You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/app-proxy/app-proxy-protect-ndes.md
+3-8Lines changed: 3 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -74,17 +74,12 @@ Azure AD Application Proxy is built on Azure. It gives you a massive amount of n
74
74
1. Select **+Add** to save your application.
75
75
76
76
1. Test whether you can access your NDES server via the Azure AD Application proxy by pasting the link you copied in step 15 into a browser. You should see a default IIS welcome page.
77
-
78
77
1. As a final test, add the *mscep.dll* path to the existing URL you pasted in the previous step:
1. You should see an **HTTP Error 403 – Forbidden** response.
83
-
84
80
1. Change the NDES URL provided (via Microsoft Intune) to devices. This change could either be in Microsoft Configuration Manager or the Microsoft Intune admin center.
85
-
86
-
* For Configuration Manager, go to the certificate registration point and adjust the URL. This URL is what devices call out to and present their challenge.
87
-
* For Intune standalone, either edit or create a new SCEP policy and add the new URL.
81
+
- For Configuration Manager, go to the certificate registration point and adjust the URL. This URL is what devices call out to and present their challenge.
82
+
- For Intune standalone, either edit or create a new SCEP policy and add the new URL.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/apple-sso-plugin.md
+4-7Lines changed: 4 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,16 +9,13 @@ ms.service: active-directory
9
9
ms.subservice: develop
10
10
ms.topic: conceptual
11
11
ms.workload: identity
12
-
ms.date: 03/13/2023
12
+
ms.date: 04/18/2023
13
13
ms.author: henrymbugua
14
14
ms.reviewer: brandwe
15
15
ms.custom: aaddev
16
16
---
17
17
18
-
# Microsoft Enterprise SSO plug-in for Apple devices (preview)
19
-
20
-
> [!IMPORTANT]
21
-
> This feature is in public preview. This preview is provided without a service-level agreement. For more information, see [Supplemental terms of use for Microsoft Azure public previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
18
+
# Microsoft Enterprise SSO plug-in for Apple devices
22
19
23
20
The *Microsoft Enterprise SSO plug-in for Apple devices* provides single sign-on (SSO) for Azure Active Directory (Azure AD) accounts on macOS, iOS, and iPadOS across all applications that support Apple's [enterprise single sign-on](https://developer.apple.com/documentation/authenticationservices) feature. The plug-in provides SSO for even old applications that your business might depend on but that don't yet support the latest identity libraries or protocols. Microsoft worked closely with Apple to develop this plug-in to increase your application's usability while providing the best protection available.
24
21
@@ -50,12 +47,12 @@ To use the Microsoft Enterprise SSO plug-in for Apple devices:
50
47
51
48
### iOS requirements
52
49
- iOS 13.0 or higher must be installed on the device.
53
-
- A Microsoft application that provides the Microsoft Enterprise SSO plug-in for Apple devices must be installed on the device. For Public Preview, these applications are the [Microsoft Authenticator app](https://support.microsoft.com/account-billing/how-to-use-the-microsoft-authenticator-app-9783c865-0308-42fb-a519-8cf666fe0acc).
50
+
- A Microsoft application that provides the Microsoft Enterprise SSO plug-in for Apple devices must be installed on the device. This app is the [Microsoft Authenticator app](https://support.microsoft.com/account-billing/how-to-use-the-microsoft-authenticator-app-9783c865-0308-42fb-a519-8cf666fe0acc).
54
51
55
52
56
53
### macOS requirements
57
54
- macOS 10.15 or higher must be installed on the device.
58
-
- A Microsoft application that provides the Microsoft Enterprise SSO plug-in for Apple devices must be installed on the device. For Public Preview, these applications include the [Intune Company Portal app](/mem/intune/user-help/enroll-your-device-in-intune-macos-cp).
55
+
- A Microsoft application that provides the Microsoft Enterprise SSO plug-in for Apple devices must be installed on the device. This app is the [Intune Company Portal app](/mem/intune/user-help/enroll-your-device-in-intune-macos-cp).
Copy file name to clipboardExpand all lines: articles/advisor/advisor-release-notes.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ Learn what's new in the service. These items may be release notes, videos, blog
13
13
14
14
Customers can now improve the relevance of recommendations to make them more actionable, resulting in additional cost savings.
15
15
The right sizing recommendations help optimize costs by identifying idle or underutilized virtual machines based on their CPU, memory, and network activity over the default lookback period of seven days.
16
-
Now, with this latest update, customers can adjust the default look back period to get recommendations based on 14, 21,30, 60, or even 90 days of use. The configuration can be applied at the subscription level. This is especially useful when the workloads have biweekly or monthly peaks (such as with payroll applications).
16
+
Now, with this latest update, customers can adjust the default look back period to get recommendations based on 14, 21,30, 60, or even 90 days of use. The configuration can be applied at the subscription level. This is especially useful when the workloads have biweekly or monthly peaks (such as with payroll applications).
17
17
18
18
To learn more, visit [Optimize virtual machine (VM) or virtual machine scale set (VMSS) spend by resizing or shutting down underutilized instances](advisor-cost-recommendations.md#optimize-virtual-machine-vm-or-virtual-machine-scale-set-vmss-spend-by-resizing-or-shutting-down-underutilized-instances).
Copy file name to clipboardExpand all lines: articles/aks/azure-disk-csi.md
+1-24Lines changed: 1 addition & 24 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Use Container Storage Interface (CSI) driver for Azure Disks on Azure Kubernetes Service (AKS)
3
3
description: Learn how to use the Container Storage Interface (CSI) driver for Azure Disks in an Azure Kubernetes Service (AKS) cluster.
4
4
ms.topic: article
5
-
ms.date: 04/12/2023
5
+
ms.date: 04/19/2023
6
6
---
7
7
8
8
# Use the Azure Disks Container Storage Interface (CSI) driver in Azure Kubernetes Service (AKS)
@@ -36,29 +36,6 @@ In addition to in-tree driver features, Azure Disk CSI driver supports the follo
36
36
> [!NOTE]
37
37
> Depending on the VM SKU that's being used, the Azure Disk CSI driver might have a per-node volume limit. For some powerful VMs (for example, 16 cores), the limit is 64 volumes per node. To identify the limit per VM SKU, review the **Max data disks** column for each VM SKU offered. For a list of VM SKUs offered and their corresponding detailed capacity limits, see [General purpose virtual machine sizes][general-purpose-machine-sizes].
38
38
39
-
## Storage class driver dynamic disks parameters
40
-
41
-
|Name | Meaning | Available Value | Mandatory | Default value
42
-
|--- | --- | --- | --- | ---
43
-
|skuName | Azure Disks storage account type (alias: `storageAccountType`)|`Standard_LRS`, `Premium_LRS`, `StandardSSD_LRS`, `UltraSSD_LRS`, `Premium_ZRS`, `StandardSSD_ZRS`, `PremiumV2_LRS` (`PremiumV2_LRS` only supports `None` caching mode) | No |`StandardSSD_LRS`|
44
-
|fsType | File System Type |`ext4`, `ext3`, `ext2`, `xfs`, `btrfs` for Linux, `ntfs` for Windows | No |`ext4` for Linux, `ntfs` for Windows|
45
-
|cachingMode |[Azure Data Disk Host Cache Setting](../virtual-machines/windows/premium-storage-performance.md#disk-caching)|`None`, `ReadOnly`, `ReadWrite`| No |`ReadOnly`|
46
-
|location | Specify Azure region where Azure Disks will be created |`eastus`, `westus`, etc. | No | If empty, driver will use the same location name as current AKS cluster|
47
-
|resourceGroup | Specify the resource group where the Azure Disks will be created | Existing resource group name | No | If empty, driver will use the same resource group name as current AKS cluster|
|LogicalSectorSize | Logical sector size in bytes for Ultra disk. Supported values are 512 ad 4096. 4096 is the default. |`512`, `4096`| No |`4096`|
51
-
|tags | Azure Disk [tags](../azure-resource-manager/management/tag-resources.md)| Tag format: `key1=val1,key2=val2`| No | ""|
52
-
|diskEncryptionSetID | ResourceId of the disk encryption set to use for [enabling encryption at rest](../virtual-machines/windows/disk-encryption.md)| format: `/subscriptions/{subs-id}/resourceGroups/{rg-name}/providers/Microsoft.Compute/diskEncryptionSets/{diskEncryptionSet-name}`| No | ""|
53
-
|diskEncryptionType | Encryption type of the disk encryption set. |`EncryptionAtRestWithCustomerKey`(by default), `EncryptionAtRestWithPlatformAndCustomerKeys`| No | ""|
54
-
|writeAcceleratorEnabled |[Write Accelerator on Azure Disks](../virtual-machines/windows/how-to-enable-write-accelerator.md)|`true`, `false`| No | ""|
55
-
|networkAccessPolicy | NetworkAccessPolicy property to prevent generation of the SAS URI for a disk or a snapshot |`AllowAll`, `DenyAll`, `AllowPrivate`| No |`AllowAll`|
56
-
|diskAccessID | Azure Resource ID of the DiskAccess resource to use private endpoints on disks || No | ``|
57
-
|enableBursting |[Enable on-demand bursting](../virtual-machines/disk-bursting.md) beyond the provisioned performance target of the disk. On-demand bursting should only be applied to Premium disk and when the disk size > 512 GB. Ultra and shared disk isn't supported. Bursting is disabled by default. |`true`, `false`| No |`false`|
58
-
|useragent | User agent used for [customer usage attribution](../marketplace/azure-partner-customer-usage-attribution.md)|| No | Generated Useragent formatted `driverName/driverVersion compiler/version (OS-ARCH)`|
59
-
|enableAsyncAttach | Allow multiple disk attach operations (in batch) on one node in parallel.<br> While this parameter can speed up disk attachment, you may encounter Azure API throttling limit when there are large number of volume attachments. |`true`, `false`| No |`false`|
60
-
|subscriptionID | Specify Azure subscription ID where the Azure Disks is created. | Azure subscription ID | No | If not empty, `resourceGroup` must be provided.|
61
-
62
39
## Use CSI persistent volumes with Azure Disks
63
40
64
41
A [persistent volume](concepts-storage.md#persistent-volumes) (PV) represents a piece of storage that's provisioned for use with Kubernetes pods. A PV can be used by one or many pods and can be dynamically or statically provisioned. This article shows you how to dynamically create PVs with Azure disk for use by a single pod in an AKS cluster. For static provisioning, see [Create a static volume with Azure Disks](azure-csi-disk-storage-provision.md#statically-provision-a-volume).
Copy file name to clipboardExpand all lines: articles/aks/azure-files-csi.md
+3-35Lines changed: 3 additions & 35 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Use Container Storage Interface (CSI) driver for Azure Files on Azure Kubernetes Service (AKS)
3
3
description: Learn how to use the Container Storage Interface (CSI) driver for Azure Files in an Azure Kubernetes Service (AKS) cluster.
4
4
ms.topic: article
5
-
ms.date: 04/11/2023
5
+
ms.date: 04/19/2023
6
6
---
7
7
8
8
# Use Azure Files Container Storage Interface (CSI) driver in Azure Kubernetes Service (AKS)
@@ -24,40 +24,6 @@ In addition to the original in-tree driver features, Azure File CSI driver suppo
24
24
-[Private endpoint][private-endpoint-overview]
25
25
- Creating large mount of file shares in parallel.
26
26
27
-
## Storage class driver dynamic parameters
28
-
29
-
|Name | Meaning | Available Value | Mandatory | Default value
30
-
|--- | --- | --- | --- | ---
31
-
|skuName | Azure Files storage account type (alias: `storageAccountType`)|`Standard_LRS`, `Standard_ZRS`, `Standard_GRS`, `Standard_RAGRS`, `Standard_RAGZRS`,`Premium_LRS`, `Premium_ZRS`| No |`StandardSSD_LRS`<br> Minimum file share size for Premium account type is 100 GiB.<br> ZRS account type is supported in limited regions.<br> NFS file share only supports Premium account type.|
32
-
|location | Specify Azure region where Azure storage account will be created. | For example, `eastus`. | No | If empty, driver uses the same location name as current AKS cluster.|
33
-
|resourceGroup | Specify the resource group where the Azure Disks will be created. | Existing resource group name | No | If empty, driver uses the same resource group name as current AKS cluster.|
34
-
|shareName | Specify Azure file share name | Existing or new Azure file share name. | No | If empty, driver generates an Azure file share name. |
35
-
|shareNamePrefix | Specify Azure file share name prefix created by driver. | Share name can only contain lowercase letters, numbers, hyphens, and length should be fewer than 21 characters. | No |
36
-
|folderName | Specify folder name in Azure file share. | Existing folder name in Azure file share. | No | If folder name does not exist in file share, mount will fail. |
37
-
|shareAccessTier |[Access tier for file share][storage-tiers]| General purpose v2 account can choose between `TransactionOptimized` (default), `Hot`, and `Cool`. Premium storage account type for file shares only. | No | Empty. Use default setting for different storage account types.|
38
-
|server | Specify Azure storage account server address | Existing server address, for example `accountname.privatelink.file.core.windows.net`. | No | If empty, driver uses default `accountname.file.core.windows.net` or other sovereign cloud account address. |
39
-
|disableDeleteRetentionPolicy | Specify whether disable DeleteRetentionPolicy for storage account created by driver. |`true` or `false`| No |`false`|
40
-
|allowBlobPublicAccess | Allow or disallow public access to all blobs or containers for storage account created by driver. |`true` or `false`| No |`false`|
41
-
|requireInfraEncryption | Specify whether or not the service applies a secondary layer of encryption with platform managed keys for data at rest for storage account created by driver. |`true` or `false`| No |`false`|
42
-
|networkEndpointType | Specify network endpoint type for the storage account created by driver. If `privateEndpoint` is specified, a private endpoint will be created for the storage account. For other cases, a service endpoint will be created by default. | "",`privateEndpoint`| No | "" |
43
-
|storageEndpointSuffix | Specify Azure storage endpoint suffix. |`core.windows.net`, `core.chinacloudapi.cn`, etc. | No | If empty, driver uses default storage endpoint suffix according to cloud environment. For example, `core.windows.net`. |
44
-
|tags |[tags][tag-resources] are created in new storage account. | Tag format: 'foo=aaa,bar=bbb' | No | "" |
45
-
|matchTags | Match tags when driver tries to find a suitable storage account. |`true` or `false`| No |`false`|
46
-
|--- |**Following parameters are only for SMB protocol**| --- | --- |
47
-
|subscriptionID | Specify Azure subscription ID where Azure file share is created. | Azure subscription ID | No | If not empty, `resourceGroup` must be provided. |
48
-
|storeAccountKey | Specify whether to store account key to Kubernetes secret. |`true` or `false`<br>`false` means driver leverages kubelet identity to get account key. | No |`true`|
49
-
|secretName | Specify secret name to store account key. || No |
50
-
|secretNamespace | Specify the namespace of secret to store account key. <br><br> **Note:** <br> If `secretNamespace` isn't specified, the secret is created in the same namespace as the pod. |`default`,`kube-system`, etc | No | Pvc namespace, for example `csi.storage.k8s.io/pvc/namespace`|
51
-
|useDataPlaneAPI | Specify whether to use [data plane API][data-plane-api] for file share create/delete/resize. This could solve the SRP API throttling issue because the data plane API has almost no limit, while it would fail when there is firewall or Vnet setting on storage account. |`true` or `false`| No |`false`|
52
-
|--- |**Following parameters are only for NFS protocol**| --- | --- |
53
-
|rootSquashType | Specify root squashing behavior on the share. The default is `NoRootSquash`|`AllSquash`, `NoRootSquash`, `RootSquash`| No |
54
-
|mountPermissions | Mounted folder permissions. The default is `0777`. If set to `0`, driver doesn't perform `chmod` after mount |`0777`| No |
55
-
|--- |**Following parameters are only for vnet setting, e.g. NFS, private endpoint**| --- | --- |
56
-
|vnetResourceGroup | Specify Vnet resource group where virtual network is defined. | Existing resource group name. | No | If empty, driver uses the `vnetResourceGroup` value in Azure cloud config file. |
57
-
|vnetName | Virtual network name | Existing virtual network name. | No | If empty, driver uses the `vnetName` value in Azure cloud config file. |
58
-
|subnetName | Subnet name | Existing subnet name of the agent node. | No | If empty, driver uses the `subnetName` value in Azure cloud config file. |
59
-
|fsGroupChangePolicy | Indicates how volume's ownership is changed by the driver. Pod `securityContext.fsGroupChangePolicy` is ignored. |`OnRootMismatch` (default), `Always`, `None`| No |`OnRootMismatch`|
60
-
61
27
## Use a persistent volume with Azure Files
62
28
63
29
A [persistent volume (PV)][persistent-volume] represents a piece of storage that's provisioned for use with Kubernetes pods. A PV can be used by one or many pods and can be dynamically or statically provisioned. If multiple pods need concurrent access to the same storage volume, you can use Azure Files to connect by using the [Server Message Block (SMB)][smb-overview] or [NFS protocol][nfs-overview]. This article shows you how to dynamically create an Azure Files share for use by multiple pods in an AKS cluster. For static provisioning, see [Manually create and use a volume with an Azure Files share][statically-provision-a-volume].
Copy file name to clipboardExpand all lines: articles/aks/keda-about.md
-2Lines changed: 0 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,8 +30,6 @@ Learn more about how KEDA works in the [official KEDA documentation][keda-archit
30
30
31
31
## Installation and version
32
32
33
-
[!INCLUDE [Current version callout](./includes/keda/current-version-callout.md)]
34
-
35
33
KEDA can be added to your Azure Kubernetes Service (AKS) cluster by enabling the KEDA add-on using an [ARM template][keda-arm] or [Azure CLI][keda-cli].
36
34
37
35
The KEDA add-on provides a fully supported installation of KEDA that is integrated with AKS.
0 commit comments