Skip to content

Commit 929afd4

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 4b6631d + 5b9dece commit 929afd4

File tree

90 files changed

+1338
-582
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

90 files changed

+1338
-582
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22480,6 +22480,11 @@
2248022480
"source_path_from_root": "/articles/communication-services/concepts/bring-your-own-storage.md",
2248122481
"redirect_url": "/azure/communication-services/concepts/call-automation/call-recording/bring-your-own-storage",
2248222482
"redirect_document_id": false
22483+
},
22484+
{
22485+
"source_path_from_root": "/articles/sentinel/data-connectors/microsoft-defender-threat-intelligence.md",
22486+
"redirect_url": "/azure/sentinel/understand-threat-intelligence",
22487+
"redirect_document_id": false
2248322488
}
2248422489

2248522490
]

articles/active-directory/fundamentals/users-default-permissions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ The set of default permissions depends on whether the user is a native member of
3636
------------ | --------- | ---------- | ----------
3737
Users and contacts | <ul><li>Enumerate the list of all users and contacts<li>Read all public properties of users and contacts</li><li>Invite guests<li>Change their own password<li>Manage their own mobile phone number<li>Manage their own photo<li>Invalidate their own refresh tokens</li></ul> | <ul><li>Read their own properties<li>Read display name, email, sign-in name, photo, user principal name, and user type properties of other users and contacts<li>Change their own password<li>Search for another user by object ID (if allowed)<li>Read manager and direct report information of other users</li></ul> | <ul><li>Read their own properties<li>Change their own password</li><li>Manage their own mobile phone number</li></ul>
3838
Groups | <ul><li>Create security groups<li>Create Microsoft 365 groups<li>Enumerate the list of all groups<li>Read all properties of groups<li>Read non-hidden group memberships<li>Read hidden Microsoft 365 group memberships for joined groups<li>Manage properties, ownership, and membership of groups that the user owns<li>Add guests to owned groups<li>Manage dynamic membership settings<li>Delete owned groups<li>Restore owned Microsoft 365 groups</li></ul> | <ul><li>Read properties of non-hidden groups, including membership and ownership (even non-joined groups)<li>Read hidden Microsoft 365 group memberships for joined groups<li>Search for groups by display name or object ID (if allowed)</li></ul> | <ul><li>Read object ID for joined groups<li>Read membership and ownership of joined groups in some Microsoft 365 apps (if allowed)</li></ul>
39-
Applications | <ul><li>Register (create) new applications<li>Enumerate the list of all applications<li>Read properties of registered and enterprise applications<li>List permissions granted to applications<li>Manage application properties, assignments, and credentials for owned applications<li>Create or delete application passwords for users<li>Delete owned applications<li>Restore owned applications<li>List permissions granted to applications</ul> | <ul><li>Read properties of registered and enterprise applications<li>List permissions granted to applications</ul> | <ul><li>Read properties of registered and enterprise applications</li><li>List permissions granted to applications</li></ul>
39+
Applications | <ul><li>Register (create) new applications<li>Enumerate the list of all applications<li>Read properties of registered and enterprise applications<li>Manage application properties, assignments, and credentials for owned applications<li>Create or delete application passwords for users<li>Delete owned applications<li>Restore owned applications<li>List permissions granted to applications</ul> | <ul><li>Read properties of registered and enterprise applications<li>List permissions granted to applications</ul> | <ul><li>Read properties of registered and enterprise applications</li><li>List permissions granted to applications</li></ul>
4040
Devices</li></ul> | <ul><li>Enumerate the list of all devices<li>Read all properties of devices<li>Manage all properties of owned devices</li></ul> | No permissions | No permissions
4141
Organization | <ul><li>Read all company information<li>Read all domains<li>Read configuration of certificate-based authentication<li>Read all partner contracts</li></ul> | <ul><li>Read company display name<li>Read all domains<li>Read configuration of certificate-based authentication</li></ul> | <ul><li>Read company display name<li>Read all domains</li></ul>
4242
Roles and scopes | <ul><li>Read all administrative roles and memberships<li>Read all properties and membership of administrative units</li></ul> | No permissions | No permissions
Lines changed: 109 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,109 @@
1+
---
2+
title: Azure Active Directory SSO integration with Sauce Labs
3+
description: Learn how to configure single sign-on between Azure Active Directory and Sauce Labs.
4+
services: active-directory
5+
author: jeevansd
6+
manager: CelesteDG
7+
ms.reviewer: CelesteDG
8+
ms.service: active-directory
9+
ms.subservice: saas-app-tutorial
10+
ms.workload: identity
11+
ms.topic: how-to
12+
ms.date: 03/26/2023
13+
ms.author: jeedes
14+
15+
---
16+
17+
# Azure Active Directory SSO integration with Sauce Labs
18+
19+
In this article, you learn how to integrate Sauce Labs with Azure Active Directory (Azure AD). App integration for single sign-on and automatic account provisioning at Sauce Labs. When you integrate Sauce Labs with Azure AD, you can:
20+
21+
* Control in Azure AD who has access to Sauce Labs.
22+
* Enable your users to be automatically signed-in to Sauce Labs with their Azure AD accounts.
23+
* Manage your accounts in one central location - the Azure portal.
24+
25+
You configure and test Azure AD single sign-on for Sauce Labs in a test environment. Sauce Labs supports both **SP** and **IDP** initiated single sign-on and **Just In Time** user provisioning.
26+
27+
> [!NOTE]
28+
> Identifier of this application is a fixed string value so only one instance can be configured in one tenant.
29+
30+
## Prerequisites
31+
32+
To integrate Azure Active Directory with Sauce Labs, you need:
33+
34+
* An Azure AD user account. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
35+
* One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
36+
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
37+
* Sauce Labs single sign-on (SSO) enabled subscription.
38+
39+
## Add application and assign a test user
40+
41+
Before you begin the process of configuring single sign-on, you need to add the Sauce Labs application from the Azure AD gallery. You need a test user account to assign to the application and test the single sign-on configuration.
42+
43+
### Add Sauce Labs from the Azure AD gallery
44+
45+
Add Sauce Labs from the Azure AD application gallery to configure single sign-on with Sauce Labs. For more information on how to add application from the gallery, see the [Quickstart: Add application from the gallery](../manage-apps/add-application-portal.md).
46+
47+
### Create and assign Azure AD test user
48+
49+
Follow the guidelines in the [create and assign a user account](../manage-apps/add-application-portal-assign-users.md) article to create a test user account in the Azure portal called B.Simon.
50+
51+
Alternatively, you can also use the [Enterprise App Configuration Wizard](https://portal.office.com/AdminPortal/home?Q=Docs#/azureadappintegration). In this wizard, you can add an application to your tenant, add users/groups to the app, and assign roles. The wizard also provides a link to the single sign-on configuration pane in the Azure portal. [Learn more about Microsoft 365 wizards.](/microsoft-365/admin/misc/azure-ad-setup-guides).
52+
53+
## Configure Azure AD SSO
54+
55+
Complete the following steps to enable Azure AD single sign-on in the Azure portal.
56+
57+
1. In the Azure portal, on the **Sauce Labs** application integration page, find the **Manage** section and select **single sign-on**.
58+
1. On the **Select a single sign-on method** page, select **SAML**.
59+
1. On the **Set up single sign-on with SAML** page, select the pencil icon for **Basic SAML Configuration** to edit the settings.
60+
61+
![Screenshot shows how to edit Basic SAML Configuration.](common/edit-urls.png "Basic Configuration")
62+
63+
1. On the **Basic SAML Configuration** section, the user doesn't have to perform any step as the app is already preintegrated with Azure.
64+
65+
1. If you wish to configure the application in **SP** initiated mode, then perform the following step:
66+
67+
In the **Sign on URL** textbox, type the URL:
68+
`https://accounts.saucelabs.com/`
69+
70+
1. On the **Set-up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
71+
72+
![Screenshot shows the Certificate download link.](common/metadataxml.png "Certificate")
73+
74+
1. On the **Set up Sauce Labs** section, copy the appropriate URL(s) based on your requirement.
75+
76+
![Screenshot shows to copy configuration appropriate URL.](common/copy-configuration-urls.png "Metadata")
77+
78+
## Configure Sauce Labs SSO
79+
80+
To configure single sign-on on **Sauce Labs** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [Sauce Labs support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
81+
82+
### Create Sauce Labs test user
83+
84+
In this section, a user called B.Simon is created in Sauce Labs. Sauce Labs supports just-in-time user provisioning, which is enabled by default. There's no action item for you in this section. If a user doesn't already exist in Sauce Labs, a new one is commonly created after authentication.
85+
86+
## Test SSO
87+
88+
In this section, you test your Azure AD single sign-on configuration with following options.
89+
90+
#### SP initiated:
91+
92+
* Click on **Test this application** in Azure portal. This will redirect to Sauce Labs Sign-on URL where you can initiate the login flow.
93+
94+
* Go to Sauce Labs Sign-on URL directly and initiate the login flow from there.
95+
96+
#### IDP initiated:
97+
98+
* Click on **Test this application** in Azure portal and you should be automatically signed in to the Sauce Labs for which you set up the SSO.
99+
100+
You can also use Microsoft My Apps to test the application in any mode. When you click the Sauce Labs tile in the My Apps, if configured in SP mode you would be redirected to the application sign-on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the Sauce Labs for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
101+
102+
## Additional resources
103+
104+
* [What is single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
105+
* [Plan a single sign-on deployment](../manage-apps/plan-sso-deployment.md).
106+
107+
## Next steps
108+
109+
Once you configure Sauce Labs you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).

articles/active-directory/saas-apps/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2123,6 +2123,8 @@
21232123
href: sap-netweaver-tutorial.md
21242124
- name: SAP Qualtrics
21252125
href: qualtrics-tutorial.md
2126+
- name: Sauce Labs
2127+
href: sauce-labs-tutorial.md
21262128
- name: Sauce Labs - Mobile and Web Testing
21272129
href: saucelabs-mobileandwebtesting-tutorial.md
21282130
- name: Saviynt

articles/aks/TOC.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -47,6 +47,8 @@
4747
href: quickstart-helm.md
4848
- name: Develop with Dapr
4949
href: quickstart-dapr.md
50+
- name: Use Draft and the DevX extension for Visual Studio Code (preview)
51+
href: draft-devx-extension-aks.md
5052
- name: Subscribe to AKS events with Event Grid
5153
href: quickstart-event-grid.md
5254
- name: Tutorials
@@ -203,7 +205,7 @@
203205
href: cluster-container-registry-integration.md
204206
- name: Use Vertical Pod Autoscaler
205207
href: vertical-pod-autoscaler.md
206-
- name: Metrics Server VPA Throttling
208+
- name: Configure Metrics Server VPA
207209
href: use-metrics-server-vertical-pod-autoscaler.md
208210
- name: Scale an AKS cluster
209211
href: scale-cluster.md
@@ -223,8 +225,6 @@
223225
href: free-standard-pricing-tiers.md
224226
- name: Use Draft (preview)
225227
href: draft.md
226-
- name: Use Draft and the DevX extension for Visual Studio Code (preview)
227-
href: draft-devx-extension-aks.md
228228
- name: Use proximity placement groups
229229
href: reduce-latency-ppg.md
230230
- name: Upgrade the node image

articles/aks/private-clusters.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Private cluster is available in public regions, Azure Government, and Azure Chin
2626
* The `aks-preview` extension 0.5.29 or higher.
2727
* If using Azure Resource Manager (ARM) or the Azure REST API, the AKS API version must be 2021-05-01 or higher.
2828
* Azure Private Link service is supported on Standard Azure Load Balancer only. Basic Azure Load Balancer isn't supported.
29-
* To use a custom DNS server, add the Azure public IP address 168.63.129.16 as the upstream DNS server in the custom DNS server. For more information about the Azure IP address, see [What is IP address 168.63.129.16?][virtual-networks-168.63.129.16]
29+
* To use a custom DNS server, add the Azure public IP address 168.63.129.16 as the upstream DNS server in the custom DNS server, and make sure to add this public IP address as the *first* DNS server. For more information about the Azure IP address, see [What is IP address 168.63.129.16?][virtual-networks-168.63.129.16]
3030

3131
## Limitations
3232

articles/aks/use-metrics-server-vertical-pod-autoscaler.md

Lines changed: 51 additions & 51 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Configure Metrics Server VPA in Azure Kubernetes Service (AKS)
33
description: Learn how to vertically autoscale your Metrics Server pods on an Azure Kubernetes Service (AKS) cluster.
44
ms.topic: article
5-
ms.date: 03/21/2023
5+
ms.date: 03/27/2023
66
---
77

88
# Configure Metrics Server VPA in Azure Kubernetes Service (AKS)
@@ -24,22 +24,22 @@ To update the coefficient values, create a ConfigMap in the overlay *kube-system
2424
1. Create a ConfigMap file named *metrics-server-config.yaml* and copy in the following manifest.
2525

2626
```yml
27-
apiVersion: v1
28-
kind: ConfigMap
29-
metadata:
30-
name: metrics-server-config
31-
namespace: kube-system
32-
labels:
33-
kubernetes.io/cluster-service: "true"
34-
addonmanager.kubernetes.io/mode: EnsureExists
35-
data:
36-
NannyConfiguration: |-
37-
apiVersion: nannyconfig/v1alpha1
38-
kind: NannyConfiguration
39-
baseCPU: 100m
40-
cpuPerNode: 1m
41-
baseMemory: 100Mi
42-
memoryPerNode: 8Mi
27+
apiVersion: v1
28+
kind: ConfigMap
29+
metadata:
30+
name: metrics-server-config
31+
namespace: kube-system
32+
labels:
33+
kubernetes.io/cluster-service: "true"
34+
addonmanager.kubernetes.io/mode: EnsureExists
35+
data:
36+
NannyConfiguration: |-
37+
apiVersion: nannyconfig/v1alpha1
38+
kind: NannyConfiguration
39+
baseCPU: 100m
40+
cpuPerNode: 1m
41+
baseMemory: 100Mi
42+
memoryPerNode: 8Mi
4343
```
4444
4545
In the ConfigMap example, the resource limit and request are changed to the following:
@@ -89,22 +89,22 @@ If you would like to bypass VPA for Metrics Server and manually control its reso
8989
1. Create a ConfigMap file named *metrics-server-config.yaml* and copy in the following manifest.
9090

9191
```yml
92-
apiVersion: v1
93-
kind: ConfigMap
94-
metadata:
95-
name: metrics-server-config
96-
namespace: kube-system
97-
labels:
98-
kubernetes.io/cluster-service: "true"
99-
addonmanager.kubernetes.io/mode: EnsureExists
100-
data:
101-
NannyConfiguration: |-
102-
apiVersion: nannyconfig/v1alpha1
103-
kind: NannyConfiguration
104-
baseCPU: 100m
105-
cpuPerNode: 0m
106-
baseMemory: 100Mi
107-
memoryPerNode: 0Mi
92+
apiVersion: v1
93+
kind: ConfigMap
94+
metadata:
95+
name: metrics-server-config
96+
namespace: kube-system
97+
labels:
98+
kubernetes.io/cluster-service: "true"
99+
addonmanager.kubernetes.io/mode: EnsureExists
100+
data:
101+
NannyConfiguration: |-
102+
apiVersion: nannyconfig/v1alpha1
103+
kind: NannyConfiguration
104+
baseCPU: 100m
105+
cpuPerNode: 0m
106+
baseMemory: 100Mi
107+
memoryPerNode: 0Mi
108108
```
109109

110110
In this ConfigMap example, it changes the resource limit and request to the following:
@@ -126,7 +126,7 @@ If you would like to bypass VPA for Metrics Server and manually control its reso
126126
kubectl -n kube-system delete po metrics-server-pod-name
127127
```
128128

129-
4. To verify the updated resources took affect, run the following command to review the Metrics Server VPA log.
129+
4. To verify the updated resources took effect, run the following command to review the Metrics Server VPA log.
130130

131131
```bash
132132
kubectl -n kube-system logs metrics-server-pod-name -c metrics-server-vpa
@@ -150,22 +150,22 @@ If you would like to bypass VPA for Metrics Server and manually control its reso
150150
1. If you use the following configmap, the Metrics Server VPA customizations aren't applied. You need add a unit for `baseCPU`.
151151

152152
```yml
153-
apiVersion: v1
154-
kind: ConfigMap
155-
metadata:
156-
name: metrics-server-config
157-
namespace: kube-system
158-
labels:
159-
kubernetes.io/cluster-service: "true"
160-
addonmanager.kubernetes.io/mode: EnsureExists
161-
data:
162-
NannyConfiguration: |-
163-
apiVersion: nannyconfig/v1alpha1
164-
kind: NannyConfiguration
165-
baseCPU: 100
166-
cpuPerNode: 1m
167-
baseMemory: 100Mi
168-
memoryPerNode: 8Mi
153+
apiVersion: v1
154+
kind: ConfigMap
155+
metadata:
156+
name: metrics-server-config
157+
namespace: kube-system
158+
labels:
159+
kubernetes.io/cluster-service: "true"
160+
addonmanager.kubernetes.io/mode: EnsureExists
161+
data:
162+
NannyConfiguration: |-
163+
apiVersion: nannyconfig/v1alpha1
164+
kind: NannyConfiguration
165+
baseCPU: 100
166+
cpuPerNode: 1m
167+
baseMemory: 100Mi
168+
memoryPerNode: 8Mi
169169
```
170170

171171
The following example output resembles the results showing the updated throttling settings aren't applied.
@@ -200,4 +200,4 @@ Metrics Server is a component in the core metrics pipeline. For more information
200200
[metrics-server-api-design]: https://github.com/kubernetes/design-proposals-archive/blob/main/instrumentation/resource-metrics-api.md
201201

202202
<!--- INTERNAL LINKS --->
203-
[horizontal-pod-autoscaler]: concepts-scale.md#horizontal-pod-autoscaler
203+
[horizontal-pod-autoscaler]: concepts-scale.md#horizontal-pod-autoscaler

0 commit comments

Comments
 (0)