You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This article shows you how to configure Azure App Service or Azure Functions to use a custom authentication provider that adheres to the [OpenID Connect (OIDC) specification](https://openid.net/connect/). OIDC is an industry standard that many identity providers (IDPs) use. You don't need to understand the details of the specification in order to configure your app to use an adherent IDP.
17
+
This article shows you how to configure Azure App Service or Azure Functions to use a custom authentication provider that adheres to the [OpenID Connect (OIDC) specification](https://openid.net/connect/). OIDC is an industry standard that many identity providers (IDPs) use. You don't need to understand the details of the specification for your app to use an OIDC identity provider.
17
18
18
-
You can configure your app to use one or more OIDC providers. Each must have a unique alphanumeric name in the configuration, and only one can serve as the default redirect target.
19
+
You can configure your app to use one or more OIDC providers. Each provider must have a unique alphanumeric name in the configuration. Only one provider can serve as the default redirect target.
19
20
20
21
## <aname="register"> </a>Register your application with the identity provider
21
22
22
23
Your provider requires you to register the details of your application with it. One of these steps involves specifying a redirect URI that has the form `<app-url>/.auth/login/<provider-name>/callback`. Each identity provider should provide more instructions on how to complete the steps. The `<provider-name>` value refers to the friendly name that you give to the OpenID provider name in Azure.
23
24
24
25
> [!NOTE]
25
-
> Some providers might require additional steps for their configuration and for using the values that they provide. For example, Apple provides a private key that isn't itself used as the OIDC client secret. You instead must use it to craft a JSON Web Token (JWT) that's treated as the secret that you provide in your app configuration. For more information, see [Creating a client secret](https://developer.apple.com/documentation/sign_in_with_apple/generate_and_validate_tokens) in the Apple developer documentation.
26
+
> Some providers might require extra steps for their configuration and for using the values that they provide. For example, Apple provides a private key that isn't itself used as the OIDC client secret. You use it to create a JSON Web Token (JWT). You use the web token as the secret that you provide in your app configuration. For more information, see [Creating a client secret](https://developer.apple.com/documentation/sign_in_with_apple/generate_and_validate_tokens).
26
27
27
-
You need to collect a *client ID* and a *client secret* for your application. The client secret is an important security credential. Don't share this secret with anyone or distribute it within a client application.
28
+
You need to collect a *client ID* and a *client secret* for your application. The client secret is an important security credential. Don't share this secret with anyone or distribute it in a client application.
28
29
29
-
Additionally, you need the OIDC metadata for the provider. This metadata is often exposed in a [configuration metadata document](https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderConfig), which is the provider's issuer URL suffixed with `/.well-known/openid-configuration`. Gather this configuration URL.
30
+
You also need the OIDC metadata for the provider. This metadata is often exposed in a [configuration metadata document](https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderConfig), which is the provider's issuer URL suffixed with `/.well-known/openid-configuration`. Get this configuration URL.
30
31
31
-
If you can't use a configuration metadata document, gather the following values separately:
32
+
If you can't use a configuration metadata document, get the following values separately:
32
33
33
34
- The issuer URL (sometimes shown as `issuer`)
34
35
- The [OAuth 2.0 authorization endpoint](https://tools.ietf.org/html/rfc6749#section-3.1) (sometimes shown as `authorization_endpoint`)
@@ -37,26 +38,30 @@ If you can't use a configuration metadata document, gather the following values
37
38
38
39
## <aname="configure"> </a>Add provider information to your application
39
40
41
+
To add provider information for your OpenID Connect provider, follow these steps.
42
+
40
43
1. Sign in to the [Azure portal] and go to your app.
41
44
42
-
1. On the left menu, select **Authentication**. Then select **Add identity provider**.
45
+
1. On the left menu, select **Settings** > **Authentication**. Then select **Add identity provider**.
43
46
44
-
1.In the dropdown list for identity providers, select **OpenID Connect**.
1. For **OpenID provider name**, provide the unique alphanumeric name that you selected earlier.
47
50
48
-
1. If you have the URL for the metadata document from the identity provider, provide that value for **Metadata URL**. Otherwise, select the **Provide endpoints separately** option and put each URL gathered from the identity provider in the appropriate field.
51
+
1. If you have the URL for the metadata document from the identity provider, provide that value for **Metadata URL**.
52
+
53
+
Otherwise, select **Provide endpoints separately**. Put each URL from the identity provider in the appropriate field.
49
54
50
-
1. Provide the values that you collected earlier for **Client ID** and **Client Secret**.
55
+
1. Provide the values that you collected earlier for **Client ID** and **Client secret**.
51
56
52
-
1. Specify an application setting name for your client secret. Your client secret is stored as an app setting to ensure that secrets are stored in a secure fashion. You can update that setting later to use [Azure Key Vault references](./app-service-key-vault-references.md) if you want to manage the secret in Key Vault.
57
+
1. Specify an application setting name for your client secret. Your client secret is stored as an app setting to ensure that secrets are stored in a secure fashion. If you want to manage the secret in Azure Key vault, update that setting later to use [Azure Key Vault references](./app-service-key-vault-references.md).
53
58
54
59
1. Select **Add** to finish setting up the identity provider.
55
60
56
61
> [!NOTE]
57
-
> The OpenID provider name can't contain a hyphen (-) because an app setting is created based on this name, and the app setting doesn't support hyphens. Use an underscore (_) instead.
62
+
> The OpenID provider name can't contain a hyphen (-) because an app setting is created based on this name. The app setting doesn't support hyphens. Use an underscore (_) instead.
58
63
>
59
-
> Azure requires `openid`, `profile`, and `email` scopes. Make sure that you configured your app registration in your ID provider with at least these scopes.
64
+
> Azure requires `openid`, `profile`, and `email` scopes. Make sure that you configure your app registration in your ID provider with at least these scopes.
# Sleep a few seconds so we don't send too many import requests https://docs.microsoft.com/en-us/azure/azure-subscription-service-limits#azure-automation-limits
177
+
# Sleep a few seconds so we don't send too many import requests https://learn.microsoft.com/en-us/azure/azure-resource-manager/management/azure-subscription-service-limits#azure-automation-limits
Copy file name to clipboardExpand all lines: articles/azure-cache-for-redis/cache-monitor-diagnostic-settings.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ Diagnostic settings in Azure are used to collect resource logs. An Azure resourc
29
29
30
30
## Cache Metrics
31
31
32
-
Azure Cache for Redis emits [many metrics](/azure/redis/monitor-cache-reference.md#metrics) such as _Server Load_ and _Connections per Second_ that are useful to log. Selecting the **AllMetrics** option allows these and other cache metrics to be logged. You can configure how long the metrics are retained. See [here for an example of exporting cache metrics to a storage account](/azure/redis/monitor-cache.md#view-cache-metrics).
32
+
Azure Cache for Redis emits [many metrics](../redis/monitor-cache-reference.md#metrics) such as _Server Load_ and _Connections per Second_ that are useful to log. Selecting the **AllMetrics** option allows these and other cache metrics to be logged. You can configure how long the metrics are retained. See [here for an example of exporting cache metrics to a storage account](../redis/monitor-cache.md#view-cache-metrics).
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/azure-netapp-files-resource-limits.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,11 +40,11 @@ The following table describes resource limits for Azure NetApp Files:
40
40
| Maximum number of files in a single directory |*Approximately* 4 million. <br> See [Determine if a directory is approaching the limit size](directory-sizes-concept.md#directory-limit). | No |
41
41
| Maximum number of files `maxfiles` per volume | See [`maxfiles`](maxfiles-concept.md)| Yes |
42
42
| Maximum number of export policy rules per volume | 5 | No |
43
-
| Maximum number of quota rules per volume |100| No |
43
+
| Maximum number of quota rules per volume |1,000| No |
44
44
| Minimum assigned throughput for a manual Quality of Service (QoS) volume | 1 MiB/s | No |
45
45
| Maximum assigned throughput for a manual QoS volume | 4,500 MiB/s | No |
46
-
| Number of cross-region replication data protection volumes (destination volumes) |50| Yes |
47
-
| Number of cross-zone replication data protection volumes (destination volumes) |50| Yes |
46
+
| Number of cross-region replication data protection volumes (destination volumes) |500| Yes |
47
+
| Number of cross-zone replication data protection volumes (destination volumes) |500| Yes |
48
48
| Maximum numbers of policy-based (scheduled) backups per volume | <ul><li> Daily retention count: 2 (minimum) to 1019 (maximum) </li> <li> Weekly retention count: 1 (minimum) to 1019 (maximum) </li> <li> Monthly retention count: 1 (minimum) to 1019 (maximum) </ol></li> <br> The maximum hourly, daily, weekly, and monthly backup retention counts *combined* is 1019. | No |
49
49
| Maximum size of protected volume | 100 TiB | No |
50
50
| Maximum number of volumes that can be backed up per subscription | 500 | No |
Copy file name to clipboardExpand all lines: articles/backup/backup-azure-vm-migrate-enhanced-policy.md
+6-1Lines changed: 6 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Move VM backup - standard to enhanced policy in Azure Backup
3
3
description: Learn how to trigger Azure VM backups migration from standard policy to enhanced policy, and then monitor the configuration backup migration job.
4
4
ms.topic: reference
5
-
ms.date: 03/05/2025
5
+
ms.date: 04/02/2025
6
6
ms.service: azure-backup
7
7
author: jyothisuri
8
8
ms.author: jsuri
@@ -23,6 +23,11 @@ Azure Backup now supports migration to the enhanced policy for Azure VM backups
23
23
- Migration operations trigger a backup job as part of the migration process and might take up to several hours to complete for large VMs.
24
24
- The change from standard policy to enhanced policy can result in additional costs. [Learn More](backup-instant-restore-capability.md#cost-impact).
25
25
26
+
>[!Note]
27
+
> If the VM already has a shared disk attached to it, then perform migration by following these steps:
28
+
>1. Detach the shared disk from the VM.
29
+
>2.[Perform the Policy change](#trigger-the-backup-migration-operation).
30
+
>3. Reattach the shared disk to implement the exclusion.
Copy file name to clipboardExpand all lines: articles/backup/backup-instant-restore-capability.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Azure Instant Restore Capability
3
3
description: Azure Instant Restore Capability and FAQs for VM backup stack, Resource Manager deployment model
4
4
ms.topic: overview
5
-
ms.date: 03/27/2025
5
+
ms.date: 04/02/2025
6
6
author: jyothisuri
7
7
ms.author: jsuri
8
8
---
@@ -138,3 +138,6 @@ Instant restore feature is enabled for everyone and can't be disabled. You can r
138
138
139
139
Yes it's safe, and there's absolutely no impact in data transfer speed.
140
140
141
+
### Why does a 12-month backup retention policy retain data for 372 days instead of 365?
142
+
143
+
The retention period for monthly backups is calculated considering **31 days** for each month. When you multiply 31 days by 12 months, the total retention duration becomes **372 days**. This approach ensures consistent retention across all months, regardless of their actual number of days.
0 commit comments