Skip to content

Commit 9f24eb6

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into ds-updatetoc1
2 parents 2ac791a + 6ca4c34 commit 9f24eb6

21 files changed

+151
-125
lines changed

articles/active-directory/app-provisioning/how-provisioning-works.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: app-provisioning
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 12/10/2019
12+
ms.date: 05/20/2020
1313
ms.author: mimart
1414
ms.reviewer: arvinh
1515
---
@@ -59,7 +59,7 @@ When you configure provisioning to a SaaS application, one of the types of attri
5959

6060
For outbound provisioning from Azure AD to a SaaS application, relying on [user or group assignments](../manage-apps/assign-user-or-group-access-portal.md) is the most common way to determine which users are in scope for provisioning. Because user assignments are also used for enabling single sign-on, the same method can be used for managing both access and provisioning. Assignment-based scoping doesn't apply to inbound provisioning scenarios such as Workday and Successfactors.
6161

62-
* **Groups.** With an Azure AD Premium license plan, you can use groups to assign access to a SaaS application. Then, when the provisioning scope is set to **Sync only assigned users and groups**, the Azure AD provisioning service will provision or de-provision users based on whether they're members of a group that's assigned to the application. The group object itself isn't provisioned unless the application supports group objects. Ensure that groups assigned to your application have the property "SecurityEnabled" set to "False".
62+
* **Groups.** With an Azure AD Premium license plan, you can use groups to assign access to a SaaS application. Then, when the provisioning scope is set to **Sync only assigned users and groups**, the Azure AD provisioning service will provision or de-provision users based on whether they're members of a group that's assigned to the application. The group object itself isn't provisioned unless the application supports group objects. Ensure that groups assigned to your application have the property "SecurityEnabled" set to "True".
6363

6464
* **Dynamic groups.** The Azure AD user provisioning service can read and provision users in [dynamic groups](../users-groups-roles/groups-create-rule.md). Keep these caveats and recommendations in mind:
6565

articles/active-directory/manage-apps/configure-user-consent.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ To configure user consent settings through the Azure portal:
4444
1. Under **User consent for applications**, select which consent setting you'd like to configure for all users.
4545
1. Select **Save** to save your settings.
4646

47-
![User consent settings](./media/configure-user-consent/configure-consent-setting-for-all-users.png)
47+
![User consent settings](./media/configure-user-consent/setting-for-all-users.png)
4848

4949
> [!TIP]
5050
> Consider [enabling the admin consent workflow](configure-admin-consent-workflow.md) to allow users to request an administrator's review and approval of an application that the user is not allowed to consent to--for example, when user consent has been disabled or when an application is requesting permissions that the user is not allowed to grant.
@@ -97,7 +97,7 @@ Permission classifications allow you to identify the impact that different permi
9797

9898
In this example, we've classified the minimum set of permission required for single sign-on:
9999

100-
![Permission classifications](./media/configure-user-consent/configure-permission-classifications.png)
100+
![Permission classifications](./media/configure-user-consent/permission-classifications.png)
101101

102102
> [!TIP]
103103
> For the Microsoft Graph API, the minimum permissions needed to do basic single sign on are `openid`, `profile`, `User.Read` and `offline_access`. With these permissions an app can read the profile details of the signed-in user and can maintain this access even when the user is no longer using the app.
@@ -187,7 +187,7 @@ You can configure which users are allowed to consent to apps accessing their gro
187187

188188
In this example, all group owners are allowed to consent to apps accessing their groups' data:
189189

190-
![Permission classifications](./media/configure-user-consent/configure-group-owner-consent.png)
190+
![Permission classifications](./media/configure-user-consent/group-owner-consent.png)
191191

192192
### Configure group owner consent using PowerShell
193193

articles/azure-resource-manager/templates/deployment-script-template.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: azure-resource-manager
55
author: mumian
66
ms.service: azure-resource-manager
77
ms.topic: conceptual
8-
ms.date: 05/06/2020
8+
ms.date: 05/20/2020
99
ms.author: jgao
1010

1111
---
@@ -250,6 +250,8 @@ You can control how PowerShell responds to non-terminating errors by using the [
250250

251251
Setting environment variables (EnvironmentVariable) in your container instances allows you to provide dynamic configuration of the application or script run by the container. Deployment script handles non-secured and secured environment variables in the same way as Azure Container Instance. For more information, see [Set environment variables in container instances](../../container-instances/container-instances-environment-variables.md#secure-values).
252252

253+
The max allowed size for environment variables is 64KB.
254+
253255
## Debug deployment scripts
254256

255257
The script service creates a [storage account](../../storage/common/storage-account-overview.md) (unless you specify an existing storage account) and a [container instance](../../container-instances/container-instances-overview.md) for script execution. If these resources are automatically created by the script service, both resources have the **azscripts** suffix in the resource names.

articles/backup/backup-azure-sap-hana-database.md

Lines changed: 33 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -27,66 +27,61 @@ In this article, you will learn how to:
2727

2828
Refer to the [prerequisites](tutorial-backup-sap-hana-db.md#prerequisites) and the [What the pre-registration script does](tutorial-backup-sap-hana-db.md#what-the-pre-registration-script-does) sections to set up the database for backup.
2929

30-
### Set up network connectivity
30+
### Establish network connectivity
3131

32-
For all operations, the SAP HANA VM requires connectivity to Azure public IP addresses. VM operations (database discovery, configure backups, schedule backups, restore recovery points, and so on) fail without connectivity to Azure public IP addresses.
32+
For all operations, an SAP HANA database running on an Azure VM requires connectivity to the Azure Backup service, Azure Storage, and Azure Active Directory. This can be achieved by using private endpoints or by allowing access to the required public IP addresses or FQDNs. Not allowing proper connectivity to the required Azure services may lead to failure in operations like database discovery, configuring backup, performing backups, and restoring data.
3333

34-
Establish connectivity by using one of the following options:
34+
The following table lists the various alternatives you can use for establishing connectivity:
3535

36-
#### Allow the Azure datacenter IP ranges
36+
| **Option** | **Advantages** | **Disadvantages** |
37+
| --------------------------------- | ------------------------------------------------------------ | ------------------------------------------------------------ |
38+
| Private endpoints | Allow backups over private IPs inside the virtual network <br><br> Provide granular control on the network and vault side | Incurs standard private endpoint [costs](https://azure.microsoft.com/pricing/details/private-link/) |
39+
| NSG service tags | Easier to manage as range changes are automatically merged <br><br> No additional costs | Can be used with NSGs only <br><br> Provides access to the entire service |
40+
| Azure Firewall FQDN tags | Easier to manage since the required FQDNs are automatically managed | Can be used with Azure Firewall only |
41+
| Allow access to service FQDNs/IPs | No additional costs <br><br> Works with all network security appliances and firewalls | A broad set of IPs or FQDNs may be required to be accessed |
42+
| Use an HTTP proxy | Single point of internet access to VMs | Additional costs to run a VM with the proxy software |
3743

38-
This option allows the [IP ranges](https://www.microsoft.com/download/details.aspx?id=41653) in the downloaded file. To access a network security group (NSG), use the Set-AzureNetworkSecurityRule cmdlet. If your safe recipients list only includes region-specific IPs, you'll also need to update the safe recipients list the Azure Active Directory (Azure AD) service tag to enable authentication.
44+
More details around using these options are shared below:
3945

40-
#### Allow access using NSG tags
46+
#### Private endpoints
4147

42-
If you use NSG to restrict connectivity, then you should use AzureBackup service tag to allows outbound access to Azure Backup. In addition, you should also allow connectivity for authentication and data transfer by using [rules](https://docs.microsoft.com/azure/virtual-network/security-overview#service-tags) for Azure AD and Azure Storage. This can be done from the Azure portal or via PowerShell.
48+
Private endpoints allow you to connect securely from servers inside a virtual network to your Recovery Services vault. The private endpoint uses an IP from the VNET address space for your vault. The network traffic between your resources inside the virtual network and the vault travels over your virtual network and a private link on the Microsoft backbone network. This eliminates exposure from the public internet. Read more on private endpoints for Azure Backup [here](https://docs.microsoft.com/azure/backup/private-endpoints).
4349

44-
To create a rule using the portal:
50+
#### NSG tags
4551

46-
1. In **All Services**, go to **Network security groups** and select the network security group.
47-
2. Select **Outbound security rules** under **Settings**.
48-
3. Select **Add**. Enter all the required details for creating a new rule as described in [security rule settings](https://docs.microsoft.com/azure/virtual-network/manage-network-security-group#security-rule-settings). Ensure the option **Destination** is set to **Service Tag** and **Destination service tag** is set to **AzureBackup**.
49-
4. Click **Add**, to save the newly created outbound security rule.
52+
If you use Network Security Groups (NSG), use the *AzureBackup* service tag to allow outbound access to Azure Backup. In addition to the Azure Backup tag, you also need to allow connectivity for authentication and data transfer by creating similar [NSG rules](https://docs.microsoft.com/azure/virtual-network/security-overview#service-tags) for *Azure AD* and *Azure Storage*. The following steps describe the process to create a rule for the Azure Backup tag:
5053

51-
To create a rule using PowerShell:
54+
1. In **All Services**, go to **Network security groups** and select the network security group.
5255

53-
1. Add Azure account credentials and update the national clouds<br/>
54-
`Add-AzureRmAccount`<br/>
56+
1. Select **Outbound security rules** under **Settings**.
5557

56-
2. Select the NSG subscription<br/>
57-
`Select-AzureRmSubscription "<Subscription Id>"`
58+
1. Select **Add**. Enter all the required details for creating a new rule as described in [security rule settings](https://docs.microsoft.com/azure/virtual-network/manage-network-security-group#security-rule-settings). Ensure the option **Destination** is set to *Service Tag* and **Destination service tag** is set to *AzureBackup*.
5859

59-
3. Select the NSG<br/>
60-
`$nsg = Get-AzureRmNetworkSecurityGroup -Name "<NSG name>" -ResourceGroupName "<NSG resource group name>"`
60+
1. Click **Add** to save the newly created outbound security rule.
6161

62-
4. Add allow outbound rule for Azure Backup service tag<br/>
63-
`Add-AzureRmNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name "AzureBackupAllowOutbound" -Access Allow -Protocol * -Direction Outbound -Priority <priority> -SourceAddressPrefix * -SourcePortRange * -DestinationAddressPrefix "AzureBackup" -DestinationPortRange 443 -Description "Allow outbound traffic to Azure Backup service"`
62+
You can similarly create NSG outbound security rules for Azure Storage and Azure AD.
6463

65-
5. Add allow outbound rule for Storage service tag<br/>
66-
`Add-AzureRmNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name "StorageAllowOutbound" -Access Allow -Protocol * -Direction Outbound -Priority <priority> -SourceAddressPrefix * -SourcePortRange * -DestinationAddressPrefix "Storage" -DestinationPortRange 443 -Description "Allow outbound traffic to Azure Backup service"`
64+
#### Azure Firewall tags
6765

68-
6. Add allow outbound rule for AzureActiveDirectory service tag<br/>
69-
`Add-AzureRmNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name "AzureActiveDirectoryAllowOutbound" -Access Allow -Protocol * -Direction Outbound -Priority <priority> -SourceAddressPrefix * -SourcePortRange * -DestinationAddressPrefix "AzureActiveDirectory" -DestinationPortRange 443 -Description "Allow outbound traffic to AzureActiveDirectory service"`
66+
If you're using Azure Firewall, create an application rule by using the *AzureBackup* [Azure Firewall FQDN tag](https://docs.microsoft.com/azure/firewall/fqdn-tags). This allows all outbound access to Azure Backup.
7067

71-
7. Save the NSG<br/>
72-
`Set-AzureRmNetworkSecurityGroup -NetworkSecurityGroup $nsg`
68+
#### Allow access to service IP ranges
7369

74-
**Allow access by using Azure Firewall tags**. If you're using Azure Firewall, create an application rule by using the AzureBackup [FQDN tag](https://docs.microsoft.com/azure/firewall/fqdn-tags). This allows outbound access to Azure Backup.
70+
If you choose to allow access service IPs, refer to the IP ranges in the JSON file available [here](https://www.microsoft.com/download/confirmation.aspx?id=56519). You'll need to allow access to IPs corresponding to Azure Backup, Azure Storage, and Azure Active Directory.
7571

76-
**Deploy an HTTP proxy server to route traffic**. When you back up an SAP HANA database on an Azure VM, the backup extension on the VM uses the HTTPS APIs to send management commands to Azure Backup and data to Azure Storage. The backup extension also uses Azure AD for authentication. Route the backup extension traffic for these three services through the HTTP proxy. The extensions are the only component that's configured for access to the public internet.
72+
#### Allow access to service FQDNs
7773

78-
Connectivity options include the following advantages and disadvantages:
74+
You can also use the following FQDNs to allow access to the required services from your servers:
7975

80-
**Option** | **Advantages** | **Disadvantages**
81-
--- | --- | ---
82-
Allow IP ranges | No additional costs | Complex to manage because the IP address ranges change over time <br/><br/> Provides access to the whole of Azure, not just Azure Storage
83-
Use NSG service tags | Easier to manage as range changes are automatically merged <br/><br/> No additional costs <br/><br/> | Can be used with NSGs only <br/><br/> Provides access to the entire service
84-
Use Azure Firewall FQDN tags | Easier to manage as the required FQDNs are automatically managed | Can be used with Azure Firewall only
85-
Use an HTTP proxy | Granular control in the proxy over the storage URLs is allowed <br/><br/> Single point of internet access to VMs <br/><br/> Not subject to Azure IP address changes | Additional costs to run a VM with the proxy software
76+
| Service | Domain names to be accessed |
77+
| -------------- | ------------------------------------------------------------ |
78+
| Azure Backup | `*.backup.windowsazure.com` |
79+
| Azure Storage | `*.blob.core.windows.net` <br><br> `*.queue.core.windows.net` |
80+
| Azure AD | Allow access to FQDNs under sections 56 and 59 according to [this article](https://docs.microsoft.com/office365/enterprise/urls-and-ip-address-ranges#microsoft-365-common-and-office-online) |
8681

87-
#### Private Endpoints
82+
#### Use an HTTP proxy server to route traffic
8883

89-
[!INCLUDE [Private Endpoints](../../includes/backup-private-endpoints.md)]
84+
When you back up an SAP HANA database running on an Azure VM, the backup extension on the VM uses the HTTPS APIs to send management commands to Azure Backup and data to Azure Storage. The backup extension also uses Azure AD for authentication. Route the backup extension traffic for these three services through the HTTP proxy. Use the list of IPs and FQDNs mentioned above for allowing access to the required services. Authenticated proxy servers aren't supported.
9085

9186
[!INCLUDE [How to create a Recovery Services vault](../../includes/backup-create-rs-vault.md)]
9287

0 commit comments

Comments
 (0)