Skip to content

Commit 92e3f0c

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 74ff9b1 + 86d49da commit 92e3f0c

File tree

73 files changed

+1335
-1444
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

73 files changed

+1335
-1444
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4970,6 +4970,11 @@
49704970
"redirect_url": "/azure/app-service-mobile",
49714971
"redirect_document_id": false
49724972
},
4973+
{
4974+
"source_path": "articles/application-gateway/application-gateway-redirect-overview.md",
4975+
"redirect_url": "/azure/application-gateway/redirect-overview",
4976+
"redirect_document_id": false
4977+
},
49734978
{
49744979
"source_path": "articles/application-gateway/application-gateway-create-gateway-arm-template.md",
49754980
"redirect_url": "/azure/application-gateway/create-vmss-template",

articles/active-directory/manage-apps/bread/toc.yml

Lines changed: 25 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
tocHref: /azure/active-directory/saas-apps/
77
topicHref: /azure/active-directory/index
88
items:
9-
- name: Manage applications
9+
- name: Application management
1010
tocHref: /azure/active-directory/saas-apps/
1111
topicHref: /azure/active-directory/manage-apps/index
1212

@@ -18,7 +18,30 @@
1818
tocHref: /azure/active-directory/fundamentals/
1919
topicHref: /azure/active-directory/index
2020
items:
21-
- name: Manage applications
21+
- name: Application management
2222
tocHref: /azure/active-directory/fundamentals/
2323
topicHref: /azure/active-directory/manage-apps/index
2424

25+
- name: Azure
26+
tocHref: /azure/
27+
topicHref: /azure/index
28+
items:
29+
- name: Active Directory
30+
tocHref: /azure/active-directory/hybrid/
31+
topicHref: /azure/active-directory/index
32+
items:
33+
- name: Application management
34+
tocHref: /azure/active-directory/hybrid/
35+
topicHref: /azure/active-directory/manage-apps/index
36+
37+
- name: Azure
38+
tocHref: /azure/
39+
topicHref: /azure/index
40+
items:
41+
- name: Active Directory
42+
tocHref: /azure/active-directory/develop/
43+
topicHref: /azure/active-directory/index
44+
items:
45+
- name: Application management
46+
tocHref: /azure/active-directory/develop/
47+
topicHref: /azure/active-directory/manage-apps/index

articles/active-directory/saas-apps/confluencemicrosoft-tutorial.md

Lines changed: 104 additions & 130 deletions
Large diffs are not rendered by default.

articles/active-directory/saas-apps/contractworks-tutorial.md

Lines changed: 66 additions & 143 deletions
Large diffs are not rendered by default.
-13 KB
Loading
130 KB
Loading
135 KB
Loading

articles/active-directory/saas-apps/netdocuments-tutorial.md

Lines changed: 81 additions & 123 deletions
Large diffs are not rendered by default.

articles/active-directory/saas-apps/zoom-tutorial.md

Lines changed: 7 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.devlang: na
1616
ms.topic: tutorial
17-
ms.date: 08/23/2019
17+
ms.date: 09/03/2019
1818
ms.author: jeedes
1919

2020
ms.collection: M365-identity-device-management
@@ -41,7 +41,8 @@ To get started, you need the following items:
4141

4242
In this tutorial, you configure and test Azure AD SSO in a test environment.
4343

44-
* Zoom supports **SP** initiated SSO
44+
* Zoom supports **SP** initiated SSO and
45+
* Zoom supports [**Automated** user provisioning](https://docs.microsoft.com/azure/active-directory/saas-apps/zoom-provisioning-tutorial).
4546

4647
## Adding Zoom from the gallery
4748

@@ -86,7 +87,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8687
`<companyname>.zoom.us`
8788

8889
> [!NOTE]
89-
> These values are not real. Update these values with the actual Sign on URL and Identifier. Contact [Zoom Client support team](https://support.zoom.us/hc/en-us) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
90+
> These values are not real. Update these values with the actual Sign on URL and Identifier. Contact [Zoom Client support team](https://support.zoom.us/hc/) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
9091

9192
1. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
9293

@@ -100,7 +101,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
100101
> To learn how to configure Role in Azure AD, see [Configure the role claim issued in the SAML token for enterprise applications](https://docs.microsoft.com/azure/active-directory/develop/active-directory-enterprise-app-role-management).
101102
102103
> [!NOTE]
103-
> Zoom might expect a group claim in the SAML payload. If you have created any groups, contact the [Zoom Client support team](https://support.zoom.us/hc/en-us) with the group information so they can configure the group information on their end. You also need to provide the Object ID to [Zoom Client support team](https://support.zoom.us/hc/en-us) so they can configure the Object ID on their end. To get the Object ID, see [Configuring Zoom with Azure](https://support.zoom.us/hc/en-us/articles/115005887566).
104+
> Zoom might expect a group claim in the SAML payload. If you have created any groups, contact the [Zoom Client support team](https://support.zoom.us/hc/) with the group information so they can configure the group information on their end. You also need to provide the Object ID to [Zoom Client support team](https://support.zoom.us/hc/) so they can configure the Object ID on their end. To get the Object ID, see [Configuring Zoom with Azure](https://support.zoom.us/hc/articles/115005887566).
104105
105106
### Create an Azure AD test user
106107

@@ -171,30 +172,10 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
171172

172173
### Create Zoom test user
173174

174-
In order to enable Azure AD users to sign in to Zoom, they must be provisioned into Zoom. In the case of Zoom, provisioning is a manual task.
175-
176-
### To provision a user account, perform the following steps:
177-
178-
1. Sign in to your **Zoom** company site as an administrator.
179-
180-
2. Click the **Account Management** tab, and then click **User Management**.
181-
182-
3. In the User Management section, click **Add users**.
183-
184-
![User management](./media/zoom-tutorial/ic784703.png "User management")
185-
186-
4. On the **Add users** page, perform the following steps:
187-
188-
![Add users](./media/zoom-tutorial/ic784704.png "Add users")
189-
190-
a. As **User Type**, select **Basic**.
191-
192-
b. In the **Emails** textbox, type the email address of a valid Azure AD account you want to provision.
193-
194-
c. Click **Add**.
175+
The objective of this section is to create a user called B.Simon in Zoom. Zoom supports automatic user provisioning, which is by default enabled. You can find more details [here](https://docs.microsoft.com/azure/active-directory/saas-apps/zoom-provisioning-tutorial) on how to configure automatic user provisioning.
195176

196177
> [!NOTE]
197-
> You can use any other Zoom user account creation tools or APIs provided by Zoom to provision Azure Active Directory user accounts.
178+
> If you need to create a user manually, you need to contact [Zoom Client support team](https://support.zoom.us/hc/)
198179
199180
## Test SSO
200181

Lines changed: 27 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Security attributes for Azure App Service
3-
description: A checklist of security attributes for evaluating Azure App Service
2+
title: Security controls for Azure App Service
3+
description: A checklist of security controls for evaluating Azure App Service
44
services: app-service
55
documentationcenter: ''
66
author: msmbaldwin
@@ -12,55 +12,49 @@ ms.date: 05/08/2019
1212
ms.author: mbaldwin
1313

1414
---
15-
# Security attributes for Azure App Service
15+
# Security controls for Azure App Service
1616

17-
This article documents the security attributes built into Azure App Service.
17+
This article documents the security controls built into Azure App Service.
1818

1919
[!INCLUDE [Security attributes header](../../includes/security-attributes-header.md)]
2020

21-
## Preventative
21+
## Network
2222

23-
| Security attribute | Yes/No | Notes |
23+
| Security control | Yes/No | Notes | Documentation
2424
|---|---|--|
25-
| Encryption at rest (such as server-side encryption, server-side encryption with customer-managed keys, and other encryption features) | Yes | Web site file content is stored in Azure Storage, which automatically encrypts the content at rest. See [Azure Storage encryption for data at rest](../storage/common/storage-service-encryption.md).<br><br>Customer supplied secrets are encrypted at rest. The secrets are encrypted at rest while stored in App Service configuration databases.<br><br>Locally attached disks can optionally be used as temporary storage by websites (D:\local and %TMP%). Locally attached disks are not encrypted at rest. |
26-
| Encryption in transit (such as ExpressRoute encryption, in VNet encryption, and VNet-VNet encryption )| Yes | Customers can configure web sites to require and use HTTPS for inbound traffic. See the blog post [How to make an Azure App Service HTTPS only](https://blogs.msdn.microsoft.com/benjaminperkins/2017/11/30/how-to-make-an-azure-app-service-https-only/). |
27-
| Encryption key handling (CMK, BYOK, etc.)| Yes | Customers can choose to store application secrets in Key Vault and retrieve them at runtime. See [Use Key Vault references for App Service and Azure Functions (preview)](app-service-key-vault-references.md).|
28-
| Column level encryption (Azure Data Services)| N/A | |
29-
| API calls encrypted| Yes | Management calls to configure App Service occur via [Azure Resource Manager](../azure-resource-manager/index.yml) calls over HTTPS. |
30-
31-
## Network segmentation
32-
33-
| Security attribute | Yes/No | Notes |
34-
|---|---|--|
35-
| Service endpoint support| Yes | Currently available in preview for App Service. See [Azure App Service Access Restrictions](app-service-ip-restrictions.md). |
36-
| VNet injection support| Yes | App Service Environments are private implementations of App Service dedicated to a single customer injected into a customer's virtual network. See [Introduction to the App Service Environments](environment/intro.md). |
37-
| Network Isolation and Firewalling support| Yes | For the public multi-tenant variation of App Service, customers can configure network ACLs (IP Restrictions) to lock down allowed inbound traffic. See [Azure App Service Access Restrictions](app-service-ip-restrictions.md). App Service Environments are deployed directly into virtual networks and hence can be secured with NSGs. |
38-
| Forced tunneling support| Yes | App Service Environments can be deployed into a customer's virtual network where forced tunneling is configured. Customers need to follow the directions in [Configure your App Service Environment with forced tunneling](environment/forced-tunnel-support.md). |
25+
| Service endpoint support| Yes | Currently available in preview for App Service.| [Azure App Service Access Restrictions](app-service-ip-restrictions.md)
26+
| VNet injection support| Yes | App Service Environments are private implementations of App Service dedicated to a single customer injected into a customer's virtual network. | [Introduction to the App Service Environments](environment/intro.md)
27+
| Network Isolation and Firewalling support| Yes | For the public multi-tenant variation of App Service, customers can configure network ACLs (IP Restrictions) to lock down allowed inbound traffic. App Service Environments are deployed directly into virtual networks and hence can be secured with NSGs. | [Azure App Service Access Restrictions](app-service-ip-restrictions.md)
28+
| Forced tunneling support| Yes | App Service Environments can be deployed into a customer's virtual network where forced tunneling is configured. | [Configure your App Service Environment with forced tunneling](environment/forced-tunnel-support.md)
3929

40-
## Detection
30+
## Monitoring & logging
4131

42-
| Security attribute | Yes/No | Notes|
32+
| Security control | Yes/No | Notes | Documentation
4333
|---|---|--|
44-
| Azure monitoring support (Log analytics, App insights, etc.)| Yes | App Service integrates with Application Insights for languages that support Application Insights (Full .NET Framework, .NET Core, Java and Node.JS). See [Monitor Azure App Service performance](../azure-monitor/app/azure-web-apps.md). App Service also sends application metrics into Azure Monitor. See [Monitor apps in Azure App Service](web-sites-monitor.md). |
34+
| Azure monitoring support (Log analytics, App insights, etc.)| Yes | App Service integrates with Application Insights for languages that support Application Insights (Full .NET Framework, .NET Core, Java and Node.JS). See [Monitor Azure App Service performance](../azure-monitor/app/azure-web-apps.md). App Service also sends application metrics into Azure Monitor. | [Monitor apps in Azure App Service](web-sites-monitor.md)
35+
| Control and management plane logging and audit| Yes | All management operations performed on App Service objects occur via [Azure Resource Manager](../azure-resource-manager/index.yml). Historical logs of these operations are available both in the portal and via the CLI. | [Azure Resource Manager resource provider operations](../role-based-access-control/resource-provider-operations.md#microsoftweb), [az monitor activity-log](/cli/azure/monitor/activity-log)
36+
| Data plane logging and audit | No | The data plane for App Service is a remote file share containing a customer’s deployed web site content. There is no auditing of the remote file share. |
4537

46-
## Identity and access management
38+
## Identity
4739

48-
| Security attribute | Yes/No | Notes|
40+
| Security control | Yes/No | Notes | Documentation
4941
|---|---|--|
50-
| Authentication| Yes | Customers can build applications on App Service that automatically integrate with [Azure Active Directory (Azure AD)](../active-directory/index.yml) as well as other OAuth compatible identity providers; see [Authentication and authorization in Azure App Service](overview-authentication-authorization.md). For management access to App Service assets, all access is controlled by a combination of Azure AD authenticated principal and Azure Resource Manager RBAC roles. |
51-
| Authorization| Yes | For management access to App Service assets, all access is controlled by a combination of Azure AD authenticated principal and Azure Resource Manager RBAC roles. |
52-
42+
| Authentication| Yes | Customers can build applications on App Service that automatically integrate with [Azure Active Directory (Azure AD)](../active-directory/index.yml) as well as other OAuth compatible identity providers For management access to App Service assets, all access is controlled by a combination of Azure AD authenticated principal and Azure Resource Manager RBAC roles. | [Authentication and authorization in Azure App Service](overview-authentication-authorization.md)
43+
| Authorization| Yes | For management access to App Service assets, all access is controlled by a combination of Azure AD authenticated principal and Azure Resource Manager RBAC roles. | [Authentication and authorization in Azure App Service](overview-authentication-authorization.md)
5344

54-
## Audit trail
45+
## Data protection
5546

56-
| Security attribute | Yes/No | Notes|
47+
| Security control | Yes/No | Notes | Documentation
5748
|---|---|--|
58-
| Control and management plane logging and audit| Yes | All management operations performed on App Service objects occur via [Azure Resource Manager](../azure-resource-manager/index.yml). Historical logs of these operations are available both in the portal and via the CLI; see [Azure Resource Manager resource provider operations](../role-based-access-control/resource-provider-operations.md#microsoftweb) and [az monitor activity-log](/cli/azure/monitor/activity-log). |
59-
| Data plane logging and audit | No | The data plane for App Service is a remote file share containing a customer’s deployed web site content. There is no auditing of the remote file share. |
49+
| Server-side encryption at rest: Microsoft managed keys | Yes | Web site file content is stored in Azure Storage, which automatically encrypts the content at rest. <br><br>Customer supplied secrets are encrypted at rest. The secrets are encrypted at rest while stored in App Service configuration databases.<br><br>Locally attached disks can optionally be used as temporary storage by websites (D:\local and %TMP%). Locally attached disks are not encrypted at rest. | [Azure Storage encryption for data at rest](../storage/common/storage-service-encryption.md)
50+
| Server-side encryption at rest: customer managed keys (BYOK) | Yes | Customers can choose to store application secrets in Key Vault and retrieve them at runtime. | [Use Key Vault references for App Service and Azure Functions (preview)](app-service-key-vault-references.md)
51+
| Column level encryption (Azure Data Services)| N/A | |
52+
| Encryption in transit (such as ExpressRoute encryption, in VNet encryption, and VNet-VNet encryption )| Yes | Customers can configure web sites to require and use HTTPS for inbound traffic. | [How to make an Azure App Service HTTPS only](https://blogs.msdn.microsoft.com/benjaminperkins/2017/11/30/how-to-make-an-azure-app-service-https-only/) (blog post)
53+
| API calls encrypted| Yes | Management calls to configure App Service occur via [Azure Resource Manager](../azure-resource-manager/index.yml) calls over HTTPS. |
6054

6155
## Configuration management
6256

63-
| Security attribute | Yes/No | Notes|
57+
| Security control | Yes/No | Notes | Documentation
6458
|---|---|--|
6559
| Configuration management support (versioning of configuration, etc.)| Yes | For management operations, the state of an App Service configuration can be exported as an Azure Resource Manager template and versioned over time. For runtime operations, customers can maintain multiple different live versions of an application using the App Service deployment slots feature. |
6660

0 commit comments

Comments
 (0)