Skip to content

Commit 6ed3928

Browse files
authored
Merge pull request #153535 from MicrosoftDocs/master
4/07 AM Publish
2 parents d63f156 + 77ac379 commit 6ed3928

File tree

86 files changed

+1960
-738
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

86 files changed

+1960
-738
lines changed

CODEOWNERS

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -54,6 +54,10 @@ articles/governance/ @DCtheGeek
5454
articles/**/*security-baseline.md @msmbaldwin @mgblythe
5555
articles/security/benchmarks/ @msmbaldwin @mgblythe
5656

57+
# Azure Security Center
58+
articles/security-center/ @memildin
59+
includes/*security-controls*.md @memildin
60+
5761
# DDOS Protection
5862

5963
articles/ddos-protection @aletheatoh @anupamvi

articles/active-directory/authentication/howto-password-ban-bad-on-premises-deploy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ The following core requirements apply:
8585
* The Key Distribution Service must be enabled on all domain controllers in the domain that run Windows Server 2012 and later versions. By default, this service is enabled via manual trigger start.
8686

8787
* Network connectivity must exist between at least one domain controller in each domain and at least one server that hosts the proxy service for Azure AD Password Protection. This connectivity must allow the domain controller to access RPC endpoint mapper port 135 and the RPC server port on the proxy service.
88-
* By default, the RPC server port is a dynamic RPC port, but it can be configured to [use a static port](#static).
88+
* By default, the RPC server port is a dynamic RPC port from the range (49152 - 65535), but it can be configured to [use a static port](#static).
8989
* All machines where the Azure AD Password Protection Proxy service will be installed must have network access to the following endpoints:
9090

9191
|**Endpoint**|**Purpose**|

articles/active-directory/fundamentals/service-accounts-introduction-azure.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ There are three types of service accounts native to Azure Active Directory: Mana
2121

2222
## Types of Azure Active Directory service accounts
2323

24-
For services hosted in Azure, we recommend using a managed identity if possible, and a service principal if not. Managed identities can’t be used for services hosted outside of Azure. In that case, we recommend a service principal. If you can use a managed identity or a service principal, do so. We recommend that you not use an Azure Active Directory user account as a service principal. See the following table for a summary.
24+
For services hosted in Azure, we recommend using a managed identity if possible, and a service principal if not. Managed identities can’t be used for services hosted outside of Azure. In that case, we recommend a service principal. If you can use a managed identity or a service principal, do so. We recommend that you not use an Azure Active Directory user account as a service account. See the following table for a summary.
2525

2626

2727
| Service hosting| Managed identity| Service principal| Azure user account |
@@ -49,7 +49,7 @@ A service principal is the local representation of an application object in a si
4949

5050
There are two mechanisms for authentication using service principals—client certificates and client secrets. Certificates are more secure: use client certificates if possible. Unlike client secrets, client certificates cannot accidentally be embedded in code.
5151

52-
For information on securing service principals, see Securing service principals.
52+
For information on securing service principals, see [Securing service principals](service-accounts-principal.md).
5353

5454

5555
## Next steps
@@ -61,4 +61,4 @@ For more information on securing Azure service accounts, see:
6161

6262
[Securing service principals](service-accounts-principal.md)
6363

64-
[Governing Azure service accounts](service-accounts-governing-azure.md)
64+
[Governing Azure service accounts](service-accounts-governing-azure.md)

articles/active-directory/managed-identities-azure-resources/tutorial-linux-vm-access-nonaad.md

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.devlang: na
1313
ms.topic: tutorial
1414
ms.tgt_pltfrm: na
1515
ms.workload: identity
16-
ms.date: 12/10/2020
16+
ms.date: 12/16/2020
1717
ms.author: barclayn
1818
ms.collection: M365-identity-device-management
1919
#Customer intent: As a developer or administrator I want to configure a Linux virtual machine to retrieve a secret from key vault using a managed identity and have a simple way to validate my configuration before using it for development
@@ -91,7 +91,15 @@ The managed identity used by the virtual machine needs to be granted access to r
9191
## Access data
9292

9393
To complete these steps, you need an SSH client.  If you are using Windows, you can use the SSH client in the [Windows Subsystem for Linux](/windows/wsl/about). If you need assistance configuring your SSH client's keys, see [How to Use SSH keys with Windows on Azure](../../virtual-machines/linux/ssh-from-windows.md), or [How to create and use an SSH public and private key pair for Linux VMs in Azure](../../virtual-machines/linux/mac-create-ssh-keys.md).
94-
 
94+
95+
>[!IMPORTANT]
96+
> All Azure SDKs support the Azure.Identity library that makes it easy to acquire Azure AD tokens to access target services. Learn more about [Azure SDKs](https://azure.microsoft.com/downloads/) and leverage the Azure.Identity library.
97+
> - [.NET](https://docs.microsoft.com/dotnet/api/overview/azure/identity-readme?view=azure-dotnet)
98+
> - [JAVA](https://docs.microsoft.com/java/api/overview/azure/identity-readme?view=azure-java-stable)
99+
> - [Javascript](https://docs.microsoft.com/javascript/api/overview/azure/identity-readme?view=azure-node-latest)
100+
> - [Python](https://docs.microsoft.com/python/api/overview/azure/identity-readme?view=azure-python)
101+
102+
95103
1. In the portal, navigate to your Linux VM and in the **Overview**, click **Connect**
96104
2. **Connect** to the VM with the SSH client of your choice. 
97105
3. In the terminal window, using CURL, make a request to the local managed identities for Azure resources endpoint to get an access token for Azure Key Vault.  

0 commit comments

Comments
 (0)