Skip to content

Commit 6f69d32

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into patricka-cert-perms
2 parents 7702628 + 80a1568 commit 6f69d32

File tree

266 files changed

+2310
-1428
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

266 files changed

+2310
-1428
lines changed

articles/active-directory-b2c/best-practices.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,13 +3,13 @@ title: Best practices for Azure AD B2C
33
titleSuffix: Azure AD B2C
44
description: Recommendations and best practices to consider when working with Azure Active Directory B2C (Azure AD B2C).
55
services: active-directory-b2c
6-
author: vigunase
7-
ms.author: vigunase
6+
author: kengaderdus
7+
ms.author: kengaderdus
88
manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 12/01/2022
12+
ms.date: 12/29/2022
1313
ms.subservice: B2C
1414
---
1515

@@ -75,6 +75,7 @@ Manage your Azure AD B2C environment.
7575
| Use version control for your custom policies | Consider using GitHub, Azure Repos, or another cloud-based version control system for your Azure AD B2C custom policies. |
7676
| Use the Microsoft Graph API to automate the management of your B2C tenants | Microsoft Graph APIs:<br/>Manage [Identity Experience Framework](/graph/api/resources/trustframeworkpolicy?preserve-view=true&view=graph-rest-beta) (custom policies)<br/>[Keys](/graph/api/resources/trustframeworkkeyset?preserve-view=true&view=graph-rest-beta)<br/>[User Flows](/graph/api/resources/identityuserflow?preserve-view=true&view=graph-rest-beta) |
7777
| Integrate with Azure DevOps | A [CI/CD pipeline](deploy-custom-policies-devops.md) makes moving code between different environments easy and ensures production readiness always. |
78+
| Custom policy deployment | Azure AD B2C relies on caching to deliver performance to your end users. When you deploy a custom policy using whatever method, expect a delay of up to **30 minutes** for your users to see the changes. As a result of this behavior, consider the following practices when you deploy your custom policies: <br> - If you're deploying to a development environment, set the `DeploymentMode` attribute to `Development` in your custom policy file's `<TrustFrameworkPolicy>` element. <br> - Deploy your updated policy files to a production environment when traffic in your app is low. <br> - When you deploy to a production environment to update existing policy files, upload the updated files with new name(s), and then update your app reference to the new name(s). You can then remove the old policy files afterwards.<br> - You can set the `DeploymentMode` to `Development` in a production environment to bypass the caching behavior. However, we don't recommend this practice. If you [Collect Azure AD B2C logs with Application Insights](troubleshoot-with-application-insights.md), all claims sent to and from identity providers are collected, which is a security and performance risk. |
7879
| Integrate with Azure Monitor | [Audit log events](view-audit-logs.md) are only retained for seven days. [Integrate with Azure Monitor](azure-monitor.md) to retain the logs for long-term use, or integrate with third-party security information and event management (SIEM) tools to gain insights into your environment. |
7980
| Setup active alerting and monitoring | [Track user behavior](./analytics-with-application-insights.md) in Azure AD B2C using Application Insights. |
8081

articles/active-directory-b2c/configure-tokens.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ The following values are set in the previous example:
9494

9595
- **token_lifetime_secs** - Access token lifetimes (seconds). The default is 3,600 (1 hour). The minimum is 300 (5 minutes). The maximum is 86,400 (24 hours).
9696
- **id_token_lifetime_secs** - ID token lifetimes (seconds). The default is 3,600 (1 hour). The minimum is 300 (5 minutes). The maximum is 86,400 (24 hours).
97-
- **refresh_token_lifetime_secs** Refresh token lifetimes (seconds). The default is 120,9600 (14 days). The minimum is 86,400 (24 hours). The maximum is 7,776,000 (90 days).
97+
- **refresh_token_lifetime_secs** Refresh token lifetimes (seconds). The default is 1,209,600 (14 days). The minimum is 86,400 (24 hours). The maximum is 7,776,000 (90 days).
9898
- **rolling_refresh_token_lifetime_secs** - Refresh token sliding window lifetime (seconds). The default is 7,776,000 (90 days). The minimum is 86,400 (24 hours). The maximum is 31,536,000 (365 days). If you don't want to enforce a sliding window lifetime, set the value of `allow_infinite_rolling_refresh_token` to `true`.
9999
- **allow_infinite_rolling_refresh_token** - Refresh token sliding window lifetime never expires.
100100

@@ -238,4 +238,4 @@ When using the [OAuth 2.0 authorization code flow](authorization-code-flow.md),
238238
## Next steps
239239

240240
- Learn more about how to [request access tokens](access-tokens.md).
241-
- Learn how to build [Resilience through developer best practices](../active-directory/fundamentals/resilience-b2c-developer-best-practices.md?bc=%2fazure%2factive-directory-b2c%2fbread%2ftoc.json&toc=%2fazure%2factive-directory-b2c%2fTOC.json).
241+
- Learn how to build [Resilience through developer best practices](../active-directory/fundamentals/resilience-b2c-developer-best-practices.md?bc=%2fazure%2factive-directory-b2c%2fbread%2ftoc.json&toc=%2fazure%2factive-directory-b2c%2fTOC.json).

articles/active-directory/authentication/concept-authentication-oath-tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ Some OATH TOTP hardware tokens are programmable, meaning they don't come with a
3030

3131
## OATH hardware tokens (Preview)
3232

33-
Azure AD supports the use of OATH-TOTP SHA-1 tokens that refresh codes every 30 or 60 seconds. Customers can purchase these tokens from the vendor of their choice.
33+
Azure AD supports the use of OATH-TOTP SHA-1 tokens that refresh codes every 30 or 60 seconds. Customers can purchase these tokens from the vendor of their choice. Hardware OATH tokens are available for users with an Azure AD Premium P1 or P2 license.
3434

3535
OATH TOTP hardware tokens typically come with a secret key, or seed, pre-programmed in the token. These keys must be input into Azure AD as described in the following steps. Secret keys are limited to 128 characters, which may not be compatible with all tokens. The secret key can only contain the characters *a-z* or *A-Z* and digits *2-7*, and must be encoded in *Base32*.
3636

articles/active-directory/devices/concept-azure-ad-join.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Any organization can deploy Azure AD joined devices no matter the size or indust
2626
| | Applicable to all users in an organization |
2727
| **Device ownership** | Organization |
2828
| **Operating Systems** | All Windows 11 and Windows 10 devices except Home editions |
29-
| | [Windows Server 2019 Virtual Machines running in Azure](howto-vm-sign-in-azure-ad-windows.md) (Server core isn't supported) |
29+
| | [Windows Server 2019 and newer Virtual Machines running in Azure](howto-vm-sign-in-azure-ad-windows.md) (Server core isn't supported) |
3030
| **Provisioning** | Self-service: Windows Out of Box Experience (OOBE) or Settings |
3131
| | Bulk enrollment |
3232
| | Windows Autopilot |

articles/active-directory/devices/hybrid-azuread-join-manual.md

Lines changed: 0 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -96,30 +96,6 @@ The **$scp.Keywords** output shows the Azure AD tenant information. Here's an ex
9696
azureADId:72f988bf-86f1-41af-91ab-2d7cd011db47
9797
```
9898

99-
If the service connection point doesn't exist, you can create it by running the `Initialize-ADSyncDomainJoinedComputerSync` cmdlet on your Azure AD Connect server. Enterprise admin credentials are required to run this cmdlet.
100-
101-
The `Initialize-ADSyncDomainJoinedComputerSync` cmdlet:
102-
103-
* Creates the service connection point in the Active Directory forest that Azure AD Connect is connected to.
104-
* Requires you to specify the `AdConnectorAccount` parameter. This account is configured as the Active Directory connector account in Azure AD Connect.
105-
106-
107-
The following script shows an example for using the cmdlet. In this script, `$aadAdminCred = Get-Credential` requires you to type a user name. Provide the user name in the user principal name (UPN) format (`[email protected]`).
108-
109-
```PowerShell
110-
Import-Module -Name "C:\Program Files\Microsoft Azure Active Directory Connect\AdPrep\AdSyncPrep.psm1";
111-
112-
$aadAdminCred = Get-Credential;
113-
114-
Initialize-ADSyncDomainJoinedComputerSync –AdConnectorAccount [connector account name] -AzureADCredentials $aadAdminCred;
115-
```
116-
117-
The `Initialize-ADSyncDomainJoinedComputerSync` cmdlet:
118-
119-
* Uses the Active Directory PowerShell module and Active Directory Domain Services (AD DS) tools. These tools rely on Active Directory Web Services running on a domain controller. Active Directory Web Services is supported on domain controllers running Windows Server 2008 R2 and later.
120-
* Is only supported by the MSOnline PowerShell module version 1.1.166.0. To download this module, use [this link](https://www.powershellgallery.com/packages/MSOnline/1.1.166.0).
121-
* If the AD DS tools aren't installed, `Initialize-ADSyncDomainJoinedComputerSync` will fail. You can install the AD DS tools through Server Manager under **Features** > **Remote Server Administration Tools** > **Role Administration Tools**.
122-
12399
### Set up issuance of claims
124100

125101
In a federated Azure AD configuration, devices rely on AD FS or an on-premises federation service from a Microsoft partner to authenticate to Azure AD. Devices authenticate to get an access token to register against the Azure Active Directory Device Registration Service (Azure DRS).

articles/active-directory/reports-monitoring/concept-usage-insights-report.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.topic: conceptual
99
ms.workload: identity
1010
ms.subservice: report-monitor
11-
ms.date: 11/23/2022
11+
ms.date: 01/10/2023
1212
ms.author: sarahlipsey
1313
ms.reviewer: besiler
1414
---
@@ -44,7 +44,9 @@ There are currently three reports available in Azure AD Usage & insights. All th
4444

4545
### Azure AD application activity (preview)
4646

47-
The **Azure AD application activity (preview)** report shows the list of applications with one or more sign-in attempts. Any application activity during the selected date range appears in the report. It's possible that activity for a deleted application may appear in the report, if the activity took place during the selected date range and before the application was deleted. The report allows you to sort by the number of successful sign-ins, failed sign-ins, and the success rate.
47+
The **Azure AD application activity (preview)** report shows the list of applications with one or more sign-in attempts. Any application activity during the selected date range appears in the report. The report allows you to sort by the number of successful sign-ins, failed sign-ins, and the success rate.
48+
49+
It's possible that activity for a deleted application may appear in the report if the activity took place during the selected date range and before the application was deleted. Other scenarios could include a user attempting to sign in to an application that doesn't have a service principal associated with the app. For these types of scenarios, you may need to review the audit logs or sign-in logs to investigate further.
4850

4951
Select the **View sign in activity** link for an application to view more details. The sign-in graph per application counts interactive user sign-ins. The details of any sign-in failures appears below the table.
5052

articles/active-directory/verifiable-credentials/issuance-request-api.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -30,10 +30,10 @@ The Request Service REST API issuance request supports the following HTTP method
3030

3131
The Request Service REST API issuance request requires the following HTTP headers:
3232

33-
| Method |Value |
33+
| Name |Value |
3434
|---------|---------|
3535
|`Authorization`| Attach the access token as a bearer token to the authorization header in an HTTP request. For example, `Authorization: Bearer <token>`.|
36-
|`Content-Type`| `Application/json`|
36+
|`Content-Type`| `application/json`|
3737

3838
Construct an HTTP POST request to the Request Service REST API.
3939

@@ -46,18 +46,18 @@ The following HTTP request demonstrates a request to the Request Service REST AP
4646
```http
4747
POST https://verifiedid.did.msidentity.com/v1.0/verifiableCredentials/createIssuanceRequest
4848
Content-Type: application/json
49-
Authorization: Bearer <token>
49+
Authorization: Bearer <token>
5050
5151
{
52-
"includeQRCode": true,
53-
"callback": {
54-
"url": "https://wwww.contoso.com/vc/callback",
55-
"state": "Aaaabbbb11112222",
56-
"headers": {
57-
"api-key": "an-api-key-can-go-here"
58-
   }
59-
},
60-
...
52+
"includeQRCode": true,
53+
"callback": {
54+
"url": "https://wwww.contoso.com/vc/callback",
55+
"state": "Aaaabbbb11112222",
56+
"headers": {
57+
"api-key": "an-api-key-can-go-here"
58+
}
59+
},
60+
...
6161
}
6262
```
6363

@@ -182,7 +182,7 @@ When your app receives the response, the app needs to present the QR code to the
182182

183183
## Error response
184184

185-
If there is an error with the request, an [error responses](error-codes.md) will be returned and should be handled appropriately by the app.
185+
If there is an error with the request, an [error response](error-codes.md) will be returned and should be handled appropriately by the app.
186186

187187
## Callback events
188188

articles/aks/azure-cni-overlay.md

Lines changed: 10 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -129,31 +129,15 @@ az provider register --namespace Microsoft.ContainerService
129129

130130
## Set up overlay clusters
131131

132-
The following steps create a new virtual network with a subnet for the cluster nodes and an AKS cluster that uses Azure CNI Overlay.
133-
134-
1. Create a virtual network with a subnet for the cluster nodes. Replace the values for the variables `resourceGroup`, `vnet` and `location`.
135-
136-
```azurecli-interactive
137-
resourceGroup="myResourceGroup"
138-
vnet="myVirtualNetwork"
139-
location="westcentralus"
140-
141-
# Create the resource group
142-
az group create --name $resourceGroup --location $location
143-
144-
# Create a VNet and a subnet for the cluster nodes
145-
az network vnet create -g $resourceGroup --location $location --name $vnet --address-prefixes 10.0.0.0/8 -o none
146-
az network vnet subnet create -g $resourceGroup --vnet-name $vnet --name nodesubnet --address-prefix 10.10.0.0/16 -o none
147-
```
148-
149-
2. Create a cluster with Azure CNI Overlay. Use the argument `--network-plugin-mode` to specify that this is an overlay cluster. If the pod CIDR is not specified then AKS assigns a default space, viz. 10.244.0.0/16. Replace the values for the variables `clusterName` and `subscription`.
150-
151-
```azurecli-interactive
152-
clusterName="myOverlayCluster"
153-
subscription="aaaaaaa-aaaaa-aaaaaa-aaaa"
154-
155-
az aks create -n $clusterName -g $resourceGroup --location $location --network-plugin azure --network-plugin-mode overlay --pod-cidr 192.168.0.0/16 --vnet-subnet-id /subscriptions/$subscription/resourceGroups/$resourceGroup/providers/Microsoft.Network/virtualNetworks/$vnet/subnets/nodesubnet
156-
```
132+
Create a cluster with Azure CNI Overlay. Use the argument `--network-plugin-mode` to specify that this is an overlay cluster. If the pod CIDR is not specified then AKS assigns a default space, viz. 10.244.0.0/16. Replace the values for the variables `clusterName`, `resourceGroup`, and `location`.
133+
134+
```azurecli-interactive
135+
clusterName="myOverlayCluster"
136+
resourceGroup="myResourceGroup"
137+
location="westcentralus"
138+
139+
az aks create -n $clusterName -g $resourceGroup --location $location --network-plugin azure --network-plugin-mode overlay --pod-cidr 192.168.0.0/16
140+
```
157141

158142
## Next steps
159143

@@ -162,4 +146,4 @@ To learn how to utilize AKS with your own Container Network Interface (CNI) plug
162146
<!-- LINKS - internal -->
163147
[az-provider-register]: /cli/azure/provider#az-provider-register
164148
[az-feature-register]: /cli/azure/feature#az-feature-register
165-
[az-feature-show]: /cli/azure/feature#az-feature-show
149+
[az-feature-show]: /cli/azure/feature#az-feature-show

articles/aks/azure-cni-powered-by-cilium.md

Lines changed: 1 addition & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -112,7 +112,6 @@ Create the cluster using `--enable-cilium-dataplane`:
112112
```azurecli-interactive
113113
az aks create -n <clusterName> -g <resourceGroupName> -l <location> \
114114
--max-pods 250 \
115-
--node-count 2 \
116115
--network-plugin azure \
117116
--vnet-subnet-id /subscriptions/<subscriptionId>/resourceGroups/<resourceGroupName>/providers/Microsoft.Network/virtualNetworks/<vnetName>/subnets/nodesubnet \
118117
--pod-subnet-id /subscriptions/<subscriptionId>/resourceGroups/<resourceGroupName>/providers/Microsoft.Network/virtualNetworks/<vnetName>/subnets/podsubnet \
@@ -121,29 +120,13 @@ az aks create -n <clusterName> -g <resourceGroupName> -l <location> \
121120

122121
### Option 2: Assign IP addresses from an overlay network
123122

124-
Run these commands to create a resource group and VNet with a single subnet:
125-
126-
```azurecli-interactive
127-
# Create the resource group
128-
az group create --name <resourceGroupName> --location <location>
129-
```
130-
131-
```azurecli-interactive
132-
# Create a VNet with a subnet for nodes and a subnet for pods
133-
az network vnet create -g <resourceGroupName> --location <location> --name <vnetName> --address-prefixes <address prefix, example: 10.0.0.0/8> -o none
134-
az network vnet subnet create -g <resourceGroupName> --vnet-name <vnetName> --name nodesubnet --address-prefixes <address prefix, example: 10.240.0.0/16> -o none
135-
```
136-
137-
Then create the cluster using `--enable-cilium-dataplane`:
123+
Run this commands to create a cluster with an overlay network and Cilium. Replace the values for `<clusterName>`, `<resourceGroupName>`, and `<location>`:
138124

139125
```azurecli-interactive
140126
az aks create -n <clusterName> -g <resourceGroupName> -l <location> \
141-
--max-pods 250 \
142-
--node-count 2 \
143127
--network-plugin azure \
144128
--network-plugin-mode overlay \
145129
--pod-cidr 192.168.0.0/16 \
146-
--vnet-subnet-id /subscriptions/<subscriptionId>/resourceGroups/<resourceGroupName>/providers/Microsoft.Network/virtualNetworks/<vnetName>/subnets/nodesubnet \
147130
--enable-cilium-dataplane
148131
```
149132

articles/aks/use-kms-etcd-encryption.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Use Key Management Service (KMS) etcd encryption in Azure Kubernetes Serv
33
description: Learn how to use the Key Management Service (KMS) etcd encryption with Azure Kubernetes Service (AKS)
44
services: container-service
55
ms.topic: article
6-
ms.date: 12/17/2022
6+
ms.date: 01/09/2023
77
---
88

99
# Add Key Management Service (KMS) etcd encryption to an Azure Kubernetes Service (AKS) cluster
@@ -32,6 +32,7 @@ The following limitations apply when you integrate KMS etcd encryption with AKS:
3232

3333
* Deletion of the key, Key Vault, or the associated identity isn't supported.
3434
* KMS etcd encryption doesn't work with system-assigned managed identity. The key vault access policy is required to be set before the feature is enabled. In addition, system-assigned managed identity isn't available until cluster creation, thus there's a cycle dependency.
35+
* Azure Key Vault with Firewall enabled to allow public access isn't supported because it blocks traffic from KMS plugin to the Key Vault.
3536
* The maximum number of secrets that a cluster enabled with KMS supports is 2,000.
3637
* Bring your own (BYO) Azure Key Vault from another tenant isn't supported.
3738
* With KMS enabled, you can't change associated Azure Key Vault model (public, private). To [change associated key vault mode][changing-associated-key-vault-mode], you need to disable and enable KMS again.
@@ -282,6 +283,8 @@ After changing the key ID (including key name and key version), you can use [az
282283

283284
> [!WARNING]
284285
> Remember to update all secrets after key rotation. Otherwise, the secrets will be inaccessible if the old keys are not existing or working.
286+
>
287+
> Once you rotate the key, the old key (key1) is still cached and shouldn't be deleted. If you want to delete the old key (key1) immediately, you need to rotate the key twice. Then key2 and key3 are cached, and key1 can be deleted without impacting existing cluster.
285288
286289
```azurecli-interactive
287290
az aks update --name myAKSCluster --resource-group MyResourceGroup --enable-azure-keyvault-kms --azure-keyvault-kms-key-id $NewKEY_ID --azure-keyvault-kms-key-vault-network-access "Private" --azure-keyvault-kms-key-vault-resource-id $KEYVAULT_RESOURCE_ID

0 commit comments

Comments
 (0)