Skip to content

Commit 6c2c974

Browse files
authored
Merge pull request #94831 from MicrosoftDocs/master
11/05 AM Publish
2 parents b2fb32a + 543b3ef commit 6c2c974

File tree

135 files changed

+626
-913
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

135 files changed

+626
-913
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5275,6 +5275,16 @@
52755275
"redirect_url": "/azure/app-service-mobile",
52765276
"redirect_document_id": false
52775277
},
5278+
{
5279+
"source_path": "articles/application-gateway/web-application-firewall-troubleshoot.md",
5280+
"redirect_url": "/azure/web-application-firewall/ag/web-application-firewall-troubleshoot",
5281+
"redirect_document_id": false
5282+
},
5283+
{
5284+
"source_path": "articles/application-gateway/waf-overview.md",
5285+
"redirect_url": "/azure/web-application-firewall/ag/ag-overview",
5286+
"redirect_document_id": false
5287+
},
52785288
{
52795289
"source_path": "articles/application-gateway/application-gateway-create-url-route-portal.md",
52805290
"redirect_url": "/azure/application-gateway/create-url-route-portal",

articles/active-directory-b2c/user-overview.md

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,27 +1,30 @@
11
---
2-
title: Overview of user accounts in Azure Active Directory B2C | Microsoft Docs
3-
description: Learn about user accounts in Azure Active Directory B2C.
2+
title: Overview of user accounts in Azure Active Directory B2C
3+
description: Learn about the types of user accounts that can be used in Azure Active Directory B2C.
44
services: active-directory-b2c
55
author: mmacy
66
manager: celestedg
77

88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 11/30/2018
11+
ms.date: 11/05/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
1515

1616
# Overview of user accounts in Azure Active Directory B2C
1717

18-
In Azure Active Directory B2C (Azure AD B2C), you can use different types of accounts. Azure Active Directory, Azure Active Directory B2B, and Azure Active Directory B2C share in the types of user accounts that can be used.
18+
In Azure Active Directory B2C (Azure AD B2C), there are several types of accounts that can be created. Azure Active Directory, Active Directory B2B, and Active Directory B2C share in the types of user accounts that can be used.
1919

2020
The following types of accounts are available:
2121

2222
- **Work account** - A work account can access resources in a tenant, and with an administrator role, can manage tenants.
2323
- **Guest account** - A guest account can only be a Microsoft account or an Azure Active Directory user that can be used to access applications or manage tenants.
24-
- **Consumer account** - A consumer account is created by going through a sign-up user flow in an Azure AD B2C application or by using Azure AD Graph API, and is used by users of the applications that are registered with Azure AD B2C.
24+
- **Consumer account** - A consumer account is used by a user of the applications you've registered with Azure AD B2C. Consumer accounts can be created by:
25+
- The user going through a sign-up user flow in an Azure AD B2C application
26+
- Using Azure AD Graph API
27+
- Using the Azure portal
2528

2629
## Work account
2730

@@ -69,7 +72,7 @@ You can also use the [Microsoft Graph API](https://docs.microsoft.com/graph/api/
6972

7073
## Consumer user
7174

72-
The consumer user can sign in to applications secured by Azure AD B2C, but cannot access Azure resources such as the Azure portal. The consumer user can use a local account or federated accounts, such as Facebook or Twitter. A consumer account is created by using a [sign-up or sign-in user flow](../active-directory-b2c/active-directory-b2c-reference-policies.md).
75+
The consumer user can sign in to applications secured by Azure AD B2C, but cannot access Azure resources such as the Azure portal. The consumer user can use a local account or federated accounts, such as Facebook or Twitter. A consumer account is created by using a [sign-up or sign-in user flow](../active-directory-b2c/active-directory-b2c-reference-policies.md), using the Azure AD Graph API, or by using the Azure portal.
7376

7477
You can specify the data that is collected when a consumer user account is created by using custom user attributes. For more information, see [Define custom attributes in Azure Active Directory B2C](../active-directory-b2c/active-directory-b2c-reference-custom-attr.md).
7578

articles/api-management/api-management-howto-developer-portal-customize.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -121,10 +121,10 @@ To make your portal and its latest changes available to visitors, you need to pu
121121

122122
## Visit the published portal
123123

124-
After you publish the portal, you can access it at the same URL as the administrative panel, for example `https://contoso-api.portal.azure-api.net`. Open it in a new browser tab to view it as an external visitor.
124+
After you publish the portal, you can access it at the same URL as the administrative panel, for example `https://contoso-api.developer.azure-api.net`. View it in a separate browser session (incognito / private browsing mode) as an external visitor.
125125

126126
## Next steps
127127

128128
Learn more about the developer portal:
129129

130-
- [Azure API Management developer portal overview](api-management-howto-developer-portal.md)
130+
- [Azure API Management developer portal overview](api-management-howto-developer-portal.md)

articles/app-service/containers/deploy-container-github-action.md

Lines changed: 40 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -3,55 +3,64 @@ title: Deploy your container from a CI/CD pipeline with GitHub Actions - Azure A
33
description: Learn how to use GitHub Actions to deploy your container to App Service
44
services: app-service
55
documentationcenter: ''
6-
author: jasonfreeberg
7-
writer:
8-
manager:
9-
editor:
6+
author: cephalin
7+
manager: gwallace
108

11-
ms.assetid:
129
ms.service: app-service
1310
ms.workload: na
1411
ms.tgt_pltfrm: na
1512
ms.devlang: na
1613
ms.topic: article
17-
ms.date: 10/09/2019
14+
ms.date: 10/25/2019
1815
ms.author: jafreebe
16+
ms.reviewer: ushan
1917

2018
---
2119

22-
# GitHub Actions for deploying to Web App for Containers
20+
# Deploy a custom container to App Service using GitHub Actions
2321

24-
[GitHub Actions](https://help.github.com/en/articles/about-github-actions) gives you the flexibility to build an automated software development lifecycle workflow. With the Azure App Service Actions for GitHub, you can automate your workflow to deploy [Azure Web Apps for Containers](https://azure.microsoft.com/services/app-service/containers/) using GitHub Actions.
22+
[GitHub Actions](https://help.github.com/en/articles/about-github-actions) gives you the flexibility to build an automated software development lifecycle workflow. With the [Azure App Service Action for Containers](https://github.com/Azure/webapps-container-deploy), you can automate your workflow to deploy apps as [custom containers to App Service](https://azure.microsoft.com/services/app-service/containers/) using GitHub Actions.
2523

2624
> [!IMPORTANT]
2725
> GitHub Actions is currently in beta. You must first [sign-up to join the preview](https://github.com/features/actions) using your GitHub account.
2826
>
2927
3028
A workflow is defined by a YAML (.yml) file in the `/.github/workflows/` path in your repository. This definition contains the various steps and parameters that make up the workflow.
3129

32-
For an Azure Web App container workflow, the file has three sections:
30+
For an Azure App Service container workflow, the file has three sections:
3331

3432
|Section |Tasks |
3533
|---------|---------|
36-
|**Authentication** | 1. Define a service principal <br /> 2. Create a GitHub secret |
37-
|**Build** | 1. Set up the environment <br /> 2. Build the container image |
38-
|**Deploy** | 1. Deploy the container image |
34+
|**Authentication** | 1. Define a service principal. <br /> 2. Create a GitHub secret. |
35+
|**Build** | 1. Set up the environment. <br /> 2. Build the container image. |
36+
|**Deploy** | 1. Deploy the container image. |
3937

4038
## Create a service principal
4139

4240
You can create a [service principal](https://docs.microsoft.com/azure/active-directory/develop/app-objects-and-service-principals#service-principal-object) by using the [az ad sp create-for-rbac](https://docs.microsoft.com/cli/azure/ad/sp?view=azure-cli-latest#az-ad-sp-create-for-rbac) command in the [Azure CLI](https://docs.microsoft.com/cli/azure/). You can run this command using [Azure Cloud Shell](https://shell.azure.com/) in the Azure portal or by selecting the **Try it** button.
4341

4442
```azurecli-interactive
45-
az ad sp create-for-rbac --name "myApp" --role contributor --scopes /subscriptions/<SUBSCRIPTION_ID>/resourceGroups/<RESOURCE_GROUP>/providers/Microsoft.Web/sites/<APP_NAME> --sdk-auth
43+
az ad sp create-for-rbac --name "myApp" --role contributor \
44+
--scopes /subscriptions/{subscription-id}/resourceGroups/{resource-group} \
45+
--sdk-auth
46+
47+
# Replace {subscription-id}, {resource-group} with the subscription, resource group details of the WebApp
4648
```
4749

48-
In this example, replace the placeholders in the resource with your subscription ID, resource group and web app name. The output is the role assignment credentials that provides access to your Web App. Copy this JSON object, which you can use to authenticate from GitHub.
50+
The output is a JSON object with the role assignment credentials that provide access to your App Service app similar to below. Copy this JSON object to authenticate from GitHub.
4951

50-
> [!NOTE]
51-
> You do not need to create a service principal if you decide to use publish profile for authentication.
52+
```azurecli
53+
{
54+
"clientId": "<GUID>",
55+
"clientSecret": "<GUID>",
56+
"subscriptionId": "<GUID>",
57+
"tenantId": "<GUID>",
58+
(...)
59+
}
60+
```
5261

5362
> [!IMPORTANT]
54-
> It is always a good practice to grant minimum access. This is why the scope in the previous example is limited to the specific web app and not the entire resource group.
63+
> It is always a good practice to grant minimum access. You could restrict scope in the above Az CLI command to the specific App Service app and the Azure Container Registry where the container images are pushed to.
5564
5665
## Configure the GitHub secret
5766

@@ -77,7 +86,7 @@ The below example uses user-level credentials i.e. Azure Service Principal for d
7786
- REGISTRY_USERNAME
7887
- REGISTRY_PASSWORD
7988
80-
5. You will see the secrets as shown below once defined.
89+
5. You see the secrets as shown below once defined.
8190
8291
![container secrets](../media/app-service-github-actions/app-service-secrets-container.png)
8392
@@ -99,7 +108,7 @@ jobs:
99108
uses: actions/checkout@master
100109
101110
- name: 'Login via Azure CLI'
102-
uses: azure/actions/login@v1
111+
uses: azure/login@v1
103112
with:
104113
creds: ${{ secrets.AZURE_CREDENTIALS }}
105114
@@ -114,19 +123,19 @@ jobs:
114123
docker push contoso.azurecr.io/nodejssampleapp:${{ github.sha }}
115124
```
116125

117-
## Deploy to Web App Container
126+
## Deploy to an App Service container
118127

119-
To deploy your image to a web app container, you will need to use the `Azure/appservice-actions/webapp@master` action. This action has 5 parameters:
128+
To deploy your image to a custom container in App Service, use the `azure/webapps-container-deploy@v1` action. This action has five parameters:
120129

121130
| **Parameter** | **Explanation** |
122131
|---------|---------|
123-
| **app-name** | (Required) Name of the Azure Web App |
132+
| **app-name** | (Required) Name of the App Service app |
124133
| **slot-name** | (Optional) Enter an existing Slot other than the Production slot |
125-
| **images** | (Required) Specify the fully qualified container image(s) name. For example, 'myregistry.azurecr.io/nginx:latest' or 'python:3.7.2-alpine/'. For multi-container scenario multiple container image names can be provided (multi-line separated) |
126-
| **configuration-file** | (Optional) Path of the Docker-Compose file. Should be a fully qualified path or relative to the default working directory. Required for multi-container scenario |
127-
| **container-command** | (Optional) Enter the start up command. For ex. dotnet run or dotnet filename.dll |
134+
| **images** | (Required) Specify the fully qualified container image(s) name. For example, 'myregistry.azurecr.io/nginx:latest' or 'python:3.7.2-alpine/'. For a multi-container app, multiple container image names can be provided (multi-line separated) |
135+
| **configuration-file** | (Optional) Path of the Docker-Compose file. Should be a fully qualified path or relative to the default working directory. Required for multi-container apps. |
136+
| **container-command** | (Optional) Enter the start-up command. For ex. dotnet run or dotnet filename.dll |
128137

129-
Below is the sample workflow to build and deploy a Node.js Web app to Azure Web App Container.
138+
Below is the sample workflow to build and deploy a Node.js app to a custom container in App Service.
130139

131140
```yaml
132141
on: [push]
@@ -142,7 +151,7 @@ jobs:
142151
uses: actions/checkout@master
143152

144153
- name: 'Login via Azure CLI'
145-
uses: azure/actions/login@v1
154+
uses: azure/login@v1
146155
with:
147156
creds: ${{ secrets.AZURE_CREDENTIALS }}
148157

@@ -170,7 +179,7 @@ jobs:
170179
171180
You can find our set of Actions grouped into different repositories on GitHub, each one containing documentation and examples to help you use GitHub for CI/CD and deploy your apps to Azure.
172181
173-
- [Azure login](https://github.com/Azure/actions)
182+
- [Azure login](https://github.com/Azure/login)
174183
175184
- [Azure WebApp](https://github.com/Azure/webapps-deploy)
176185
@@ -182,4 +191,6 @@ You can find our set of Actions grouped into different repositories on GitHub, e
182191
183192
- [K8s deploy](https://github.com/Azure/k8s-deploy)
184193
185-
- [Starter Workflows](https://github.com/actions/starter-workflows)
194+
- [Starter CI Workflows](https://github.com/actions/starter-workflows)
195+
196+
- [Starter workflows to deploy to Azure](https://github.com/Azure/actions-workflow-samples)

0 commit comments

Comments
 (0)