Skip to content

Commit 938cf29

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into sap-workloads-articles
2 parents 7efcae8 + 4504a68 commit 938cf29

File tree

166 files changed

+874
-791
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

166 files changed

+874
-791
lines changed
-4.51 KB
Loading

articles/active-directory/app-provisioning/plan-auto-user-provisioning.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.topic: conceptual
1010
ms.workload: identity
11-
ms.date: 04/11/2023
11+
ms.date: 04/12/2023
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---
@@ -57,7 +57,7 @@ This article uses the following terms:
5757

5858
* Target system - The repository of users that the Azure AD provisions to. The Target system is typically a SaaS application such as ServiceNow, Zscaler, and Slack. The target system can also be an on-premises system such as AD.
5959

60-
* [System for Cross-domain Identity Management (SCIM)](https://aka.ms/scimoverview) - An open standard that allows for the automation of user provisioning. SCIM communicates user identity data between identity providers such as Microsoft, and service providers like Salesforce or other SaaS apps that require user identity information.
60+
* [System for Cross-domain Identity Management (SCIM)](https://aka.ms/scimoverview) - An open standard that allows for the automation of user provisioning. SCIM communicates user identity data between identity providers and service providers. Microsoft is an example of an identity provider. Salesforce is an example of a service provider. Service providers require user identity information and an identity provider fulfills that need. SCIM is the mechanism the identity provider and service provider use to send information back and forth.
6161

6262
### Training resources
6363

@@ -128,7 +128,7 @@ When technology projects fail, it's typically because of mismatched expectations
128128

129129
### Plan communications
130130

131-
Communication is critical to the success of any new service. Proactively communicate with your users how their experience will change, when it will change, and how to gain support if they experience issues.
131+
Communication is critical to the success of any new service. Proactively communicate to your users about their experience, how the experience is changing, when to expect any change, and how to gain support if they experience issues.
132132

133133
### Plan a pilot
134134

@@ -140,7 +140,7 @@ A pilot allows you to test with a small group before deploying a capability for
140140

141141
In your first wave, target IT, usability, and other appropriate users who can test and provide feedback. Use this feedback to further develop the communications and instructions you send to your users, and to give insights into the types of issues your support staff may see.
142142

143-
Widen the rollout to larger groups of users by increasing the scope of the group(s) targeted. This can be done through [dynamic group membership](../enterprise-users/groups-dynamic-membership.md), or by manually adding users to the targeted group(s).
143+
Widen the rollout to larger groups of users by increasing the scope of the group(s) targeted. Increasing the scope of the group(s) is done through [dynamic group membership](../enterprise-users/groups-dynamic-membership.md), or by manually adding users to the targeted group(s).
144144

145145
## Plan application connections and administration
146146

@@ -150,7 +150,7 @@ Use the Azure portal to view and manage all the applications that support provis
150150

151151
The actual steps required to enable and configure automatic provisioning vary depending on the application. If the application you wish to automatically provision is listed in the [Azure AD SaaS app gallery](../saas-apps/tutorial-list.md), then you should select the [app-specific integration tutorial](../saas-apps/tutorial-list.md) to configure its pre-integrated user provisioning connector.
152152

153-
If not, follow the steps below:
153+
If not, follow the steps:
154154

155155
1. [Create a request](../manage-apps/v2-howto-app-gallery-listing.md) for a pre-integrated user provisioning connector. Our team will work with you and the application developer to onboard your application to our platform if it supports SCIM.
156156

@@ -164,7 +164,7 @@ For more information, see [What applications and systems can I use with Azure AD
164164

165165
Setting up automatic user provisioning is a per-application process. For each application, you need to provide [administrator credentials](../app-provisioning/configure-automatic-user-provisioning-portal.md) to connect to the target system’s user management endpoint.
166166

167-
The image below shows one version of the required admin credentials:
167+
The image shows one version of the required admin credentials:
168168

169169
![Provisioning screen to manage user account provisioning settings](./media/plan-auto-user-provisioning/userprovisioning-admincredentials.png)
170170

@@ -235,7 +235,7 @@ It's common for a security review to be required as part of a deployment. If you
235235

236236
### Plan rollback
237237

238-
If the automatic user provisioning implementation fails to work as desired in the production environment, the following rollback steps below can assist you in reverting to a previous known good state:
238+
If the automatic user provisioning implementation fails to work as desired in the production environment, the following rollback steps can assist you in reverting to a previous known good state:
239239

240240
1. Review the [provisioning logs](../app-provisioning/check-status-user-account-provisioning.md) to determine what incorrect operations occurred on the affected users and/or groups.
241241

articles/active-directory/authentication/how-to-migrate-mfa-server-to-azure-mfa.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -107,9 +107,10 @@ As part of enrolling users to use Microsoft Authenticator as a second factor, we
107107
Microsoft Identity Manager (MIM) SSPR can use MFA Server to invoke SMS one-time passcodes as part of the password reset flow.
108108
MIM can't be configured to use Azure AD Multi-Factor Authentication.
109109
We recommend you evaluate moving your SSPR service to Azure AD SSPR.
110-
111110
You can use the opportunity of users registering for Azure AD Multi-Factor Authentication to use the combined registration experience to register for Azure AD SSPR.
112111

112+
If you can't move your SSPR service, or you leverage MFA Server to invoke MFA requests for Privileged Access Management (PAM) scenarios, we recommend you update to an [alternate 3rd party MFA option](https://learn.microsoft.com/microsoft-identity-manager/working-with-custommfaserver-for-mim).
113+
113114
### RADIUS clients and Azure AD Multi-Factor Authentication
114115

115116
MFA Server supports RADIUS to invoke multifactor authentication for applications and network devices that support the protocol.

articles/active-directory/roles/delegate-by-task.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -387,7 +387,7 @@ You can further restrict permissions by assigning roles at smaller scopes or by
387387
> | Create user | [User Administrator](permissions-reference.md#user-administrator) | |
388388
> | Delete users | [User Administrator](permissions-reference.md#user-administrator) | |
389389
> | Invalidate refresh tokens of limited admins | [User Administrator](permissions-reference.md#user-administrator) | |
390-
> | Invalidate refresh tokens of non-admins | [Password Administrator](permissions-reference.md#password-administrator) | [User Administrator](permissions-reference.md#user-administrator) |
390+
> | Invalidate refresh tokens of non-admins | [Helpdesk Administrator](permissions-reference.md#helpdesk-administrator) | [User Administrator](permissions-reference.md#user-administrator) |
391391
> | Invalidate refresh tokens of privileged admins | [Privileged Authentication Administrator](permissions-reference.md#privileged-authentication-administrator) | |
392392
> | Read basic configuration | [Default user role](../fundamentals/users-default-permissions.md) | |
393393
> | Reset password for limited admins | [User Administrator](permissions-reference.md#user-administrator) | |

articles/aks/web-app-routing.md

Lines changed: 4 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -25,9 +25,9 @@ The add-on deploys the following components:
2525
## Prerequisites
2626

2727
- An Azure subscription. If you don't have an Azure subscription, you can create a [free account](https://azure.microsoft.com/free).
28-
- [Azure CLI installed](/cli/azure/install-azure-cli).
28+
- Azure CLI version 2.47.0 or later installed and configured. Run `az --version` to find the version. If you need to install or upgrade, see [Install Azure CLI][install-azure-cli].
2929
- An Azure Key Vault to store certificates.
30-
- A DNS solution, such as [Azure DNS](../dns/dns-getstarted-portal.md).
30+
- (Optional) A DNS solution, such as [Azure DNS](../dns/dns-getstarted-portal.md).
3131

3232
### Install the `aks-preview` Azure CLI extension
3333

@@ -147,20 +147,13 @@ az aks enable-addons -g <ResourceGroupName> -n <ClusterName> --addons azure-keyv
147147

148148
## Retrieve the add-on's managed identity object ID
149149

150-
Retrieve user managed identity object ID for the add-on. This identity is used in the next steps to grant permissions to manage the Azure DNS zone and retrieve certificates from the Azure Key Vault. Provide your *`<ResourceGroupName>`*, *`<ClusterName>`*, and *`<Location>`* in the script to retrieve the managed identity's object ID.
150+
Retrieve user managed identity object ID for the add-on. This identity is used in the next steps to grant permissions to manage the Azure DNS zone and retrieve certificates from the Azure Key Vault. Provide your *`<ResourceGroupName>`* and *`<ClusterName>`* in the script to retrieve the managed identity's object ID.
151151

152152
```azurecli-interactive
153153
# Provide values for your environment
154154
RGNAME=<ResourceGroupName>
155155
CLUSTERNAME=<ClusterName>
156-
LOCATION=<Location>
157-
158-
# Retrieve user managed identity object ID for the add-on
159-
SUBSCRIPTION_ID=$(az account show --query id --output tsv)
160-
MANAGEDIDENTITYNAME="webapprouting-${CLUSTERNAME}"
161-
MCRGNAME=$(az aks show -g ${RGNAME} -n ${CLUSTERNAME} --query nodeResourceGroup -o tsv)
162-
USERMANAGEDIDENTITY_RESOURCEID="/subscriptions/${SUBSCRIPTION_ID}/resourceGroups/${MCRGNAME}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/${MANAGEDIDENTITYNAME}"
163-
MANAGEDIDENTITY_OBJECTID=$(az resource show --id $USERMANAGEDIDENTITY_RESOURCEID --query "properties.principalId" -o tsv | tr -d '[:space:]')
156+
MANAGEDIDENTITY_OBJECTID=$(az aks show -g ${RGNAME} -n ${CLUSTERNAME} --query ingressProfile.webAppRouting.identity.objectId -o tsv)
164157
```
165158

166159
## Configure the add-on to use Azure DNS to manage creating DNS zones

articles/automation/automation-linux-hrw-install.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Deploy an agent-based Linux Hybrid Runbook Worker in Automation
33
description: This article tells how to install an agent-based Hybrid Runbook Worker to run runbooks on Linux-based machines in your local datacenter or cloud environment.
44
services: automation
55
ms.subservice: process-automation
6-
ms.date: 03/30/2023
6+
ms.date: 04/12/2023
77
ms.topic: conceptual
88
---
99

@@ -212,15 +212,15 @@ To install and configure a Linux Hybrid Runbook Worker, perform the following st
212212
213213
## Turn off signature validation
214214

215-
By default, Linux Hybrid Runbook Workers require signature validation. If you run an unsigned runbook against a worker, you see a `Signature validation failed` error. To turn off signature validation, run the following command. Replace the second parameter with your Log Analytics workspace ID.
215+
By default, Linux Hybrid Runbook Workers require signature validation. If you run an unsigned runbook against a worker, you see a `Signature validation failed` error. To turn off signature validation, run the following command as root. Replace the second parameter with your Log Analytics workspace ID.
216216

217217
```bash
218218
sudo python /opt/microsoft/omsconfig/modules/nxOMSAutomationWorker/DSCResources/MSFT_nxOMSAutomationWorkerResource/automationworker/scripts/require_runbook_signature.py --false <logAnalyticsworkspaceId>
219219
```
220220

221221
## <a name="remove-linux-hybrid-runbook-worker"></a>Remove the Hybrid Runbook Worker
222222

223-
Run the following commands on agent-based Linux Hybrid Worker:
223+
Run the following commands as root on the agent-based Linux Hybrid Worker:
224224

225225
1. ```python
226226
sudo bash

articles/azure-arc/servers/ssh-arc-overview.md

Lines changed: 3 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: (Preview) SSH access to Azure Arc-enabled servers
33
description: Leverage SSH remoting to access and manage Azure Arc-enabled servers.
4-
ms.date: 03/25/2022
4+
ms.date: 04/12/2023
55
ms.topic: conceptual
66
ms.custom: references_regions
77
---
@@ -41,16 +41,8 @@ Authenticating with Azure AD credentials has additional requirements:
4141
> The Virtual Machine Administrator Login and Virtual Machine User Login roles use `dataActions` and can be assigned at the management group, subscription, resource group, or resource scope. We recommend that you assign the roles at the management group, subscription, or resource level and not at the individual VM level. This practice avoids the risk of reaching the [Azure role assignments limit](../../role-based-access-control/troubleshooting.md#limits) per subscription.
4242
4343
### Availability
44-
SSH access to Arc-enabled servers is currently supported in the following regions:
45-
- eastus2euap, eastus, eastus2, westus2, southeastasia, westeurope, northeurope, westcentralus, southcentralus, uksouth, australiaeast, francecentral, japaneast, eastasia, koreacentral, westus3, westus, centralus, northcentralus.
46-
47-
### Supported operating systems
48-
- Windows: Windows 7+ and Windows Server 2012+
49-
- Linux:
50-
- CentOS: CentOS 7, CentOS 8
51-
- RedHat Enterprise Linux (RHEL): RHEL 7.4 to RHEL 7.10, RHEL 8.3+
52-
- SUSE Linux Enterprise Server (SLES): SLES 12, SLES 15.1+
53-
- Ubuntu Server: Ubuntu Server 16.04 to Ubuntu Server 20.04
44+
SSH access to Arc-enabled servers is currently supported in all regions supported by Arc-Enabled Servers with the following exceptions:
45+
- Germany West Central
5446

5547
## Getting started
5648

articles/azure-monitor/visualize/vmext-troubleshoot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ If the Microsoft Monitoring Agent VM extension isn't installing or reporting, pe
3232
1. Check if the Azure VM agent is installed and working correctly by using the steps in [KB 2965986](https://support.microsoft.com/kb/2965986#mt1):
3333
* You can also review the VM agent log file `C:\WindowsAzure\logs\WaAppAgent.log`.
3434
* If the log doesn't exist, the VM agent isn't installed.
35-
* [Install the Azure VM Agent](../../virtual-machines/extensions/agent-windows.md#install-the-vm-agent).
35+
* [Install the Azure VM Agent](../../virtual-machines/extensions/agent-windows.md#install-the-azure-windows-vm-agent).
3636
1. Review the Microsoft Monitoring Agent VM extension log files in `C:\Packages\Plugins\Microsoft.EnterpriseCloud.Monitoring.MicrosoftMonitoringAgent`.
3737
1. Ensure the virtual machine can run PowerShell scripts.
3838
1. Ensure permissions on C:\Windows\temp haven't been changed.

articles/azure-vmware/deploy-azure-vmware-solution.md

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,18 +4,14 @@ description: Learn how to use the information gathered in the planning stage to
44
ms.topic: tutorial
55
ms.custom: "engagement-fy23, devx-track-azurecli"
66
ms.service: azure-vmware
7-
ms.date: 12/05/2022
7+
ms.date: 4/12/2023
88

99
---
1010

1111
# Deploy and configure Azure VMware Solution
1212

1313
Once you've [planned your deployment](plan-private-cloud-deployment.md), you'll deploy and configure your Azure VMware Solution private cloud.
1414

15-
The diagram shows the deployment workflow of Azure VMware Solution.
16-
17-
:::image type="content" source="media/deploy-azure-vmware-solution-workflow.png" alt-text="Diagram showing the Azure VMware Solution deployment workflow." lightbox="media/deploy-azure-vmware-solution-workflow.png" border="false":::
18-
1915
In this how-to, you'll:
2016

2117
> [!div class="checklist"]
@@ -37,8 +33,6 @@ After you're finished, follow the recommended next steps at the end to continue
3733

3834
In the planning phase, you defined whether to use an *existing* or *new* ExpressRoute virtual network gateway.
3935

40-
:::image type="content" source="media/connect-expressroute-vnet-workflow.png" alt-text="Diagram showing the workflow for connecting Azure Virtual Network to ExpressRoute in Azure VMware Solution." border="false":::
41-
4236
>[!IMPORTANT]
4337
>[!INCLUDE [disk-pool-planning-note](includes/disk-pool-planning-note.md)]
4438

articles/azure-vmware/disaster-recovery-using-vmware-site-recovery-manager.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Deploy disaster recovery with VMware Site Recovery Manager
33
description: Deploy disaster recovery with VMware Site Recovery Manager (SRM) in your Azure VMware Solution private cloud.
44
ms.topic: how-to
55
ms.service: azure-vmware
6-
ms.date: 07/28/2022
6+
ms.date: 4/12/2023
77
---
88

99
# Deploy disaster recovery with VMware Site Recovery Manager
@@ -143,7 +143,7 @@ After installing VMware SRM and vSphere Replication, you need to complete the co
143143
1. Enter the remote site details, and then select **NEXT**.
144144

145145
>[!NOTE]
146-
>An Azure VMware Solution private cloud operates with an embedded Platform Services Controller (PSC), so only one local vCenter can be selected. If the remote vCenter Server is using an embedded Platform Service Controller (PSC), use the vCenter Server's FQDN (or its IP address) and port to specify the PSC.
146+
>An Azure VMware Solution private cloud operates with an embedded Platform Services Controller (PSC), so only one local vCenter Server can be selected. If the remote vCenter Server is using an embedded Platform Service Controller (PSC), use the vCenter Server's FQDN (or its IP address) and port to specify the PSC.
147147
>
148148
>The remote user must have sufficient permissions to perform the pairings. An easy way to ensure this is to give that user the VRM administrator and SRM administrator roles in the remote vCenter Server. For a remote Azure VMware Solution private cloud, cloudadmin is configured with those roles.
149149
@@ -219,7 +219,7 @@ While Microsoft aims to simplify VMware SRM and vSphere Replication installation
219219

220220
## Scale limitations
221221

222-
To learn about the limits for the VMware Site Recovery Manager Add-On with the Azure VMware Soltuion, check the [Azure subscription and service limits, quotas, and constraints.](../azure-resource-manager/management/azure-subscription-service-limits.md#azure-vmware-solution-limits)
222+
To learn about the limits for the VMware Site Recovery Manager Add-On with the Azure VMware Solution, check the [Azure subscription and service limits, quotas, and constraints.](../azure-resource-manager/management/azure-subscription-service-limits.md#azure-vmware-solution-limits)
223223

224224
## SRM licenses
225225

@@ -299,4 +299,4 @@ VMware and Microsoft support teams will engage each other as needed to troublesh
299299
- [vSphere Replication administration](https://docs.vmware.com/en/vSphere-Replication/8.2/com.vmware.vsphere.replication-admin.doc/GUID-35C0A355-C57B-430B-876E-9D2E6BE4DDBA.html)
300300
- [Pre-requisites and Best Practices for SRM installation](https://docs.vmware.com/en/Site-Recovery-Manager/8.3/com.vmware.srm.install_config.doc/GUID-BB0C03E4-72BE-4C74-96C3-97AC6911B6B8.html)
301301
- [Network ports for SRM](https://docs.vmware.com/en/Site-Recovery-Manager/8.3/com.vmware.srm.install_config.doc/GUID-499D3C83-B8FD-4D4C-AE3D-19F518A13C98.html)
302-
- [Network ports for vSphere Replication](https://kb.vmware.com/s/article/2087769)
302+
- [Network ports for vSphere Replication](https://kb.vmware.com/s/article/2087769)

0 commit comments

Comments
 (0)