You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/how-to-mfa-number-match.md
+3-7Lines changed: 3 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,9 +4,9 @@ description: Learn how to use number matching in MFA notifications
4
4
ms.service: active-directory
5
5
ms.subservice: authentication
6
6
ms.topic: conceptual
7
-
ms.date: 01/31/2023
7
+
ms.date: 02/03/2023
8
8
ms.author: justinha
9
-
author: mjsantani
9
+
author: justinha
10
10
ms.collection: M365-identity-device-management
11
11
12
12
# Customer intent: As an identity administrator, I want to encourage users to use the Microsoft Authenticator app in Azure AD to improve and secure user sign-in events.
@@ -305,7 +305,7 @@ GET https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationM
305
305
306
306
### When will my tenant see number matching if I don't use the Azure portal or Graph API to roll out the change?
307
307
308
-
Number match will be enabled for all users of Microsoft Authenticator after February 27, 2023. Relevant services will begin deploying these changes after February 27, 2023 and users will start to see number match in approval requests. As services deploy, some may see number match while others don't. To ensure consistent behavior for all your users, we highly recommend you use the Azure portal or Graph API to roll out number match for all Microsoft Authenticator users.
308
+
Number match will be enabled for all users of Microsoft Authenticator push notifications after February 27, 2023. Relevant services will begin deploying these changes after February 27, 2023 and users will start to see number match in approval requests. As services deploy, some may see number match while others don't. To ensure consistent behavior for all your users, we highly recommend you use the Azure portal or Graph API to roll out number match for all Microsoft Authenticator users.
309
309
310
310
### Will the changes after February 27th, 2023, override number matching settings that are configured for a group in the Authentication methods policy?
311
311
@@ -362,10 +362,6 @@ If the user has a different default authentication method, there won't be any ch
362
362
363
363
Regardless of their default method, any user who is prompted to sign-in with Authenticator push notifications will see number match after February 27th, 2023. If the user is prompted for another method, they won't see any change.
364
364
365
-
### Will users who don't use number matching be able to perform MFA?
366
-
367
-
It depends on how the **Enable and Target** tab is configured. The scope for number match approvals will change under the **Configure** tab to include everyone, but it only applies for users and groups targeted on the **Enable and Target** tab for Push or Any. However, if Target on the **Enable and Target** tab is set to specific groups for Push or Any, and the user isn't a member of those groups, then they won't receive the number matching approvals once the change is implemented after February 27th, 2023 because they aren't a member of the groups defined on the **Enable and Target** tab for Push and/or Any.
368
-
369
365
### Is number matching supported with MFA Server?
370
366
371
367
No, number matching isn't enforced because it's not a supported feature for MFA Server, which is [deprecated](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/microsoft-entra-change-announcements-september-2022-train/ba-p/2967454).
Copy file name to clipboardExpand all lines: articles/active-directory/multi-tenant-organizations/cross-tenant-synchronization-configure.md
+22-2Lines changed: 22 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.workload: identity
9
9
ms.subservice: multi-tenant-organizations
10
10
ms.topic: how-to
11
-
ms.date: 02/01/2023
11
+
ms.date: 02/03/2023
12
12
ms.author: rolyon
13
13
ms.custom: it-pro
14
14
@@ -118,7 +118,7 @@ In this step, you automatically redeem invitations in the source tenant.
118
118
119
119
1. Select **Save**.
120
120
121
-
## Step 5: Create a configuration application in the source tenant
121
+
## Step 5: Create a configuration in the source tenant
122
122
123
123
<br/>**Source tenant**
124
124
@@ -454,6 +454,26 @@ Restoring a previously soft-deleted user in the target tenant isn't supported.
454
454
455
455
Manually restore the soft-deleted user in the target tenant. For more information, see [Restore or remove a recently deleted user using Azure Active Directory](../fundamentals/active-directory-users-restore.md).
456
456
457
+
#### Symptom - Unable to delete a configuration
458
+
459
+
On the **Configurations** page, there isn't a way to delete a configuration.
460
+
461
+
**Cause**
462
+
463
+
Currently, there isn't a way to delete a configuration on the **Configurations** page. Instead, you must delete the configuration in **Enterprise applications**.
464
+
465
+
**Solution**
466
+
467
+
1. In the source tenant, select **Azure Active Directory** > **Enterprise applications**.
468
+
469
+
1. In the list of all applications, find the name of your configuration. If necessary, you can search by the configuration name.
470
+
471
+
1. Select the configuration and then select **Properties**.
472
+
473
+
1. Select **Delete** and then **Yes** to delete the configuration.
474
+
475
+
:::image type="content" source="./media/cross-tenant-synchronization-configure/enterprise-applications-configuration-delete.png" alt-text="Screenshot of the Enterprise applications Properties page showing how to delete a configuration." lightbox="./media/cross-tenant-synchronization-configure/enterprise-applications-configuration-delete.png":::
476
+
457
477
## Next steps
458
478
459
479
-[Tutorial: Reporting on automatic user account provisioning](../app-provisioning/check-status-user-account-provisioning.md)
Copy file name to clipboardExpand all lines: articles/aks/image-cleaner.md
+56-6Lines changed: 56 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,15 +5,15 @@ ms.author: nickoman
5
5
author: nickomang
6
6
services: container-service
7
7
ms.topic: article
8
-
ms.date: 12/14/2022
8
+
ms.date: 02/03/2023
9
9
---
10
10
11
11
# Use Image Cleaner to clean up stale images on your Azure Kubernetes Service cluster (preview)
12
12
13
-
It's common to use pipelines to build and deploy images on Azure Kubernetes Service (AKS) clusters. While great for image creation, this process often doesn't account for the stale images left behind and can lead to image bloat on cluster nodes. These images can present security issues as they may contain vulnerabilities. By cleaning these unreferenced images, you can remove an area of risk in your clusters. When done manually, this process can be time intensive, which Image Cleaner can mitigate via automatic image identification and removal.
13
+
It's common to use pipelines to build and deploy images on Azure Kubernetes Service (AKS) clusters. While great for image creation, this process often doesn't account for the stale images left behind and can lead to image bloat on cluster nodes. These images can present security issues as they may contain vulnerabilities. By cleaning these unreferenced images, you can remove an area of risk in your clusters. When done manually, this process can be time intensive, which Image Cleaner can mitigate via automatic image identification and removal.
14
14
15
15
> [!NOTE]
16
-
> Image Cleaner is a feature based on [Eraser](https://github.com/Azure/eraser).
16
+
> Image Cleaner is a feature based on [Eraser](https://github.com/Azure/eraser).
17
17
> On an AKS cluster, the feature name and property name is `Image Cleaner` while the relevant Image Cleaner pods' names contain `Eraser`.
18
18
19
19
[!INCLUDE [preview features callout](./includes/preview/preview-callout.md)]
@@ -92,8 +92,7 @@ When enabled, an `eraser-controller-manager` pod is deployed on each agent node,
92
92
93
93
Once an `ImageList` is generated, Image Cleaner will remove all the images in the list from node VMs.
94
94
95
-
96
-
:::image type="content" source="./media/image-cleaner/image-cleaner.jpg" alt-text="A diagram showing ImageCleaner's workflow. The ImageCleaner pods running on the cluster can generate an ImageList, or manual input can be provided.":::
95
+
:::image type="content" source="./media/image-cleaner/image-cleaner.jpg" alt-text="Screenshot of a diagram showing ImageCleaner's workflow. The ImageCleaner pods running on the cluster can generate an ImageList, or manual input can be provided.":::
97
96
98
97
## Configuration options
99
98
@@ -167,7 +166,58 @@ az aks update -g MyResourceGroup -n MyManagedCluster
167
166
168
167
## Logging
169
168
170
-
The deletion logs are stored in the `image-cleaner-kind-worker` pods. You can check these via `kubectl logs` or via the Container Insights pod log table if the [Azure Monitor add-on](./monitor-aks.md) is enabled.
169
+
Deletion image logs are stored in `eraser-aks-nodepool-xxx` pods for manually deleted images, and in `eraser-collector-xxx` pods for automatically deleted images.
170
+
171
+
You can view these logs by running `kubectl logs <pod name> -n kubesystem`. However, this command may return only the most recent logs, since older logs are routinely deleted. To view all logs, follow these steps to enable the [Azure Monitor add-on](./monitor-aks.md) and use the Container Insights pod log table.
172
+
173
+
1. Ensure that Azure monitoring is enabled on the cluster. For detailed steps, see [Enable Container Insights for AKS cluster](../azure-monitor/containers/container-insights-enable-aks.md#existing-aks-cluster).
174
+
175
+
1. Get the Log Analytics resource ID:
176
+
177
+
```azurecli
178
+
az aks show -g <resourceGroupofAKSCluster> -n <nameofAksCluster>
179
+
```
180
+
181
+
After a few minutes, the command returns JSON-formatted information about the solution, including the workspace resource ID:
1. In the Azure portal, search for the workspace resource ID, then select **Logs**.
195
+
196
+
1. Copy this query into the table, replacing `name` with either `eraser-aks-nodepool-xxx` (for manual mode) or `eraser-collector-xxx` (for automatic mode).
197
+
198
+
```kusto
199
+
let startTimestamp = ago(1h);
200
+
KubePodInventory
201
+
| where TimeGenerated > startTimestamp
202
+
| project ContainerID, PodName=Name, Namespace
203
+
| where PodName contains "name" and Namespace startswith "kube-system"
204
+
| distinct ContainerID, PodName
205
+
| join
206
+
(
207
+
ContainerLog
208
+
| where TimeGenerated > startTimestamp
209
+
)
210
+
on ContainerID
211
+
// at this point before the next pipe, columns from both tables are available to be "projected". Due to both
212
+
// tables having a "Name" column, we assign an alias as PodName to one column which we actually want
Copy file name to clipboardExpand all lines: articles/azure-arc/servers/prerequisites.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,7 +38,7 @@ The following versions of the Windows and Linux operating system are officially
38
38
* SUSE Linux Enterprise Server (SLES) 12 and 15
39
39
* Red Hat Enterprise Linux (RHEL) 7, 8 and 9
40
40
* Amazon Linux 2
41
-
* Oracle Linux 7
41
+
* Oracle Linux 7 and 8
42
42
43
43
> [!NOTE]
44
44
> On Linux, Azure Arc-enabled servers install several daemon processes. We only support using systemd to manage these processes. In some environments, systemd may not be installed or available, in which case Arc-enabled servers are not supported, even if the distribution is otherwise supported. These environments include **Windows Subsystem for Linux** (WSL) and most container-based systems, such as Kubernetes or Docker. The Azure Connected Machine agent can be installed on the node that runs the containers but not inside the containers themselves.
0 commit comments