Skip to content

Commit a49bd71

Browse files
authored
Merge pull request #223840 from MicrosoftDocs/main
1/12 PM Publish
2 parents 0d148d6 + cdec748 commit a49bd71

File tree

190 files changed

+1402
-1288
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

190 files changed

+1402
-1288
lines changed

articles/active-directory/develop/howto-configure-publisher-domain.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,7 @@ You're not required to maintain the resources that are used for verification aft
116116
If your tenant has verified domains, in the **Select a verified domain** dropdown, select one of the domains.
117117

118118
> [!NOTE]
119-
> The expected `Content-Type` header that should return is `application/json`. If you use any other header, like `application/json; charset=utf-8`, you might see this error message:
119+
> Content will be interpreted as UTF-8 JSON for deserialization. Supported `Content-Type` headers that should return are `application/json`, `application/json; charset=utf-8`, or ` `. If you use any other header, you might see this error message:
120120
>
121121
> `Verification of publisher domain failed. Error getting JSON file from https:///.well-known/microsoft-identity-association. The server returned an unexpected content type header value.`
122122
>

articles/active-directory/fundamentals/whats-new.md

Lines changed: 11 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -83,20 +83,6 @@ In this Public Preview refresh, we have enhanced the user experience with an upd
8383

8484
For more information, see: [Conditional Access templates (Preview)](../conditional-access/concept-conditional-access-policy-common.md).
8585

86-
87-
---
88-
89-
### Public Preview - Enabling customization capabilities for the conditional error messages in Company Branding.
90-
91-
92-
93-
**Type:** New feature
94-
**Service category:** Other
95-
**Product capability:** End User Experiences
96-
97-
Updates to the Company Branding functionality on the Azure AD/Microsoft 365 login experience, to allow customizing conditional access (CA) error messages. For more information, see: [Company Branding](../fundamentals/customize-branding.md).
98-
99-
10086
---
10187

10288
### Public Preview - Admins can restrict their users from creating tenants
@@ -223,31 +209,33 @@ For listing your application in the Azure AD app gallery, please read the detail
223209

224210
### ADAL End of Support Announcement
225211

226-
227-
228212
**Type:** N/A
229213
**Service category:** Other
230214
**Product capability:** Developer Experience
231215

232-
As part of our ongoing initiative to improve the developer experience, service reliability, and security of customer applications, we will end support for the Azure Active Directory Authentication Library (ADAL). The final deadline to migrate your applications to Microsoft Authentication Library (MSAL) has been extended to **June 1, 2023**.
216+
As part of our ongoing initiative to improve the developer experience, service reliability, and security of customer applications, we will end support for the Azure Active Directory Authentication Library (ADAL). The final deadline to migrate your applications to Microsoft Authentication Library (MSAL) has been extended to **June 30, 2023**.
217+
218+
### Why are we doing this?
233219

234-
### Why are we doing this?
235220
As we consolidate and evolve the Microsoft Identity platform, we are also investing in making significant improvements to the developer experience and service features that make it possible to build secure, robust and resilient applications. To make these features available to our customers we needed to update the architecture of our software development kits. As a result of this change, we’ve decided that the path forward requires us to sunset ADAL so that we can focus on developer experience investments with MSAL.
236221

237-
### What happens?
238-
We recognize that changing libraries is not an easy task, and cannot be accomplished quickly. We are committed to helping customers plan their migrations to MSAL as well as execute them with minimal disruption.
222+
### What happens?
223+
224+
We recognize that changing libraries is not an easy task, and cannot be accomplished quickly. We are committed to helping customers plan their migrations to MSAL as well as execute them with minimal disruption.
225+
239226
- In June 2020 we [announced the 2-year end of support timeline for ADAL](https://devblogs.microsoft.com/microsoft365dev/end-of-support-timelines-for-azure-ad-authentication-library-adal-and-azure-ad-graph/).
240227
- In December 2022 we’ve decided to extend the ADAL end of support to June 2023.
241228
- Through the next six months (January 2023 – June 2023) we will continue informing customers about the upcoming end of support along with providing guidance on migration.
242229
- On June 2023 we will officially sunset ADAL, removing library documentation and archiving all GitHub repositories related to the project.
243230

244-
### How to find out which applications in my tenant are using ADAL?
231+
### How to find out which applications in my tenant are using ADAL?
245232

246233
Refer to our post on [Microsoft Q&A](/answers/questions/360928/information-how-to-find-apps-using-adal-in-your-te.html) for details on identifying ADAL apps with the help of [Azure Workbooks](../../azure-monitor/visualize/workbooks-overview.md).
247234
### If I’m using ADAL, what can I expect after the deadline?
235+
248236
- There will be no new releases (security or otherwise) to the library after June 2023.
249-
- We will not be accepting any incident reports or support requests for ADAL. ADAL to MSAL Migration support would continue.
250-
- The underpinning services will continue working and applications that depend on ADAL should continue working; however, applications will be at increased security and reliability risk due to not having the latest updates, service configuration, and enhancements made available through the Microsoft Identity platform.
237+
- We will not be accepting any incident reports or support requests for ADAL. ADAL to MSAL migration support would continue.
238+
- The underpinning services will continue working and applications that depend on ADAL should continue working; however, applications and the resources they access will be at increased security and reliability risk due to not having the latest updates, service configuration, and enhancements made available through the Microsoft Identity platform.
251239

252240
### What features can I only access with MSAL?
253241

@@ -558,18 +546,6 @@ Beginning September 30, 2024, Azure Multi-Factor Authentication Server deploymen
558546

559547
---
560548

561-
### General Availability - Change of Default User Consent Settings
562-
563-
564-
565-
**Type:** New feature
566-
**Service category:** Enterprise Apps
567-
**Product capability:** Developer Experience
568-
569-
Starting Sept 30th, 2022, Microsoft will require all new tenants to follow a new user consent configuration. While this won't impact any existing tenants that were created before September 30, 2022, all new tenants created after September 30, 2022, will have the default setting of “Enable automatic updates (Recommendation)” under User consent settings. This change reduces the risk of malicious applications attempting to trick users into granting them access to your organization's data. For more information, see: [Configure how users consent to applications](../manage-apps/configure-user-consent.md).
570-
571-
---
572-
573549
### Public Preview - Lifecycle Workflows is now available
574550

575551

articles/active-directory/hybrid/how-to-connect-group-writeback-enable.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,10 @@ Group writeback requires enabling both the original and new versions of the feat
2929
>
3030
>The enhanced group writeback feature is enabled on the tenant and not per Azure AD Connect client instance. Please be sure that all Azure AD Connect client instances are updated to a minimal build version of 1.6.4.0 or later.
3131
32+
> [!NOTE]
33+
> If you don't want to writeback all existing Microsoft 365 groups to Active Directory, you need to make changes to group writeback default behaviour before performing the steps in this article to enable the feature. See [Modify Azure AD Connect group writeback default behavior](how-to-connect-modify-group-writeback.md).
34+
> Also the new and original versions of the feature need to be enabled in the order documented. If the original feature is enabled first, all existing Microsoft 365 groups will be written back to Active Directory.
35+
3236
### Enable group writeback by using PowerShell
3337

3438
1. On your Azure AD Connect server, open a PowerShell prompt as an administrator.

articles/active-directory/hybrid/how-to-connect-group-writeback-v2.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,10 @@ You can modify the default behavior as follows:
118118
- Microsoft 365 groups with up to 250,000 members can be written back to on-premises.
119119

120120
If you plan to make changes to the default behavior, we recommend that you do so before you enable group writeback. However, you can still modify the default behavior if group writeback is already enabled. For more information, see [Modify Azure AD Connect group writeback default behavior](how-to-connect-modify-group-writeback.md).
121-
121+
122+
> [!NOTE]
123+
> You need to make these changes before enabling group writeback; otherwise, all existing Microsoft 365 groups will be automatically written back to Active Directory. Also, the new and original versions of the feature need to be enabled in the order documented. If the original feature is enabled first, all existing Microsoft 365 groups will be written back to Active Directory.
124+
122125
## Understand limitations of public preview 
123126

124127
Although this release has undergone extensive testing, you might still encounter issues. One of the goals of this public preview release is to find and fix any issues before the feature moves to general availability. Please also note that any public preview functionality can still receive breaking changes which may require you to make changes to you configuration to continue using this feature. We may also decide to change or remove certain functionality without prior notice.
@@ -143,4 +146,4 @@ These limitations and known issues are specific to group writeback:
143146

144147
- [Modify Azure AD Connect group writeback default behavior](how-to-connect-modify-group-writeback.md)
145148
- [Enable Azure AD Connect group writeback](how-to-connect-group-writeback-enable.md)
146-
- [Disable Azure AD Connect group writeback](how-to-connect-group-writeback-disable.md)
149+
- [Disable Azure AD Connect group writeback](how-to-connect-group-writeback-disable.md)

articles/active-directory/manage-apps/protect-against-consent-phishing.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ Administrators should be in control of application use by providing the right in
6262
- Block [consent phishing emails with Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/set-up-anti-phishing-policies#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365) by protecting against phishing campaigns where an attacker is impersonating a known user in the organization.
6363
- Configure Microsoft Defender for Cloud Apps policies to help manage abnormal application activity in the organization. For example, [activity policies](/cloud-app-security/user-activity-policies), [anomaly detection](/cloud-app-security/anomaly-detection-policy), and [OAuth app policies](/cloud-app-security/app-permission-policy).
6464
- Investigate and hunt for consent phishing attacks by following the guidance on [advanced hunting with Microsoft 365 Defender](/microsoft-365/security/defender/advanced-hunting-overview).
65-
- Allow access to trusted applications that meet certain criteria and that protect against those applications that don't:
65+
- Allow access to trusted applications that meet certain criteria and protect against those applications that don't:
6666
- [Configure user consent settings](./configure-user-consent.md?tabs=azure-portal) to allow users to only consent to applications that meet certain criteria, such as applications developed by your organization or from verified publishers and only for low risk permissions you select.
6767
- Use applications that have been publisher verified. [Publisher verification](../develop/publisher-verification-overview.md) helps administrators and users understand the authenticity of application developers through a Microsoft supported vetting process. Even if an application does have a verified publisher, it is still important to review the consent prompt to understand and evaluate the request. For example, reviewing the permissions being requested to ensure they align with the scenario the app is requesting them to enable, additional app and publisher details on the consent prompt, etc.
6868
- Create proactive [application governance](/microsoft-365/compliance/app-governance-manage-app-governance) policies to monitor third-party application behavior on the Microsoft 365 platform to address common suspicious application behaviors.
@@ -72,3 +72,4 @@ Administrators should be in control of application use by providing the right in
7272
- [Application consent grant investigation](/security/compass/incident-response-playbook-app-consent)
7373
- [Managing access to applications](./what-is-access-management.md)
7474
- [Restrict user consent operations in Azure AD](../../security/fundamentals/steps-secure-identity.md#restrict-user-consent-operations)
75+
- [Compromised and malicious applications investigation](/security/compass/incident-response-playbook-compromised-malicious-app)

articles/aks/azure-cni-overlay.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,6 @@ Use the traditional VNet option when:
8686

8787
The overlay solution has the following limitations today
8888

89-
* Only available for Linux and not for Windows.
9089
* You can't deploy multiple overlay clusters on the same subnet.
9190
* Overlay can be enabled only for new clusters. Existing (already deployed) clusters can't be configured to use overlay.
9291
* You can't use Application Gateway as an Ingress Controller (AGIC) for an overlay cluster.

articles/aks/node-updates-kured.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ helm repo update
6767
kubectl create namespace kured
6868

6969
# Install kured in that namespace with Helm 3 (only on Linux nodes, kured is not working on Windows nodes)
70-
helm install my-release kubereboot/kured --namespace kured --set nodeSelector."kubernetes.io/os"=linux
70+
helm install my-release kubereboot/kured --namespace kured --set nodeSelector."kubernetes\.io/os"=linux
7171
```
7272

7373
You can also configure additional parameters for `kured`, such as integration with Prometheus or Slack. For more information about additional configuration parameters, see the [kured Helm chart][kured-install].

articles/aks/support-policies.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -127,17 +127,17 @@ Although you can sign in to and change agent nodes, doing this operation is disc
127127

128128
You may only customize the NSGs on custom subnets. You may not customize NSGs on managed subnets or at the NIC level of the agent nodes. AKS has egress requirements to specific endpoints, to control egress and ensure the necessary connectivity, see [limit egress traffic](limit-egress-traffic.md). For ingress, the requirements are based on the applications you have deployed to cluster.
129129

130-
## Stopped or de-allocated clusters
130+
## Stopped, de-allocated, and "Not Ready" nodes
131131

132-
As stated earlier, manually de-allocating all cluster nodes via the IaaS APIs/CLI/portal renders the cluster out of support. The only supported way to stop/de-allocate all nodes is to [stop the AKS cluster](start-stop-cluster.md#stop-an-aks-cluster), which preserves the cluster state for up to 12 months.
132+
If you do not need your AKS workloads to run continuously, you can [stop the AKS cluster](start-stop-cluster.md#stop-an-aks-cluster) which stops all nodepools and the control plane, and start it again when needed. When you stop a cluster using the `az aks stop` command, the cluster state will be preserved for up to 12 months. After 12 months the cluster state and all of its resources will be deleted.
133133

134-
Clusters that are stopped for more than 12 months will no longer preserve state.
134+
Manually de-allocating all cluster nodes via the IaaS APIs/CLI/portal is not a supported way to stop an AKS cluster or nodepool. The cluster will be considered out of support and will be stopped by AKS after 30 days. The clusters will then be subject to the same 12 month preservation policy as a correctly stopped cluster.
135135

136-
Clusters that are de-allocated outside of the AKS APIs have no state preservation guarantees. The control planes for clusters in this state will be archived after 30 days, and deleted after 12 months.
136+
Clusters with 0 "Ready" nodes (or all "Not Ready") and 0 Running VMs will be stopped after 30 days.
137137

138138
AKS reserves the right to archive control planes that have been configured out of support guidelines for extended periods equal to and beyond 30 days. AKS maintains backups of cluster etcd metadata and can readily reallocate the cluster. This reallocation can be initiated by any PUT operation bringing the cluster back into support, such as an upgrade or scale to active agent nodes.
139139

140-
If your subscription is suspended or deleted, your cluster's control plane and state will be deleted after 90 days.
140+
All clusters in a suspended or deleted subscription will be stopped immediately and deleted after 30 days
141141

142142
## Unsupported alpha and beta Kubernetes features
143143

articles/azure-monitor/app/java-standalone-config.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -711,6 +711,8 @@ If your application is behind a firewall and can't connect directly to Applicati
711711
}
712712
```
713713

714+
You can also set the http proxy using the environment variable `APPLICATIONINSIGHTS_PROXY`, which takes the format `https://<host>:<port>`. It then takes precedence over the proxy specified in the JSON configuration.
715+
714716
Application Insights Java 3.x also respects the global `https.proxyHost` and `https.proxyPort` system properties if they're set, and `http.nonProxyHosts`, if needed.
715717

716718
## Recovery from ingestion failures

0 commit comments

Comments
 (0)