You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/session-behavior.md
+7-5Lines changed: 7 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ manager: celestedg
8
8
ms.service: active-directory
9
9
ms.workload: identity
10
10
ms.topic: how-to
11
-
ms.date: 04/22/2021
11
+
ms.date: 06/07/2021
12
12
ms.custom: project-no-code
13
13
ms.author: mimart
14
14
ms.subservice: B2C
@@ -240,16 +240,18 @@ When you want to sign the user out of the application, it isn't enough to clear
240
240
241
241
Upon a sign-out request, Azure AD B2C:
242
242
243
-
1. Invalidates the Azure AD B2C cookie-based session.
244
243
::: zone pivot="b2c-user-flow"
245
-
2. Attempts to sign out from federated identity providers
244
+
1. Invalidates the Azure AD B2C cookie-based session.
245
+
1. Attempts to sign out from federated identity providers
246
246
::: zone-end
247
+
247
248
::: zone pivot="b2c-custom-policy"
248
-
3. Attempts to sign out from federated identity providers:
249
+
1. Invalidates the Azure AD B2C cookie-based session.
250
+
1. Attempts to sign out from federated identity providers:
249
251
- OpenId Connect - If the identity provider well-known configuration endpoint specifies an `end_session_endpoint` location. The sign-out request doesn't pass the `id_token_hint` parameter. If the federated identity provider requires this parameter, the sign-out request will fail.
250
252
- OAuth2 - If the [identity provider metadata](oauth2-technical-profile.md#metadata) contains the `end_session_endpoint` location.
251
253
- SAML - If the [identity provider metadata](identity-provider-generic-saml.md) contains the `SingleLogoutService` location.
252
-
4. Optionally, signs-out from other applications. For more information, see the [Single sign-out](#single-sign-out) section.
254
+
1. Optionally, signs-out from other applications. For more information, see the [Single sign-out](#single-sign-out) section.
253
255
254
256
> [!NOTE]
255
257
> You can disable the sign out from federated identity providers, by setting the identity provider technical profile metadata `SingleLogoutEnabled` to `false`.
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/tutorial-create-user-flows.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ manager: celestedg
8
8
ms.service: active-directory
9
9
ms.workload: identity
10
10
ms.topic: tutorial
11
-
ms.date: 05/21/2021
11
+
ms.date: 06/07/2021
12
12
ms.author: mimart
13
13
ms.subservice: B2C
14
14
zone_pivot_groups: b2c-policy-type
@@ -42,13 +42,13 @@ A user flow lets you determine how users interact with your application when the
42
42
43
43
::: zone pivot="b2c-user-flow"
44
44
- If you don't have one already, [create an Azure AD B2C tenant](tutorial-create-tenant.md) that is linked to your Azure subscription.
45
-
-[Register your application](tutorial-register-applications.md) in the tenant that you created so that it can communicate with Azure AD B2C.
45
+
-[Register a web application](tutorial-register-applications.md), and [enable ID token implicit grant](tutorial-register-applications.md#enable-id-token-implicit-grant).
46
46
::: zone-end
47
47
48
48
::: zone pivot="b2c-custom-policy"
49
49
50
50
- If you don't have one already, [create an Azure AD B2C tenant](tutorial-create-tenant.md) that is linked to your Azure subscription.
51
-
-[Register your application](tutorial-register-applications.md) in the tenant that you created so that it can communicate with Azure AD B2C.
51
+
-[Register a web application](tutorial-register-applications.md), and [enable ID token implicit grant](tutorial-register-applications.md#enable-id-token-implicit-grant).
52
52
-[Create a Facebook application](identity-provider-facebook.md#create-a-facebook-application). Skip the prerequisites and the reset of the steps in the [Set up sign-up and sign-in with a Facebook account](identity-provider-facebook.md) article. Although a Facebook application is not required for using custom policies, it's used in this walkthrough to demonstrate enabling social login in a custom policy.
Copy file name to clipboardExpand all lines: articles/azure-resource-manager/templates/template-tutorial-quickstart-template.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,7 @@ This template works for deploying storage accounts and app service plans, but yo
30
30
31
31
1. Open [Azure Quickstart templates](https://azure.microsoft.com/resources/templates/)
32
32
1. In **Search**, enter _deploy linux web app_.
33
-
1. Select the tile with the title **Deploy a basic Linux web app**. If you have trouble finding it, here's the [direct link](https://azure.microsoft.com/resources/templates/101-webapp-basic-linux/).
33
+
1. Select the tile with the title **Deploy a basic Linux web app**. If you have trouble finding it, here's the [direct link](https://azure.microsoft.com/en-us/resources/templates/webapp-basic-linux/).
34
34
1. Select **Browse on GitHub**.
35
35
1. Select _azuredeploy.json_.
36
36
1. Review the template. In particular, look for the `Microsoft.Web/sites` resource.
Copy file name to clipboardExpand all lines: articles/azure-video-analyzer/video-analyzer-docs/detect-motion-record-video-clips-cloud.md
+17Lines changed: 17 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -983,6 +983,23 @@ Within few seconds, you should see the following response in the OUTPUT window
983
983
984
984
Status code of 200 indicates that the pipeline topology was successfully deleted.
985
985
986
+
## Playing back the recording
987
+
988
+
You can examine the Video Analyzer video resource that was created by the live pipeline by logging in to the Azure portal and viewing the video.
989
+
1. Open your web browser, and go to the [Azure portal](https://portal.azure.com/). Enter your credentials to sign in to the portal. The default view is your service dashboard.
990
+
1. Locate your Video Analyzer account among the resources you have in your subscription, and open the account pane.
991
+
1. Select **Videos** in the **Video Analyzers** list.
992
+
1. You'll find a video listed with the name `sample-motion-video-camera001`. This is the name chosen in your pipeline topology file.
993
+
1. Select the video.
994
+
1. The video details page will open and the playback should start automatically.
995
+
996
+
<!--TODO: add image -- ![Video playback]() TODO: new screenshot is needed here -->
997
+
998
+
999
+
> [!NOTE]
1000
+
> Because the source of the video was a container simulating a camera feed, the time stamps in the video are related to when you activated the live pipeline and when you deactivated it.
Copy file name to clipboardExpand all lines: articles/azure-video-analyzer/video-analyzer-docs/record-event-based-live-video.md
+2-4Lines changed: 2 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -350,17 +350,15 @@ When you deactivate the live pipeline, the video sink node stops recording media
350
350
351
351
This event indicates that recording has stopped. The subject section in applicationProperties references the video sink node in the live pipeline, which generated this message. The body section contains information about the output location. In this case, it's the name of the Video Analyzer resource into which video is recorded.
352
352
353
-
## Video Analyzer video resource
353
+
## Playing back the recording
354
354
355
355
You can examine the Video Analyzer video resource that was created by the live pipeline by logging in to the Azure portal and viewing the video.
356
356
1. Open your web browser, and go to the [Azure portal](https://portal.azure.com/). Enter your credentials to sign in to the portal. The default view is your service dashboard.
357
357
1. Locate your Video Analyzer account among the resources you have in your subscription, and open the account pane.
358
358
1. Select **Videos** in the **Video Analyzers** list.
Copy file name to clipboardExpand all lines: articles/backup/backup-azure-monitoring-built-in-monitor.md
+84-5Lines changed: 84 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -117,16 +117,95 @@ To inactivate/resolve an active alert, you can select the list item correspondin
117
117
118
118
## Azure Monitor alerts for Azure Backup (preview)
119
119
120
-
Azure Backup also provides alerts via Azure Monitor, to enable users to have a consistent experience for alert management across different Azure services, including backup. With Azure Monitor alerts, you can route alerts to any notification channel supported by Azure Backup such as email, ITSM, Webhook, Logic App and so on.
120
+
Azure Backup also provides alerts via Azure Monitor, to enable users to have a consistent experience for alert management across different Azure services, including backup. With Azure Monitor alerts, you can route alerts to any notification channel supported by Azure Monitor such as email, ITSM, Webhook, Logic App and so on.
121
121
122
-
Currently, this feature is available for Azure Databases for PostgreSQL Server, Azure Blobs and Azure Managed Disks. Alerts are generated for the following scenarios and can be accessed by navigating to a Backup vault and clicking on the **Alerts** menu item:
122
+
Currently, Azure Backup has made two main types of built-in alerts available:
123
123
124
-
- Delete Backup Data
125
-
- Backup Failure (to get alerts for Backup Failure, you need to register the AFEC flag named **EnableAzureBackupJobFailureAlertsToAzureMonitor** via the preview portal)
126
-
- Restore Failure (to get alerts for Restore Failure, you need to register the AFEC flag named **EnableAzureBackupJobFailureAlertsToAzureMonitor** via the preview portal)
124
+
***Security Alerts**: For scenarios, such as deletion of backup data, or disabling of soft-delete functionality for a vault, security alerts (of severity Sev 0) are fired, and displayed in the Azure portal or consumed via other clients (PowerShell, CLI and REST API). Security alerts are generated by default and can't be turned off. However, you can control the scenarios for which the notifications (for example, emails) should be fired. For more information on how to configure notifications, see [Action rules](../azure-monitor/alerts/alerts-action-rules.md).
125
+
***Job Failure Alerts**: For scenarios, such as backup failure and restore failure, Azure Backup provides built-in alerts via Azure Monitor (of Severity Sev 1). Unlike security alerts, you can choose to turn off Azure Monitor alerts for job failure scenarios. For example, if you have already configured custom alert rules for job failures via Log Analytics, and don't need built-in alerts to be fired for every job failure. By default, alerts for job failures are turned off. Refer to the [section on turning on alerts for these scenarios](#turning-on-azure-monitor-alerts-for-job-failure-scenarios) for more details.
126
+
127
+
The following table summarizes the different backup alerts currently available (in preview) via Azure Monitor and the supported workload/vault types:
| Security | Delete Backup Data | <li> Azure Virtual Machine <br><br> <li> SQL in Azure VM (non-AG scenarios) <br><br> <li> SAP HANA in Azure VM <br><br> <li> Azure Backup Agent <br><br> <li> DPM <br><br> <li> Azure Backup Server <br><br> <li> Azure Database for PostgreSQL Server <br><br> <li> Azure Blobs <br><br> <li> Azure Managed Disks | This alert is fired when a user stops backup and deletes backup data (Note – If soft-delete feature is disabled for the vault, Delete Backup Data alert is not received) |
132
+
| Security | Upcoming Purge | <li> Azure Virtual Machine <br><br> <li> SQL in Azure VM (non-AG scenarios) <br><br> <li> SAP HANA in Azure VM | For all workloads which support soft-delete, this alert is fired when the backup data for an item is 2 days away from being permanently purged by the Azure Backup service |
133
+
| Security | Purge Complete | <li> Azure Virtual Machine <br><br> <li> SQL in Azure VM (non-AG scenarios) <br><br> <li> SAP HANA in Azure VM | Delete Backup Data |
134
+
| Security | Soft Delete Disabled for Vault | Recovery Services vaults | This alert is fired when the soft-deleted backup data for an item has been permanently deleted by the Azure Backup service |
135
+
| Jobs | Backup Failure | <li> Azure Virtual Machine <br><br> <li> SQL in Azure VM (non-AG scenarios) <br><br> <li> SAP HANA in Azure VM <br><br> <li> Azure Backup Agent <br><br> <li> Azure Files <br><br> <li> Azure Database for PostgreSQL Server <br><br> <li> Azure Blobs <br><br> <li> Azure Managed Disks | This alert is fired when a backup job failure has occurred. By default, alerts for backup failures are turned off. Refer to the [section on turning on alerts for this scenario](#turning-on-azure-monitor-alerts-for-job-failure-scenarios) for more details. |
136
+
| Jobs | Restore Failure | <li> Azure Virtual Machine <br><br> <li> SQL in Azure VM (non-AG scenarios) <br><br> <li> SAP HANA in Azure VM <br><br> <li> Azure Backup Agent <br><br> <li> Azure Files <br><br> <li> Azure Database for PostgreSQL Server <br><br> <li> Azure Blobs <br><br> <li> Azure Managed Disks| This alert is fired when a restore job failure has occurred. By default, alerts for restore failures are turned off. Refer to the [section on turning on alerts for this scenario](#turning-on-azure-monitor-alerts-for-job-failure-scenarios) for more details. |
137
+
138
+
### Turning on Azure Monitor alerts for job failure scenarios
139
+
140
+
To opt-in to Azure Monitor alerts for backup failure and restore failure scenarios, follow the below steps:
141
+
142
+
1. Navigate to the Azure portal and search for **Preview Features**.
2. You can view the list of all preview features that are available for you to opt-in to.
147
+
148
+
* If you wish to receive job failure alerts for workloads backed up to Recovery Services vaults, select the flag named **EnableAzureBackupJobFailureAlertsToAzureMonitor** corresponding to Microsoft.RecoveryServices provider (column 3).
149
+
* If you wish to receive job failure alerts for workloads backed up to Backup vaults, select the flag named **EnableAzureBackupJobFailureAlertsToAzureMonitor** corresponding to Microsoft.DataProtection provider (column 3).
3. Click **Register** to enable this feature for your subscription.
154
+
> [!NOTE]
155
+
> It may take up to 30 minutes for the registration to take effect. If you wish to enable this feature for multiple subscriptions, repeat the above process by selecting the relevant subscription at the top of the screen.
156
+
157
+
158
+
### Viewing fired alerts in the Azure portal
159
+
160
+
Once an alert is fired for a vault, you can view the alert in the Azure portal by navigating to the vault and clicking on the **Alerts** menu item. Clicking this shows a distribution of alerts by severity for this vault.
Clicking on any of the numbers opens up a list of all alerts fired with the given severity. You can click any of the alerts to get more details about the alert, such as the affected datasource, alert description and recommended action, and so on.
For more information about Azure Monitor alerts, see [Overview of alerts in Azure](../azure-monitor/alerts/alerts-overview.md).
129
173
174
+
### Configuring notifications for alerts
175
+
176
+
To configure notifications for Azure Monitor alerts, you must create an action rule. The following steps demonstrate how to create an action rule to send email notifications to a given email address. Similar instructions will apply for routing these alerts to other notification channels, such as ITSM, webhook, logic app and so on.
177
+
178
+
1. Navigate to **Azure Monitor** in the Azure portal. Click the **Alerts** menu item and select **Manage actions**.
3. Select the scope for which the action rule should be applied. You can apply the action rule for all resources within a subscription. Optionally, you can also apply filters on the alerts, for example, to only generate notifications for alerts of a certain severity.
0 commit comments