Skip to content

Commit 8e16d30

Browse files
authored
Merge pull request #186811 from MicrosoftDocs/master
Merge master to live, 4 AM
2 parents 5df3802 + bbfb99a commit 8e16d30

File tree

70 files changed

+2656
-824
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

70 files changed

+2656
-824
lines changed

articles/active-directory/manage-apps/assign-user-or-group-access-portal.md

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,19 +12,26 @@ ms.topic: how-to
1212
ms.date: 10/23/2021
1313
ms.author: ergreenl
1414
ms.reviewer: davidmu
15+
ms.custom: contperf-fy22q2, contperf-fy22q3
1516

1617
#customer intent: As an admin, I want to manage user assignment for an app in Azure Active Directory using Powershell
1718
---
1819

1920
# Assign users and groups to an application
2021

21-
This article shows you how to assign users and groups to an enterprise application in Azure Active Directory (Azure AD) using PowerShell. When you assign a user to an application, the application appears in the user's My Apps portal for easy access. If the application exposes roles, you can also assign a specific role to the user.
22+
This article shows you how to assign users and groups to an enterprise application in Azure Active Directory (Azure AD) using PowerShell. When you assign a user to an application, the application appears in the user's [My Apps](https://myapps.microsoft.com/) portal for easy access. If the application exposes roles, you can also assign a specific role to the user.
23+
24+
When you assign a group to an application, only users in the group will have access. The assignment does not cascade to nested groups.
25+
26+
Group-based assignment requires Azure Active Directory Premium P1 or P2 edition. Group-based assignment is supported for Security groups only. Nested group memberships and Microsoft 365 groups are not currently supported. For more licensing requirements for the features discussed in this article, see the [Azure Active Directory pricing page](https://azure.microsoft.com/pricing/details/active-directory).
27+
28+
For greater control, certain types of enterprise applications can be configured to require user assignment. See [Manage access to an application](what-is-access-management.md#requiring-user-assignment-for-an-app) for more information on requiring user assignment for an app.
2229

2330
## Prerequisites
2431

2532
To assign users to an app using PowerShell, you need:
2633

27-
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
34+
- An Azure account with an active subscription. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
2835
- One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
2936
- If you have not yet installed the AzureAD module (use the command `Install-Module -Name AzureAD`). If you're prompted to install a NuGet module or the new Azure Active Directory V2 PowerShell module, type Y and press ENTER.
3037
- Azure Active Directory Premium P1 or P2 for group-based assignment. For more licensing requirements for the features discussed in this article, see the [Azure Active Directory pricing page](https://azure.microsoft.com/pricing/details/active-directory).

articles/active-directory/manage-apps/f5-big-ip-forms-advanced.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,11 +15,11 @@ ms.collection: M365-identity-device-management
1515

1616
In this article, you'll learn how to configure F5's BIG-IP Access Policy Manager (APM) and Azure Active Directory (Azure AD) for secure hybrid access to form-based applications.
1717

18-
Configuring BIG-IP published applications with Azure AD provides many benefits, including:
18+
Enabling BIG-IP published services for Azure Active Directory (Azure AD) SSO provides many benefits, including:
1919

20-
- Improved Zero Trust governance through Azure AD pre-authentication and authorization
20+
- Improved Zero Trust governance through Azure AD pre-authentication and [Conditional Access](/conditional-access/overview)
2121
- Full single sign-on (SSO) between Azure AD and BIG-IP published services
22-
- Identities and access are managed from a single control plane, the Azure portal
22+
- Identities and access are managed from a single control plane, the [Azure portal](https://azure.microsoft.com/features/azure-portal/)
2323

2424
To learn about all the benefits, see [Integrate F5 BIG-IP with Azure Active Directory](f5-aad-integration.md) and [What is application access and single sign-on with Azure AD?](../active-directory-appssoaccess-whatis.md).
2525

articles/active-directory/manage-apps/f5-big-ip-header-advanced.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,12 +19,12 @@ In this article, you’ll learn to implement Secure Hybrid Access (SHA) with sin
1919

2020
Configuring BIG-IP published applications with Azure AD provides many benefits, including:
2121

22-
- Improved Zero trust governance through Azure AD pre-authentication and authorization
22+
- Improved Zero trust governance through Azure AD pre-authentication and [Conditional Access](/conditional-access/overview)
2323

2424
- Full Single sign-on (SSO) between Azure AD and BIG-IP published
2525
services.
2626

27-
- Manage identities and access from a single control plane, The [Azure portal](https://azure.microsoft.com/features/azure-portal)
27+
- Manage identities and access from a single control plane, the [Azure portal](https://azure.microsoft.com/features/azure-portal)
2828

2929
To learn about all of the benefits, see the article on [F5 BIG-IP and Azure AD integration](./f5-aad-integration.md) and [what is application access and single sign-on with Azure AD](/azure/active-directory/active-directory-appssoaccess-whatis).
3030

articles/active-directory/manage-apps/f5-big-ip-headers-easy-button.md

Lines changed: 2 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -19,11 +19,11 @@ In this article, you’ll learn to implement Secure Hybrid Access (SHA) with sin
1919

2020
Enabling BIG-IP published services for Azure Active Directory (Azure AD) SSO provides many benefits, including:
2121

22-
* Improved Zero Trust governance through Azure AD pre-authentication and authorization
22+
* Improved Zero Trust governance through Azure AD pre-authentication and [Conditional Access](/conditional-access/overview)
2323

2424
* Full SSO between Azure AD and BIG-IP published services
2525

26-
* Manage Identities and access from a single control plane, [the Azure portal](https://portal.azure.com/)
26+
* Manage Identities and access from a single control plane, the [Azure portal](https://portal.azure.com/)
2727

2828
To learn about all of the benefits, see the article on [F5 BIG-IP and Azure AD integration](./f5-aad-integration.md) and [what is application access and single sign-on with Azure AD](/azure/active-directory/active-directory-appssoaccess-whatis).
2929

@@ -298,15 +298,11 @@ Our backend application sits on HTTP port 80 but obviously switch to 443 if your
298298
Enabling SSO allows users to access BIG-IP published services without having to enter credentials. The **Easy Button wizard** supports Kerberos, OAuth Bearer, and HTTP authorization headers for SSO, the latter of which we’ll enable to configure the following.
299299

300300
* **Header Operation:** Insert
301-
302301
* **Header Name:** upn
303-
304302
* **Header Value:** %{session.saml.last.identity}
305303

306304
* **Header Operation:** Insert
307-
308305
* **Header Name:** employeeid
309-
310306
* **Header Value:** %{session.saml.last.attr.name.employeeid}
311307

312308
![Screenshot for SSO and HTTP headers](./media/f5-big-ip-easy-button-header/sso-http-headers.png)

articles/active-directory/manage-apps/f5-big-ip-kerberos-advanced.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -19,11 +19,9 @@ In this tutorial, you'll learn to implement Secure Hybrid Access (SHA) with sing
1919

2020
Integrating a BIG-IP with Azure Active Directory (Azure AD) provides many benefits, including:
2121

22-
* Improved Zero Trust governance through Azure AD pre-authentication and authorization.
23-
22+
* Improved Zero Trust governance through Azure AD pre-authentication and [Conditional Access](/conditional-access/overview)
2423
* Full SSO between Azure AD and BIG-IP published services.
25-
26-
* Management of identities and access from a single control plane, the [Azure portal](https://portal.azure.com/).
24+
* Management of identities and access from a single control plane, the [Azure portal](https://azure.microsoft.com/features/azure-portal/)
2725

2826
To learn about all of the benefits, see [Integrate F5 BIG-IP with Azure Active Directory](./f5-aad-integration.md) and [What is single sign-on in Azure Active Directory?](/azure/active-directory/active-directory-appssoaccess-whatis).
2927

articles/active-directory/manage-apps/f5-big-ip-kerberos-easy-button.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,11 +19,11 @@ In this article, you'll learn to implement Secure Hybrid Access (SHA) with singl
1919

2020
Integrating a BIG-IP with Azure Active Directory (Azure AD) provides many benefits, including:
2121

22-
* Improved Zero Trust governance through Azure AD pre-authentication and authorization
22+
* Improved Zero Trust governance through Azure AD pre-authentication and [Conditional Access](/conditional-access/overview)
2323

2424
* Full SSO between Azure AD and BIG-IP published services
2525

26-
* Manage identities and access from a single control plane, [The Azure portal](https://portal.azure.com/)
26+
* Manage identities and access from a single control plane, the [Azure portal](https://portal.azure.com/)
2727

2828
To learn about all of the benefits, see the article on [F5 BIG-IP and Azure AD integration](./f5-aad-integration.md) and [what is application access and single sign-on with Azure AD](/azure/active-directory/active-directory-appssoaccess-whatis).
2929

articles/active-directory/manage-apps/f5-big-ip-ldap-header-easybutton.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ In this article, you'll learn to implement Secure Hybrid Access (SHA) with singl
1919

2020
Enabling BIG-IP published services for Azure Active Directory (Azure AD) SSO provides many benefits, including:
2121

22-
* Improved Zero Trust governance through Azure AD pre-authentication and authorization
22+
* Improved Zero Trust governance through Azure AD pre-authentication and [Conditional Access](/conditional-access/overview)
2323

2424
* Full SSO between Azure AD and BIG-IP published services
2525

articles/active-directory/manage-apps/what-is-single-sign-on.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.topic: overview
1212
ms.date: 11/18/2021
1313
ms.author: davidmu
1414
ms.reviewer: ergreenl
15-
ms.custom: contperf-fy21q1, contperf-fy22q2
15+
ms.custom: contperf-fy21q1, contperf-fy22q2, contperf-fy22q3
1616
# Customer intent: As an IT admin, I need to learn about single sign-on and my applications in Azure Active Directory.
1717
---
1818

@@ -52,7 +52,7 @@ Choosing an SSO method depends on how the application is configured for authenti
5252
- You're testing other aspects of the application
5353
- An on-premises application doesn't require users to authenticate, but you want them to. With SSO disabled, the user needs to authenticate.
5454

55-
If you configured the application for SP-initiated SAML-based SSO and you change the SSO mode to disabled, it won't stop users from signing in to the application outside the MyApps portal. To achieve this, you need to [disable the ability for users to sign in](disable-user-sign-in-portal.md).
55+
If you configured the application for SP-initiated SAML-based SSO and you change the SSO mode to disabled, it won't stop users from signing in to the application outside the MyApps portal. To achieve this, you need to disable the ability for users to sign in.
5656

5757
## Plan SSO deployment
5858

articles/app-service/app-service-web-tutorial-dotnet-sqldatabase.md

Lines changed: 9 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to deploy a C# ASP.NET app to Azure and to Azure SQL Data
44
ms.assetid: 03c584f1-a93c-4e3d-ac1b-c82b50c75d3e
55
ms.devlang: csharp
66
ms.topic: tutorial
7-
ms.date: 11/08/2021
7+
ms.date: 01/27/2022
88
ms.custom: "devx-track-csharp, mvc, devcenter, vs-azure, seodec18"
99
---
1010

@@ -23,15 +23,14 @@ In this tutorial, you learn how to:
2323
> * Deploy the app to Azure
2424
> * Update the data model and redeploy the app
2525
> * Stream logs from Azure to your terminal
26-
> * Manage the app in the Azure portal
2726
2827
[!INCLUDE [quickstarts-free-trial-note](../../includes/quickstarts-free-trial-note.md)]
2928

3029
## Prerequisites
3130

3231
To complete this tutorial:
3332

34-
Install <a href="https://www.visualstudio.com/downloads/" target="_blank">Visual Studio 2022</a> with the **ASP.NET and web development** workload.
33+
Install <a href="https://www.visualstudio.com/downloads/" target="_blank">Visual Studio 2022</a> with the **ASP.NET and web development** and **Azure development** workloads.
3534

3635
If you've installed Visual Studio already, add the workloads in Visual Studio by clicking **Tools** > **Get Tools and Features**.
3736

@@ -172,7 +171,7 @@ Before creating a database, you need a [logical SQL server](../azure-sql/databas
172171

173172
#### Deploy your ASP.NET app
174173

175-
1. In the **Publish** tab scroll back up to the top and click **Publish**. Once your ASP.NET app is deployed to Azure. Your default browser is launched with the URL to the deployed app.
174+
1. In the **Publish** tab, scroll back up to the top and click **Publish**. Once your ASP.NET app is deployed to Azure. Your default browser is launched with the URL to the deployed app.
176175

177176
1. Add a few to-do items.
178177

@@ -182,7 +181,7 @@ Before creating a database, you need a [logical SQL server](../azure-sql/databas
182181

183182
## Access the database locally
184183

185-
Visual Studio lets you explore and manage your new database in Azure easily in the **SQL Server Object Explorer**. The new database already opened its firewall to the App Service app that you created, but to access it from your local computer (such as from Visual Studio), you must open a firewall for your local machine's public IP address. If your internet service provider changes your public IP address, you need to reconfigure the firewall to access the Azure database again.
184+
Visual Studio lets you explore and manage your new database in Azure easily in the **SQL Server Object Explorer**. The new database already opened its firewall to the App Service app that you created. But to access it from your local computer (such as from Visual Studio), you must open a firewall for your local machine's public IP address. If your internet service provider changes your public IP address, you need to reconfigure the firewall to access the Azure database again.
186185

187186
#### Create a database connection
188187

@@ -350,11 +349,9 @@ Each action starts with a `Trace.WriteLine()` method. This code is added to show
350349
351350
#### Enable log streaming
352351
353-
1. From the **View** menu, select **Cloud Explorer**.
352+
1. In the publish page, scroll down to the **Hosting** section.
354353
355-
1. In **Cloud Explorer**, expand the Azure subscription that has your app and expand **App Service**.
356-
357-
1. Right-click your Azure app and select **View Streaming Logs**.
354+
1. At the right-hand corner, click **...** > **View Streaming Logs**.
358355
359356
![Enable log streaming](./media/app-service-web-tutorial-dotnet-sqldatabase/stream-logs.png)
360357
@@ -366,16 +363,14 @@ Each action starts with a `Trace.WriteLine()` method. This code is added to show
366363
367364
#### Change trace levels
368365
369-
1. To change the trace levels to output other trace messages, go back to **Cloud Explorer**.
366+
1. To change the trace levels to output other trace messages, go back to the publish page.
370367
371-
1. Right-click your app again and select **Open in Portal**.
368+
1. In the **Hosting** section, click **...** > **Open in Azure portal**.
372369
373370
1. In the portal management page for your app, from the left menu, select **App Service logs**.
374371
375372
1. Under **Application Logging (File System)**, select **Verbose** in **Level**. Click **Save**.
376373
377-
![Change trace level to Verbose](./media/app-service-web-tutorial-dotnet-sqldatabase/trace-level-verbose.png)
378-
379374
> [!TIP]
380375
> You can experiment with different trace levels to see what types of messages are displayed for each level. For example, the **Information** level includes all logs created by `Trace.TraceInformation()`, `Trace.TraceWarning()`, and `Trace.TraceError()`, but not logs created by `Trace.WriteLine()`.
381376
@@ -394,22 +389,6 @@ To stop the log-streaming service, click the **Stop monitoring** button in the *
394389
395390
![Stop log streaming](./media/app-service-web-tutorial-dotnet-sqldatabase/stop-streaming.png)
396391
397-
## Manage your Azure app
398-
399-
Go to the [Azure portal](https://portal.azure.com) to manage the web app. Search for and select **App Services**.
400-
401-
![Search for Azure App Services](./media/app-service-web-tutorial-dotnet-sqldatabase/azure-portal-navigate-app-services.png)
402-
403-
Select the name of your Azure app.
404-
405-
![Portal navigation to Azure app](./media/app-service-web-tutorial-dotnet-sqldatabase/access-portal.png)
406-
407-
You have landed in your app's page.
408-
409-
By default, the portal shows the **Overview** page. This page gives you a view of how your app is doing. Here, you can also perform basic management tasks like browse, stop, start, restart, and delete. The tabs on the left side of the page show the different configuration pages you can open.
410-
411-
![App Service page in Azure portal](./media/app-service-web-tutorial-dotnet-sqldatabase/web-app-blade.png)
412-
413392
[!INCLUDE [Clean up section](../../includes/clean-up-section-portal-web-app.md)]
414393
415394
## Next steps
@@ -423,12 +402,11 @@ In this tutorial, you learned how to:
423402
> * Deploy the app to Azure
424403
> * Update the data model and redeploy the app
425404
> * Stream logs from Azure to your terminal
426-
> * Manage the app in the Azure portal
427405
428406
Advance to the next tutorial to learn how to easily improve the security of your connection Azure SQL Database.
429407
430408
> [!div class="nextstepaction"]
431-
> [Access SQL Database securely using managed identities for Azure resources](tutorial-connect-msi-sql-database.md)
409+
> [Tutorial: Connect to SQL Database from App Service without secrets using a managed identity](tutorial-connect-msi-sql-database.md)
432410
433411
More resources:
434412

articles/app-service/environment/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ The multi-tenant version of Azure App Service contains numerous features to enab
6262

6363
## Feature differences
6464

65-
Compared to earlier versions of the App Service Environment, there are some differences with App Service Environment v3. With App Service Environment v3:
65+
Compared to earlier versions of the App Service Environment, there are some differences with App Service Environment v3:
6666

6767
- There are no networking dependencies in the customer virtual network. You can secure all inbound and outbound as desired. Outbound traffic can be routed also as desired.
6868
- You can deploy it enabled for zone redundancy. Zone redundancy can only be set during creation and only in regions where all App Service Environment v3 dependencies are zone redundant.

0 commit comments

Comments
 (0)