Skip to content

Commit 897d067

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into erlimits
2 parents c88e311 + fb795cc commit 897d067

9 files changed

+53
-36
lines changed

articles/azure-arc/data/privacy-data-collection-and-reporting.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,10 +11,11 @@ ms.date: 07/30/2021
1111
ms.custom: template-concept
1212
---
1313

14-
# Azure Arc data services data collection and reporting
14+
# Azure Arc-enabled data services data collection and reporting
1515

1616
This article describes the data that Azure Arc-enabled data services transmits to Microsoft.
1717

18+
Azure Arc-enabled data services doesn't store any customer data.
1819

1920
## Related products
2021

articles/azure-resource-manager/bicep/install.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Set up Bicep development and deployment environments
33
description: How to configure Bicep development and deployment environments
44
ms.topic: conceptual
5-
ms.date: 08/08/2022
5+
ms.date: 11/03/2022
66
ms.custom: devx-track-azurepowershell, devx-track-azurecli
77
---
88

@@ -13,6 +13,7 @@ Let's make sure your environment is set up for working with Bicep files. To auth
1313
| Tasks | Options | Bicep CLI installation |
1414
| ------ | ------- | ----------- |
1515
| Author | [VS Code and Bicep extension](#vs-code-and-bicep-extension) | automatic |
16+
| | [Visual Studio and Bicep extension](#visual-studio-and-bicep-extension) | automatic |
1617
| Deploy | [Azure CLI](#azure-cli) | automatic |
1718
| | [Azure PowerShell](#azure-powershell) | [manual](#install-manually) |
1819
| | [VS Code and Bicep extension](#vs-code-and-bicep-extension) | automatic |
@@ -39,6 +40,15 @@ If you get an error during installation, see [Troubleshoot Bicep installation](i
3940

4041
You can deploy your Bicep files directly from the VS Code editor. For more information, see [Deploy Bicep files from Visual Studio Code](deploy-vscode.md).
4142

43+
## Visual Studio and Bicep extension
44+
45+
To author Bicep file from Visual Studio, you need:
46+
47+
- **Visual Studio** - If you don't already have Visual Studio, [install it](https://visualstudio.microsoft.com/).
48+
- **Bicep extension for Visual Studio**. Visual Studio with the Bicep extension provides language support and resource autocompletion. The extension helps you create and validate Bicep files. Install the extension from [Visual Studio Marketplace](https://marketplace.visualstudio.com/items?itemName=ms-azuretools.visualstudiobicep).
49+
50+
To walk through a tutorial, see [Quickstart: Create Bicep files with Visual Studio](./quickstart-create-bicep-use-visual-studio.md).
51+
4252
## Azure CLI
4353

4454
When you use Azure CLI with Bicep, you have everything you need to [deploy](deploy-cli.md) and [decompile](decompile.md) Bicep files. Azure CLI automatically installs the Bicep CLI when a command is executed that needs it.

articles/azure-resource-manager/bicep/overview.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Bicep language for deploying Azure resources
33
description: Describes the Bicep language for deploying infrastructure to Azure. It provides an improved authoring experience over using JSON to develop templates.
44
ms.topic: conceptual
5-
ms.date: 03/14/2022
5+
ms.date: 11/03/2022
66
---
77

88
# What is Bicep?
@@ -76,9 +76,11 @@ Bicep provides the following advantages:
7676
---
7777

7878
- **Authoring experience**: When you use the [Bicep Extension for VS Code](https://marketplace.visualstudio.com/items?itemName=ms-azuretools.vscode-bicep) to create your Bicep files, you get a first-class authoring experience. The editor provides rich type-safety, intellisense, and syntax validation.
79-
79+
8080
![Bicep file authoring example](./media/overview/bicep-intellisense.gif)
8181

82+
You can also create Bicep files in Visual Studio with the [Bicep extension for Visual Studio](https://marketplace.visualstudio.com/items?itemName=ms-azuretools.visualstudiobicep).
83+
8284
- **Repeatable results**: Repeatedly deploy your infrastructure throughout the development lifecycle and have confidence your resources are deployed in a consistent manner. Bicep files are idempotent, which means you can deploy the same file many times and get the same resource types in the same state. You can develop one file that represents the desired state, rather than developing lots of separate files to represent updates.
8385
- **Orchestration**: You don't have to worry about the complexities of ordering operations. Resource Manager orchestrates the deployment of interdependent resources so they're created in the correct order. When possible, Resource Manager deploys resources in parallel so your deployments finish faster than serial deployments. You deploy the file through one command, rather than through multiple imperative commands.
8486

articles/azure-resource-manager/bicep/quickstart-create-bicep-use-visual-studio-code.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Create Bicep files - Visual Studio Code
33
description: Use Visual Studio Code and the Bicep extension to Bicep files for deploy Azure resources
4-
ms.date: 06/30/2022
4+
ms.date: 11/03/2022
55
ms.topic: quickstart
66
ms.custom: devx-track-azurepowershell, mode-ui
77
#Customer intent: As a developer new to Azure deployment, I want to learn how to use Visual Studio Code to create and edit Bicep files, so I can use them to deploy Azure resources.
@@ -11,6 +11,8 @@ ms.custom: devx-track-azurepowershell, mode-ui
1111

1212
This quickstart guides you through the steps to create a [Bicep file](overview.md) with Visual Studio Code. You'll create a storage account and a virtual network. You'll also learn how the Bicep extension simplifies development by providing type safety, syntax validation, and autocompletion.
1313

14+
Similar authoring experience is also supported in Visual Studio. See [Quickstart: Create Bicep files with Visual Studio](./quickstart-create-bicep-use-visual-studio.md).
15+
1416
## Prerequisites
1517

1618
If you don't have an Azure subscription, [create a free account](https://azure.microsoft.com/free/) before you begin.

articles/azure-resource-manager/bicep/quickstart-create-bicep-use-visual-studio.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,8 @@ ms.topic: quickstart
1111

1212
This quickstart guides you through the steps to create a [Bicep file](overview.md) with Visual Studio. You'll create a storage account and a virtual network. You'll also learn how the Bicep extension simplifies development by providing type safety, syntax validation, and autocompletion.
1313

14+
Similar authoring experience is also supported in Visual Studio Code. See [Quickstart: Create Bicep files with Visual Studio Code](./quickstart-create-bicep-use-visual-studio-code.md).
15+
1416
## Prerequisites
1517

1618
- Azure Subscription. If you don't have an Azure subscription, [create a free account](https://azure.microsoft.com/free/) before you begin.

articles/azure-resource-manager/bicep/quickstart-private-module-registry.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ To work with module registries, you must have [Bicep CLI](./install.md) version
1919

2020
A Bicep registry is hosted on [Azure Container Registry (ACR)](../../container-registry/container-registry-intro.md). To create one, see [Quickstart: Create a container registry by using a Bicep file](../../container-registry/container-registry-get-started-bicep.md).
2121

22-
To set up your environment for Bicep development, see [Install Bicep tools](install.md). After completing those steps, you'll have [Visual Studio Code](https://code.visualstudio.com/) and the [Bicep extension](https://marketplace.visualstudio.com/items?itemName=ms-azuretools.vscode-bicep).
22+
To set up your environment for Bicep development, see [Install Bicep tools](install.md). After completing those steps, you'll have [Visual Studio Code](https://code.visualstudio.com/) and the [Bicep extension](https://marketplace.visualstudio.com/items?itemName=ms-azuretools.vscode-bicep), or [Visual Studio](https://visualstudio.microsoft.com/) and the [Bicep extension](https://marketplace.visualstudio.com/items?itemName=ms-azuretools.visualstudiobicep).
2323

2424
## Create Bicep modules
2525

articles/storage/files/storage-files-identity-ad-ds-assign-permissions.md

Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -5,20 +5,18 @@ author: khdownie
55
ms.service: storage
66
ms.subservice: files
77
ms.topic: how-to
8-
ms.date: 09/19/2022
8+
ms.date: 11/03/2022
99
ms.author: kendownie
1010
ms.custom: devx-track-azurepowershell, subject-rbac-steps, devx-track-azurecli
1111
ms.devlang: azurecli
1212
---
1313

1414
# Part two: assign share-level permissions to an identity
1515

16-
Before you begin this article, make sure you've completed the previous article, [Enable AD DS authentication for your account](storage-files-identity-ad-ds-enable.md).
17-
18-
Once you've enabled Active Directory Domain Services (AD DS) authentication on your storage account, you must configure share-level permissions in order to get access to your file shares. There are two ways you can assign share-level permissions. You can assign them to specific Azure AD users/groups, and you can assign them to all authenticated identities as a default share-level permission.
16+
Once you've enabled an Active Directory (AD) source for your storage account, you must configure share-level permissions in order to get access to your file share. There are two ways you can assign share-level permissions. You can assign them to [specific Azure AD users/groups](#share-level-permissions-for-specific-azure-ad-users-or-groups), and you can assign them to all authenticated identities as a [default share-level permission](#share-level-permissions-for-all-authenticated-identities).
1917

2018
> [!IMPORTANT]
21-
> Full administrative control of a file share, including the ability to take ownership of a file, requires using the storage account key. Full administrative control isn't supported with AD DS or Azure AD authentication.
19+
> Full administrative control of a file share, including the ability to take ownership of a file, requires using the storage account key. Full administrative control isn't supported with Active Directory Domain Services (AD DS) or Azure AD authentication.
2220
2321
## Applies to
2422
| File share type | SMB | NFS |
@@ -31,16 +29,16 @@ Once you've enabled Active Directory Domain Services (AD DS) authentication on y
3129

3230
Most users should assign share-level permissions to specific Azure AD users or groups, and then use Windows ACLs for granular access control at the directory and file level. This is the most stringent and secure configuration.
3331

34-
There are three scenarios where we instead recommend using default share-level permissions assigned to all authenticated identities:
32+
There are three scenarios where we instead recommend using a [default share-level permission](#share-level-permissions-for-all-authenticated-identities) assigned to all authenticated identities:
3533

3634
- If you are unable to sync your on-premises AD DS to Azure AD, you can use a default share-level permission. Assigning a default share-level permission allows you to work around the sync requirement because you don't need to specify the permission to identities in Azure AD. Then you can use Windows ACLs for granular permission enforcement on your files and directories.
37-
- Identities that are tied to an AD but aren't synching to Azure AD can also leverage the default share-level permission. This could include standalone Managed Service Accounts (sMSA), group Managed Service Accounts (gMSA), and computer accounts.
35+
- Identities that are tied to an AD but aren't synching to Azure AD can also leverage the default share-level permission. This could include standalone Managed Service Accounts (sMSA), group Managed Service Accounts (gMSA), and computer accounts.
3836
- The on-premises AD DS you're using is synched to a different Azure AD than the Azure AD the file share is deployed in.
39-
- This is typical when you're managing multi-tenant environments. Using the default share-level permission allows you to bypass the requirement for an Azure AD hybrid identity. You can still use Windows ACLs on your files and directories for granular permission enforcement.
40-
- You prefer to enforce authentication only using Windows ACLs at the file and directory level.
37+
- This is typical when you're managing multi-tenant environments. Using a default share-level permission allows you to bypass the requirement for an Azure AD hybrid identity. You can still use Windows ACLs on your files and directories for granular permission enforcement.
38+
- You prefer to enforce authentication only using Windows ACLs at the file and directory level.
4139

4240
> [!NOTE]
43-
> Because computer accounts don't have an identity in Azure AD, you can't configure Azure role-based access control (RBAC) for them. However, computer accounts can access a file share by using default share-level permissions.
41+
> Because computer accounts don't have an identity in Azure AD, you can't configure Azure role-based access control (RBAC) for them. However, computer accounts can access a file share by using a [default share-level permission](#share-level-permissions-for-all-authenticated-identities).
4442
4543
## Share-level permissions
4644

articles/storage/files/storage-files-identity-auth-active-directory-enable.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: khdownie
55
ms.service: storage
66
ms.subservice: files
77
ms.topic: how-to
8-
ms.date: 10/04/2022
8+
ms.date: 11/03/2022
99
ms.author: kendownie
1010
---
1111

@@ -14,7 +14,7 @@ ms.author: kendownie
1414

1515
We strongly recommend that you review the [How it works section](./storage-files-active-directory-overview.md#how-it-works) to select the right AD source for authentication. The setup is different depending on the domain service you choose. This article focuses on enabling and configuring on-premises AD DS for authentication with Azure file shares.
1616

17-
If you're new to Azure Files, we recommend reading our [planning guide](storage-files-planning.md) before reading the following series of articles.
17+
If you're new to Azure Files, we recommend reading our [planning guide](storage-files-planning.md).
1818

1919
## Applies to
2020
| File share type | SMB | NFS |
@@ -25,13 +25,13 @@ If you're new to Azure Files, we recommend reading our [planning guide](storage-
2525

2626
## Supported scenarios and restrictions
2727

28-
- AD DS identities used for Azure Files on-premises AD DS authentication must be synced to Azure AD or use a default share-level permission. Password hash synchronization is optional.
28+
- AD DS identities used for Azure Files on-premises AD DS authentication must be synced to Azure AD or [use a default share-level permission](storage-files-identity-ad-ds-assign-permissions.md#share-level-permissions-for-all-authenticated-identities). Password hash synchronization is optional.
2929
- Supports Azure file shares managed by Azure File Sync.
3030
- Supports Kerberos authentication with AD with [AES 256 encryption](./storage-troubleshoot-windows-file-connection-problems.md#azure-files-on-premises-ad-ds-authentication-support-for-aes-256-kerberos-encryption) (recommended) and RC4-HMAC. AES 128 Kerberos encryption is not yet supported.
3131
- Supports single sign-on experience.
3232
- Only supported on clients running OS versions Windows 8/Windows Server 2012 or newer.
3333
- Only supported against the AD forest that the storage account is registered to. You can only access Azure file shares with the AD DS credentials from a single forest by default. If you need to access your Azure file share from a different forest, make sure that you have the proper forest trust configured, see the [FAQ](storage-files-faq.md#ad-ds--azure-ad-ds-authentication) for details.
34-
- Doesn't support authentication against computer accounts created in AD DS.
34+
- Doesn't support assigning share-level permissions to computer accounts (machine accounts) using Azure RBAC. You can either [use a default share-level permission](storage-files-identity-ad-ds-assign-permissions.md#share-level-permissions-for-all-authenticated-identities) to allow computer accounts to access the share, or consider using a service logon account instead.
3535
- Doesn't support authentication against Network File System (NFS) file shares.
3636
- Doesn't support using CNAME to mount file shares.
3737

0 commit comments

Comments
 (0)