Skip to content

Commit 80da36d

Browse files
authored
Merge pull request #90358 from MicrosoftDocs/master
10/02 AM Publish
2 parents 4f3f502 + 30c6636 commit 80da36d

File tree

82 files changed

+1879
-1339
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

82 files changed

+1879
-1339
lines changed

articles/active-directory/develop/active-directory-configurable-token-lifetimes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.devlang: na
1616
ms.topic: conceptual
17-
ms.date: 08/22/2019
17+
ms.date: 09/17/2019
1818
ms.author: ryanwi
1919
ms.custom: aaddev, annaba, identityplatformtop40
2020
ms.reviewer: hirsin
@@ -26,7 +26,7 @@ ms.collection: M365-identity-device-management
2626
You can specify the lifetime of a token issued by Azure Active Directory (Azure AD). You can set token lifetimes for all apps in your organization, for a multi-tenant (multi-organization) application, or for a specific service principal in your organization.
2727

2828
> [!IMPORTANT]
29-
> After hearing from customers during the preview, we've implemented [authentication session management capabilities](https://go.microsoft.com/fwlink/?linkid=2083106) in Azure AD Conditional Access. You can use this new feature to configure refresh token lifetimes by setting sign in frequency. After November 1, 2019 you will not be able to use Configurable Token Lifetime policy to configure refresh tokens, but you can still use it to configure access tokens.
29+
> After hearing from customers during the preview, we've implemented [authentication session management capabilities](https://go.microsoft.com/fwlink/?linkid=2083106) in Azure AD Conditional Access. You can use this new feature to configure refresh token lifetimes by setting sign in frequency. After November 1, 2019 you will not be able to use Configurable Token Lifetime policy to configure session and refresh tokens. You can still configure access token lifetimes after the deprecation.
3030
3131
In Azure AD, a policy object represents a set of rules that are enforced on individual applications or on all applications in an organization. Each policy type has a unique structure, with a set of properties that are applied to objects to which they are assigned.
3232

articles/active-directory/hybrid/reference-connect-accounts-permissions.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,9 @@ In addition to these three accounts used to run Azure AD Connect, you will also
5353
> To learn more about dedicated administrative forests please refer to [ESAE Administrative Forest Design Approach](https://docs.microsoft.com/windows-server/identity/securing-privileged-access/securing-privileged-access-reference-material#esae-administrative-forest-design-approach)
5454
>>>>>>> e683a61b0ed62ae739941410f658a127534e2481
5555
56+
> [!NOTE]
57+
> The Global Administrator role is not required after the initial setup and the only required account will be the **Directory Synchronization Accounts** role account. That does not necssarily mean that you will want to just remove the account with the Global Administrator role. It is better to change the role to a less powerful role, as totally removing the account may introduce issues if you ever need to re-run the wizard again. By reducing the privilege of the role you can always re-elevate the priviliges if you have to utilize the Azure AD Connect wizard again.
58+
5659
## Installing Azure AD Connect
5760
The Azure AD Connect installation wizard offers two different paths:
5861

articles/active-directory/saas-apps/foodee-provisioning-tutorial.md

Lines changed: 69 additions & 63 deletions
Large diffs are not rendered by default.

articles/app-service/app-service-web-configure-tls-mutual-auth.md

Lines changed: 13 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.service: app-service
1212
ms.workload: na
1313
ms.tgt_pltfrm: na
1414
ms.topic: article
15-
ms.date: 02/22/2019
15+
ms.date: 10/01/2019
1616
ms.author: cephalin
1717
ms.custom: seodec18
1818

@@ -33,6 +33,15 @@ To set up your app to require client certificates, you need to set the `clientCe
3333
az webapp update --set clientCertEnabled=true --name <app_name> --resource-group <group_name>
3434
```
3535

36+
## Exclude paths from requiring authentication
37+
38+
When you enable mutual auth for your application, all paths under the root of your app will require a client certificate for access. To allow certain paths to remain open for anonymous access, you can define exclusion paths as part of your application configuration.
39+
40+
Exclusion paths can be configured by selecting **Configuration** > **General Settings** and defining an exclusion path. In this example, anything under `/public` path for your application would not request a client certificate.
41+
42+
![Certificate Exclusion Paths][exclusion-paths]
43+
44+
3645
## Access client certificate
3746

3847
In App Service, SSL termination of the request happens at the frontend load balancer. When forwarding the request to your app code with [client certificates enabled](#enable-client-certificates), App Service injects an `X-ARR-ClientCert` request header with the client certificate. App Service does not do anything with this client certificate other than forwarding it to your app. Your app code is responsible for validating the client certificate.
@@ -208,4 +217,6 @@ export class AuthorizationHandler {
208217
}
209218
}
210219
}
211-
```
220+
```
221+
222+
[exclusion-paths]: ./media/app-service-web-configure-tls-mutual-auth/exclusion-paths.png
100 KB
Loading

articles/app-service/webjobs-sdk-how-to.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -813,7 +813,7 @@ For information about how to handle cancellation tokens, see the Azure Functions
813813

814814
If your web app runs on multiple instances, a continuous WebJob runs on each instance, listening for triggers and calling functions. The various trigger bindings are designed to efficiently share work collaboratively across instances, so that scaling out to more instances allows you to handle more load.
815815

816-
The queue and blob triggers automatically prevent a function from processing a queue message or blob more than once; functions don't have to be idempotent.
816+
While some triggers may result in double-processing, queue and blob storage triggers automatically prevent a function from processing a queue message or blob more than once. For more information, see [Designing for identical input](../azure-functions/functions-idempotent.md) in the Azure Functions documentation.
817817

818818
The timer trigger automatically ensures that only one instance of the timer runs, so you don't get more than one function instance running at a given scheduled time.
819819

articles/azure-cache-for-redis/cache-aspnet-output-cache-provider.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -167,7 +167,7 @@ namespace MyCompany.Redis
167167

168168
public object Deserialize(byte[] data)
169169
{
170-
if (data == null)6t6
170+
if (data == null)
171171
{
172172
return null;
173173
}

articles/azure-cache-for-redis/cache-how-to-premium-vnet.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -114,13 +114,17 @@ There are seven outbound port requirements.
114114
| 10221-10231 |Outbound |TCP |Internal communications for Redis | (Redis subnet) | (Redis subnet) |
115115
| 20226 |Outbound |TCP |Internal communications for Redis | (Redis subnet) |(Redis subnet) |
116116
| 13000-13999 |Outbound |TCP |Internal communications for Redis | (Redis subnet) |(Redis subnet) |
117-
| 15000-15999 |Outbound |TCP |Internal communications for Redis | (Redis subnet) |(Redis subnet) |
117+
| 15000-15999 |Outbound |TCP |Internal communications for Redis and Geo-Replication | (Redis subnet) |(Redis subnet) (Geo-replica peer subnet) |
118118
| 6379-6380 |Outbound |TCP |Internal communications for Redis | (Redis subnet) |(Redis subnet) |
119119

120120
<sup>1</sup> These IP addresses owned by Microsoft are used to address the Host VM which serves Azure DNS.
121121

122122
<sup>3</sup> Not needed for subnets with no custom DNS server, or newer redis caches that ignore custom DNS.
123123

124+
#### Geo-replication peer port requirements
125+
126+
If you are using georeplication between caches in Azure Virtual Networks, please note that the recommended configuration is to unblock ports 15000-15999 for the whole subnet in both inbound AND outbound directions to both caches, so that all the replica components in the subnet can communicate directly with each other even in the event of a future geo-failover.
127+
124128
#### Inbound port requirements
125129

126130
There are eight inbound port range requirements. Inbound requests in these ranges are either inbound from other services hosted in the same VNET or internal to the Redis subnet communications.
@@ -132,7 +136,7 @@ There are eight inbound port range requirements. Inbound requests in these range
132136
| 8500 |Inbound |TCP/UDP |Azure load balancing | (Redis subnet) |Azure Load Balancer |
133137
| 10221-10231 |Inbound |TCP |Internal communications for Redis | (Redis subnet) |(Redis subnet), Azure Load Balancer |
134138
| 13000-13999 |Inbound |TCP |Client communication to Redis Clusters, Azure load balancing | (Redis subnet) |Virtual Network, Azure Load Balancer |
135-
| 15000-15999 |Inbound |TCP |Client communication to Redis Clusters, Azure load Balancing | (Redis subnet) |Virtual Network, Azure Load Balancer |
139+
| 15000-15999 |Inbound |TCP |Client communication to Redis Clusters, Azure load Balancing, and Geo-Replication | (Redis subnet) |Virtual Network, Azure Load Balancer, (Geo-replica peer subnet) |
136140
| 16001 |Inbound |TCP/UDP |Azure load balancing | (Redis subnet) |Azure Load Balancer |
137141
| 20226 |Inbound |TCP |Internal communications for Redis | (Redis subnet) |(Redis subnet) |
138142

articles/azure-functions/functions-scenario-database-table-cleanup.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,13 +9,13 @@ manager: jeconnoc
99
ms.assetid: 076f5f95-f8d2-42c7-b7fd-6798856ba0bb
1010
ms.service: azure-functions
1111
ms.topic: conceptual
12-
ms.date: 10/28/2018
12+
ms.date: 10/02/2019
1313
ms.author: glenga
1414
---
1515

1616
# Use Azure Functions to connect to an Azure SQL Database
1717

18-
This article shows you how to use Azure Functions to create a scheduled job that connects to an Azure SQL Database instance. The function code cleans up rows in a table in the database. The new C# function is created based on a pre-defined timer trigger template in Visual Studio 2019. To support this scenario, you must also set a database connection string as an app setting in the function app. This scenario uses a bulk operation against the database.
18+
This article shows you how to use Azure Functions to create a scheduled job that connects to an Azure SQL Database or Azure SQL Managed Instance. The function code cleans up rows in a table in the database. The new C# function is created based on a pre-defined timer trigger template in Visual Studio 2019. To support this scenario, you must also set a database connection string as an app setting in the function app. For Azure SQL Managed Instance you need to [enable public endpoint](https://docs.microsoft.com/azure/sql-database/sql-database-managed-instance-public-endpoint-configure) to be able to connect from Azure Functions. This scenario uses a bulk operation against the database.
1919

2020
If this is your first experience working with C# Functions, you should read the [Azure Functions C# developer reference](functions-dotnet-class-library.md).
2121

@@ -35,7 +35,7 @@ You need to get the connection string for the database you created when you comp
3535

3636
1. Select **SQL Databases** from the left-hand menu, and select your database on the **SQL databases** page.
3737

38-
1. Select **Connection strings** under **Settings** and copy the complete **ADO.NET** connection string.
38+
1. Select **Connection strings** under **Settings** and copy the complete **ADO.NET** connection string. For Azure SQL Managed Instance copy connection string for public endpoint.
3939

4040
![Copy the ADO.NET connection string.](./media/functions-scenario-database-table-cleanup/adonet-connection-string.png)
4141

articles/azure-monitor/app/monitor-web-app-availability.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ There are three types of availability tests:
2626

2727
* [URL ping test](#create-a-url-ping-test): a simple test that you can create in the Azure portal.
2828
* [Multi-step web test](availability-multistep.md): A recording of a sequence of web requests, which can be played back to test more complex scenarios. Multi-step web tests are created in Visual Studio Enterprise and uploaded to the portal for execution.
29-
* [Custom Track Availability Tests](https://docs.microsoft.com/dotnet/api/microsoft.applicationinsights.telemetryclient.trackavailability?view=azure-dotnet): The `TrackAvailability()` method can be used to create your own custom availability tests.
29+
* [Custom Track Availability Tests](https://docs.microsoft.com/dotnet/api/microsoft.applicationinsights.telemetryclient.trackavailability?view=azure-dotnet): If you decide to create a custom application to run availability tests, the `TrackAvailability()` method can be used to send the results to Application Insights.
3030

3131
**You can create up to 100 availability tests per Application Insights resource.**
3232

0 commit comments

Comments
 (0)