Skip to content

Commit a0a0e90

Browse files
authored
Merge pull request #179010 from MicrosoftDocs/master
11/08 8AM OOB Publish
2 parents 27ddccf + b51dead commit a0a0e90

File tree

61 files changed

+521
-502
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

61 files changed

+521
-502
lines changed

articles/active-directory-b2c/identity-provider-azure-ad-single-tenant.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ If you want to get the `family_name` and `given_name` claims from Azure AD, you
7676
1. Select **Add optional claim**.
7777
1. For the **Token type**, select **ID**.
7878
1. Select the optional claims to add, `family_name` and `given_name`.
79-
1. Click **Add**.
79+
1. Select **Add**. If **Turn on the Microsoft Graph email permission (required for claims to appear in token)** appears, enable it, and then select **Add** again.
8080
8181
## [Optional] Verify your app authenticity
8282
@@ -97,8 +97,7 @@ If you want to get the `family_name` and `given_name` claims from Azure AD, you
9797
https://login.microsoftonline.com/{tenant}/v2.0/.well-known/openid-configuration
9898
```
9999
100-
For example, `https://login.microsoftonline.com/contoso.onmicrosoft.com/v2.0/.well-known/openid-configuration`.
101-
For example, `https://login.microsoftonline.com/contoso.com/v2.0/.well-known/openid-configuration`.
100+
For example, `https://login.microsoftonline.com/contoso.onmicrosoft.com/v2.0/.well-known/openid-configuration`. If you use a custom domain, replace `contoso.com` with your custom domain in `https://login.microsoftonline.com/contoso.com/v2.0/.well-known/openid-configuration`.
102101
103102
1. For **Client ID**, enter the application ID that you previously recorded.
104103
1. For **Client secret**, enter the client secret that you previously recorded.
@@ -121,7 +120,8 @@ At this point, the Azure AD identity provider has been set up, but it's not yet
121120
122121
1. In your Azure AD B2C tenant, select **User flows**.
123122
1. Click the user flow that you want to add the Azure AD identity provider.
124-
1. Under the **Social identity providers**, select **Contoso Azure AD**.
123+
1. Under **Settings**, select **Identity providers**
124+
1. Under **Custom identity providers**, select **Contoso Azure AD**.
125125
1. Select **Save**.
126126
1. To test your policy, select **Run user flow**.
127127
1. For **Application**, select a web application that you [previously registered](tutorial-register-applications.md). The **Reply URL** should show `https://jwt.ms`.

articles/active-directory/conditional-access/concept-condition-filters-for-devices.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Use filter for devices in Conditional Access to enhance security po
44
ms.service: active-directory
55
ms.subservice: conditional-access
66
ms.topic: conceptual
7-
ms.date: 10/26/2021
7+
ms.date: 11/08/2021
88

99
ms.author: joflore
1010
author: MicrosoftGuyJFlo
@@ -19,7 +19,6 @@ When creating Conditional Access policies, administrators have asked for the abi
1919

2020
:::image type="content" source="media/concept-condition-filters-for-devices/create-filter-for-devices-condition.png" alt-text="Creating a filter for device in Conditional Access policy conditions":::
2121

22-
2322
## Common scenarios
2423

2524
There are multiple scenarios that organizations can now enable using filter for devices condition. Below are some core scenarios with examples of how to use this new condition.
@@ -84,6 +83,10 @@ Policy 2: All users with the directory role of Global administrator, accessing t
8483
1. Confirm your settings and set **Enable policy** to **On**.
8584
1. Select **Create** to create to enable your policy.
8685

86+
### Setting attribute values
87+
88+
Setting extension attributes is made possible through the Graph API. For more information about setting device attributes, see the article [Update device](/graph/api/device-update?view=graph-rest-1.0&tabs=http#example-2--write-extensionattributes-on-a-device).
89+
8790
### Filter for devices Graph API
8891

8992
The filter for devices API is available in Microsoft Graph v1.0 endpoint and can be accessed using https://graph.microsoft.com/v1.0/identity/conditionalaccess/policies/. You can configure a filter for devices when creating a new Conditional Access policy or you can update an existing policy to configure the filter for devices condition. To update an existing policy, you can do a patch call on the Microsoft Graph v1.0 endpoint mentioned above by appending the policy ID of an existing policy and executing the following request body. The example here shows configuring a filter for devices condition excluding device that are not marked as SAW devices. The rule syntax can consist of more than one single expression. To learn more about the syntax, see [dynamic membership rules for groups in Azure Active Directory](../enterprise-users/groups-dynamic-membership.md).
@@ -139,6 +142,7 @@ The filter for devices condition in Conditional Access evaluates policy based on
139142

140143
## Next steps
141144

145+
- [Update device Graph API](/graph/api/device-update?view=graph-rest-1.0&tabs=http)
142146
- [Conditional Access: Conditions](concept-conditional-access-conditions.md)
143147
- [Common Conditional Access policies](concept-conditional-access-policy-common.md)
144148
- [Securing devices as part of the privileged access story](/security/compass/privileged-access-devices)

articles/active-directory/verifiable-credentials/decentralized-identifier-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -122,6 +122,6 @@ The roles in this scenario are:
122122

123123
Now that you know about DIDs and verifiable credentials try them yourself by following our get started article or one of our articles providing more detail on verifiable credential concepts.
124124

125-
- [Get started with verifiable credentials](get-started-verifiable-credentials.md)
125+
- [Get started with verifiable credentials](verifiable-credentials-configure-tenant.md)
126126
- [How to customize your credentials](credential-design.md)
127127
- [Verifiable credentials FAQ](verifiable-credentials-faq.md)

articles/aks/availability-zones.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,15 +27,20 @@ AKS clusters can currently be created using availability zones in the following
2727
* Australia East
2828
* Brazil South
2929
* Canada Central
30+
* Central India
3031
* Central US
32+
* East Asia
3133
* East US
3234
* East US 2
3335
* France Central
3436
* Germany West Central
3537
* Japan East
38+
* Korea Central
3639
* North Europe
40+
* Norway East
3741
* Southeast Asia
3842
* South Central US
43+
* Sweden Central
3944
* UK South
4045
* US Gov Virginia
4146
* West Europe

articles/app-service/deploy-staging-slots.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -213,7 +213,7 @@ For more information on customizing the `applicationInitialization` element, see
213213

214214
You can also customize the warm-up behavior with one or both of the following [app settings](configure-common.md):
215215

216-
- `WEBSITE_SWAP_WARMUP_PING_PATH`: The path to ping to warm up your site. Add this app setting by specifying a custom path that begins with a slash as the value. An example is `/statuscheck`. The default value is `/`.
216+
- `WEBSITE_SWAP_WARMUP_PING_PATH`: The path to ping over HTTP to warm up your site. Add this app setting by specifying a custom path that begins with a slash as the value. An example is `/statuscheck`. The default value is `/`.
217217
- `WEBSITE_SWAP_WARMUP_PING_STATUSES`: Valid HTTP response codes for the warm-up operation. Add this app setting with a comma-separated list of HTTP codes. An example is `200,202` . If the returned status code isn't in the list, the warmup and swap operations are stopped. By default, all response codes are valid.
218218
- `WEBSITE_WARMUP_PATH`: A relative path on the site that should be pinged whenever the site restarts (not only during slot swaps). Example values include `/statuscheck` or the root path, `/`.
219219

articles/app-service/reference-app-settings.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -293,7 +293,7 @@ For more information on deployment slots, see [Set up staging environments in Az
293293
|`WEBSITE_SLOT_NAME`| Read-only. Name of the current deployment slot. The name of the production slot is `Production`. ||
294294
|`WEBSITE_OVERRIDE_STICKY_EXTENSION_VERSIONS`| By default, the versions for site extensions are specific to each slot. This prevents unanticipated application behavior due to changing extension versions after a swap. If you want the extension versions to swap as well, set to `1` on *all slots*. ||
295295
|`WEBSITE_OVERRIDE_PRESERVE_DEFAULT_STICKY_SLOT_SETTINGS`| Designates certain settings as [sticky or not swappable by default](deploy-staging-slots.md#which-settings-are-swapped). Default is `true`. Set this setting to `false` or `0` for *all deployment slots* to make them swappable instead. There's no fine-grain control for specific setting types. ||
296-
|`WEBSITE_SWAP_WARMUP_PING_PATH`| Path to ping to warm up the target slot in a swap, beginning with a slash. The default is `/`, which pings the root path. | `/statuscheck` |
296+
|`WEBSITE_SWAP_WARMUP_PING_PATH`| Path to ping to warm up the target slot in a swap, beginning with a slash. The default is `/`, which pings the root path over HTTP. | `/statuscheck` |
297297
|`WEBSITE_SWAP_WARMUP_PING_STATUSES`| Valid HTTP response codes for the warm-up operation during a swap. If the returned status code isn't in the list, the warmup and swap operations are stopped. By default, all response codes are valid. | `200,202` |
298298
| `WEBSITE_SLOT_NUMBER_OF_TIMEOUTS_BEFORE_RESTART` | During a slot swap, maximum number of timeouts after which we force restart the site on a specific VM instance. The default is `3`. ||
299299
| `WEBSITE_SLOT_MAX_NUMBER_OF_TIMEOUTS` | During a slot swap, maximum number of timeout requests for a single URL to make before giving up. The default is `5`. ||
Lines changed: 98 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,98 @@
1+
---
2+
title: Automatic Extension Upgrade (preview) for Azure Arc-enabled servers
3+
description: Learn how to enable the Automatic Extension Upgrade (preview) for your Azure Arc-enabled servers.
4+
ms.topic: conceptual
5+
ms.date: 11/06/2021
6+
---
7+
8+
# Automatic Extension Upgrade (preview) for Azure Arc-enabled servers
9+
10+
Automatic Extension Upgrade (preview) is available for Azure Arc-enabled servers that have supported VM extensions installed. When Automatic Extension Upgrade (preview) is enabled on a machine, the extension is upgraded automatically whenever the extension publisher releases a new version for that extension.
11+
12+
Automatic Extension Upgrade has the following features:
13+
14+
- You can opt in and out of automatic upgrades at any time.
15+
- Each supported extension is enrolled individually, and you can choose which extensions to upgrade automatically.
16+
- Supported in all public cloud regions.
17+
18+
> [!NOTE]
19+
> In this release, only the Azure CLI is supported to configure Automatic Extension Upgrade.
20+
21+
## How does Automatic Extension Upgrade work?
22+
23+
The extension upgrade process replaces the existing Azure VM extension version supported by Azure Arc-enabled servers with a new version of the same extension when published by the extension publisher.
24+
25+
A failed extension update is automatically retried. A retry is attempted every few days automatically without user intervention.
26+
27+
### Availability-first updates
28+
29+
The availability-first model for platform orchestrated updates ensures that availability configurations in Azure are respected across multiple availability levels.
30+
31+
For a group of Arc-enabled servers undergoing an update, the Azure platform will orchestrate updates following the model described in the [Automation Extension Upgrade](../../virtual-machines/automatic-extension-upgrade.md#availability-first-updates). However, there are some notable differences between Arc-enabled servers and Azure VMs:
32+
33+
**Across regions:**
34+
35+
- Geo-paired regions are not applicable.
36+
37+
**Within a region:**
38+
39+
- Availability Zones are not applicable.
40+
- Machines are batched on a best effort basis to avoid concurrent updates for all machines registered with Arc-enabled servers in a subscription.
41+
42+
## Supported extensions
43+
44+
Automatic Extension Upgrade (preview) supports the following extensions (and more are added periodically):
45+
46+
- Azure Monitor Agent - Linux and Windows
47+
- Azure Security agent - Linux and Windows
48+
- Dependency agent – Linux and Windows
49+
- Key Vault Extension - Linux only
50+
- Log Analytics agent (OMS agent) - Linux only
51+
52+
## Enabling Automatic Extension Upgrade (preview)
53+
54+
To enable Automatic Extension Upgrade (preview) for an extension, you must ensure the property `enable-auto-upgrade` is set to `true` and added to every extension definition individually.
55+
56+
Use the [az connectedmachine extension](/cli/azure/connectedmachine/extension) cmdlet with the `--name`, `--machine-name`, `--enable-auto-upgrade`, and `--resource-group` parameters.
57+
58+
```azurecli
59+
az connectedmachine extension update \
60+
--resource-group resourceGroupName \
61+
--machine-name machineName \
62+
--name DependencyAgentLinux \
63+
--enable-auto-upgrade true
64+
```
65+
66+
To check the status of Automatic Extension Upgrade (preview) for all extensions on an Arc-enabled server, run the following command:
67+
68+
```azurecli
69+
az connectedmachine extension list --resource-group resourceGroupName --machine-name machineName --query "[].{Name:name, AutoUpgrade:properties.enableAutoUpgrade}" --output table
70+
```
71+
72+
## Extension upgrades with multiple extensions
73+
74+
A machine managed by Arc-enabled servers can have multiple extensions with automatic extension upgrade enabled. The same machine can also have other extensions without automatic extension upgrade enabled.
75+
76+
If multiple extension upgrades are available for a machine, the upgrades may be batched together, but each extension upgrade is applied individually on a machine. A failure on one extension does not impact the other extension(s) to be upgraded. For example, if two extensions are scheduled for an upgrade, and the first extension upgrade fails, the second extension will still be upgraded.
77+
78+
## Disable Automatic Extension Upgrade
79+
80+
To disable Automatic Extension Upgrade (preview) for an extension, you must ensure the property `enable-auto-upgrade` is set to `false` and added to every extension definition individually.
81+
82+
### Using the Azure CLI
83+
84+
Use the [az connectedmachine extension ](/cli/azure/connectedmachine/extension) cmdlet with the `--name`, `--machine-name`, `--enable-auto-upgrade`, and `--resource-group` parameters.
85+
86+
```azurecli
87+
az connectedmachine extension update \
88+
--resource-group resourceGroupName \
89+
--machine-name machineName \
90+
--name DependencyAgentLinux \
91+
--enable-auto-upgrade false
92+
```
93+
94+
## Next steps
95+
96+
- You can deploy, manage, and remove VM extensions using the [Azure CLI](manage-vm-extensions-cli.md), [PowerShell](manage-vm-extensions-powershell.md), or [Azure Resource Manager templates](manage-vm-extensions-template.md).
97+
98+
- Troubleshooting information can be found in the [Troubleshoot VM extensions guide](troubleshoot-vm-extensions.md).

articles/azure-arc/servers/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -73,6 +73,8 @@
7373
href: manage-vm-extensions-powershell.md
7474
- name: Deploy extensions using ARM template
7575
href: manage-vm-extensions-template.md
76+
- name: Automatic extension upgrade
77+
href: manage-automatic-vm-extension-upgrade.md
7678
- name: Use managed identities on server
7779
href: managed-identity-authentication.md
7880
- name: Manage agent

articles/azure-functions/create-first-function-cli-csharp.md

Lines changed: 4 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -8,31 +8,22 @@ adobe-target: true
88
adobe-target-activity: DocsExp–386541–A/B–Enhanced-Readability-Quickstarts–2.19.2021
99
adobe-target-experience: Experience B
1010
adobe-target-content: ./create-first-function-cli-csharp-ieux
11-
zone_pivot_groups: runtime-version-programming-functions
1211
---
1312

1413
# Quickstart: Create a C# function in Azure from the command line
1514

16-
[!INCLUDE [functions-runtime-version-dotnet](../../includes/functions-runtime-version-dotnet.md)]
17-
1815
In this article, you use command-line tools to create a C# function that responds to HTTP requests. After testing the code locally, you deploy it to the serverless environment of Azure Functions.
1916

2017
[!INCLUDE [functions-dotnet-execution-model](../../includes/functions-dotnet-execution-model.md)]
2118

22-
Completing this quickstart incurs a small cost of a few USD cents or less in your Azure account.
19+
This article creates an HTTP triggered function that runs on .NET 6.0. There is also a [Visual Studio Code-based version](create-first-function-vs-code-csharp.md) of this article.
2320

24-
There is also a [Visual Studio Code-based version](create-first-function-vs-code-csharp.md) of this article.
21+
Completing this quickstart incurs a small cost of a few USD cents or less in your Azure account.
2522

2623
## Configure your local environment
2724

2825
Before you begin, you must have the following:
2926

30-
::: zone pivot="programming-runtime-functions-v3"
31-
[!INCLUDE [functions-cli-dotnet-prerequisites](../../includes/functions-cli-dotnet-prerequisites.md)]
32-
::: zone-end
33-
::: zone pivot="programming-runtime-functions-v4"
34-
# [In-process](#tab/in-process)
35-
3627
+ [.NET 6.0 SDK](https://dotnet.microsoft.com/download)
3728

3829
+ [Azure Functions Core Tools](./functions-run-local.md#v2) version 4.x.
@@ -43,22 +34,6 @@ Before you begin, you must have the following:
4334

4435
+ The Azure [Az PowerShell module](/powershell/azure/install-az-ps) version 5.9.0 or later.
4536

46-
# [Isolated process](#tab/isolated-process)
47-
48-
+ [.NET 6.0 SDK](https://dotnet.microsoft.com/download/dotnet/6.0)
49-
50-
+ [.NET Core 3.1 SDK](https://dotnet.microsoft.com/download). Required by the build process.
51-
52-
+ [Azure Functions Core Tools](./functions-run-local.md#v2) version 4.x.
53-
54-
+ One of the following tools for creating Azure resources:
55-
56-
+ [Azure CLI](/cli/azure/install-azure-cli) version 2.4 or later.
57-
58-
+ The Azure [Az PowerShell module](/powershell/azure/install-az-ps) version 5.9.0 or later.
59-
---
60-
::: zone-end
61-
6237
You also need an Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?ref=microsoft.com&utm_source=microsoft.com&utm_medium=docs&utm_campaign=visualstudio).
6338

6439
### Prerequisite check
@@ -67,7 +42,7 @@ Verify your prerequisites, which depend on whether you are using Azure CLI or Az
6742

6843
# [Azure CLI](#tab/azure-cli)
6944

70-
+ In a terminal or command window, run `func --version` to check that the Azure Functions Core Tools are version 3.x.
45+
+ In a terminal or command window, run `func --version` to check that the Azure Functions Core Tools are version 4.x.
7146

7247
+ Run `dotnet --list-sdks` to check that the required versions are installed.
7348

@@ -77,7 +52,7 @@ Verify your prerequisites, which depend on whether you are using Azure CLI or Az
7752

7853
# [Azure PowerShell](#tab/azure-powershell)
7954

80-
+ In a terminal or command window, run `func --version` to check that the Azure Functions Core Tools are version 3.x.
55+
+ In a terminal or command window, run `func --version` to check that the Azure Functions Core Tools are version 4.x.
8156

8257
+ Run `dotnet --list-sdks` to check that the required versions are installed.
8358

@@ -227,10 +202,8 @@ To learn more, see [Azure Functions HTTP triggers and bindings](./functions-bind
227202

228203
---
229204

230-
::: zone pivot="programming-runtime-functions-v4"
231205
> [!NOTE]
232206
> This command creates a function app using the 3.x version of the Azure Functions runtime. The `func azure functionapp publish` command that you'll run later updates the app to version 4.x.
233-
::: zone-end
234207

235208
In the previous example, replace `<STORAGE_NAME>` with the name of the account you used in the previous step, and replace `<APP_NAME>` with a globally unique name appropriate to you. The `<APP_NAME>` is also the default DNS domain for the function app.
236209

articles/azure-functions/create-first-function-cli-java.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Before you begin, you must have the following:
2929

3030
+ An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?ref=microsoft.com&utm_source=microsoft.com&utm_medium=docs&utm_campaign=visualstudio).
3131

32-
+ The [Azure Functions Core Tools](functions-run-local.md#v2) version 3.x..
32+
+ The [Azure Functions Core Tools](functions-run-local.md#v2) version 4.x.
3333

3434
+ The [Azure CLI](/cli/azure/install-azure-cli) version 2.4 or later.
3535

@@ -39,7 +39,7 @@ Before you begin, you must have the following:
3939

4040
### Prerequisite check
4141

42-
+ In a terminal or command window, run `func --version` to check that the Azure Functions Core Tools are version 3.x.
42+
+ In a terminal or command window, run `func --version` to check that the Azure Functions Core Tools are version 4.x.
4343

4444
+ Run `az --version` to check that the Azure CLI version is 2.4 or later.
4545

0 commit comments

Comments
 (0)