Skip to content

Commit 7234e6a

Browse files
authored
Merge branch 'main' into eflow-diagnose-nw
2 parents e3a6d15 + a359464 commit 7234e6a

File tree

159 files changed

+2506
-486
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

159 files changed

+2506
-486
lines changed

articles/active-directory-b2c/json-transformations.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,6 +68,7 @@ The following example generates a JSON string based on the claim value of "email
6868
<InputClaims>
6969
<InputClaim ClaimTypeReferenceId="email" TransformationClaimType="personalizations.0.to.0.email" />
7070
<InputClaim ClaimTypeReferenceId="otp" TransformationClaimType="personalizations.0.dynamic_template_data.otp" />
71+
<InputClaim ClaimTypeReferenceId="email" TransformationClaimType="personalizations.0.dynamic_template_data.verify-email" />
7172
</InputClaims>
7273
<InputParameters>
7374
<InputParameter Id="template_id" DataType="string" Value="d-4c56ffb40fa648b1aa6822283df94f60"/>
@@ -464,4 +465,4 @@ Output claim:
464465

465466
## Next steps
466467

467-
- Find more [claims transformation samples](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-transformation/json) on the Azure AD B2C community GitHub repo
468+
- Find more [claims transformation samples](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-transformation/json) on the Azure AD B2C community GitHub repo

articles/active-directory/develop/sample-v2-code.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,6 @@ The following samples show public client desktop applications that access the Mi
7676
> | Language/<br/>Platform | Code sample(s) <br/> on GitHub | Auth<br/> libraries | Auth flow |
7777
> | ------- | -------- | ------------- | -------------- |
7878
> | .NET Core | &#8226; [Call Microsoft Graph](https://github.com/Azure-Samples/ms-identity-dotnet-desktop-tutorial/tree/master/1-Calling-MSGraph/1-1-AzureAD) <br/> &#8226; [Call Microsoft Graph with token cache](https://github.com/Azure-Samples/ms-identity-dotnet-desktop-tutorial/tree/master/2-TokenCache) <br/> &#8226; [Call Micrsoft Graph with custom web UI HTML](https://github.com/Azure-Samples/ms-identity-dotnet-desktop-tutorial/tree/master/3-CustomWebUI/3-1-CustomHTML) <br/> &#8226; [Call Microsoft Graph with custom web browser](https://github.com/Azure-Samples/ms-identity-dotnet-desktop-tutorial/tree/master/3-CustomWebUI/3-2-CustomBrowser) <br/> &#8226; [Sign in users with device code flow](https://github.com/Azure-Samples/ms-identity-dotnet-desktop-tutorial/tree/master/4-DeviceCodeFlow) | MSAL.NET |&#8226; Authorization code with PKCE <br/> &#8226; Device code |
79-
> | .NET | &#8226; [Call Microsoft Graph with daemon console](https://github.com/Azure-Samples/active-directory-dotnetcore-daemon-v2/tree/master/1-Call-MSGraph) <br/> &#8226; [Call web API with daemon console](https://github.com/Azure-Samples/active-directory-dotnetcore-daemon-v2/blob/master/2-Call-OwnApi/README.md) | MSAL.NET | Authorization code with PKCE |
8079
> | .NET | [Invoke protected API with integrated Windows authentication](https://github.com/azure-samples/active-directory-dotnet-iwa-v2) | MSAL.NET | Integrated Windows authentication |
8180
> | Java | [Call Microsoft Graph](https://github.com/Azure-Samples/ms-identity-msal-java-samples/tree/main/2.%20Client-Side%20Scenarios/Integrated-Windows-Auth-Flow) | MSAL Java | Integrated Windows authentication |
8281
> | Node.js | [Sign in users](https://github.com/Azure-Samples/ms-identity-javascript-nodejs-desktop) | MSAL Node | Authorization code with PKCE |

articles/active-directory/develop/v2-oauth2-on-behalf-of-flow.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -213,8 +213,8 @@ A service-to-service request for a SAML assertion contains the following paramet
213213

214214
The response contains a SAML token encoded in UTF8 and Base64url.
215215

216-
- **SubjectConfirmationData for a SAML assertion sourced from an OBO call**: If the target application requires a recipient value in **SubjectConfirmationData**, then the value must be a non-wildcard Reply URL in the resource application configuration.
217-
- **The SubjectConfirmationData node**: The node can't contain an **InResponseTo** attribute since it's not part of a SAML response. The application receiving the SAML token must be able to accept the SAML assertion without an **InResponseTo** attribute.
216+
- **SubjectConfirmationData for a SAML assertion sourced from an OBO call**: If the target application requires a `Recipient` value in `SubjectConfirmationData`, then the value must be configured as the first non-wildcard Reply URL in the resource application configuration. Since the default Reply URL isn't used to determine the `Recipient` value, you might have to reorder the Reply URLs in the application configuration.
217+
- **The SubjectConfirmationData node**: The node can't contain an `InResponseTo` attribute since it's not part of a SAML response. The application receiving the SAML token must be able to accept the SAML assertion without an `InResponseTo` attribute.
218218
- **API permissions**: You have to [add the necessary API permissions](quickstart-configure-app-access-web-apis.md) on the middle-tier application to allow access to the SAML application, so that it can request a token for the `/.default` scope of the SAML application.
219219
- **Consent**: Consent must have been granted to receive a SAML token containing user data on an OAuth flow. For information, see [Gaining consent for the middle-tier application](#gaining-consent-for-the-middle-tier-application) below.
220220

articles/active-directory/devices/device-management-azure-portal.md

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -107,6 +107,25 @@ To view or copy BitLocker keys, you need to be the owner of the device or have o
107107
- Security Administrator
108108
- Security Reader
109109

110+
## Block users from viewing their BitLocker keys (preview)
111+
In this preivew, admins can block self-service BitLocker key access to the registered owner of the device. Default users without the BitLocker read permission will be unable to view or copy their BitLocker key(s) for their owned devices.
112+
113+
To disable/enable self-service BitLocker recovery:
114+
115+
```PowerShell
116+
Connect-MgGraph -Scopes Policy.ReadWrite.Authorization
117+
$authPolicyUri = "https://graph.microsoft.com/beta/policies/authorizationPolicy/authorizationPolicy"
118+
$body = @{
119+
defaultUserRolePermissions = @{
120+
allowedToReadBitlockerKeysForOwnedDevice = $false #Set this to $true to allow BitLocker self-service recovery
121+
}
122+
}| ConvertTo-Json
123+
Invoke-MgGraphRequest -Uri $authPolicyUri -Method PATCH -Body $body
124+
# Show current policy setting
125+
$authPolicy = Invoke-MgGraphRequest -Uri $authPolicyUri
126+
$authPolicy.defaultUserRolePermissions
127+
```
128+
110129
## View and filter your devices (preview)
111130

112131
In this preview, you have the ability to infinitely scroll, reorder columns, and select all devices. You can filter the device list by these device attributes:

articles/aks/cluster-configuration.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -31,9 +31,9 @@ By using `containerd` for AKS nodes, pod startup latency improves and node resou
3131
`Containerd` works on every GA version of Kubernetes in AKS, and in every upstream kubernetes version above v1.19, and supports all Kubernetes and AKS features.
3232

3333
> [!IMPORTANT]
34-
> Clusters with Linux node pools created on Kubernetes v1.19 or greater default to `containerd` for its container runtime. Clusters with node pools on a earlier supported Kubernetes versions receive Docker for their container runtime. Linux node pools will be updated to `containerd` once the node pool Kubernetes version is updated to a version that supports `containerd`. You can still use Docker node pools and clusters on versions below 1.23, but Docker is no longer supported as of September 2022.
34+
> Clusters with Linux node pools created on Kubernetes v1.19 or greater default to `containerd` for its container runtime. Clusters with node pools on a earlier supported Kubernetes versions receive Docker for their container runtime. Linux node pools will be updated to `containerd` once the node pool Kubernetes version is updated to a version that supports `containerd`.
3535
>
36-
> Using `containerd` with Windows Server 2019 node pools is generally available, and will be the only container runtime option in Kubernetes 1.21 and greater. For more details, see [Add a Windows Server node pool with `containerd`][/learn/aks-add-np-containerd].
36+
> Using `containerd` with Windows Server 2019 node pools is generally available, and will be the only container runtime option in Kubernetes 1.21 and greater. You can still use Docker node pools and clusters on versions below 1.23, but Docker is no longer supported as of September 2022. For more details, see [Add a Windows Server node pool with `containerd`][aks-add-np-containerd].
3737
>
3838
> It is highly recommended to test your workloads on AKS node pools with `containerd` prior to using clusters with a Kubernetes version that supports `containerd` for your node pools.
3939
@@ -232,4 +232,4 @@ az aks show -n aks -g myResourceGroup --query "oidcIssuerProfile.issuerUrl" -ots
232232
[az-feature-register]: /cli/azure/feature#az_feature_register
233233
[az-feature-list]: /cli/azure/feature#az_feature_list
234234
[az-provider-register]: /cli/azure/provider#az_provider_register
235-
[aks-add-np-containerd]: windows-container-cli.md#add-a-windows-server-node-pool-with-containerd
235+
[aks-add-np-containerd]: ./learn/quick-windows-container-deploy-cli.md#add-a-windows-server-node-pool-with-containerd

articles/aks/index.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,10 @@ landingContent:
2828
links:
2929
- text: Use CVM (Preview)
3030
url: use-cvm.md
31+
- text: AKS GitHub Actions
32+
url: kubernetes-action.md
33+
- text: FIPS support for Windows Server node pools
34+
url: enable-fips-nodes.md#create-a-fips-enabled-windows-node-pool
3135
- text: Automatically upgrade an AKS cluster
3236
url: auto-upgrade-cluster.md
3337
- text: Start/stop node pools

articles/api-management/api-management-howto-aad-b2c.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ Azure Active Directory B2C is a cloud identity management solution for consumer-
1919
In this tutorial, you'll learn the configuration required in your API Management service to integrate with Azure Active Directory B2C. As noted later in this article, if you are using the deprecated legacy developer portal, some steps will differ.
2020

2121
> [!IMPORTANT]
22-
> * This article has been updated with steps to configure an Azure AD B2C app using the Microsoft Authentication Library ([MSAL](../active-directory/develop/msal-overview.md)) v2.0.
22+
> * This article has been updated with steps to configure an Azure AD B2C app using the Microsoft Authentication Library ([MSAL](../active-directory/develop/msal-overview.md)).
2323
> * If you previously configured an Azure AD B2C app for user sign-in using the Azure AD Authentication Library (ADAL), we recommend that you [migrate to MSAL](#migrate-to-msal).
2424
2525
For information about enabling access to the developer portal by using classic Azure Active Directory, see [How to authorize developer accounts using Azure Active Directory](api-management-howto-aad.md).

articles/app-service/configure-language-java.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -640,10 +640,10 @@ Next, determine if the data source should be available to one application or to
640640
<Resource
641641
name="jdbc/dbconnection"
642642
type="javax.sql.DataSource"
643-
url="${dbuser}"
643+
url="${connURL}"
644644
driverClassName="<insert your driver class name>"
645-
username="${dbpassword}"
646-
password="${connURL}"
645+
username="${dbuser}"
646+
password="${dbpassword}"
647647
/>
648648
</Context>
649649
```

articles/application-gateway/proxy-buffers.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: application-gateway
55
author: jaesoni
66
ms.service: application-gateway
77
ms.topic: how-to
8-
ms.date: 12/01/2021
8+
ms.date: 08/03/2022
99
ms.author: jaysoni
1010
#Customer intent: As a user, I want to know how can I disable/enable proxy buffers.
1111
---
@@ -73,4 +73,4 @@ For reference, visit [Azure SDK for .NET](/dotnet/api/microsoft.azure.management
7373
## Limitations
7474
- API version 2020-01-01 or later should be used to configure buffers.
7575
- Currently, these changes are supported only through ARM templates.
76-
- Request and Response Buffers cannot be disabled for WAF v2 SKU.
76+
- Request and Response Buffers can only be disabled for the WAF v2 SKU if request body checking is disabled. Otherwise, Request and Response Buffers cannot be disabled for the WAF v2 SKU.

articles/availability-zones/migrate-app-service.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn how to migrate Azure App Service to availability zone support
55
author: anaharris-ms
66
ms.service: app-service
77
ms.topic: conceptual
8-
ms.date: 06/07/2022
8+
ms.date: 08/03/2022
99
ms.author: anaharris
1010
ms.reviewer: jordanselig
1111
ms.custom: references_regions
@@ -45,6 +45,7 @@ Availability zone support is a property of the App Service plan. The following a
4545
- France Central
4646
- UK South
4747
- Japan East
48+
- East Asia
4849
- Southeast Asia
4950
- Australia East
5051
- Availability zones can only be specified when creating a **new** App Service plan. A pre-existing App Service plan can't be converted to use availability zones.
@@ -146,4 +147,4 @@ There's no additional cost associated with enabling availability zones. Pricing
146147
> [Overview of autoscale in Microsoft Azure](../azure-monitor/autoscale/autoscale-overview.md)
147148
148149
> [!div class="nextstepaction"]
149-
> [Manage disaster recovery](../app-service/manage-disaster-recovery.md)
150+
> [Manage disaster recovery](../app-service/manage-disaster-recovery.md)

0 commit comments

Comments
 (0)