Skip to content

Commit a5a6a57

Browse files
Merge branch 'main' into WI-143029-release-ga-malware-scan
2 parents 6cedc94 + adcf986 commit a5a6a57

File tree

31 files changed

+258
-179
lines changed

31 files changed

+258
-179
lines changed

articles/active-directory/manage-apps/application-properties.md

Lines changed: 33 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.topic: conceptual
1010
ms.workload: identity
11-
ms.date: 09/06/2022
11+
ms.date: 08/29/2023
1212
ms.author: jomondi
1313
ms.reviewer: ergreenl
1414
ms.custom: enterprise-apps
@@ -20,71 +20,74 @@ ms.custom: enterprise-apps
2020

2121
This article describes the properties that you can configure for an enterprise application in your Azure Active Directory (Azure AD) tenant. To configure the properties, see [Configure enterprise application properties](add-application-portal-configure.md).
2222

23-
## Enabled for users to sign in?
23+
## Enabled for users to sign in?
2424

25-
If this option is set to **Yes**, then assigned users are able to sign in to the application from the My Apps portal, the User access URL, or by navigating to the application URL directly. If assignment is required, then only users who are assigned to the application are able to sign-in. If assignment is required, applications must be assigned to be granted a token.
25+
If this option is set to **Yes**, then assigned users are able to sign in to the application from the My Apps portal, the User access URL, or by navigating to the application URL directly. If assignment is required, then only users who are assigned to the application are able to sign-in. If assignment is required, applications must be assigned to get a token.
2626

2727
If this option is set to **No**, then no users are able to sign in to the application, even if they're assigned to it. Tokens aren't issued for the application.
2828

29-
## Name
29+
## Name
3030

31-
This property is the name of the application that users see on the My Apps portal. Administrators see the name when they manage access to the application. Other tenants see the name when integrating the application into their directory.
31+
This property is the name of the application that users see on the My Apps portal. Administrators see the name when they manage access to the application. Other tenants see the name when integrating the application into their directory.
3232

33-
It's recommended that you choose a name that users can understand. This is important because this name is visible in the various portals, such as My Apps and O365 Launcher.
33+
It's recommended that you choose a name that users can understand. This is important because this name is visible in the various portals, such as My Apps and Microsoft 365 Launcher.
3434

35-
## Homepage URL
35+
## Homepage URL
3636

37-
If the application is custom-developed, the homepage URL is the URL that a user can use to sign in to the application. For example, it's the URL that is launched when the application is selected in the My Apps portal. If this application is from the Azure AD Gallery, this URL is where you can go to learn more about the application or its vendor.
37+
If the application is custom-developed, the homepage URL is the URL that a user can use to sign in to the application. For example, it's the URL that is launched when the application is selected in the My Apps portal. If this application is from the Azure AD Gallery, this URL is where you can go to learn more about the application or its vendor.
3838

39-
The homepage URL can't be edited within enterprise applications. The homepage URL must be edited on the application object.
39+
The homepage URL can't be edited within enterprise applications. The homepage URL must be edited on the application object.
4040

41-
## Logo
41+
## Logo
4242

4343
This is the application logo that users see on the My Apps portal and the Office 365 application launcher. Administrators also see the logo in the Azure AD gallery.
4444

4545
Custom logos must be exactly 215x215 pixels in size and be in the PNG format. You should use a solid color background with no transparency in your application logo. The logo file size can't be over 100 KB.
4646

47-
## Application ID
47+
## Application ID
4848

4949
This property is the unique identifier for the application in your directory. You can use this application ID if you ever need help from Microsoft Support. You can also use the identifier to perform operations using the Microsoft Graph APIs or the Microsoft Graph PowerShell SDK.
5050

51-
## Object ID
51+
## Object ID
5252

53-
This is the unique identifier of the service principal object associated with the application. This identifier can be useful when performing management operations against this application using PowerShell or other programmatic interfaces. This identifier is different than the identifier for the application object.
53+
This is the unique identifier of the service principal object associated with the application. This identifier can be useful when performing management operations against this application using PowerShell or other programmatic interfaces. This identifier is different than the identifier for the application object.
5454

55-
The identifier is used to update information for the local instance of the application, such as assigning users and groups to the application. The identifier can also be used to update the properties of the enterprise application or to configure single-sign on.
55+
The identifier is used to update information for the local instance of the application, such as assigning users and groups to the application. The identifier can also be used to update the properties of the enterprise application or to configure single-sign on.
5656

57-
## Assignment required
57+
## Assignment required
5858

59-
This option doesn't affect whether or not an application appears on the My Apps portal. To show the application there, assign an appropriate user or group to the application. This option has no effect on users' access to the application when it's configured for any of the other single sign-on modes.
59+
This setting controls who or what in the directory can obtain an access token for the application. You can use this setting to further lock down access to the application and let only specified users and applications obtain access tokens.
60+
61+
This option determines whether or not an application appears on the My Apps portal. To show the application there, assign an appropriate user or group to the application. This option has no effect on users' access to the application when it's configured for any of the other single sign-on modes.
62+
63+
If this option is set to **Yes**, then users and other applications or services must first be assigned this application before being able to access it.
64+
65+
If this option is set to **No**, then all users are able to sign in, and other applications and services are able to obtain an access token to the application. This option also allows any external users that may have been invited into your organization to sign in.
66+
67+
This option only applies to the following types of applications and services:
6068

61-
If this option is set to **Yes**, then users and other applications or services must first be assigned this application before being able to access it.
62-
63-
If this option is set to **No**, then all users are able to sign in, and other applications and services are able to obtain an access token to the application.
64-
65-
This option only applies to the following types of applications and services:
6669
- Applications using SAML
6770
- OpenID Connect
6871
- OAuth 2.0
6972
- WS-Federation for user sign
70-
- Application Proxy applications with Azure AD pre-authentication enabled
71-
- Applications or services for which other applications or service are requesting access tokens
73+
- Application Proxy applications with Azure AD preauthentication enabled
74+
- Applications or services for which other applications or service are requesting access tokens
7275

73-
## Visible to users
76+
## Visible to users
7477

75-
Makes the application visible in My Apps and the O365 Launcher
78+
Makes the application visible in My Apps and the Microsoft 365 Launcher
7679

77-
If this option is set to **Yes**, then assigned users see the application on the My Apps portal and O365 app launcher.
80+
If this option is set to **Yes**, then assigned users see the application on the My Apps portal and Microsoft 365 app launcher.
7881

79-
If this option is set to **No**, then no users see this application on their My Apps portal and O365 launcher.
82+
If this option is set to **No**, then no users see this application on their My Apps portal and Microsoft 365 launcher.
8083

8184
Make sure that a homepage URL is included or else the application can't be launched from the My Apps portal.
8285

83-
Regardless of whether assignment is required or not, only assigned users are able to see this application in the My Apps portal. If you want certain users to see the application in the My Apps portal, but everyone to be able to access it, assign the users in the **Users and Groups** tab, and set assignment required to **No**.
86+
Regardless of whether assignment is required or not, only assigned users are able to see this application in the My Apps portal. If you want certain users to see the application in the My Apps portal, but everyone to be able to access it, assign the users in the **Users and Groups** tab, and set assignment required to **No**.
8487

85-
## Notes
88+
## Notes
8689

87-
You can use this field to add any information that is relevant for the management of the application. The field is a free text field with a maximum size of 1024 characters.
90+
You can use this field to add any information that is relevant for the management of the application. The field is a free text field with a maximum size of 1024 characters.
8891

8992
## Next steps
9093

articles/azure-web-pubsub/socketio-overview.md

Lines changed: 10 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Overview of Web PubSub for Socket.IO
3-
description: Get an overview of Azure Web PubSub support for the open-source Socket.IO library.
2+
title: Overview Socket.IO on Azure
3+
description: Get an overview of Azure's support for the open-source Socket.IO library.
44
keywords: Socket.IO, Socket.IO on Azure, multi-node Socket.IO, scaling Socket.IO
55
author: kevinguo-ed
66
ms.author: kevinguo
@@ -9,27 +9,25 @@ ms.service: azure-web-pubsub
99
ms.topic: how-to
1010
---
1111

12-
# Overview of Web PubSub for Socket.IO
12+
# Overview Socket.IO on Azure
1313

1414
> [!NOTE]
15-
> Web PubSub for Socket.IO feature is in public preview. We welcome any feedback and suggestions. Please reach out to the service team at [email protected].
15+
> The support of Socket.IO on Azure is in public preview. We welcome any feedback and suggestions. Please reach out to the service team at [email protected].
1616
17-
Web PubSub for Socket.IO is a fully managed cloud offering for [Socket.IO](https://socket.io/). Socket.IO is a widely popular open-source library for real-time messaging between clients and a server. Web PubSub for Socket.IO is a feature of the Azure Web PubSub service.
17+
Socket.IO is a widely popular open-source library for real-time messaging between clients and a server. Managing stateful and persistent connections between clients and a server is often a source of frustration for Socket.IO users. The problem is more acute when multiple Socket.IO instances are spread across servers.
1818

19-
Managing stateful and persistent connections between clients and a server is often a source of frustration for Socket.IO users. The problem is more acute when multiple Socket.IO instances are spread across servers.
20-
21-
Web PubSub for Socket.IO removes the burden of deploying, hosting, and coordinating Socket.IO instances for developers. Development teams can then focus on building real-time experiences by using familiar APIs from the Socket.IO library.
19+
Azure provides a fully managed cloud solution for [Socket.IO](https://socket.io/). This support removes the burden of deploying, hosting, and coordinating Socket.IO instances for developers. Development teams can then focus on building real-time experiences by using familiar APIs from the Socket.IO library.
2220

2321
## Simplified architecture
24-
Web PubSub for Socket.IO removes the need for an "adapter" server component when scaling out a Socket.IO app, allowing the development team to reap the benefits for a simplified architecture.
22+
This feature removes the need for an "adapter" server component when scaling out a Socket.IO app, allowing the development team to reap the benefits of a simplified architecture.
2523

2624
:::image type="content" source="./media/socketio-service-internal/typical-architecture-managed-socketio.jpg" alt-text="Screenshot of a typical architecture of a fully managed Socket.IO app.":::
2725

2826
## Benefits over hosting a Socket.IO app yourself
2927

30-
The following table shows the benefits of using the fully managed Azure service.
28+
The following table shows the benefits of using the fully managed solution from Azure.
3129

32-
| Item | Hosting a Socket.IO app yourself | Using Web PubSub for Socket.IO|
30+
| Item | Hosting a Socket.IO app yourself | Using Socket.IO on Azure|
3331
|------------|------------|------------|
3432
| Deployment | Customer managed | Azure managed |
3533
| Hosting | Customer needs to provision enough server resources to serve and maintain persistent connections | Azure managed |
@@ -44,7 +42,7 @@ A common approach to meeting the concurrency and latency challenge is to [scale
4442

4543
:::image type="content" source="./media/socketio-overview/typical-architecture-self-hosted-socketio-app.jpg" alt-text="Diagram of a typical architecture of a self-hosted Socket.IO app.":::
4644

47-
With Web PubSub for Socket.IO, you're freed from handling scaling issues and implementing code logic related to using an adapter.
45+
With Socket.IO on Azure, you're freed from handling scaling issues and implementing code logic related to using an adapter.
4846

4947
## Same programming model
5048

articles/defender-for-cloud/concept-agentless-containers.md

Lines changed: 1 addition & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -28,29 +28,7 @@ All of these capabilities are available as part of the [Defender CSPM](concept-c
2828

2929
## Agentless discovery and visibility within Kubernetes components
3030

31-
Agentless discovery for Kubernetes provides API-based discovery of information about Kubernetes cluster architecture, workload objects, and setup.
32-
33-
### How does agentless discovery for Kubernetes work?
34-
35-
The discovery process is based on snapshots taken at intervals:
36-
37-
:::image type="content" source="media/concept-agentless-containers/diagram-permissions-architecture.png" alt-text="Diagram of the permissions architecture." lightbox="media/concept-agentless-containers/diagram-permissions-architecture.png":::
38-
39-
When you enable the agentless discovery for Kubernetes extension, the following process occurs:
40-
41-
- **Create**: Defender for Cloud creates an identity in customer environments called CloudPosture/securityOperator/DefenderCSPMSecurityOperator.
42-
- **Assign**: Defender for Cloud assigns a built-in role called **Kubernetes Agentless Operator** to that identity on subscription scope. The role contains the following permissions:
43-
44-
- AKS read (Microsoft.ContainerService/managedClusters/read)
45-
- AKS Trusted Access with the following permissions:
46-
- Microsoft.ContainerService/managedClusters/trustedAccessRoleBindings/write
47-
- Microsoft.ContainerService/managedClusters/trustedAccessRoleBindings/read
48-
- Microsoft.ContainerService/managedClusters/trustedAccessRoleBindings/delete
49-
50-
Learn more about [AKS Trusted Access](/azure/aks/trusted-access-feature).
51-
52-
- **Discover**: Using the system assigned identity, Defender for Cloud performs a discovery of the AKS clusters in your environment using API calls to the API server of AKS.
53-
- **Bind**: Upon discovery of an AKS cluster, Defender for Cloud performs an AKS bind operation between the created identity and the Kubernetes role “Microsoft.Security/pricings/microsoft-defender-operator”. The role is visible via API and gives Defender for Cloud data plane read permission inside the cluster.
31+
Agentless discovery for Kubernetes provides API-based discovery of information about Kubernetes cluster architecture, workload objects, and setup. For more information, see [Agentless discovery for Kubernetes](defender-for-containers-introduction.md#agentless-discovery-for-kubernetes).
5432

5533
### What's the refresh interval?
5634

0 commit comments

Comments
 (0)