions block to add the required JSON.
107+
Values can also be set manually with an [Azure REST API](/rest/api/azure/) PUT operation on the app configuration in Resource Manager or using an Azure Resource Manager template. As an example, you can use resources.azure.com and edit the ipSecurityRestrictions block to add the required JSON.
108108

109109
The location for this information in Resource Manager is:
110110

@@ -136,4 +136,4 @@ Access restrictions are also available for function apps with the same functiona
136136
[Application Gateway integration with service endpoints](networking/app-gateway-with-service-endpoints.md)
137137

138138
<!--Links-->
139-
[serviceendpoints]: https://docs.microsoft.com/azure/virtual-network/virtual-network-service-endpoints-overview
139+
[serviceendpoints]: ../virtual-network/virtual-network-service-endpoints-overview.md

articles/app-service/app-service-plan-manage.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ You can find **Clone App** in the **Development Tools** section of the menu.
7777

7878
To scale up an App Service plan's pricing tier, see [Scale up an app in Azure](manage-scale-up.md).
7979

80-
To scale out an app's instance count, see [Scale instance count manually or automatically](../monitoring-and-diagnostics/insights-how-to-scale.md).
80+
To scale out an app's instance count, see [Scale instance count manually or automatically](../azure-monitor/platform/autoscale-get-started.md).
8181

8282
<a name="delete"></a>
8383

@@ -96,4 +96,4 @@ To avoid unexpected charges, when you delete the last app in an App Service plan
9696
[change]: ./media/azure-web-sites-web-hosting-plans-in-depth-overview/change-appserviceplan.png
9797
[createASP]: ./media/azure-web-sites-web-hosting-plans-in-depth-overview/create-appserviceplan.png
9898
[createWebApp]: ./media/azure-web-sites-web-hosting-plans-in-depth-overview/create-web-app.png
99-
[createResource]: ./media/azure-web-sites-web-hosting-plans-in-depth-overview/create-a-resource.png
99+
[createResource]: ./media/azure-web-sites-web-hosting-plans-in-depth-overview/create-a-resource.png

articles/app-service/app-service-security-controls.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ This article documents the security controls built into Azure App Service.
4545
| Server-side encryption at rest: Microsoft-managed keys | Yes | Web site file content is stored in Azure Storage, which automatically encrypts the content at rest. <br><br>Customer supplied secrets are encrypted at rest. The secrets are encrypted at rest while stored in App Service configuration databases.<br><br>Locally attached disks can optionally be used as temporary storage by websites (D:\local and %TMP%). Locally attached disks are not encrypted at rest. | [Azure Storage encryption for data at rest](../storage/common/storage-service-encryption.md)
4646
| Server-side encryption at rest: customer-managed keys (BYOK) | Yes | Customers can choose to store application secrets in Key Vault and retrieve them at runtime. | [Use Key Vault references for App Service and Azure Functions (preview)](app-service-key-vault-references.md)
4747
| Column level encryption (Azure Data Services)| N/A | |
48-
| Encryption in transit (such as ExpressRoute encryption, in VNet encryption, and VNet-VNet encryption )| Yes | Customers can configure web sites to require and use HTTPS for inbound traffic. | [How to make an Azure App Service HTTPS only](https://blogs.msdn.microsoft.com/benjaminperkins/2017/11/30/how-to-make-an-azure-app-service-https-only/) (blog post)
48+
| Encryption in transit (such as ExpressRoute encryption, in VNet encryption, and VNet-VNet encryption )| Yes | Customers can configure web sites to require and use HTTPS for inbound traffic. | [How to make an Azure App Service HTTPS only](/archive/blogs/benjaminperkins/how-to-make-an-azure-app-service-https-only) (blog post)
4949
| API calls encrypted| Yes | Management calls to configure App Service occur via [Azure Resource Manager](../azure-resource-manager/index.yml) calls over HTTPS. |
5050

5151
## Configuration management
@@ -56,4 +56,4 @@ This article documents the security controls built into Azure App Service.
5656

5757
## Next steps
5858

59-
- Learn more about the [built-in security controls across Azure services](../security/fundamentals/security-controls.md).
59+
- Learn more about the [built-in security controls across Azure services](../security/fundamentals/security-controls.md).

articles/app-service/app-service-undelete.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.topic: article
99

1010
# Restore deleted App Service app Using PowerShell
1111

12-
If you happened to accidentally delete your app in Azure App Service, you can restore it using the commands from the [Az PowerShell module](https://docs.microsoft.com/powershell/azure/?view=azps-2.6.0&viewFallbackFrom=azps-2.2.0).
12+
If you happened to accidentally delete your app in Azure App Service, you can restore it using the commands from the [Az PowerShell module](/powershell/azure/?view=azps-2.6.0&viewFallbackFrom=azps-2.2.0).
1313

1414
> [!NOTE]
1515
> - Deleted apps are purged from the system 30 days after the initial deletion. After an app is purged, it can't be recovered.
@@ -71,4 +71,4 @@ By default `Restore-AzDeletedWebApp` will restore both your app configuration as
7171
> If the app was hosted on and then deleted from an App Service Environment, it can be restored only if the corresponding App Service Environment still exists.
7272
>
7373
74-
You can find the full commandlet reference here: [Restore-AzDeletedWebApp](https://docs.microsoft.com/powershell/module/az.websites/restore-azdeletedwebapp).
74+
You can find the full commandlet reference here: [Restore-AzDeletedWebApp](/powershell/module/az.websites/restore-azdeletedwebapp).

0 commit comments

Comments
 (0)