Skip to content

Commit 79f9db6

Browse files
authored
Merge pull request #226579 from cmcclister/cm-linkfix-20230207-1
LinkFix: azure-docs-pr (2023-02) - 1
2 parents 8fb288b + a603267 commit 79f9db6

File tree

48 files changed

+126
-136
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

48 files changed

+126
-136
lines changed

articles/iot-fundamentals/iot-security-architecture.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -19,8 +19,8 @@ When you design and architect an IoT solution, it's important to understand the
1919
Microsoft recommends using a threat modeling process as part of your IoT solution design. If you're not familiar with threat modeling and the secure development lifecycle, see:
2020

2121
- [Threat modeling](https://www.microsoft.com/securityengineering/sdl/threatmodeling)
22-
- [Secure development best practices on Azure](/azure/security/develop/secure-dev-overview)
23-
- [Getting started guide](/azure/security/develop/threat-modeling-tool-getting-started)
22+
- [Secure development best practices on Azure](../security/develop/secure-dev-overview.md)
23+
- [Getting started guide](../security/develop/threat-modeling-tool-getting-started.md)
2424

2525
## Security in IoT
2626

@@ -42,7 +42,7 @@ Each zone is separated by a _trust boundary_, shown as the dotted red line in th
4242
- Denial of service
4343
- Elevation of privilege
4444

45-
To learn more, see the [STRIDE model](/azure/security/develop/threat-modeling-tool-threats#stride-model).
45+
To learn more, see the [STRIDE model](../security/develop/threat-modeling-tool-threats.md#stride-model).
4646

4747
:::image type="content" source="media/iot-security-architecture/iot-security-architecture-fig1.png" alt-text="A diagram that shows the zones and trust boundaries in a typical IoT solution architecture." border="false":::
4848

@@ -201,4 +201,4 @@ The following table shows example mitigations to the storage threats:
201201

202202
## See also
203203

204-
Read about IoT Hub security in [Control access to IoT Hub](../iot-hub/iot-hub-devguide-security.md) in the IoT Hub developer guide.
204+
Read about IoT Hub security in [Control access to IoT Hub](../iot-hub/iot-hub-devguide-security.md) in the IoT Hub developer guide.

articles/iot-hub/iot-hub-upgrade.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,4 +52,4 @@ The maximum limit of device-to-cloud partitions for basic tier and standard tier
5252

5353
## Next steps
5454

55-
Get more details about [How to choose the right IoT Hub tier](iot-hub-scaling.md).
55+
Get more details about [How to choose the right IoT Hub tier](iot-hub-scaling.md).

articles/lighthouse/concepts/tenants-users-roles.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ All [built-in roles](../../role-based-access-control/built-in-roles.md) are curr
4343
In some cases, a role that had previously been supported with Azure Lighthouse may become unavailable. For example, if the [`DataActions`](../../role-based-access-control/role-definitions.md#dataactions) permission is added to a role that previously didn't have that permission, that role can no longer be used when onboarding new delegations. Users who had already been assigned the role will still be able to work on previously delegated resources, but they won't be able to perform tasks that use the [`DataActions`](../../role-based-access-control/role-definitions.md#dataactions) permission.
4444

4545
> [!IMPORTANT]
46-
> When assigning roles, be sure to review the [actions](../../role-based-access-control/role-definitions.md) specified for each role. In some cases, even though roles with [`DataActions`](../../role-based-access-control/role-definitions.md#dataactions) permission are not supported, the actions included in a role may allow access to data, where data is exposed through access keys and not accessed via the user's identity. For example, the [Virtual Machine Contributor](/azure/role-based-access-control/built-in-roles) role includes the `Microsoft.Storage/storageAccounts/listKeys/action` action, which returns storage account access keys that could be used to retrieve certain customer data.
46+
> When assigning roles, be sure to review the [actions](../../role-based-access-control/role-definitions.md) specified for each role. In some cases, even though roles with [`DataActions`](../../role-based-access-control/role-definitions.md#dataactions) permission are not supported, the actions included in a role may allow access to data, where data is exposed through access keys and not accessed via the user's identity. For example, the [Virtual Machine Contributor](../../role-based-access-control/built-in-roles.md) role includes the `Microsoft.Storage/storageAccounts/listKeys/action` action, which returns storage account access keys that could be used to retrieve certain customer data.
4747
4848
> [!NOTE]
4949
> As soon as a new applicable built-in role is added to Azure, it can be assigned when [onboarding a customer using Azure Resource Manager templates](../how-to/onboard-customer.md). There may be a delay before the newly-added role becomes available in Partner Center when [publishing a managed service offer](../how-to/publish-managed-services-offers.md). Similarly, if a role becomes unavailable, you may still see it in Partner Center for a period of time; however, you won't be able to publish new offers using such roles.
@@ -57,4 +57,4 @@ The only exception is if the subscription is transferred to an Azure AD tenant t
5757
## Next steps
5858

5959
- Learn about [recommended security practices for Azure Lighthouse](recommended-security-practices.md).
60-
- Onboard your customers to Azure Lighthouse, either by [using Azure Resource Manager templates](../how-to/onboard-customer.md) or by [publishing a private or public managed services offer to Azure Marketplace](../how-to/publish-managed-services-offers.md).
60+
- Onboard your customers to Azure Lighthouse, either by [using Azure Resource Manager templates](../how-to/onboard-customer.md) or by [publishing a private or public managed services offer to Azure Marketplace](../how-to/publish-managed-services-offers.md).

articles/logic-apps/biztalk-server-to-azure-integration-services-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -814,7 +814,7 @@ You can install and run BizTalk Server on your own hardware, on-premises virtual
814814

815815
- Availability and redundancy
816816

817-
In Azure, [availability zones](../reliability/availability-zones-overview.md#availability-zones) provide resiliency, distributed availability, and active-active-active zone scalability. To increase availability for your logic app workloads, you can [enable availability zone support](/azure/logic-apps/set-up-zone-redundancy-availability-zones), but only when you create your logic app. You'll need at least three separate availability zones in any Azure region that supports and enables zone redundancy. The Azure Logic Apps platform distributes these zones and logic app workloads across these zones. This capability is a key requirement for enabling resilient architectures and providing high availability if datacenter failures happen in a region. For more information, see [Build solutions for high availability using availability zones](/azure/architecture/high-availability/building-solutions-for-high-availability).
817+
In Azure, [availability zones](../reliability/availability-zones-overview.md#availability-zones) provide resiliency, distributed availability, and active-active-active zone scalability. To increase availability for your logic app workloads, you can [enable availability zone support](./set-up-zone-redundancy-availability-zones.md), but only when you create your logic app. You'll need at least three separate availability zones in any Azure region that supports and enables zone redundancy. The Azure Logic Apps platform distributes these zones and logic app workloads across these zones. This capability is a key requirement for enabling resilient architectures and providing high availability if datacenter failures happen in a region. For more information, see [Build solutions for high availability using availability zones](/azure/architecture/high-availability/building-solutions-for-high-availability).
818818

819819
- Isolated and dedicated environment
820820

@@ -948,4 +948,4 @@ You've learned more about how Azure Integration Services compares to BizTalk Ser
948948
> [!div class="nextstepaction"]
949949
> [Choose the best Azure Integration Services offerings for your scenario](azure-integration-services-choose-capabilities.md)
950950
>
951-
> [Migration approaches for BizTalk Server to Azure Integration Services](biztalk-server-azure-integration-services-migration-approaches.md)
951+
> [Migration approaches for BizTalk Server to Azure Integration Services](biztalk-server-azure-integration-services-migration-approaches.md)

articles/machine-learning/how-to-access-azureml-behind-firewall.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ The following terms and information are used throughout this article:
2828
* __Azure service tags__: A service tag is an easy way to specify the IP ranges used by an Azure service. For example, the `AzureMachineLearning` tag represents the IP addresses used by the Azure Machine Learning service.
2929

3030
> [!IMPORTANT]
31-
> Azure service tags are only supported by some Azure services. For a list of service tags supported with network security groups and Azure Firewall, see the [Virtual network service tags](/azure/virtual-network/service-tags-overview) article.
31+
> Azure service tags are only supported by some Azure services. For a list of service tags supported with network security groups and Azure Firewall, see the [Virtual network service tags](../virtual-network/service-tags-overview.md) article.
3232
>
3333
> If you are using a non-Azure solution such as a 3rd party firewall, download a list of [Azure IP Ranges and Service Tags](https://www.microsoft.com/download/details.aspx?id=56519). Extract the file and search for the service tag within the file. The IP addresses may change periodically.
3434
@@ -65,7 +65,7 @@ __Inbound traffic__
6565
| `AzureLoadBalancer` | Any | `VirtualNetwork` | 44224 | Inbound to compute instance/cluster. __Only needed if the instance/cluster is configured to use a public IP address__. |
6666

6767
> [!TIP]
68-
> A network security group (NSG) is created by default for this traffic. For more information, see [Default security rules](/azure/virtual-network/network-security-groups-overview#inbound).
68+
> A network security group (NSG) is created by default for this traffic. For more information, see [Default security rules](../virtual-network/network-security-groups-overview.md#inbound).
6969
7070
__Outbound traffic__
7171

@@ -85,7 +85,7 @@ __Outbound traffic__
8585
> If a compute instance or compute cluster is configured for no public IP, they can't access the public internet by default. However, they do need to communicate with the resources listed above. To enable outbound communication, you have two possible options:
8686
>
8787
> * __User-defined route and firewall__: Create a user-defined route in the subnet that contains the compute. The __Next hop__ for the route should reference the private IP address of the firewall, with an address prefix of 0.0.0.0/0.
88-
> * __Azure Virtual Network NAT with a public IP__: For more information on using Virtual Network Nat, see the [Virtual Network NAT](/azure/virtual-network/nat-gateway/nat-overview) documentation.
88+
> * __Azure Virtual Network NAT with a public IP__: For more information on using Virtual Network Nat, see the [Virtual Network NAT](../virtual-network/nat-gateway/nat-overview.md) documentation.
8989
9090
### Recommended configuration for training and deploying models
9191

articles/machine-learning/how-to-secure-training-vnet.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -135,9 +135,9 @@ The following configurations are in addition to those listed in the [Prerequisit
135135

136136
For more information on the outbound traffic that is used by Azure Machine Learning, see the following articles:
137137
- [Configure inbound and outbound network traffic](how-to-access-azureml-behind-firewall.md).
138-
- [Azure's outbound connectivity methods](/azure/load-balancer/load-balancer-outbound-connections#scenarios).
138+
- [Azure's outbound connectivity methods](../load-balancer/load-balancer-outbound-connections.md#scenarios).
139139

140-
For more information on service tags that can be used with Azure Firewall, see the [Virtual network service tags](/azure/virtual-network/service-tags-overview) article.
140+
For more information on service tags that can be used with Azure Firewall, see the [Virtual network service tags](../virtual-network/service-tags-overview.md) article.
141141

142142
Use the following information to create a compute instance or cluster with no public IP address:
143143

@@ -365,4 +365,4 @@ This article is part of a series on securing an Azure Machine Learning workflow.
365365
* [Secure the inference environment](how-to-secure-inferencing-vnet.md)
366366
* [Enable studio functionality](how-to-enable-studio-virtual-network.md)
367367
* [Use custom DNS](how-to-custom-dns.md)
368-
* [Use a firewall](how-to-access-azureml-behind-firewall.md)
368+
* [Use a firewall](how-to-access-azureml-behind-firewall.md)

articles/machine-learning/v1/how-to-secure-training-vnet.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -72,15 +72,15 @@ In this article you learn how to secure the following training compute resources
7272
- "Microsoft.Network/virtualNetworks/*/read" on the virtual network resource. This permission isn't needed for Azure Resource Manager (ARM) template deployments.
7373
- "Microsoft.Network/virtualNetworks/subnet/join/action" on the subnet resource.
7474

75-
For more information on Azure RBAC with networking, see the [Networking built-in roles](/azure/role-based-access-control/built-in-roles.md#networking)
75+
For more information on Azure RBAC with networking, see the [Networking built-in roles](../../role-based-access-control/built-in-roles.md#networking)
7676

7777
## Limitations
7878

7979
### Azure Machine Learning compute cluster/instance
8080

8181
* __Compute clusters__ can be created in a different region than your workspace. This functionality is in __preview__, and is only available for __compute clusters__, not compute instances. When using a different region for the cluster, the following limitations apply:
8282

83-
* If your workspace associated resources, such as storage, are in a different virtual network than the cluster, set up global virtual network peering between the networks. For more information, see [Virtual network peering](/azure/virtual-network/virtual-network-peering-overview).
83+
* If your workspace associated resources, such as storage, are in a different virtual network than the cluster, set up global virtual network peering between the networks. For more information, see [Virtual network peering](../../virtual-network/virtual-network-peering-overview.md).
8484
* You may see increased network latency and data transfer costs. The latency and costs can occur when creating the cluster, and when running jobs on it.
8585

8686
Guidance such as using NSG rules, user-defined routes, and input/output requirements, apply as normal when using a different region than the workspace.
@@ -145,7 +145,7 @@ The following configurations are in addition to those listed in the [Prerequisit
145145

146146
For more information on the outbound traffic that is used by Azure Machine Learning, see the following articles:
147147
- [Configure inbound and outbound network traffic](../how-to-access-azureml-behind-firewall.md).
148-
- [Azure's outbound connectivity methods](/azure/load-balancer/load-balancer-outbound-connections#scenarios).
148+
- [Azure's outbound connectivity methods](../../load-balancer/load-balancer-outbound-connections.md#scenarios).
149149

150150
Use the following information to create a compute instance or cluster with no public IP address:
151151

@@ -176,7 +176,7 @@ The following configurations are in addition to those listed in the [Prerequisit
176176
>
177177
> If you have another NSG at the subnet level, the rules in the subnet level NSG mustn't conflict with the rules in the automatically created NSG.
178178
>
179-
> To learn how the NSGs filter your network traffic, see [How network security groups filter network traffic](/azure/virtual-network/network-security-group-how-it-works).
179+
> To learn how the NSGs filter your network traffic, see [How network security groups filter network traffic](../../virtual-network/network-security-group-how-it-works.md).
180180

181181
* One load balancer
182182

@@ -185,7 +185,7 @@ The following configurations are in addition to those listed in the [Prerequisit
185185
For a compute instance, these resources are kept until the instance is deleted. Stopping the instance doesn't remove the resources.
186186

187187
> [!IMPORTANT]
188-
> These resources are limited by the subscription's [resource quotas](/azure/azure-resource-manager/management/azure-subscription-service-limits). If the virtual network resource group is locked then deletion of compute cluster/instance will fail. Load balancer cannot be deleted until the compute cluster/instance is deleted. Also please ensure there is no Azure Policy assignment which prohibits creation of network security groups.
188+
> These resources are limited by the subscription's [resource quotas](../../azure-resource-manager/management/azure-subscription-service-limits.md). If the virtual network resource group is locked then deletion of compute cluster/instance will fail. Load balancer cannot be deleted until the compute cluster/instance is deleted. Also please ensure there is no Azure Policy assignment which prohibits creation of network security groups.
189189
190190
+ In your VNet, allow **inbound** TCP traffic on port **44224** from the `AzureMachineLearning` service tag.
191191
> [!IMPORTANT]

articles/marketplace/azure-app-metered-billing.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ When it comes to defining the offer along with its pricing models, it is importa
3535
> You must keep track of the usage in your code and only send usage events to Microsoft for the usage that is above the base fee.
3636
3737
> [!Note]
38-
> Offers will be billed to customers in the customers’ agreement currency, using the local market price that was published at the time the offer was created. The amount that customers pay, and that ISVs are paid, depends on the Foreign Exchange rates at the time the customer transacts the offer. Learn more on ["How we convert currency?"](/azure/marketplace/marketplace-geo-availability-currencies#how-we-convert-currency).
38+
> Offers will be billed to customers in the customers’ agreement currency, using the local market price that was published at the time the offer was created. The amount that customers pay, and that ISVs are paid, depends on the Foreign Exchange rates at the time the customer transacts the offer. Learn more on ["How we convert currency?"](./marketplace-geo-availability-currencies.md#how-we-convert-currency).
3939
## Sample offer
4040

4141
As an example, Contoso is a publisher with a managed application service called Contoso Analytics (CoA). CoA allows customers to analyze large amount of data for reporting and data warehousing. Contoso is registered as a publisher in Partner Center for the commercial marketplace program to publish offers to Azure customers. There are two plans associated with CoA, outlined below:
@@ -118,6 +118,4 @@ Follow the instruction in [Support for the commercial marketplace program in Par
118118

119119
**Video tutorial**
120120

121-
- [Metered Billing for Azure Managed Applications Overview](https://go.microsoft.com/fwlink/?linkid=2196310)
122-
123-
121+
- [Metered Billing for Azure Managed Applications Overview](https://go.microsoft.com/fwlink/?linkid=2196310)

articles/marketplace/azure-container-plan-availability.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ When you remove a market, customers from that market who are using active deploy
3535
Select *Save* to continue.
3636

3737
> [!NOTE]
38-
> Offers will be billed to customers in the customers’ agreement currency, using the local market price that was published at the time the offer was created. The amount that customers pay, and that ISVs are paid, depends on the Foreign Exchange rates at the time the customer transacts the offer. Learn more on ["How we convert currency?"](/azure/marketplace/marketplace-geo-availability-currencies).
38+
> Offers will be billed to customers in the customers’ agreement currency, using the local market price that was published at the time the offer was created. The amount that customers pay, and that ISVs are paid, depends on the Foreign Exchange rates at the time the customer transacts the offer. Learn more on ["How we convert currency?"](./marketplace-geo-availability-currencies.md).
3939
4040
## Pricing
4141

0 commit comments

Comments
 (0)