Skip to content

Commit 8309142

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into heidist-bugfix
2 parents d2e59b6 + e7c3d91 commit 8309142

File tree

88 files changed

+2933
-299
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

88 files changed

+2933
-299
lines changed

articles/active-directory-domain-services/secure-remote-vm-access.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -57,6 +57,7 @@ The RD environment deployment contains a number of steps. The existing RD deploy
5757

5858
1. Sign in to VMs created for the RD environment with an account that's part of the *Azure AD DC Administrators* group, such as *contosoadmin*.
5959
1. To create and configure RDS, use the existing [Remote Desktop environment deployment guide][deploy-remote-desktop]. Distribute the RD server components across your Azure VMs as desired.
60+
* Specific to Azure AD DS - when you configure RD licensing, set it to **Per Device** mode, not **Per User** as noted in the deployment guide.
6061
1. If you want to provide access using a web browser, [set up the Remote Desktop web client for your users][rd-web-client].
6162

6263
With RD deployed into the Azure AD DS managed domain, you can manage and use the service as you would with an on-premises AD DS domain.

articles/active-directory/app-provisioning/workday-attribute-reference.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.author: chmutali
1818
# Workday attribute reference
1919
This section provides a list of attributes that you can fetch from Workday using XPATH queries. Based on the Workday Web Services API version, you plan to use, refer to the appropriate section.
2020

21-
## XPATH values for Workday Web Services version 21.1
21+
## XPATH values for Workday Web Services (WWS) API v21.1
2222

2323

2424
The table below captures the list of Workday attributes and corresponding XPATH expressions that are shipped out of the box with the Workday inbound provisioning app connector.
@@ -106,7 +106,9 @@ The table below captures the list of Workday attributes and corresponding XPATH
106106
| 79 | WorkerType | wd:Worker/wd:Worker\_Data/wd:Employment\_Data/wd:Position\_Data/wd:Worker\_Type\_Reference/@wd:Descriptor |
107107
| 80 | WorkSpaceReference | wd:Worker/wd:Worker\_Data/wd:Employment\_Data/wd:Position\_Data/wd:Work\_Space\_\_Reference/@wd:Descriptor |
108108

109-
## XPATH values for Workday Web Services version 30+
109+
## XPATH values for Workday Web Services (WWS) API v30+
110+
111+
If you are using a WWS API v30.0 and above, before turning on the provisioning job, please update the **XPATH API expressions** under **Attribute Mapping -> Advanced Options -> Edit attribute list for Workday** to use the values listed below. To configure additional XPATHs, refer to the section [Tutorial: Managing your configuration](../saas-apps/workday-inbound-tutorial.md#managing-your-configuration).
110112

111113

112114
| \# | Name | Workday XPATH API expression |

articles/active-directory/authentication/howto-mfa-mfasettings.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -95,11 +95,11 @@ Configure the _fraud alert_ feature so that your users can report fraudulent att
9595
### View fraud reports
9696

9797
1. Sign in to the [Azure portal](https://portal.azure.com).
98-
2. Select **Azure Active Directory** > **Sign-ins**. The fraud report is now part of the standard Azure AD Sign-ins report.
99-
98+
2. Select **Azure Active Directory** > **Sign-ins** > **Authentication Details**. The fraud report is now part of the standard Azure AD Sign-ins report and it will show in the **"Result Detail"** as MFA denied, Fraud Code Entered.
99+
100100
## Notifications
101101

102-
Configure email addresses here for users who will receive fraud alert emails.
102+
Configure email addresses here for users who will receive fraud alert emails in **Azure Active Directory** > **Security** > **Multi-Factor Authentication** > **Notifications**.
103103

104104
![Notification fraud alert email sample](./media/howto-mfa-mfasettings/multi-factor-authentication-fraud-alert-email.png)
105105

articles/active-directory/develop/quickstart-v2-aspnet-core-webapp.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -152,6 +152,19 @@ The line containing `.AddAzureAd` adds the Microsoft identity platform authentic
152152
> [!NOTE]
153153
> Setting `ValidateIssuer = false` is a simplification for this quickstart. In real applications you need to validate the issuer.
154154
> See the samples to understand how to do that.
155+
>
156+
> Also note the `Configure` method which contains two important methods: `app.UserCookiePolicy()` and `app.UseAuthentication()`
157+
158+
```csharp
159+
// This method gets called by the runtime. Use this method to configure the HTTP request pipeline.
160+
public void Configure(IApplicationBuilder app, IHostingEnvironment env)
161+
{
162+
// more core
163+
app.UseCookiePolicy();
164+
app.UseAuthentication();
165+
// more core
166+
}
167+
```
155168

156169
### Protect a controller or a controller's method
157170

articles/active-directory/develop/scenario-web-app-sign-user-production.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,15 @@ Now that you know how to get a token to call web APIs, learn how to move it to p
2323

2424
## Next steps
2525

26+
### Troubleshooting
27+
28+
> [!NOTE]
29+
> When users sign-in to the web application for the first time, they will need to consent. However, in some organizations, users can see a message like the following:
30+
>
31+
> *AppName needs permissions to access resources in your organization that only an admin can grant. Please ask an admin to grant permission to this app before you can use it.*
32+
>
33+
> This is because your tenant administrator has **disabled** the ability for users to consent. In that case, you need to contact your tenant administrators so that they do an admin-consent for the scopes required by the application.
34+
2635
### Same site
2736

2837
Make sure you understand possible issues with new versions of the Chrome browser
-32 KB
Loading
-32.3 KB
Loading

articles/active-directory/saas-apps/workday-inbound-tutorial.md

Lines changed: 15 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.devlang: na
1313
ms.topic: article
1414
ms.tgt_pltfrm: na
1515
ms.workload: identity
16-
ms.date: 05/16/2019
16+
ms.date: 04/23/2020
1717
ms.author: chmutali
1818

1919
ms.collection: M365-identity-device-management
@@ -325,18 +325,19 @@ In this step, you'll grant "business process security" policy permissions for th
325325

326326
![Business Process Security Policies](./media/workday-inbound-tutorial/wd_isu_12.png "Business Process Security Policies")
327327

328-
2. In the **Business Process Type** textbox, search for *Contact* and select **Contact Change** business process and click **OK**.
328+
2. In the **Business Process Type** textbox, search for *Contact* and select **Work Contact Change** business process and click **OK**.
329329

330330
![Business Process Security Policies](./media/workday-inbound-tutorial/wd_isu_13.png "Business Process Security Policies")
331331

332-
3. On the **Edit Business Process Security Policy** page, scroll to the **Maintain Contact Information (Web Service)** section.
332+
3. On the **Edit Business Process Security Policy** page, scroll to the **Change Work Contact Information (Web Service)** section.
333+
333334

334-
![Business Process Security Policies](./media/workday-inbound-tutorial/wd_isu_14.png "Business Process Security Policies")
335-
336-
4. Select and add the new integration system security group to the list of security groups that can initiate the web services request. Click on **Done**.
335+
4. Select and add the new integration system security group to the list of security groups that can initiate the web services request.
337336

338337
![Business Process Security Policies](./media/workday-inbound-tutorial/wd_isu_15.png "Business Process Security Policies")
339338

339+
5. Click on **Done**.
340+
340341
### Activating security policy changes
341342

342343
**To activate security policy changes:**
@@ -457,8 +458,11 @@ In this step, we establish connectivity with Workday and Active Directory in the
457458
https://wd3-impl-services1.workday.com/ccx/service/contoso4, where *contoso4* is replaced with your correct tenant name and *wd3-impl* is replaced with the correct environment string.
458459

459460
> [!NOTE]
460-
> By default the app uses Workday Web Services v21.1 if no version information is specified in the URL. To use a specific Workday Web Services API version, please use the URL format: https://####.workday.com/ccx/service/tenantName/Human_Resources/v##.# <br>
461-
> Example: https://wd3-impl-services1.workday.com/ccx/service/contoso4/Human_Resources/v31.0
461+
> By default, the app uses Workday Web Services (WWS) v21.1 if no version information is specified in the URL. To use a specific WWS API version, please use the URL format: https://####.workday.com/ccx/service/tenantName/Human_Resources/v##.# <br>
462+
> Example: https://wd3-impl-services1.workday.com/ccx/service/contoso4/Human_Resources/v31.0 <br>
463+
464+
> [!NOTE]
465+
> If you are using a WWS API v30.0 and above, before turning on the provisioning job, please update the **XPATH API expressions** under **Attribute Mapping -> Advanced Options -> Edit attribute list for Workday** referring to the section [Managing your configuration](#managing-your-configuration) and [Workday attribute reference](../app-provisioning/workday-attribute-reference.md#xpath-values-for-workday-web-services-wws-api-v30).
462466
463467
* **Active Directory Forest -** The "Name" of your Active Directory domain, as registered with the agent. Use the dropdown to select the target domain for provisioning. This value is typically a string like: *contoso.com*
464468

@@ -838,7 +842,7 @@ The solution currently uses the following Workday APIs:
838842
* If the URL format is: https://\#\#\#\#\.workday\.com/ccx/service/tenantName/Human\_Resources , then API v21.1 is used
839843
* If the URL format is: https://\#\#\#\#\.workday\.com/ccx/service/tenantName/Human\_Resources/v\#\#\.\# , then the specified API version is used. (Example: if v34.0 is specified, then it is used.)
840844

841-
* Workday Email Writeback feature uses Maintain_Contact_Information (v26.1)
845+
* Workday Email Writeback feature uses Change_Work_Contact_Information (v30.0)
842846
* Workday Username Writeback feature uses Update_Workday_Account (v31.2)
843847

844848
#### Can I configure my Workday HCM tenant with two Azure AD tenants?
@@ -1272,7 +1276,7 @@ To do this change, you must use [Workday Studio](https://community.workday.com/s
12721276

12731277
1. Download and install [Workday Studio](https://community.workday.com/studio-download). You will need a Workday community account to access the installer.
12741278

1275-
2. Download the Workday Human_Resources WSDL file from this URL: https://community.workday.com/sites/default/files/file-hosting/productionapi/Human_Resources/v21.1/Human_Resources.wsdl
1279+
2. Download the Workday **Human_Resources** WSDL file specific to the WWS API version you plan to use from the [Workday Web Services Directory](https://community.workday.com/sites/default/files/file-hosting/productionapi/index.html)
12761280

12771281
3. Launch Workday Studio.
12781282

@@ -1292,7 +1296,7 @@ To do this change, you must use [Workday Studio](https://community.workday.com/s
12921296

12931297
9. Select **OK**.
12941298

1295-
10. In the **Request** pane, paste in the XML below and set **Employee_ID** to the employee ID of a real user in your Workday tenant. Select a user that has the attribute populated that you wish to extract.
1299+
10. In the **Request** pane, paste in the XML below. Set **Employee_ID** to the employee ID of a real user in your Workday tenant. Set **wd:version** to the version of WWS that you plan to use. Select a user that has the attribute populated that you wish to extract.
12961300

12971301
```xml
12981302
<?xml version="1.0" encoding="UTF-8"?>

articles/aks/faq.md

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -93,6 +93,25 @@ AKS supports the following [admission controllers][admission-controllers]:
9393

9494
Currently, you can't modify the list of admission controllers in AKS.
9595

96+
## Can I use admission controller webhooks on AKS?
97+
98+
Yes, you may use admission controller webhooks on AKS. It is recommended you exclude internal AKS namespaces which are marked with the **control-plane label.** For example, by adding the below to the webhook configuration:
99+
100+
```
101+
namespaceSelector:
102+
matchExpressions:
103+
- key: control-plane
104+
operator: DoesNotExist
105+
```
106+
107+
## Can admission controller webhooks impact kube-system and internal AKS namespaces?
108+
109+
To protect the stability of the system and prevent custom admission controllers from impacting internal services in the kube-system, namespace AKS has an **Admissions Enforcer**, which automatically excludes kube-system and AKS internal namespaces. This service ensures the custom admission controllers don't affect the services running in kube-system.
110+
111+
If you have a critical use case for having something deployed on kube-system (not recommended) which you require to be covered by your custom admission webhook, you may add the below label or annotation so that Admissions Enforcer ignores it.
112+
113+
Label: ```"admissions.enforcer/disabled": "true"``` or Annotation: ```"admissions.enforcer/disabled": true```
114+
96115
## Is Azure Key Vault integrated with AKS?
97116

98117
AKS isn't currently natively integrated with Azure Key Vault. However, the [Azure Key Vault FlexVolume for Kubernetes project][keyvault-flexvolume] enables direct integration from Kubernetes pods to Key Vault secrets.

articles/automation/TOC.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,8 @@
2626
href: learn/automation-tutorial-runbook-textual-python2.md
2727
- name: Concepts
2828
items:
29+
- name: Automation account authentication overview
30+
href: automation-security-overview.md
2931
- name: Runbook execution overview
3032
href: automation-runbook-execution.md
3133
- name: Hybrid Runbook Worker overview
@@ -48,6 +50,8 @@
4850
href: automation-create-standalone-account.md
4951
- name: Create Automation account with Resource Manager template
5052
href: automation-create-account-template.md
53+
- name: Configure authentication with Amazon Web Services
54+
href: automation-config-aws-account.md
5155
- name: Manage an Automation Run As account
5256
href: manage-runas-account.md
5357
- name: Manage role permissions and security
@@ -248,8 +252,6 @@
248252
href: automation-create-alert-triggered-runbook.md
249253
- name: Manage Office 365 services
250254
href: manage-office-365.md
251-
- name: Authenticate runbooks with Amazon Web Services
252-
href: automation-config-aws-account.md
253255
- name: Deploy AWS VM with Automation runbook
254256
href: automation-scenario-aws-deployment.md
255257
- name: Deploy Resource Manager template with runbook

0 commit comments

Comments
 (0)