You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
If you disabled the strong [password complexity](password-complexity.md), update the password policy to [DisableStrongPassword](user-profile-attributes.md#password-policy-attribute):
134
135
136
+
> [!NOTE]
137
+
> After the user resets their password, the passwordPolicies will be changed back to DisablePasswordExpiration
Copy file name to clipboardExpand all lines: articles/aks/configure-azure-cni.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -145,7 +145,7 @@ The following screenshot from the Azure portal shows an example of configuring t
145
145
146
146
## Dynamic allocation of IPs and enhanced subnet support
147
147
148
-
A drawback with the traditional CNI is the exhaustion of pod IP addresses as the AKS cluster grows, resulting in the need to rebuild the entire cluster in a bigger subnet. The new dynamic IP allocation capability in Azure CNI solves this problem by allotting pod IPs from a subnet separate from the subnet hosting the AKS cluster. It offers the following benefits:
148
+
A drawback with the traditional CNI is the exhaustion of pod IP addresses as the AKS cluster grows, resulting in the need to rebuild the entire cluster in a bigger subnet. The new dynamic IP allocation capability in Azure CNI solves this problem by allocating pod IPs from a subnet separate from the subnet hosting the AKS cluster. It offers the following benefits:
149
149
150
150
***Better IP utilization**: IPs are dynamically allocated to cluster Pods from the Pod subnet. This leads to better utilization of IPs in the cluster compared to the traditional CNI solution, which does static allocation of IPs for every node.
Copy file name to clipboardExpand all lines: articles/container-registry/container-registry-tutorial-sign-build-push.md
+29-21Lines changed: 29 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,18 +33,18 @@ In this tutorial:
33
33
> [!NOTE]
34
34
> The tutorial uses early released versions of notation and notation plugins.
35
35
36
-
1. Install notation with plugin support from the [release version](https://github.com/notaryproject/notation/releases/)
36
+
1. Install notation 0.11.0-alpha.4 with plugin support on a Linux environment. You can also download the package for other environments from the [release page](https://github.com/notaryproject/notation/releases/tag/v0.11.0-alpha.4).
tar xvzf notation-azure-kv.tar.gz -C ~/.config/notation/plugins/azure-kv notation-azure-kv
63
63
```
64
64
65
-
3. List the available plugins and verify that the plugin is available
65
+
3. List the available plugins and verify that the plugin is available.
66
66
67
67
```bash
68
68
notation plugin ls
@@ -73,7 +73,7 @@ In this tutorial:
73
73
> [!NOTE]
74
74
> For easy execution of commands in the tutorial, provide values for the Azure resources to match the existing ACR and AKV resources.
75
75
76
-
1. Configure AKV resource names
76
+
1. Configure AKV resource names.
77
77
78
78
```bash
79
79
# Name of the existing Azure Key Vault used to store the signing keys
@@ -84,7 +84,7 @@ In this tutorial:
84
84
CERT_PATH=./${KEY_NAME}.pem
85
85
```
86
86
87
-
2. Configure ACR and image resource names
87
+
2. Configure ACR and image resource names.
88
88
89
89
```bash
90
90
# Name of the existing registry example: myregistry.azurecr.io
@@ -106,7 +106,7 @@ Otherwise create an x509 self-signed certificate storing it in AKV for remote si
106
106
107
107
### Create a self-signed certificate (Azure CLI)
108
108
109
-
1. Create a certificate policy file
109
+
1. Create a certificate policy file.
110
110
111
111
Once the certificate policy file is executed as below, it creates a valid signing certificate compatible with **notation**in AKV. The EKU listed is for code-signing, but isn't required for notation to sign artifacts.
112
112
@@ -128,32 +128,32 @@ Otherwise create an x509 self-signed certificate storing it in AKV for remote si
128
128
EOF
129
129
```
130
130
131
-
1. Create the certificate
131
+
1. Create the certificate.
132
132
133
133
```azure-cli
134
134
az keyvault certificate create -n $KEY_NAME --vault-name $AKV_NAME -p @my_policy.json
- Sign the container image with the default JWS signature envelope:
188
+
181
189
```bash
182
190
notation sign --key $KEY_NAME $IMAGE
183
191
```
184
-
192
+
185
193
## View the graph of artifacts with the ORAS CLI
186
194
187
-
ACR support for ORAS artifacts enables a linked graph of supply chain artifacts that can be viewed through the ORAS CLI or the Azure CLI
195
+
ACR support for ORAS artifacts enables a linked graph of supply chain artifacts that can be viewed through the ORAS CLI or the Azure CLI.
188
196
189
-
1. Signed images can be view with the ORAS CLI
197
+
1. Signed images can be view with the ORAS CLI.
190
198
191
199
```bash
192
200
oras login -u $USER_NAME -p $PASSWORD $REGISTRY
@@ -195,7 +203,7 @@ ACR support for ORAS artifacts enables a linked graph of supply chain artifacts
195
203
196
204
## View the graph of artifacts with the Azure CLI
197
205
198
-
1. List the manifest details for the container image
206
+
1. List the manifest details for the container image.
199
207
200
208
```azure-cli
201
209
az acr manifest show-metadata $IMAGE -o jsonc
@@ -248,4 +256,4 @@ notation verify $IMAGE
248
256
249
257
## Next steps
250
258
251
-
[Enforce policy to only deploy signed container images to Azure Kubernetes Service (AKS) utilizing **ratify** and **gatekeeper**.](https://github.com/Azure/notation-azure-kv/blob/main/docs/nv2-sign-verify-aks.md)
259
+
See [Enforce policy to only deploy signed container images to Azure Kubernetes Service (AKS) utilizing **ratify** and **gatekeeper**.](https://github.com/Azure/notation-azure-kv/blob/main/docs/nv2-sign-verify-aks.md)
Copy file name to clipboardExpand all lines: articles/virtual-wan/how-to-routing-policies.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,7 +36,7 @@ While Private Traffic includes both branch and Virtual Network address prefixes
36
36
37
37
***Internet Traffic Routing Policy**: When an Internet Traffic Routing Policy is configured on a Virtual WAN hub, all branch (User VPN (Point-to-site VPN), Site-to-site VPN, and ExpressRoute) and Virtual Network connections to that Virtual WAN Hub will forward Internet-bound traffic to the Azure Firewall resource, Third-Party Security provider or **Network Virtual Appliance** specified as part of the Routing Policy.
38
38
39
-
In other words, when Traffic Routing Policy is configured on a Virtual WAN hub, the Virtual WAN will advertise a **default** route to all spokes, Gateways and Network Virtual Appliances (deployed in the hub or spoke). This includes the **Network Virtual Appliance** that is the next hop for the Itnernet Traffic routing policy.
39
+
In other words, when Traffic Routing Policy is configured on a Virtual WAN hub, the Virtual WAN will advertise a **default** route to all spokes, Gateways and Network Virtual Appliances (deployed in the hub or spoke). This includes the **Network Virtual Appliance** that is the next hop for the Internet Traffic routing policy.
40
40
41
41
***Private Traffic Routing Policy**: When a Private Traffic Routing Policy is configured on a Virtual WAN hub, **all** branch and Virtual Network traffic in and out of the Virtual WAN Hub including inter-hub traffic will be forwarded to the Next Hop Azure Firewall resource or Network Virtual Appliance resource that was specified in the Private Traffic Routing Policy.
0 commit comments