Skip to content

Commit 9320576

Browse files
authored
Merge pull request #43 from MicrosoftDocs/master
Merge
2 parents a2c5bc8 + 46f9a25 commit 9320576

File tree

175 files changed

+1767
-751
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

175 files changed

+1767
-751
lines changed

articles/active-directory-b2c/custom-policy-localization.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.subservice: B2C
1717

1818
[!INCLUDE [active-directory-b2c-advanced-audience-warning](../../includes/active-directory-b2c-advanced-audience-warning.md)]
1919

20-
Language customization in Azure Active Directory B2C (Azure AD B2C) allows you to accommodate different languages to suit your customer' needs. Microsoft provides the translations for 36 languages, but you can also provide your own translations for any language. Even if your experience is provided for only a single language, you can customize any text on the pages.
20+
Language customization in Azure Active Directory B2C (Azure AD B2C) allows you to accommodate different languages to suit your customer' needs. Microsoft provides the translations for [36 languages](https://docs.microsoft.com/azure/active-directory-b2c/user-flow-language-customization#supported-languages), but you can also provide your own translations for any language. Even if your experience is provided for only a single language, you can customize any text on the pages.
2121

2222
This article shows you how to support multiple locales or languages in the policy for user journeys. Localization requires three steps: set-up the explicit list of supported languages, provide language-specific strings and collections, and edit the [content definition](contentdefinitions.md) for the page.
2323

articles/active-directory/authentication/howto-authentication-passwordless-deployment.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ Microsoft's passwordless authentication methods enable different scenarios. Cons
5656
| **Web app sign-in**: <br> from a mobile or non-windows device | **Yes** | **No** | **No** |
5757
| **Computer sign in**: <br> Non-Windows computer | **No** | **No** | **No** |
5858

59-
For information on selecting the best method for your organization, see [Deciding a passwordless method](https://docs.microsoft.com/azure/security/fundamentals/ad-passwordless#deciding-a-passwordless-method).
59+
For information on selecting the best method for your organization, see [Deciding a passwordless method](https://docs.microsoft.com/azure/active-directory/authentication/concept-authentication-passwordless#choose-a-passwordless-method).
6060

6161
## Prerequisites
6262

@@ -130,7 +130,7 @@ See [Best practices for a pilot](https://aka.ms/deploymentplans) on the deployme
130130

131131
The Microsoft Authenticator app is a free download from Google Play or the Apple App Store. [Learn more about downloading the Microsoft Authenticator app](https://www.microsoft.com/p/microsoft-authenticator/9nblgggzmcj6). Have users download the Microsoft Authenticator app. and follow the directions to enable phone sign in.
132132

133-
It turns any iOS or Android phone into a strong, passwordless credential. Users sign in to any platform or browser by getting a notification to their phone, matching a number displayed on the screen to the one on their phone, and then using biometrics or a PIN to confirm. [See details on how the Microsoft Authenticator app works](https://docs.microsoft.com/azure/security/fundamentals/ad-passwordless#user-using-microsoft-authenticator-for-passwordless-sign-in).
133+
It turns any iOS or Android phone into a strong, passwordless credential. Users sign in to any platform or browser by getting a notification to their phone, matching a number displayed on the screen to the one on their phone, and then using biometrics or a PIN to confirm. [See details on how the Microsoft Authenticator app works](https://docs.microsoft.com/azure/active-directory/authentication/concept-authentication-passwordless#microsoft-authenticator-app).
134134

135135
![sign in with the Authenticator app](./media/howto-authentication-passwordless-deployment/passwordless-dp-sign-in.png)
136136

articles/active-directory/governance/entitlement-management-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ These problems are compounded for users who need access from another organizatio
4141
- No one person may not know all of the specific individuals in other organization's directories to be able to invite them
4242
- Even if they were able to invite these users, no one in that organization may remember to manage all of the user's access consistently
4343

44-
Azure AD entitlement management can help address these challenges. To learn more about how customers have been using Azure AD entitlement management, you can read the [Avanade case study](https://aka.ms/AvanadeELMCase) and the [Centrica case study](https://aka.ms/CentricaELMCase). This video provides an overview of entitlement management and its value:
44+
Azure AD entitlement management can help address these challenges. To learn more about how customers have been using Azure AD entitlement management, you can read the [Avanade case study](https://customers.microsoft.com/story/avanade-professional-services-azure-canada) and the [Centrica case study](https://customers.microsoft.com/story/757467-centrica-energy-azure). This video provides an overview of entitlement management and its value:
4545

4646
>[!VIDEO https://www.youtube.com/embed/_Lss6bFrnQ8]
4747

articles/active-directory/saas-apps/box-tutorial.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.subservice: saas-app-tutorial
1313
ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.topic: tutorial
16-
ms.date: 01/31/2020
16+
ms.date: 03/24/2020
1717
ms.author: jeedes
1818

1919
ms.collection: M365-identity-device-management
@@ -87,6 +87,9 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8787
b. In the **Identifier (Entity ID)** text box, type a URL:
8888
`box.net`
8989

90+
c. In the **Reply URL** text box, type a URL:
91+
`https://sso.services.box.net/sp/ACS.saml2`
92+
9093
> [!NOTE]
9194
> The Sign-on URL value is not real. Update the value with the actual Sign-On URL. Contact [Box Client support team](https://community.box.com/t5/custom/page/page-id/submit_sso_questionaire) to get the value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
9295

articles/app-service/environment/firewall-integration.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to integrate with Azure Firewall to secure outbound traff
44
author: ccompy
55
ms.assetid: 955a4d84-94ca-418d-aa79-b57a5eb8cb85
66
ms.topic: article
7-
ms.date: 01/24/2020
7+
ms.date: 03/31/2020
88
ms.author: ccompy
99
ms.custom: seodec18
1010

@@ -211,6 +211,8 @@ With an Azure Firewall, you automatically get everything below configured with t
211211
|gmstorageprodsn1.queue.core.windows.net:443 |
212212
|gmstorageprodsn1.table.core.windows.net:443 |
213213
|rteventservice.trafficmanager.net:443 |
214+
|ctldl.windowsupdate.com:80 |
215+
|ctldl.windowsupdate.com:443 |
214216

215217
#### Wildcard HTTP/HTTPS dependencies
216218

@@ -221,6 +223,8 @@ With an Azure Firewall, you automatically get everything below configured with t
221223
| \*.update.microsoft.com:443 |
222224
| \*.windowsupdate.microsoft.com:443 |
223225
| \*.identity.azure.net:443 |
226+
| \*.ctldl.windowsupdate.com:80 |
227+
| \*.ctldl.windowsupdate.com:443 |
224228

225229
#### Linux dependencies
226230

articles/app-service/environment/using-an-ase.md

Lines changed: 35 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,18 +5,18 @@ author: ccompy
55

66
ms.assetid: a22450c4-9b8b-41d4-9568-c4646f4cf66b
77
ms.topic: article
8-
ms.date: 01/01/2020
8+
ms.date: 3/26/2020
99
ms.author: ccompy
1010
ms.custom: seodec18
1111
---
1212
# Use an App Service Environment
1313

1414
An App Service Environment (ASE) is a deployment of Azure App Service into a subnet in a customer's Azure Virtual Network instance. An ASE consists of:
1515

16-
- **Front ends**: Where HTTP or HTTPS terminates in an App Service Environment.
17-
- **Workers**: The resources that host your apps.
18-
- **Database**: Holds information that defines the environment.
19-
- **Storage**: Used to host the customer-published apps.
16+
- **Front ends**: Where HTTP or HTTPS terminates in an App Service Environment
17+
- **Workers**: The resources that host your apps
18+
- **Database**: Holds information that defines the environment
19+
- **Storage**: Used to host the customer-published apps
2020

2121
You can deploy an ASE with an external or internal virtual IP (VIP) for app access. A deployment with an external VIP is commonly called an *External ASE*. A deployment with an internal VIP is called an *ILB ASE* because it uses an internal load balancer (ILB). To learn more about the ILB ASE, see [Create and use an ILB ASE][MakeILBASE].
2222

@@ -115,6 +115,22 @@ For information about how to create an ILB ASE, see [Create and use an ILB ASE][
115115

116116
The SCM URL is used to access the Kudu console or for publishing your app by using Web Deploy. For information on the Kudu console, see [Kudu console for Azure App Service][Kudu]. The Kudu console gives you a web UI for debugging, uploading files, editing files, and much more.
117117

118+
### DNS configuration
119+
120+
When you use an External ASE, apps made in your ASE are registered with Azure DNS. With an ILB ASE, you must manage your own DNS.
121+
122+
To configure DNS with your ILB ASE:
123+
124+
create a zone for <ASE name>.appserviceenvironment.net
125+
create an A record in that zone that points * to the ILB IP address
126+
create an A record in that zone that points @ to the ILB IP address
127+
create a zone in <ASE name>.appserviceenvironment.net named scm
128+
create an A record in the scm zone that points * to the ILB IP address
129+
130+
The DNS settings for your ASE default domain suffix do not restrict your apps to only being accessible by those names. You can set a custom domain name without any validation on your apps in an ILB ASE. If you then want to create a zone named *contoso.net*, you could do so and point it to the ILB IP address. The custom domain name works for app requests but doesn't for the scm site. The scm site is only available at *&lt;appname&gt;.scm.&lt;asename&gt;.appserviceenvironment.net*.
131+
132+
The zone named *.&lt;asename&gt;.appserviceenvironment.net* is globally unique. Before May 2019, customers were able to specify the domain suffix of the ILB ASE. If you wanted to use *.contoso.com* for the domain suffix, you were able do so and that would include the scm site. There were challenges with that model including; managing the default SSL certificate, lack of single sign-on with the scm site, and the requirement to use a wildcard certificate. The ILB ASE default certificate upgrade process was also disruptive and caused application restarts. To solve these problems, the ILB ASE behavior was changed to use a domain suffix based on the name of the ASE and with a Microsoft owned suffix. The change to the ILB ASE behavior only affects ILB ASEs made after May 2019. Pre-existing ILB ASEs must still manage the default certificate of the ASE and their DNS configuration.
133+
118134
## Publishing
119135

120136
In an ASE, as with the multitenant App Service, you can publish by these methods:
@@ -127,7 +143,7 @@ In an ASE, as with the multitenant App Service, you can publish by these methods
127143

128144
With an External ASE, these publishing options all work the same way. For more information, see [Deployment in Azure App Service][AppDeploy].
129145

130-
Publishing is significantly different with an ILB ASE, for which the publishing endpoints are all available only through the ILB. The ILB is on a private IP in the ASE subnet in the virtual network. If you don't have network access to the ILB, you can't publish any apps on that ASE. As noted in [Create and use an ILB ASE][MakeILBASE], you must configure DNS for the apps in the system. That requirement includes the SCM endpoint. If the endpoints aren't defined properly, you can't publish. Your IDEs must also have network access to the ILB to publish directly to it.
146+
With an ILB ASE, the publishing endpoints are only available through the ILB. The ILB is on a private IP in the ASE subnet in the virtual network. If you don't have network access to the ILB, you can't publish any apps on that ASE. As noted in [Create and use an ILB ASE][MakeILBASE], you must configure DNS for the apps in the system. That requirement includes the SCM endpoint. If the endpoints aren't defined properly, you can't publish. Your IDEs must also have network access to the ILB to publish directly to it.
131147

132148
Without additional changes, internet-based CI systems like GitHub and Azure DevOps don't work with an ILB ASE because the publishing endpoint isn't internet accessible. You can enable publishing to an ILB ASE from Azure DevOps by installing a self-hosted release agent in the virtual network that contains the ILB ASE. Alternatively, you can also use a CI system that uses a pull model, such as Dropbox.
133149

@@ -164,7 +180,18 @@ To enable logging on your ASE:
164180

165181
![ASE diagnostic log settings][4]
166182

167-
If you integrate with Log Analytics, you can see the logs by selecting **Logs** from the ASE portal and creating a query against **AppServiceEnvironmentPlatformLogs**.
183+
If you integrate with Log Analytics, you can see the logs by selecting **Logs** from the ASE portal and creating a query against **AppServiceEnvironmentPlatformLogs**. Logs are only emitted when your ASE has an event that will trigger it. If your ASE does not have such an event, there will not be any logs. To quickly see an example of logs in your Log Analytics workspace, perform a scale operation with one of the App Service plans in your ASE. You can then run a query against **AppServiceEnvironmentPlatformLogs** to see those logs.
184+
185+
**Creating an alert**
186+
187+
To create an alert against your logs, follow the instructions in [Create, view, and manage log alerts using Azure Monitor][logalerts]. In brief:
188+
189+
* Open the Alerts page in your ASE portal
190+
* Select **New alert rule**
191+
* Select your Resource to be your Log Analytics workspace
192+
* Set your condition with a custom log search to use a query like, "AppServiceEnvironmentPlatformLogs | where ResultDescription contains "has begun scaling" or whatever you want. Set the threshold as appropriate.
193+
* Add or create an action group as desired. The action group is where you define the response to the alert such as sending an email or an SMS message
194+
* Name your alert and save it.
168195

169196
## Upgrade preference
170197

@@ -240,3 +267,4 @@ To delete an ASE:
240267
[AppDeploy]: ../deploy-local-git.md
241268
[ASEWAF]: app-service-app-service-environment-web-application-firewall.md
242269
[AppGW]: ../../application-gateway/application-gateway-web-application-firewall-overview.md
270+
[logalerts]: ../../azure-monitor/platform/alerts-log.md

articles/application-gateway/configuration-overview.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -163,8 +163,6 @@ Choose HTTP or HTTPS:
163163

164164
- If you choose HTTP, the traffic between the client and the application gateway is unencrypted.
165165

166-
- Choose HTTPS if you want [TLS termination](https://docs.microsoft.com/azure/application-gateway/overview#secure-sockets-layer-ssltls-termination) or [end-to-end TLS encryption](https://docs.microsoft.com/azure/application-gateway/ssl-overview). The traffic between the client and the application gateway is encrypted. And the TLS connection terminates at the application gateway. If you want end-to-end TLS encryption, you must choose HTTPS and configure the **back-end HTTP** setting. This ensures that traffic is re-encrypted when it travels from the application gateway to the back end.
167-
168166
- Choose HTTPS if you want [TLS termination](features.md#secure-sockets-layer-ssltls-termination) or [end-to-end TLS encryption](https://docs.microsoft.com/azure/application-gateway/ssl-overview). The traffic between the client and the application gateway is encrypted. And the TLS connection terminates at the application gateway. If you want end-to-end TLS encryption, you must choose HTTPS and configure the **back-end HTTP** setting. This ensures that traffic is re-encrypted when it travels from the application gateway to the back end.
169167

170168

articles/application-gateway/ingress-controller-install-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -266,7 +266,7 @@ Kubernetes. We will leverage it to install the `application-gateway-kubernetes-i
266266

267267
> [!NOTE]
268268
> The `identityResourceID` and `identityClientID` are values that were created
269-
during the [Create an Identity](https://github.com/Azure/application-gateway-kubernetes-ingress/blob/072626cb4e37f7b7a1b0c4578c38d1eadc3e8701/docs/setup/install-new.md#create-an-identity)
269+
during the [Deploy Components](ingress-controller-install-new.md#deploy-components)
270270
steps, and could be obtained again using the following command:
271271
> ```azurecli
272272
> az identity show -g <resource-group> -n <identity-name>

articles/application-gateway/self-signed-certificates.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -257,11 +257,13 @@ Add-AzApplicationGatewayRequestRoutingRule `
257257
258258
Set-AzApplicationGateway -ApplicationGateway $gw
259259
```
260+
260261
### Verify the application gateway backend health
261262

262263
1. Click the **Backend Health** view of your application gateway to check if the probe is healthy.
263-
1. You should see that the Status is **Healthy** for the HTTPS probe.
264-
![HTTPS probe](media/self-signed-certificates/https-probe.png)
264+
1. You should see that the Status is **Healthy** for the HTTPS probe.
265+
266+
![HTTPS probe](media/self-signed-certificates/https-probe.png)
265267

266268
## Next steps
267269

articles/asc-for-iot/how-to-deploy-edge.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ Complete each step to complete your IoT Edge deployment for Azure Security Cente
9393
1. On the **Module Twin Settings** tab, add the following configuration:
9494

9595
``` json
96-
"ms_iotn:urn_azureiot_Security_SecurityAgentConfiguration":{}
96+
"ms_iotn:urn_azureiot_Security_SecurityAgentConfiguration"
9797
```
9898

9999
1. Select **Update**.

0 commit comments

Comments
 (0)