You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/application-proxy-faq.md
+7-3Lines changed: 7 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -109,15 +109,15 @@ No, this scenario isn't supported because Application Proxy will terminate TLS t
109
109
110
110
Refer to [Publish Remote Desktop with Azure AD Application Proxy](application-proxy-integrate-with-remote-desktop-services.md).
111
111
112
-
### Can I use Kerberos Constrained Delegation in the Remote Desktop Gateway publishing scenario?
112
+
### Can I use Kerberos Constrained Delegation (Single Sign-On - Windows Integrated Authentication) in the Remote Desktop Gateway publishing scenario?
113
113
114
114
No, this scenario isn't supported.
115
115
116
116
### My users don't use Internet Explorer 11 and the pre-authentication scenario doesn’t work for them. Is this expected?
117
117
118
118
Yes, it’s expected. The pre-authentication scenario requires an ActiveX control, which isn't supported in third-party browsers.
119
119
120
-
### Is the Remote Desktop Web Client supported?
120
+
### Is the Remote Desktop Web Client (HTML5) supported?
121
121
122
122
No, this scenario isn't currently supported. Follow our [UserVoice](https://aka.ms/aadapuservoice) feedback forum for updates on this feature.
123
123
@@ -131,6 +131,10 @@ Yes, it's expected. If the user’s computer is Azure AD joined, the user signs
131
131
132
132
Refer to [Enable remote access to SharePoint with Azure AD Application Proxy](application-proxy-integrate-with-sharepoint-server.md).
133
133
134
+
### Can I use the SharePoint mobile app (iOS/ Android) to access a published SharePoint server?
135
+
136
+
The [SharePoint mobile app](https://docs.microsoft.com/sharepoint/administration/supporting-the-sharepoint-mobile-apps-online-and-on-premises) does not support Azure Active Directory pre-authentication currently.
137
+
134
138
## Active Directory Federation Services (AD FS) publishing
135
139
136
140
### Can I use Azure AD Application Proxy as AD FS proxy (like Web Application Proxy)?
@@ -143,7 +147,7 @@ No. Azure AD Application Proxy is designed to work with Azure AD and doesn’t f
143
147
144
148
Currently, WebSocket protocol support is still in public preview and it may not work for other applications. Some customers have had mixed success using WebSocket protocol with other applications. If you test such scenarios, we would love to hear your results. Please send us your feedback at [email protected].
145
149
146
-
Features (Eventlogs, PowerShell and Remote Desktop Services) in Windows Admin Center (WAC) or Remote Desktop Web Client do not work through Azure AD Application Proxy presently.
150
+
Features (Eventlogs, PowerShell and Remote Desktop Services) in Windows Admin Center (WAC) or Remote Desktop Web Client (HTML5) do not work through Azure AD Application Proxy presently.
- To find the registration key and registration URL for your Automation account, see the [Onboarding securely using registration](#onboarding-securely-using-registration) section if this article.
107
+
- To find the registration key and registration URL for your Automation account, see the [Onboarding securely using registration](#onboarding-securely-using-registration) section of this article.
108
108
109
109
3. If the PowerShell DSC Local Configuration Manager (LCM) defaults don't match your use case, or you want to onboard machines that only report to Azure Automation State Configuration, follow steps 4-7. Otherwise, proceed directly to step 7.
Copy file name to clipboardExpand all lines: articles/azure-arc/servers/overview.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -142,7 +142,7 @@ The Azure Connected Machine agent for Windows and Linux can be upgraded to the l
142
142
143
143
### Agent status
144
144
145
-
The Connected Machine agent sends a regular heartbeat message to the service every 5 minutes. If one is not received for 15 minutes, the machine is considered offline and the status will automatically be changed to **Disconnected** in the portal. Upon receiving a subsequent heartbeat message from the Connected Machine agent, its status will automatically be changed to **Connected**.
145
+
The Connected Machine agent sends a regular heartbeat message to the service every 5 minutes. If the service stops receiving these heartbeat messages from a machine, that machine is considered offline and the status will automatically be changed to **Disconnected** in the portal within 15 to 30 minutes. Upon receiving a subsequent heartbeat message from the Connected Machine agent, its status will automatically be changed to **Connected**.
146
146
147
147
## Install and configure agent
148
148
@@ -156,4 +156,4 @@ Connecting machines in your hybrid environment directly with Azure can be accomp
156
156
157
157
## Next steps
158
158
159
-
- To begin evaluating Azure Arc for servers (preview), follow the article [Connect hybrid machines to Azure from the Azure portal](onboard-portal.md).
159
+
- To begin evaluating Azure Arc for servers (preview), follow the article [Connect hybrid machines to Azure from the Azure portal](onboard-portal.md).
title: Use DISA CAP to connect to Azure Government
2
+
title: ASE deployment with DISA CAP
3
3
description: This document provides a comparison of features and guidance on developing applications for Azure Government
4
4
services: azure-government
5
5
cloud: gov
@@ -18,53 +18,61 @@ ms.author: joscot
18
18
19
19
---
20
20
21
-
# App Service Environment reference for DoD customers using a DISA CAP connection
21
+
# App Service Environment reference for DoD customers connected to the DISA CAP
22
22
23
23
This article explains the baseline configuration of an App Service Environment (ASE) with an internal load balancer (ILB) for customers who use the DISA CAP to connect to Azure Government.
24
24
25
25
## Environment configuration
26
26
27
27
### Assumptions
28
28
29
-
The customer has deployed an ASE with an ILB and has implemented an ExpressRoute connection via the DISA Cloud Access Point (CAP) process.
29
+
The customer has deployed an ASE with an ILB and has implemented an ExpressRoute connection to the DISA Cloud Access Point (CAP).
30
30
31
31
### Route table
32
32
33
-
When creating the ASE via the portal, a route table with a default route of 0.0.0.0/0 and next hop “Internet” is created. However, the DISA BGP routes will advertise for 0.0.0.0/0 and this route table should be removed from the ASE subnet.
33
+
When creating the ASE via the portal, a route table with a default route of 0.0.0.0/0 and next hop “Internet” is created.
34
+
However, since DISA advertises a default route out the ExpressRoute circuit, the User Defined Route (UDR) should either be deleted, or remove the default route to internet.
34
35
35
-
### Network security group (NSG)
36
-
37
-
The ASE will be created with inbound and outbound security rules as shown below. The inbound security rules MUST allow ports 454-455 with an ephemeral source port range (*). Source IPs must include the following Azure Government ranges see [App Service Environment management addresses](https://docs.microsoft.com/azure/app-service/environment/management-addresses
36
+
You will need to create new routes in the UDR for the management addresses in order to keep the ASE healthy. For Azure Government ranges see [App Service Environment management addresses](https://docs.microsoft.com/azure/app-service/environment/management-addresses
38
37
)
39
38
40
-
* 23.97.29.209
41
-
* 23.97.0.17
42
-
* 23.97.16.184
43
-
* 13.72.180.105
44
-
* 13.72.53.37
39
+
Rule 1: 23.97.29.209 --> Internet
40
+
Rule 2: 23.97.0.17 --> Internet
41
+
Rule 3: 23.97.16.184 --> Internet
42
+
Rule 4: 13.72.180.105 --> Internet
43
+
Rule 5: 13.72.53.37 --> Internet
44
+
45
+
Make sure the UDR is applied to the subnet your ASE is deployed to.
46
+
47
+
### Network security group (NSG)
45
48
46
-
#### Default NSG security rules
49
+
The ASE will be created with inbound and outbound security rules as shown below. The inbound security rules MUST allow ports 454-455 with an ephemeral source port range (*).
47
50
48
51
The images below describe the default NSG rules created during the ASE creation. For more information, see [Networking considerations for an App Service Environment](https://docs.microsoft.com/azure/app-service/environment/network-info#network-security-groups)
49
52
50
53

51
54
52
55

53
56
57
+
### Service Endpoints
58
+
59
+
Depending what storage you are using you will be required to enable Service Endpoints for SQL and Azure Storage to access them without going back down to the DISA BCAP. You also need to enable EventHub Service Endpoint for ASE logs.
60
+
54
61
## FAQs
55
62
56
-
* Some configuration changes may take some time to take effect. Allow for several hours for changes to routing, NSGs, ASE Health, etc. to propagate and take effect.
63
+
* Some configuration changes may take some time to take effect. Allow for several hours for changes to routing, NSGs, ASE Health, etc. to propagate and take effect, or optionally you can reboot the ASE.
57
64
58
65
## Resource manager template sample
59
66
60
67
> [!NOTE]
61
-
>The Azure Portal will not allow the ASE to be configured with non-RFC 1918 IP addresses. If your solution requires non-RFC 1918 IP addresses, you must use a Resource Manager Template to deploy the ASE.
68
+
>In order to deploy non-RFC 1918 IP addresses in the portal you must pre-stage the VNet and Subnet for the ASE. You can use a Resource Manager Template to deploy the ASE with non-RFC1918 IPs as well.
Copy file name to clipboardExpand all lines: articles/azure-monitor/app/nodejs.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.date: 03/14/2019
12
12
13
13
To receive, store, and explore your monitoring data, include the SDK in your code, and then set up a corresponding Application Insights resource in Azure. The SDK sends data to that resource for further analysis and exploration.
14
14
15
-
The Node.js SDK can automatically monitor incoming and outgoing HTTP requests, exceptions, and some system metrics. Beginning in version 0.20, the SDK also can monitor some common third-party packages, like MongoDB, MySQL, and Redis. All events related to an incoming HTTP request are correlated for faster troubleshooting.
15
+
The Node.js SDK can automatically monitor incoming and outgoing HTTP requests, exceptions, and some system metrics. Beginning in version 0.20, the SDK also can monitor some common [third-party packages](https://github.com/microsoft/node-diagnostic-channel/tree/master/src/diagnostic-channel-publishers#currently-supported-modules), like MongoDB, MySQL, and Redis. All events related to an incoming HTTP request are correlated for faster troubleshooting.
16
16
17
17
You can use the TelemetryClient API to manually instrument and monitor additional aspects of your app and system. We describe the TelemetryClient API in more detail later in this article.
Copy file name to clipboardExpand all lines: articles/data-explorer/ingest-data-event-hub.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -89,7 +89,7 @@ Now you create a table in Azure Data Explorer, to which Event Hubs will send dat
89
89
1. Copy the following command into the window and select **Run** to map the incoming JSON data to the column names and data types of the table (TestTable).
0 commit comments