Skip to content

Commit a28b0f1

Browse files
committed
fix merge conflicts
2 parents 61fd7a0 + e994fef commit a28b0f1

File tree

98 files changed

+1124
-482
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

98 files changed

+1124
-482
lines changed

articles/active-directory/develop/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -183,6 +183,8 @@
183183
href: app-resilience-continuous-access-evaluation.md
184184
- name: Claims challenges and requests
185185
href: claims-challenge.md
186+
- name: Configure app instance property lock
187+
href: howto-configure-app-instance-property-locks.md
186188
- name: Test
187189
items:
188190
- name: Build a test environment
Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
---
2+
title: "How to configure app instance property lock in your applications"
3+
description: How to increase app security by configuring property modification locks for sensitive properties of the application.
4+
services: active-directory
5+
manager: saumadan
6+
ms.service: active-directory
7+
ms.subservice: develop
8+
ms.topic: conceptual
9+
ms.workload: identity
10+
ms.date: 11/03/2022
11+
author: madansr7
12+
ms.author: saumadan
13+
ms.reviewer:
14+
# Customer intent: As an application developer, I want to learn how to protect properties of my application instance of being modified.
15+
---
16+
# How to configure app instance property lock for your applications (Preview)
17+
18+
Application instance lock is a feature in Azure Active Directory (Azure AD) that allows sensitive properties of a multi-tenant application object to be locked for modification after the application is provisioned in another tenant.
19+
This feature provides application developers with the ability to lock certain properties if the application doesn't support scenarios that require configuring those properties.
20+
21+
22+
## What are sensitive properties?
23+
24+
The following property usage scenarios are considered as sensitive:
25+
26+
- Credentials (`keyCredentials`, `passwordCredentials`) where usage type is `Sign`. This is a scenario where your application supports a SAML flow.
27+
- Credentials (`keyCredentials`, `passwordCredentials`) where usage type is `Verify`. In this scenario, your application supports an OIDC client credentials flow.
28+
- `TokenEncryptionKeyId` which specifies the keyId of a public key from the keyCredentials collection. When configured, Azure AD encrypts all the tokens it emits by using the key to which this property points. The application code that receives the encrypted token must use the matching private key to decrypt the token before it can be used for the signed-in user.
29+
30+
## Configure an app instance lock
31+
32+
To configure an app instance lock using the Azure portal:
33+
34+
1. Sign in to the <a href="https://portal.azure.com/" target="_blank">Azure portal</a>.
35+
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="./media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant that contains the app registration you want to configure.
36+
1. Search for and select **Azure Active Directory**.
37+
1. Under **Manage**, select **App registrations**, and then select the application you want to configure.
38+
1. Select **Authentication**, and then select **Configure** under the *App instance property lock* section.
39+
40+
:::image type="content" source="media/howto-configure-app-instance-property-locks/app-instance-lock-configure-overview.png" alt-text="Screenshot of an app registration's app instance lock in the Azure portal.":::
41+
42+
2. In the **App instance property lock** pane, enter the settings for the lock. The table following the image describes each setting and their parameters.
43+
44+
:::image type="content" source="media/howto-configure-app-instance-property-locks/app-instance-lock-configure-properties.png" alt-text="Screenshot of an app registration's app instance property lock context pane in the Azure portal.":::
45+
46+
| Field | Description |
47+
| ---------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
48+
| **Enable property lock** | Specifies if the property locks are enabled. |
49+
| **All properties** | Locks all sensitive properties without needing to select each property scenario. |
50+
| **Credentials used for verification** | Locks the ability to add or update credential properties (`keyCredentials`, `passwordCredentials`) where usage type is `verify`. |
51+
| **Credentials used for signing tokens** | Locks the ability to add or update credential properties (`keyCredentials`, `passwordCredentials`) where usage type is `sign`. |
52+
| **Token Encryption KeyId** | Locks the ability to change the `tokenEncryptionKeyId` property. |
53+
54+
3. Select **Save** to save your changes.
Loading
Loading

articles/active-directory/governance/tutorial-onboard-custom-workflow-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ Use the following steps to create a pre-hire workflow that will generate a TAP a
6767

6868
:::image type="content" source="media/tutorial-lifecycle-workflows/configure-scope.png" alt-text="Screenshot of selecting a configuration scope." lightbox="media/tutorial-lifecycle-workflows/configure-scope.png":::
6969

70-
8. Next, you will configure the scope. The scope determines which users this workflow will run against. In this case, it will be on all users in the Sales department. On the configure scope screen, under **Rule** add the following settings and then select **Next: Review tasks**
70+
8. Next, you will configure the scope. The scope determines which users this workflow will run against. In this case, it will be on all users in the Sales department. On the configure scope screen, under **Rule** add the following settings and then select **Next: Review tasks**. For a full list of supported user properties, see: [Supported user properties and query parameters](/graph/api/resources/identitygovernance-rulebasedsubjectset?view=graph-rest-beta#supported-user-properties-and-query-parameters)
7171

7272
:::image type="content" source="media/tutorial-lifecycle-workflows/review-tasks.png" alt-text="Screenshot of selecting review tasks." lightbox="media/tutorial-lifecycle-workflows/review-tasks.png":::
7373

articles/active-directory/governance/tutorial-scheduled-leaver-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ Use the following steps to create a scheduled leaver workflow that will configur
5050
7. Next, you will configure the basic information about the workflow. This information includes when the workflow will trigger, known as **Days from event**. So in this case, the workflow will trigger seven days after the employee's leave date. On the post-offboarding of an employee screen, add the following settings and then select **Next: Configure Scope**.
5151
:::image type="content" source="media/tutorial-lifecycle-workflows/leaver-basics.png" alt-text="Screenshot of leaver template basics information for a workflow." lightbox="media/tutorial-lifecycle-workflows/leaver-basics.png":::
5252

53-
8. Next, you will configure the scope. The scope determines which users this workflow will run against. In this case, it will be on all users in the Marketing department. On the configure scope screen, under **Rule** add the following and then select **Next: Review tasks**.
53+
8. Next, you will configure the scope. The scope determines which users this workflow will run against. In this case, it will be on all users in the Marketing department. On the configure scope screen, under **Rule** add the following and then select **Next: Review tasks**. For a full list of supported user properties, see: [Supported user properties and query parameters](/graph/api/resources/identitygovernance-rulebasedsubjectset?view=graph-rest-beta#supported-user-properties-and-query-parameters)
5454
:::image type="content" source="media/tutorial-lifecycle-workflows/leaver-scope.png" alt-text="Screenshot of reviewing scope details for a leaver workflow." lightbox="media/tutorial-lifecycle-workflows/leaver-scope.png":::
5555

5656
9. On the following page, you may inspect the tasks if desired but no additional configuration is needed. Select **Next: Select users** when you are finished.

articles/aks/concepts-network.md

Lines changed: 18 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -10,9 +10,10 @@ ms.custom: fasttrack-edit
1010
# Network concepts for applications in Azure Kubernetes Service (AKS)
1111

1212
In a container-based, microservices approach to application development, application components work together to process their tasks. Kubernetes provides various resources enabling this cooperation:
13-
* You can connect to and expose applications internally or externally.
14-
* You can build highly available applications by load balancing your applications.
15-
* For your more complex applications, you can configure ingress traffic for SSL/TLS termination or routing of multiple components.
13+
14+
* You can connect to and expose applications internally or externally.
15+
* You can build highly available applications by load balancing your applications.
16+
* For your more complex applications, you can configure ingress traffic for SSL/TLS termination or routing of multiple components.
1617
* For security reasons, you can restrict the flow of network traffic into or between pods and nodes.
1718

1819
This article introduces the core concepts that provide networking to your applications in AKS:
@@ -27,9 +28,11 @@ This article introduces the core concepts that provide networking to your applic
2728
To allow access to your applications or between application components, Kubernetes provides an abstraction layer to virtual networking. Kubernetes nodes connect to a virtual network, providing inbound and outbound connectivity for pods. The *kube-proxy* component runs on each node to provide these network features.
2829

2930
In Kubernetes:
30-
* *Services* logically group pods to allow for direct access on a specific port via an IP address or DNS name.
31-
* You can distribute traffic using a *load balancer*.
32-
* More complex routing of application traffic can also be achieved with *Ingress Controllers*.
31+
32+
* *Services* logically group pods to allow for direct access on a specific port via an IP address or DNS name.
33+
* You can distribute traffic using a *load balancer*.
34+
* More complex routing of application traffic can also be achieved with *Ingress Controllers*.
35+
* You can *control outbound (egress) traffic* for cluster nodes.
3336
* Security and filtering of the network traffic for pods is possible with Kubernetes *network policies*.
3437

3538
The Azure platform also simplifies virtual networking for AKS clusters. When you create a Kubernetes load balancer, you also create and configure the underlying Azure load balancer resource. As you open network ports to pods, the corresponding Azure network security group rules are configured. For HTTP application routing, Azure can also configure *external DNS* as new ingress routes are configured.
@@ -158,6 +161,7 @@ The LoadBalancer only works at layer 4. At layer 4, the Service is unaware of th
158161
![Diagram showing Ingress traffic flow in an AKS cluster][aks-ingress]
159162

160163
### Create an ingress resource
164+
161165
In AKS, you can create an Ingress resource using NGINX, a similar tool, or the AKS HTTP application routing feature. When you enable HTTP application routing for an AKS cluster, the Azure platform creates the Ingress controller and an *External-DNS* controller. As new Ingress resources are created in Kubernetes, the required DNS A records are created in a cluster-specific DNS zone.
162166

163167
For more information, see [Deploy HTTP application routing][aks-http-routing].
@@ -180,11 +184,17 @@ Configure your ingress controller to preserve the client source IP on requests t
180184

181185
If you're using client source IP preservation on your ingress controller, you can't use TLS pass-through. Client source IP preservation and TLS pass-through can be used with other services, such as the *LoadBalancer* type.
182186

187+
## Control outbound (egress) traffic
188+
189+
AKS clusters are deployed on a virtual network and have outbound dependencies on services outside of that virtual network. These outbound dependencies are almost entirely defined with fully qualified domain names (FQDNs). By default, AKS clusters have unrestricted outbound (egress) internet access. This allows the nodes and services you run to access external resources as needed. If desired, you can restrict outbound traffic.
190+
191+
For more information, see [Control egress traffic for cluster nodes in AKS][limit-egress].
192+
183193
## Network security groups
184194

185195
A network security group filters traffic for VMs like the AKS nodes. As you create Services, such as a LoadBalancer, the Azure platform automatically configures any necessary network security group rules.
186196

187-
You don't need to manually configure network security group rules to filter traffic for pods in an AKS cluster. Simply define any required ports and forwarding as part of your Kubernetes Service manifests. Let the Azure platform create or update the appropriate rules.
197+
You don't need to manually configure network security group rules to filter traffic for pods in an AKS cluster. Simply define any required ports and forwarding as part of your Kubernetes Service manifests. Let the Azure platform create or update the appropriate rules.
188198

189199
You can also use network policies to automatically apply traffic filter rules to pods.
190200

@@ -237,3 +247,4 @@ For more information on core Kubernetes and AKS concepts, see the following arti
237247
[use-network-policies]: use-network-policies.md
238248
[operator-best-practices-network]: operator-best-practices-network.md
239249
[support-policies]: support-policies.md
250+
[limit-egress]: limit-egress-traffic.md

articles/attestation/claim-sets.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -199,7 +199,7 @@ The following claims are additionally supported by the SevSnpVm attestation type
199199
200200
- **x-ms-sevsnpvm-authorkeydigest**: SHA384 hash of the author signing key
201201
- **x-ms-sevsnpvm-bootloader-svn** :AMD boot loader security version number (SVN)
202-
- **x-ms-sevsnpvm-familyId**: HCL family identification string
202+
- **x-ms-sevsnpvm-familyId**: Host Compatibility Layer (HCL) family identification string
203203
- **x-ms-sevsnpvm-guestsvn**: HCL security version number (SVN)
204204
- **x-ms-sevsnpvm-hostdata**: Arbitrary data defined by the host at VM launch time
205205
- **x-ms-sevsnpvm-idkeydigest**: SHA384 hash of the identification signing key

articles/azure-arc/kubernetes/tutorial-use-gitops-connected-cluster.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,6 @@
11
---
22
title: 'Tutorial: Deploy configurations using GitOps on an Azure Arc-enabled Kubernetes cluster'
33
description: This tutorial demonstrates applying configurations on an Azure Arc-enabled Kubernetes cluster. For a conceptual take on this process, see the Configurations and GitOps - Azure Arc-enabled Kubernetes article.
4-
author: csand-msft
5-
ms.author: csand
64
ms.service: azure-arc
75
ms.topic: tutorial
86
ms.date: 05/24/2022

articles/azure-netapp-files/whats-new.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.service: azure-netapp-files
1212
ms.workload: storage
1313
ms.tgt_pltfrm: na
1414
ms.topic: overview
15-
ms.date: 11/03/2022
15+
ms.date: 11/07/2022
1616
ms.author: anfdocs
1717
---
1818
# What's new in Azure NetApp Files
@@ -21,6 +21,8 @@ Azure NetApp Files is updated regularly. This article provides a summary about t
2121

2222
## November 2022
2323

24+
* [Azure NetApp Files datastores for Azure VMware Solution](../azure-vmware/attach-azure-netapp-files-to-azure-vmware-solution-hosts.md) is now generally available (GA) with expanded regional coverage.
25+
2426
* [Encrypted SMB connections to Domain Controller](create-active-directory-connections.md#encrypted-smb-dc) (Preview)
2527

2628
With the Encrypted SMB connections to Active Directory Domain Controller capability you can now specify whether encryption should be used for communication between SMB server and domain controller in Active Directory connections. When enabled, only SMB3 will be used for encrypted domain controller connections.

0 commit comments

Comments
 (0)