Skip to content

Commit 8b37091

Browse files
authored
Merge pull request #100604 from MicrosoftDocs/master
1/09 AM Publish
2 parents 5b073ca + ac7fd55 commit 8b37091

37 files changed

+490
-221
lines changed

.openpublishing.redirection.json

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -40879,11 +40879,6 @@
4087940879
"redirect_url": "/azure/azure-monitor/platform/data-platform",
4088040880
"redirect_document_id": false
4088140881
},
40882-
{
40883-
"source_path": "articles/azure-monitor/platform/data-sources-reference.md",
40884-
"redirect_url": "/azure/azure-monitor/platform/data-sources",
40885-
"redirect_document_id": false
40886-
},
4088740882
{
4088840883
"source_path": "articles/azure-monitor/platform/collect-activity-logs-subscriptions.md",
4088940884
"redirect_url": "/azure/azure-monitor/platform/activity-log-collect-tenants",

articles/active-directory-b2c/active-directory-b2c-reference-oidc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ OpenID Connect is an authentication protocol, built on top of OAuth 2.0, that ca
2020

2121
[OpenID Connect](https://openid.net/specs/openid-connect-core-1_0.html) extends the OAuth 2.0 *authorization* protocol for use as an *authentication* protocol. This authentication protocol allows you to perform single sign-on. It introduces the concept of an *ID token*, which allows the client to verify the identity of the user and obtain basic profile information about the user.
2222

23-
Because it extends OAuth 2.0, it also enables applications to securely acquire *access tokens*. You can use access tokens to access resources that are secured by an [authorization server](active-directory-b2c-reference-protocols.md). OpenID Connect is recommended if you're building a web application that's hosted on a server and accessed through a browser. If you want to add identity management to your mobile or desktop applications using Azure AD B2C, you should use [OAuth 2.0](active-directory-b2c-reference-oauth-code.md) rather than OpenID Connect. For more information about tokens, see the [Overview of tokens in Azure Active Directory B2C](active-directory-b2c-reference-tokens.md)
23+
Because it extends OAuth 2.0, it also enables applications to securely acquire *access tokens*. You can use access tokens to access resources that are secured by an [authorization server](active-directory-b2c-reference-protocols.md). OpenID Connect is recommended if you're building a web application that's hosted on a server and accessed through a browser. For more information about tokens, see the [Overview of tokens in Azure Active Directory B2C](active-directory-b2c-reference-tokens.md)
2424

2525
Azure AD B2C extends the standard OpenID Connect protocol to do more than simple authentication and authorization. It introduces the [user flow parameter](active-directory-b2c-reference-policies.md), which enables you to use OpenID Connect to add user experiences to your application, such as sign-up, sign-in, and profile management.
2626

articles/active-directory/manage-apps/use-scim-to-provision-users-and-groups.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -59,15 +59,16 @@ Note that you don't need to support both users and groups or all the attributes
5959
| Azure Active Directory user | "urn:ietf:params:scim:schemas:extension:enterprise:2.0:User" |
6060
| --- | --- |
6161
| IsSoftDeleted |active |
62+
|department|urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:department|
6263
| displayName |displayName |
64+
|employeeId|urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:employeeNumber|
6365
| Facsimile-TelephoneNumber |phoneNumbers[type eq "fax"].value |
6466
| givenName |name.givenName |
6567
| jobTitle |title |
6668
| mail |emails[type eq "work"].value |
6769
| mailNickname |externalId |
68-
| manager |manager |
70+
| manager |urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:manager |
6971
| mobile |phoneNumbers[type eq "mobile"].value |
70-
| objectId |ID |
7172
| postalCode |addresses[type eq "work"].postalCode |
7273
| proxy-Addresses |emails[type eq "other"].Value |
7374
| physical-Delivery-OfficeName |addresses[type eq "other"].Formatted |
@@ -76,15 +77,16 @@ Note that you don't need to support both users and groups or all the attributes
7677
| telephone-Number |phoneNumbers[type eq "work"].value |
7778
| user-PrincipalName |userName |
7879

80+
7981
### Table 2: Default group attribute mapping
8082

8183
| Azure Active Directory group | urn:ietf:params:scim:schemas:core:2.0:Group |
8284
| --- | --- |
83-
| displayName |externalId |
85+
| displayName |displayName |
8486
| mail |emails[type eq "work"].value |
8587
| mailNickname |displayName |
8688
| members |members |
87-
| objectId |ID |
89+
| objectId |externalId |
8890
| proxyAddresses |emails[type eq "other"].Value |
8991

9092
## Step 2: Understand the Azure AD SCIM implementation

articles/aks/private-clusters.md

Lines changed: 17 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -77,16 +77,16 @@ Where --enable-private-cluster is a mandatory flag for a private cluster
7777
#### Advanced Networking
7878

7979
```azurecli-interactive
80-
az aks create \
81-
--resource-group <private-cluster-resource-group>\
82-
--name <private-cluster-name> \
83-
--load-balancer-sku standard
84-
--enable-private-cluster
85-
--network-plugin azure \
86-
--vnet-subnet-id <subnet-id> \
87-
--docker-bridge-address 172.17.0.1/16 \
88-
--dns-service-ip 10.2.0.10 \
89-
--service-cidr 10.2.0.0/24 \
80+
az aks create \
81+
--resource-group <private-cluster-resource-group> \
82+
--name <private-cluster-name> \
83+
--load-balancer-sku standard \
84+
--enable-private-cluster \
85+
--network-plugin azure \
86+
--vnet-subnet-id <subnet-id> \
87+
--docker-bridge-address 172.17.0.1/16 \
88+
--dns-service-ip 10.2.0.10 \
89+
--service-cidr 10.2.0.0/24
9090
```
9191
Where --enable-private-cluster is a mandatory flag for a private cluster
9292

@@ -104,6 +104,11 @@ The API server end point has no public IP address. Consequently, users will need
104104
* click on the Private DNS Zone
105105
* select Virtual network link in the left pane
106106
* create a new link to add the VNET of the VM to the Private DNS Zone *(It takes a few minutes for the DNS zone link to become available)*
107+
* go back to the MC_* resource group in the portal
108+
* select the virtual network on the right pane. Virtual network name will be in the form aks-vnet-*.
109+
* select Peerings on the left pane
110+
* click on Add and add the Virtual network of the VM and create the peering.
111+
* Go to the Vnet where you have the VM and then click on peerings and select the AKS Virtual network and create the peering. If the address ranges on the AKS Virtual network and the VM's virtual network clashes, Then peering will fail. Refer to this [document][virtual-network-peering] for more information about virtual network peering.
107112
* SSH into the VM
108113
* Install Kubectl tool and run kubectl commands
109114

@@ -128,3 +133,5 @@ The API server end point has no public IP address. Consequently, users will need
128133
[az-extension-add]: /cli/azure/extension#az-extension-add
129134
[az-extension-update]: /cli/azure/extension#az-extension-update
130135
[private-link-service]: https://docs.microsoft.com/azure/private-link/private-link-service-overview
136+
[virtual-network-peering]: ../virtual-network/virtual-network-peering-overview.md
137+

articles/azure-functions/functions-infrastructure-as-code.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ Application Insights is recommended for monitoring your function apps. The Appli
8686
},
8787
"properties": {
8888
"Application_Type": "web",
89-
"ApplicationId": "[variables('functionAppName')]"
89+
"ApplicationId": "[variables('appInsightsName')]"
9090
}
9191
},
9292
```

0 commit comments

Comments
 (0)