You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concept-sspr-writeback.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -101,7 +101,7 @@ Password writeback is a highly secure service. To ensure your information is pro
101
101
After a user submits a password reset, the reset request goes through several encryption steps before it arrives in your on-premises environment. These encryption steps ensure maximum service reliability and security. They are described as follows:
102
102
103
103
1.**Password encryption with 2048-bit RSA Key**: After a user submits a password to be written back to on-premises, the submitted password itself is encrypted with a 2048-bit RSA key.
104
-
1.**Package-level encryption with AES-GCM**: The entire package, the password plus the required metadata, is encrypted by using AES-GCM. This encryption prevents anyone with direct access to the underlying Service Bus channel from viewing or tampering with the contents.
104
+
1.**Package-level encryption with 256-bit AES-GCM**: The entire package, the password plus the required metadata, is encrypted by using AES-GCM (with a key size of 256 bits). This encryption prevents anyone with direct access to the underlying Service Bus channel from viewing or tampering with the contents.
105
105
1.**All communication occurs over TLS/SSL**: All the communication with Service Bus happens in an SSL/TLS channel. This encryption secures the contents from unauthorized third parties.
106
106
1.**Automatic key rollover every six months**: All keys roll over every six months, or every time password writeback is disabled and then re-enabled on Azure AD Connect, to ensure maximum service security and safety.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/msal-net-migration.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,9 +49,10 @@ For details about the decision tree below, read [MSAL.NET or Microsoft.Identity.
49
49
50
50
## Next steps
51
51
52
+
- Learn about [public client and confidential client applications](msal-client-applications.md).
52
53
- Learn how to [migrate confidential client applications built on top of ASP.NET MVC or .NET classic from ADAL.NET to MSAL.NET](msal-net-migration-confidential-client.md).
53
54
- Learn how to [migrate public client applications built on top of .NET or .NET classic from ADAL.NET to MSAL.NET](msal-net-migration-public-client.md).
54
55
- Learn more about the [Differences between ADAL.NET and MSAL.NET apps](msal-net-differences-adal-net.md).
55
56
- Learn how to migrate confidential client applications built on top of ASP.NET Core from ADAL.NET to Microsoft.Identity.Web:
> Secure access to the AKS Run Command by assigning the "AKS Run Command role" to specific users and/or groups in combination with Just-in-Time access or Conditional Access policies.
154
+
> Secure access to the AKS Run Command by creating a Custom role with the "Microsoft.ContainerService/managedClusters/runcommand/action" permissions and assign to specific users and/or groups in combination with Just-in-Time access or Conditional Access policies.
Copy file name to clipboardExpand all lines: articles/api-management/api-management-howto-aad-b2c.md
+20-14Lines changed: 20 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ author: dlepow
7
7
8
8
ms.service: api-management
9
9
ms.topic: how-to
10
-
ms.date: 07/07/2021
10
+
ms.date: 09/28/2021
11
11
ms.author: danlep
12
12
---
13
13
@@ -16,20 +16,20 @@ ms.author: danlep
16
16
17
17
Azure Active Directory B2C is a cloud identity management solution for consumer-facing web and mobile applications. You can use it to manage access to your API Management developer portal.
18
18
19
-
This guide shows youthe configuration that's required in your API Management service to integrate with Azure Active Directory B2C. If you are using the deprecated legacy developer portal, some steps differ, as noted in this article.
19
+
In this tutorial, you'll learn the configuration required in your API Management service to integrate with Azure Active Directory B2C. As noted later in this article, if you are using the deprecated legacy developer portal, some steps will differ.
20
20
21
21
For information about enabling access to the developer portal by using classic Azure Active Directory, see [How to authorize developer accounts using Azure Active Directory](api-management-howto-aad.md).
22
22
23
23
## Prerequisites
24
24
25
-
* An Azure Active Directory B2C tenant to create an application in. For more information, see [Azure Active Directory B2C overview](../active-directory-b2c/overview.md).
26
-
* If you don't already have an API Management service, complete the following quickstart: [Create an Azure API Management instance](get-started-create-service-instance.md)
25
+
* An Azure Active Directory B2C tenant in which to create an application. For more information, see [Azure Active Directory B2C overview](../active-directory-b2c/overview.md).
26
+
*An API Management instance. If you don't already have one, [create an Azure API Management instance](get-started-create-service-instance.md).
In this section, create a user flow in your Azure Active Directory B2C tenant containing both sign up and sign in policies. For detailed steps, see [Create user flows and custom policies in Azure Active Directory B2C](../active-directory-b2c/tutorial-create-user-flows.md?pivots=b2c-us).
32
+
In this section, you'll create a user flow in your Azure Active Directory B2C tenant containing both sign up and sign in policies. For detailed steps, see [Create user flows and custom policies in Azure Active Directory B2C](../active-directory-b2c/tutorial-create-user-flows.md?pivots=b2c-us).
33
33
34
34
1. In the [Azure portal](https://portal.azure.com), access your Azure Active Directory B2C tenant.
35
35
1. Under **Policies**, select **User flows** > **+ New user flow**.
@@ -72,11 +72,11 @@ In this section, create a user flow in your Azure Active Directory B2C tenant co
72
72
* Record the key in a safe location. This secret value is never displayed again after you leave this page.
73
73
1. Switch back to the API Management **Add identity provider** page, and paste the key into the **Client secret** text box.
74
74
1. Switch back to the B2C app registration. In the left menu, under **Manage**, select **Authentication**.
75
-
* Under **Implicit grant**, select the **Access tokens** check box.
75
+
* Under **Implicit grant and hybrid flows**, select both the **Access tokens**and **ID tokens**check boxes.
76
76
* Select **Save**.
77
77
1. Switch back in the API Management **Add identity provider** page.
78
78
* In **Signin tenant**, specify the domain name of the Azure Active Directory B2C tenant.
79
-
* The **Authority** field lets you control the Azure AD B2C login URL to use. Set the value to **<your_b2c_tenant_name>.b2clogin.com**.
79
+
* The **Authority** field lets you control the Azure Active Directory B2C login URL to use. Set the value to **<your_b2c_tenant_name>.b2clogin.com**.
80
80
* Specify the **Signup Policy** and **Signin Policy** from the B2C tenant policies.
81
81
* Optionally provide the **Profile Editing Policy** and **Password Reset Policy**.
82
82
@@ -85,12 +85,12 @@ In this section, create a user flow in your Azure Active Directory B2C tenant co
85
85
86
86
After the changes are saved, developers will be able to create new accounts and sign in to the developer portal by using Azure Active Directory B2C.
87
87
88
-
## Developer portal - add Azure AD B2C account authentication
> You need to [republish the developer portal](api-management-howto-developer-portal-customize.md#publish) when you create or update Azure Active Directory B2C configuration settings for the changes to take effect.
92
92
93
-
In the developer portal, sign-in with Azure AD B2C is possible with the **Sign-in button: OAuth** widget. The widget is already included on the sign-in page of the default developer portal content.
93
+
In the developer portal, sign-in with Azure Active Directory B2C is possible with the **Sign-in button: OAuth** widget. The widget is already included on the sign-in page of the default developer portal content.
94
94
95
95
1. To sign in by using Azure Active Directory B2C, open a new browser window and go to the developer portal. Select **Sign in**.
96
96
@@ -103,30 +103,36 @@ When the signup is complete, you're redirected back to the developer portal. You
103
103
104
104
:::image type="content" source="media/api-management-howto-aad-b2c/developer-portal-home.png" alt-text="Sign in to developer portal complete":::
105
105
106
-
Although a new account is automatically created whenever a new user signs in with Azure AD B2C, you may consider adding the same widget to the sign-up page.
106
+
Although a new account is automatically created whenever a new user signs in with Azure Active Directory B2C, you may consider adding the same widget to the signup page.
107
107
108
108
The **Sign-up form: OAuth** widget represents a form used for signing up with OAuth.
109
109
110
-
## Legacy developer portal - how to sign up with Azure AD B2C
110
+
## Legacy developer portal - how to sign up with Azure Active Directory B2C
1. To sign up for a developer account by using Azure AD B2C, open a new browser window and go to the legacy developer portal. Click the **Sign up** button.
114
+
> [!NOTE]
115
+
> To properly integrate B2C with the legacy developer portal, use **standard v1** user flows, in combination with enabling [password reset](/active-directory-b2c/user-flow-self-service-password-reset.md) before signing up/signing into a developer account using Azure Active Directory B2C.
116
+
117
+
1. Open a new browser window and go to the legacy developer portal. Click the **Sign up** button.
115
118
116
119
:::image type="content" source="media/api-management-howto-aad-b2c/b2c-dev-portal.png" alt-text="Sign up in legacy developer portal":::
120
+
117
121
1. Choose to sign up with **Azure Active Directory B2C**.
118
122
119
123
:::image type="content" source="media/api-management-howto-aad-b2c/b2c-dev-portal-b2c-button.png" alt-text="Sign up with Azure Active Directory B2C":::
120
124
121
-
3. You're redirected to the signup policy that you configured in the previous section. Choose to sign up by using your email address or one of your existing social accounts.
125
+
1. You're redirected to the signup policy you configured in the previous section. Choose to sign up by using your email address or one of your existing social accounts.
122
126
123
127
> [!NOTE]
124
-
> If Azure Active Directory B2C is the only option that's enabled on the **Identities** tab in the publisher portal, you'll be redirected to the signup policy directly.
128
+
> If Azure Active Directory B2C is the only option enabled on the **Identities** tab in the publisher portal, you'll be redirected to the signup policy directly.
125
129
126
130
:::image type="content" source="media/api-management-howto-aad-b2c/b2c-dev-portal-b2c-options.png" alt-text="Sign up options in legacy developer portal":::
127
131
128
132
When the signup is complete, you're redirected back to the developer portal. You're now signed in to the developer portal for your API Management service instance.
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/enable-continuous-availability-existing-SMB.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.workload: storage
13
13
ms.tgt_pltfrm: na
14
14
ms.devlang: na
15
15
ms.topic: how-to
16
-
ms.date: 08/18/2021
16
+
ms.date: 09/28/2021
17
17
ms.author: b-juche
18
18
---
19
19
# Enable Continuous Availability on existing SMB volumes
@@ -33,7 +33,7 @@ You can enable the SMB Continuous Availability (CA) feature when you [create a n
33
33
3. On the Edit window that appears, select the **Enable Continuous Availability** checkbox.
34
34

35
35
36
-
4. Reboot the server.
36
+
4. Reboot the Windows systems connecting to the existing SMB share.
37
37
38
38
> [!NOTE]
39
39
> Selecting the **Enable Continuous Availability** option alone does not automatically make the existing SMB sessions continuously available. After selecting the option, be sure to reboot the server for the change to take effect.
@@ -50,4 +50,4 @@ You can enable the SMB Continuous Availability (CA) feature when you [create a n
50
50
51
51
## Next steps
52
52
53
-
* [Create an SMB volume for Azure NetApp Files](azure-netapp-files-create-volumes-smb.md)
53
+
* [Create an SMB volume for Azure NetApp Files](azure-netapp-files-create-volumes-smb.md)
Copy file name to clipboardExpand all lines: articles/azure-resource-manager/management/delete-resource-group.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Delete resource group and resources
3
3
description: Describes how to delete resource groups and resources. It describes how Azure Resource Manager orders the deletion of resources when a deleting a resource group. It describes the response codes and how Resource Manager handles them to determine if the deletion succeeded.
4
4
ms.topic: conceptual
5
-
ms.date: 03/18/2021
5
+
ms.date: 09/28/2021
6
6
ms.custom: seodec18, devx-track-azurepowershell
7
7
---
8
8
@@ -114,13 +114,13 @@ az resource delete \
114
114
115
115
---
116
116
117
-
## Required access
117
+
## Required access and deletion failures
118
118
119
119
To delete a resource group, you need access to the delete action for the **Microsoft.Resources/subscriptions/resourceGroups** resource. You also need delete for all resources in the resource group.
120
120
121
121
For a list of operations, see [Azure resource provider operations](../../role-based-access-control/resource-provider-operations.md). For a list of built-in roles, see [Azure built-in roles](../../role-based-access-control/built-in-roles.md).
122
122
123
-
If you have the required access, but the delete request fails, it may be because there's a [lock](lock-resources.md) on the resource group.
123
+
If you have the required access, but the delete request fails, it may be because there's a [lock on the resources or resource group](lock-resources.md). Even if you didn't manually lock a resource group, it may have been [automatically locked by a related service](lock-resources.md#managed-applications-and-locks). Or, the deletion can fail if the resources are connected to resources in other resource groups that aren't being deleted. For example, you can't delete a virtual network with subnets that are still in use by a virtual machine.
@@ -136,13 +136,21 @@ The following table shows the **default regional limits** for supported subscrip
136
136
137
137
|Subscription type| Max number of SQL Managed Instance subnets | Max number of vCore units*|
138
138
| :---| :--- | :--- |
139
-
|Pay-as-you-go|3|320|
140
-
|CSP |8 (15 in some regions**)|960 (1440 in some regions**)|
141
-
|Pay-as-you-go Dev/Test|3|320|
142
-
|Enterprise Dev/Test|3|320|
143
-
|EA|8 (15 in some regions**)|960 (1440 in some regions**)|
144
-
|Visual Studio Enterprise|2 |64|
145
-
|Visual Studio Professional and MSDN Platforms|2|32|
139
+
|CSP |16 (30 in some regions**)|960 (1440 in some regions**)|
140
+
|EA|16 (30 in some regions**)|960 (1440 in some regions**)|
141
+
|Enterprise Dev/Test|6|320|
142
+
|Pay-as-you-go|6|320|
143
+
|Pay-as-you-go Dev/Test|6|320|
144
+
|Azure Pass|3|64|
145
+
|BizSpark|3|64|
146
+
|BizSpark Plus|3|64|
147
+
|Microsoft Azure Sponsorship|3|64|
148
+
|Microsoft Partner Network|3|64|
149
+
|Visual Studio Enterprise (MPN)|3|64|
150
+
|Visual Studio Enterprise|3|32|
151
+
|Visual Studio Enterprise (BizSpark)|3|32|
152
+
|Visual Studio Professional|3|32|
153
+
|MSDN Platforms|3|32|
146
154
147
155
\* In planning deployments, please take into consideration that Business Critical (BC) service tier requires four (4) times more vCore capacity than General Purpose (GP) service tier. For example: 1 GP vCore = 1 vCore unit and 1 BC vCore = 4 vCore. To simplify your consumption analysis against the default limits, summarize the vCore units across all subnets in the region where SQL Managed Instance is deployed and compare the results with the instance unit limits for your subscription type. **Max number of vCore units** limit applies to each subscription in a region. There is no limit per individual subnets except that the sum of all vCores deployed across multiple subnets must be lower or equal to **max number of vCore units**.
0 commit comments