You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/whats-new-docs.md
+11-7Lines changed: 11 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: "What's new in Azure Active Directory business-to-customer (B2C)"
3
3
description: "New and updated documentation for the Azure Active Directory business-to-customer (B2C)."
4
-
ms.date: 10/01/2024
4
+
ms.date: 11/04/2024
5
5
ms.service: azure-active-directory
6
6
ms.subservice: b2c
7
7
ms.topic: whats-new
@@ -19,6 +19,16 @@ manager: CelesteDG
19
19
20
20
Welcome to what's new in Azure Active Directory B2C documentation. This article lists new docs that have been added and those that have had significant updates in the last three months. To learn what's new with the B2C service, see [What's new in Microsoft Entra ID](../active-directory/fundamentals/whats-new.md), [Azure AD B2C developer release notes](custom-policy-developer-notes.md) and [What's new in Microsoft Entra External ID](/entra/external-id/whats-new-docs).
21
21
22
+
## October 2024
23
+
24
+
### Updated articles
25
+
26
+
-[Secure APIs used for API connectors in Azure AD B2C](secure-rest-api.md) - ROPC flow updates
27
+
-[Application types that can be used in Active Directory B2C](application-types.md) - Implicit grant flow updates
28
+
-[Configure authentication in a sample single-page application by using Azure AD B2C](configure-authentication-sample-spa-app.md) - Implicit grant flow updates
29
+
-[Single-page application sign-in using the OAuth 2.0 implicit flow in Azure Active Directory B2C](implicit-flow-single-page-application.md) - Implicit grant flow updates
30
+
-[Register a single-page application in Azure Active Directory B2C](tutorial-register-spa.md) - Implicit grant flow updates
31
+
22
32
## September 2024
23
33
24
34
### Updated articles
@@ -33,9 +43,3 @@ This month, we changed Twitter to X in numerous articles and code samples.
33
43
34
44
-[Tutorial: Configure Keyless with Azure Active Directory B2C](partner-keyless.md) - Editorial updates
35
45
36
-
## July 2024
37
-
38
-
### Updated articles
39
-
40
-
-[Developer notes for Azure Active Directory B2C](custom-policy-developer-notes.md) - Updated Twitter to X
41
-
-[Custom email verification with SendGrid](custom-email-sendgrid.md) - Updated the localization script
Copy file name to clipboardExpand all lines: articles/api-management/limit-concurrency-policy.md
+6Lines changed: 6 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,6 +16,8 @@ ms.author: danlep
16
16
17
17
The `limit-concurrency` policy prevents enclosed policies from executing by more than the specified number of requests at any time. When that number is exceeded, new requests will fail immediately with the `429` Too Many Requests status code.
Copy file name to clipboardExpand all lines: articles/app-service/configure-vnet-integration-routing.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ Your app is already integrated using the regional virtual network integration fe
17
17
18
18
## Configure application routing
19
19
20
-
Application routing defines what traffic is routed from your app and into the virtual network. We recommend that you use the `vnetRouteAllEnabled` site setting to enable routing of all traffic. Using the configuration setting allows you to audit the behavior with [a built-in policy](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F33228571-70a4-4fa1-8ca1-26d0aba8d6ef). The existing `WEBSITE_VNET_ROUTE_ALL` app setting can still be used, and you can enable all traffic routing with either setting.
20
+
Application routing defines what traffic is routed from your app and into the virtual network. We recommend that you use the `vnetRouteAllEnabled` site setting to enable routing of all traffic. Using the configuration setting allows you to audit the behavior with [a built-in policy](https://portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2Ff5c0bfb3-acea-47b1-b477-b0edcdf6edc1). The existing `WEBSITE_VNET_ROUTE_ALL` app setting can still be used, and you can enable all traffic routing with either setting.
Copy file name to clipboardExpand all lines: articles/backup/azure-kubernetes-service-cluster-backup-concept.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -100,7 +100,7 @@ Also, as part of the backup and restore operations, the following roles are assi
100
100
| Reader | Backup vault | Snapshot resource group | Allows the Backup vault to perform _List_ and _Read_ operations on snapshot resource group. |
101
101
| Contributor | AKS cluster | Snapshot resource group | Allows AKS cluster to store persistent volume snapshots in the resource group. |
102
102
| Storage Blob Data Contributor | Extension Identity | Storage account | Allows Backup Extension to store cluster resource backups in the blob container. |
103
-
| Data Operator for Managed Disk| Backup vault | Snapshot Resource Group | Allows Backup Vault service to move incremental snapshot data to the Vault. |
103
+
| Data Operator for Managed Disks| Backup vault | Snapshot Resource Group | Allows Backup Vault service to move incremental snapshot data to the Vault. |
104
104
| Disk Snapshot Contributor | Backup vault | Snapshot Resource Group | Allows Backup Vault to access Disks snapshots and perform Vaulting operation. |
105
105
| Storage Blob Data Reader | Backup vault | Storage Account | Allow Backup Vault to access Blob Container with backup data stored to move to Vault. |
106
106
| Contributor | Backup vault | Staging Resource Group | Allows Backup Vault to hydrate backups as Disks stored in Vault Tier. |
Copy file name to clipboardExpand all lines: articles/governance/policy/how-to/migrate-from-automanage-best-practices.md
+21-67Lines changed: 21 additions & 67 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,33 +31,19 @@ Automanage designers created an experience for Azure customers to onboard new an
31
31
This functionality is available in Azure Policy as an initiative with various configurable parameters, Azure services, regional availability, compliance states, and remediation actions. Configuration profiles are the main onboarding vehicle for Automanage customers. Just like Azure Policy initiatives, Automanage configuration profiles apply to VMs at the subscription and resource group level. They enable further specification of the zone of
32
32
applicability. The following Automanage feature parities are available in Azure Policy.
33
33
34
-
### Azure Monitor agent
35
-
36
-
The Azure Monitor agent collects monitoring data from the guest operating system of Azure and hybrid VMs. The agent delivers the data to Azure Monitor for use by features, insights, and other services, such as Microsoft Sentinel and Microsoft Defender for Cloud. The Azure Monitor agent replaces all of the Azure Monitor legacy monitoring agents.
34
+
### Azure Monitor Insights and analytics
37
35
38
-
Deploy this extension by using the following policies:
36
+
[Azure Monitor][13] is a suite of tools designed to enhance the performance, reliability, and quality of your applications. It offers features like application performance management, monitoring alerts, metrics analysis, diagnostic settings, and logs. With Azure Monitor Insights, you can gain valuable insights into your application's behavior, troubleshoot issues, and optimize performance.
39
37
40
-
- Configure Linux VMs to run the Azure Monitor agent with user-assigned managed-identity-based authentication.
41
-
- Configure Windows machines to associate with a data collection rule or a data collection endpoint.
42
-
- Configure Windows VMs to run the Azure Monitor agent with user-assigned managed-identity-based authentication.
43
-
- Configure Linux machines to associate with a data collection rule or a data collection endpoint.
44
-
- Deploy a dependency agent for Linux VMs with Azure Monitor agent settings.
45
-
- Deploy a dependency agent that you can enable on Windows VMs with Azure Monitor agent settings.
38
+
The Azure Monitor agent collects monitoring data from the guest operating system of Azure and hybrid VMs. The agent delivers the data to Azure Monitor for use by features, insights, and other services, such as Microsoft Sentinel and Microsoft Defender for Cloud. The Azure Monitor agent replaces all of the Azure Monitor legacy monitoring agents like the deprecated Microsoft Monitor Agent. The new Azure Monitor Agent is unsupported in Automanage but can be configured at-scale using Azure Policy. Visit [Azure Monitor Agent Built-In Policy][12] to learn more.
46
39
47
40
### Azure Backup
48
41
49
-
Azure Backup provides independent and isolated backups to guard against unintended destruction of the data on your VMs. Backups are stored in a Recovery Services vault with built-in management of recovery points. To back up Azure VMs, Backup installs an extension on the VM agent running on the machine.
50
-
51
-
Configure Backup by using the following policies:
52
-
53
-
- Configure backup on VMs with a specific tag to an existing Recovery Services vault in the same location.
54
-
- Enable Backup for VMs.
55
-
56
-
To configure Backup time and duration, create a custom Azure policy based on the properties of the Backup policy resource or by a REST API call. For more information, see [Create Recovery Services backup policies by using the REST API][02].
42
+
[Azure Backup][14] provides independent and isolated backups to guard against unintended destruction of the data on your VMs. Backups are stored in a Recovery Services vault with built-in management of recovery points. To back up Azure VMs, Backup installs an extension on the VM agent running on the machine. Visit [Azure Backup Built-In Policy][11] to learn how to configure Backup at scale through Azure Policy. To configure Backup time and duration, create a custom Azure policy based on the properties of the Backup policy resource or by a REST API call. For more information, see [Create Recovery Services backup policies by using the REST API][02].
57
43
58
44
### Microsoft Antimalware for Azure
59
45
60
-
Microsoft Antimalware for Azure Cloud Services and Virtual Machines offers free real-time protection that helps identify and remove viruses, spyware, and other malicious software. It generates alerts when known malicious or unwanted software tries to install itself or run on your Azure systems. The Azure Guest agent (or the Microsoft Fabric agent) opens the Microsoft Antimalware for Azure extension and applies the antimalware configuration settings that were supplied as input. This step enables the antimalware service with either default or custom configuration settings.
46
+
[Microsoft Antimalware][10] for Azure Cloud Services and Virtual Machines offers free real-time protection that helps identify and remove viruses, spyware, and other malicious software. It generates alerts when known malicious or unwanted software tries to install itself or run on your Azure systems. The Azure Guest agent (or the Microsoft Fabric agent) opens the Microsoft Antimalware for Azure extension and applies the antimalware configuration settings that were supplied as input. This step enables the antimalware service with either default or custom configuration settings.
61
47
62
48
Deploy the following Microsoft Antimalware for Azure policies in Azure Policy:
63
49
@@ -73,26 +59,9 @@ You can create a custom Azure policy based on the properties of the Azure `IaaSA
73
59
74
60
For more information, see [this webpage][03].
75
61
76
-
### Azure Monitor Insights and analytics
77
-
78
-
Azure Monitor Insights is a suite of tools within Azure Monitor designed to enhance the performance, reliability, and quality of your applications. It offers features like application performance management, monitoring alerts, metrics analysis, diagnostic settings, and logs. With Azure Monitor Insights, you can gain valuable insights into your application's behavior, troubleshoot issues, and optimize performance.
79
-
80
-
The following policies provide the same capabilities as Automanage:
81
-
82
-
- Assign a built-in user-assigned managed identity to VMs.
83
-
- Configure Linux VMs to run the Azure Monitor agent with user-assigned authentication based on managed identity.
84
-
- Configure Windows VMs to run the Azure Monitor agent with user-assigned authentication based on managed identity.
85
-
- Deploy a dependency agent that you can enable on Windows VMs with Azure Monitor agent settings.
86
-
- Deploy a dependency agent for Linux VMs with Azure Monitor agent settings.
87
-
- Configure Linux machines to associate with a data collection rule or a data collection endpoint.
88
-
- Configure Windows machines to associate with a data collection rule or a data collection endpoint.
89
-
90
-
To configure all the previous options, deploy the **Enable Azure Monitor for VMs with Azure
91
-
Monitoring Agent (AMA)** policy initiative.
92
-
93
62
### Change Tracking and Inventory
94
63
95
-
Change Tracking and Inventory is a feature within Automation that monitors changes in VMs across Azure, on-premises, and in other cloud environments. It tracks modifications to installed software, files, registry keys, and services on both Windows and Linux systems. Change Tracking and Inventory uses the Log Analytics agent to collect data and then forwards it to Azure Monitor Logs for analysis. It also integrates with Microsoft Defender for Cloud File Integrity Monitoring to enhance security and operational insights.
64
+
[Change Tracking and Inventory][15] is a feature within Automation that monitors changes in VMs across Azure, on-premises, and in other cloud environments. It tracks modifications to installed software, files, registry keys, and services on both Windows and Linux systems. Change Tracking and Inventory uses the Log Analytics agent to collect data and then forwards it to Azure Monitor Logs for analysis. It also integrates with Microsoft Defender for Cloud File Integrity Monitoring to enhance security and operational insights.
96
65
97
66
Enable change tracking on VMs by using the following policies:
98
67
@@ -111,42 +80,15 @@ Configure the preceding Azure policies in bulk by using the following Azure Poli
111
80
112
81
### Microsoft Defender for Cloud
113
82
114
-
Microsoft Defender for Cloud provides unified security management and advanced threat protection across hybrid cloud workloads.
115
-
116
-
Configure Defender for Cloud in Azure Policy through the following policy initiatives:
117
-
118
-
- Configure multiple Microsoft Defender for Endpoint integration settings with Defender for Cloud.
119
-
- Download the Microsoft cloud security benchmark.
120
-
- Configure Defender for Cloud plans.
83
+
[Microsoft Defender for Cloud][16] (MDC) provides unified security management and advanced threat protection across hybrid cloud workloads. Visit [Configure Defender for Cloud in Azure Policy][17] to learn more about at-scale compliance and monitoring for MDC.
121
84
122
85
### Azure Update Manager
123
86
124
-
Azure Update Manager is a service included as part of your Azure subscription. Use it to assess your update status across your environment and manage your Windows and Linux server patching from a single pane of glass, both for on-premises and Azure. It provides a unified solution to help you keep your systems up to date. Update Manager oversees update compliance, deploys critical updates, and offers flexible patching options.
125
-
126
-
Configure Update Manager in Azure Policy through the following policies:
127
-
128
-
- Configure periodic checking for missing system updates on servers enabled by Azure Arc.
129
-
- Configure machines periodically to check for missing system updates.
130
-
- Schedule recurring updates by using Update Manager.
131
-
-[Preview]: Set prerequisites for scheduling recurring updates on Azure VMs.
132
-
- Configure periodic checking for missing system updates on Azure VMs.
87
+
[Azure Update Manager][19] (AUM) is a service included as part of your Azure subscription. Use it to assess your update status across your environment and manage your Windows and Linux server patching from a single pane of glass, both for on-premises and Azure. It provides a unified solution to help you keep your systems up to date. Update Manager oversees update compliance, deploys critical updates, and offers flexible patching options. Visit [Azure Update Manager Built-In Policy][18] to learn how to configure AUM at scale through Azure Policy.
133
88
134
89
### Azure Automation account
135
90
136
-
Automation is a cloud-based service that provides consistent management across your Azure and non-Azure environments. Use it to automate repetitive tasks, enforce configuration consistency, and manage updates for VMs. By using runbooks and shared assets, you can streamline operations and reduce operational costs.
137
-
138
-
Configure Automation in Azure Policy through the following policies:
139
-
140
-
- Use managed identity for Automation accounts.
141
-
- Configure private endpoint connections on Automation accounts.
142
-
- Disable public network access for Automation accounts.
143
-
- Configure Automation accounts with private DNS zones.
144
-
- Use customer-managed keys to encrypt data at rest for Automation accounts.
145
-
- Disable the local authentication method for the Automation account.
146
-
- Encrypt Automation account variables.
147
-
- Configure Automation accounts to disable local authentication.
148
-
- Configure Automation accounts to disable public network access.
149
-
- Enable private endpoint connections on Automation accounts.
91
+
[Azure Automation][21] is a cloud-based service that provides consistent management across your Azure and non-Azure environments. Use it to automate repetitive tasks, enforce configuration consistency, and manage updates for VMs. By using runbooks and shared assets, you can streamline operations and reduce operational costs. Visit [Azure Automation Built-In Policy][20] to learn how to configure AUM at scale through Azure Policy.
150
92
151
93
### Boot diagnostics
152
94
@@ -185,3 +127,15 @@ Now that you have an overview of Azure Policy and some of the key concepts, here
0 commit comments