Skip to content

Commit 6727bd7

Browse files
authored
Merge pull request #194056 from MicrosoftDocs/main
4/05 AM Publish
2 parents 210067b + 7444635 commit 6727bd7

File tree

87 files changed

+1231
-866
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

87 files changed

+1231
-866
lines changed

articles/active-directory-b2c/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -233,7 +233,7 @@
233233
displayName: Username, Email, Phone authorization, Phone sign-in
234234
- name: Add an identity provider
235235
href: add-identity-provider.md
236-
- name: AD FS
236+
- name: AD FS (OpenID Connect)
237237
href: identity-provider-adfs.md
238238
displayName: AD-FS, ADFS
239239
- name: AD FS (SAML)

articles/active-directory-b2c/secure-rest-api.md

Lines changed: 30 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 10/25/2021
12+
ms.date: 04/05/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
zone_pivot_groups: b2c-policy-type
@@ -397,6 +397,35 @@ After you add the above snippets, your technical profile should look like the fo
397397
</ClaimsProvider>
398398
```
399399

400+
### Call the REST technical profile
401+
402+
To call the `REST-GetProfile` technical profile, you first need to acquire an Azure AD access token using the `REST-AcquireAccessToken` technical profile. The following example shows how to call the `REST-GetProfile` technical profile from a [validation technical profile](validation-technical-profile.md):
403+
404+
```xml
405+
<ValidationTechnicalProfiles>
406+
<ValidationTechnicalProfile ReferenceId="REST-AcquireAccessToken" />
407+
<ValidationTechnicalProfile ReferenceId="REST-GetProfile" />
408+
</ValidationTechnicalProfiles>
409+
```
410+
411+
The following example shows how to call the `REST-GetProfile` technical profile from a [user journey](userjourneys.md), or a [sub journey](subjourneys.md):
412+
413+
```xml
414+
<OrchestrationSteps>
415+
<OrchestrationStep Order="2" Type="ClaimsExchange">
416+
<ClaimsExchanges>
417+
<ClaimsExchange Id="REST-AcquireAccessTokens" TechnicalProfileReferenceId="REST-AcquireAccessToken" />
418+
</ClaimsExchanges>
419+
</OrchestrationStep>
420+
421+
<OrchestrationStep Order="3" Type="ClaimsExchange">
422+
<ClaimsExchanges>
423+
<ClaimsExchange Id="REST-GetProfile" TechnicalProfileReferenceId="REST-GetProfile" />
424+
</ClaimsExchanges>
425+
</OrchestrationStep>
426+
</OrchestrationSteps>
427+
```
428+
400429
## Using a static OAuth2 bearer
401430

402431
### Add the OAuth2 bearer token policy key

articles/active-directory-b2c/tutorial-register-applications.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,8 +50,9 @@ To register a web application in your Azure AD B2C tenant, you can use our new u
5050

5151
The following restrictions apply to redirect URIs:
5252

53-
* The reply URL must begin with the scheme `https`.
53+
* The reply URL must begin with the scheme `https`, unless you use a localhost redirect URL.
5454
* The reply URL is case-sensitive. Its case must match the case of the URL path of your running application. For example, if your application includes as part of its path `.../abc/response-oidc`, do not specify `.../ABC/response-oidc` in the reply URL. Because the web browser treats paths as case-sensitive, cookies associated with `.../abc/response-oidc` may be excluded if redirected to the case-mismatched `.../ABC/response-oidc` URL.
55+
* The reply URL should include or exclude the trailing forward slash as your application expects it. For example, `https://contoso.com/auth-response` and `https://contoso.com/auth-response/` might be treated as nonmatching URLs in your application.
5556

5657
1. Under **Permissions**, select the *Grant admin consent to openid and offline_access permissions* check box.
5758
1. Select **Register**.
@@ -71,6 +72,7 @@ To register a web application in your Azure AD B2C tenant, you can use our new u
7172

7273
* The reply URL must begin with the scheme `https`, unless using `localhost`.
7374
* The reply URL is case-sensitive. Its case must match the case of the URL path of your running application. For example, if your application includes as part of its path `.../abc/response-oidc`, do not specify `.../ABC/response-oidc` in the reply URL. Because the web browser treats paths as case-sensitive, cookies associated with `.../abc/response-oidc` may be excluded if redirected to the case-mismatched `.../ABC/response-oidc` URL.
75+
* The reply URL should include or exclude the trailing forward slash as your application expects it. For example, `https://contoso.com/auth-response` and `https://contoso.com/auth-response/` might be treated as nonmatching URLs in your application.
7476

7577
1. Select **Create** to complete the application registration.
7678

articles/active-directory/saas-apps/code42-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -108,11 +108,11 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
108108

109109
## Configure Code42 SSO
110110

111-
To configure single sign-on on **Code42** side, you need to send the **App Federation Metadata Url** to [Code42 support team](mailto:idpsupport@code42.com). They set this setting to have the SAML SSO connection set properly on both sides.
111+
To configure single sign-on on **Code42** side, you need to send the **App Federation Metadata Url** to [Code42 support team](http://gethelp.code42.com/). They set this setting to have the SAML SSO connection set properly on both sides.
112112

113113
### Create Code42 test user
114114

115-
In this section, you create a user called B.Simon in Code42. Work with [Code42 support team](mailto:idpsupport@code42.com) to add the users in the Code42 platform. Users must be created and activated before you use single sign-on.
115+
In this section, you create a user called B.Simon in Code42. Work with [Code42 support team](http://gethelp.code42.com/) to add the users in the Code42 platform. Users must be created and activated before you use single sign-on.
116116

117117
## Test SSO
118118

articles/aks/api-server-authorized-ip-ranges.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,7 @@ az aks create \
103103

104104
## Update a cluster's API server authorized IP ranges
105105

106-
To update the API server authorized IP ranges on an existing cluster, use [az aks update][az-aks-update] command and use the *`--api-server-authorized-ip-ranges`*,--load-balancer-outbound-ip-prefixes*, *`--load-balancer-outbound-ips`*, or--load-balancer-outbound-ip-prefixes* parameters.
106+
To update the API server authorized IP ranges on an existing cluster, use [az aks update][az-aks-update] command and use the *`--api-server-authorized-ip-ranges`*, *`--load-balancer-outbound-ip-prefixes`*, *`--load-balancer-outbound-ips`*, or *`--load-balancer-outbound-ip-prefixes`* parameters.
107107

108108
The following example updates API server authorized IP ranges on the cluster named *myAKSCluster* in the resource group named *myResourceGroup*. The IP address range to authorize is *73.140.245.0/24*:
109109

articles/aks/cluster-configuration.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -181,6 +181,12 @@ To update a cluster to use OIDC Issuer.
181181
az aks update -n aks -g myResourceGroup --enable-oidc-issuer
182182
```
183183

184+
### Show the OIDC Issuer URL
185+
186+
```azurecli-interactive
187+
az aks show -n aks -g myResourceGroup --query "oidcIssuerProfile.issuerUrl" -otsv
188+
```
189+
184190
## Next steps
185191

186192
- Learn how [upgrade the node images](node-image-upgrade.md) in your cluster.

articles/aks/integrations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ Azure Kubernetes Service (AKS) provides additional, supported functionality for
1212

1313
## Add-ons
1414

15-
Add-ons provide extra capabilities for your AKS cluster and their installation and configuration is managed Azure. Use `az aks addon` to manage all add-ons for your cluster.
15+
Add-ons provide extra capabilities for your AKS cluster and their installation and configuration is managed by Azure. Use `az aks addon` to manage all add-ons for your cluster.
1616

1717
The below table shows the available add-ons.
1818

articles/aks/use-azure-dedicated-hosts.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ The following limitations apply when you integrate Azure Dedicated Host with Azu
6262

6363
* An existing agent pool can't be converted from non-ADH to ADH or ADH to non-ADH.
6464
* It is not supported to update agent pool from host group A to host group B.
65-
* Fault domain count can only be 1.
65+
* Using ADH across subscriptions.
6666

6767
## Add a Dedicated Host Group to an AKS cluster
6868

@@ -96,7 +96,7 @@ az vm host group create \
9696
--name myHostGroup \
9797
-g myDHResourceGroup \
9898
-z 1\
99-
--platform-fault-domain-count 1
99+
--platform-fault-domain-count 5
100100
--automatic-placement true
101101
```
102102

@@ -167,4 +167,4 @@ In this article, you learned how to create an AKS cluster with a Dedicated host,
167167
[aks-faq]: faq.md
168168
[azure-cli-install]: /cli/azure/install-azure-cli
169169
[dedicated-hosts]: ../virtual-machines/dedicated-hosts.md
170-
[az-vm-host-group-create]: /cli/azure/vm/host/group#az_vm_host_group_create
170+
[az-vm-host-group-create]: /cli/azure/vm/host/group#az_vm_host_group_create

articles/app-service/environment/how-to-migrate.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Use the migration feature to migrate App Service Environment v2 to App Se
33
description: Learn how to migrate your App Service Environment v2 to App Service Environment v3 using the migration feature
44
author: seligj95
55
ms.topic: tutorial
6-
ms.date: 2/2/2022
6+
ms.date: 4/5/2022
77
ms.author: jordanselig
88
zone_pivot_groups: app-service-cli-portal
99
---
@@ -109,21 +109,21 @@ az appservice ase show --name $ASE_NAME --resource-group $ASE_RG
109109

110110
From the [Azure portal](https://portal.azure.com), navigate to the **Overview** page for the App Service Environment you'll be migrating. The platform will validate if migration is supported for your App Service Environment. Wait a couple seconds after the page loads for this validation to take place.
111111

112-
If migration is supported for your App Service Environment, there are three ways to access the migration feature. These methods include a banner at the top of the Overview page, a new item in the left-hand side menu called **Migration (preview)**, and an info box on the **Configuration** page. Select any of these methods to move on to the next step in the migration process.
112+
If migration is supported for your App Service Environment, there are three ways to access the migration feature. These methods include a banner at the top of the Overview page, a new item in the left-hand side menu called **Migration**, and an info box on the **Configuration** page. Select any of these methods to move on to the next step in the migration process.
113113

114114
![migration access points](./media/migration/portal-overview.png)
115115

116116
![configuration page view](./media/migration/configuration-migration-support.png)
117117

118-
If you don't see these elements, your App Service Environment isn't supported for migration at this time or your environment is in an unhealthy or suspended state (which blocks migration). If your environment [won't be supported for migration](migrate.md#supported-scenarios) or you want to migrate to App Service Environment v3 without using the migration feature, see the [manual migration options](migration-alternatives.md).
118+
If you don't see these elements, your App Service Environment isn't supported for migration at this time or your environment is in an unhealthy or suspended state (which blocks migration). If your environment [won't be supported for migration with the migration feature](migrate.md#supported-scenarios) or you want to migrate to App Service Environment v3 without using the migration feature, see the [manual migration options](migration-alternatives.md).
119119

120120
The migration page will guide you through the series of steps to complete the migration.
121121

122122
![migration page sample](./media/migration/migration-ux-pre.png)
123123

124124
## 2. Generate IP addresses for your new App Service Environment v3
125125

126-
Under **Generate new IP addresses**, confirm you understand the implications and start the process. This step will take about 15 minutes to complete. Don't scale or make changes to your existing App Service Environment during this time. If you may see a message a few minutes after starting this step asking you to refresh the page, select refresh as shown in the sample to allow your new IP addresses to appear.
126+
Under **Get new IP addresses**, confirm you understand the implications and start the process. This step will take about 15 minutes to complete. You won't be able to scale or make changes to your existing App Service Environment during this time. If after 15 minutes you don't see your new IP addresses, select refresh as shown in the sample to allow your new IP addresses to appear.
127127

128128
![pre-migration request to refresh](./media/migration/pre-migration-refresh.png)
129129

@@ -135,7 +135,7 @@ When the previous step finishes, you'll be shown the IP addresses for your new A
135135

136136
## 4. Delegate your App Service Environment subnet
137137

138-
App Service Environment v3 requires the subnet it's in to have a single delegation of `Microsoft.Web/hostingEnvironments`. Previous versions didn't require this delegation. You'll need to confirm your subnet is delegated properly and update the delegation if needed before migrating. A link to your subnet is given so that you can confirm and update as needed.
138+
App Service Environment v3 requires the subnet it's in to have a single delegation of `Microsoft.Web/hostingEnvironments`. Previous versions didn't require this delegation. You'll need to confirm your subnet is delegated properly and/or update the delegation if needed before migrating. A link to your subnet is given so that you can confirm and update as needed.
139139

140140
![ux subnet delegation sample](./media/migration/subnet-delegation-ux.png)
141141

-762 Bytes
Loading

0 commit comments

Comments
 (0)