You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/application-properties.md
+33-30Lines changed: 33 additions & 30 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.subservice: app-mgmt
9
9
ms.topic: conceptual
10
10
ms.workload: identity
11
-
ms.date: 09/06/2022
11
+
ms.date: 08/29/2023
12
12
ms.author: jomondi
13
13
ms.reviewer: ergreenl
14
14
ms.custom: enterprise-apps
@@ -20,71 +20,74 @@ ms.custom: enterprise-apps
20
20
21
21
This article describes the properties that you can configure for an enterprise application in your Azure Active Directory (Azure AD) tenant. To configure the properties, see [Configure enterprise application properties](add-application-portal-configure.md).
22
22
23
-
## Enabled for users to sign in?
23
+
## Enabled for users to sign in?
24
24
25
-
If this option is set to **Yes**, then assigned users are able to sign in to the application from the My Apps portal, the User access URL, or by navigating to the application URL directly. If assignment is required, then only users who are assigned to the application are able to sign-in. If assignment is required, applications must be assigned to be granted a token.
25
+
If this option is set to **Yes**, then assigned users are able to sign in to the application from the My Apps portal, the User access URL, or by navigating to the application URL directly. If assignment is required, then only users who are assigned to the application are able to sign-in. If assignment is required, applications must be assigned to get a token.
26
26
27
27
If this option is set to **No**, then no users are able to sign in to the application, even if they're assigned to it. Tokens aren't issued for the application.
28
28
29
-
## Name
29
+
## Name
30
30
31
-
This property is the name of the application that users see on the My Apps portal. Administrators see the name when they manage access to the application. Other tenants see the name when integrating the application into their directory.
31
+
This property is the name of the application that users see on the My Apps portal. Administrators see the name when they manage access to the application. Other tenants see the name when integrating the application into their directory.
32
32
33
-
It's recommended that you choose a name that users can understand. This is important because this name is visible in the various portals, such as My Apps and O365 Launcher.
33
+
It's recommended that you choose a name that users can understand. This is important because this name is visible in the various portals, such as My Apps and Microsoft 365 Launcher.
34
34
35
-
## Homepage URL
35
+
## Homepage URL
36
36
37
-
If the application is custom-developed, the homepage URL is the URL that a user can use to sign in to the application. For example, it's the URL that is launched when the application is selected in the My Apps portal. If this application is from the Azure AD Gallery, this URL is where you can go to learn more about the application or its vendor.
37
+
If the application is custom-developed, the homepage URL is the URL that a user can use to sign in to the application. For example, it's the URL that is launched when the application is selected in the My Apps portal. If this application is from the Azure AD Gallery, this URL is where you can go to learn more about the application or its vendor.
38
38
39
-
The homepage URL can't be edited within enterprise applications. The homepage URL must be edited on the application object.
39
+
The homepage URL can't be edited within enterprise applications. The homepage URL must be edited on the application object.
40
40
41
-
## Logo
41
+
## Logo
42
42
43
43
This is the application logo that users see on the My Apps portal and the Office 365 application launcher. Administrators also see the logo in the Azure AD gallery.
44
44
45
45
Custom logos must be exactly 215x215 pixels in size and be in the PNG format. You should use a solid color background with no transparency in your application logo. The logo file size can't be over 100 KB.
46
46
47
-
## Application ID
47
+
## Application ID
48
48
49
49
This property is the unique identifier for the application in your directory. You can use this application ID if you ever need help from Microsoft Support. You can also use the identifier to perform operations using the Microsoft Graph APIs or the Microsoft Graph PowerShell SDK.
50
50
51
-
## Object ID
51
+
## Object ID
52
52
53
-
This is the unique identifier of the service principal object associated with the application. This identifier can be useful when performing management operations against this application using PowerShell or other programmatic interfaces. This identifier is different than the identifier for the application object.
53
+
This is the unique identifier of the service principal object associated with the application. This identifier can be useful when performing management operations against this application using PowerShell or other programmatic interfaces. This identifier is different than the identifier for the application object.
54
54
55
-
The identifier is used to update information for the local instance of the application, such as assigning users and groups to the application. The identifier can also be used to update the properties of the enterprise application or to configure single-sign on.
55
+
The identifier is used to update information for the local instance of the application, such as assigning users and groups to the application. The identifier can also be used to update the properties of the enterprise application or to configure single-sign on.
56
56
57
-
## Assignment required
57
+
## Assignment required
58
58
59
-
This option doesn't affect whether or not an application appears on the My Apps portal. To show the application there, assign an appropriate user or group to the application. This option has no effect on users' access to the application when it's configured for any of the other single sign-on modes.
59
+
This setting controls who or what in the directory can obtain an access token for the application. You can use this setting to further lock down access to the application and let only specified users and applications obtain access tokens.
60
+
61
+
This option determines whether or not an application appears on the My Apps portal. To show the application there, assign an appropriate user or group to the application. This option has no effect on users' access to the application when it's configured for any of the other single sign-on modes.
62
+
63
+
If this option is set to **Yes**, then users and other applications or services must first be assigned this application before being able to access it.
64
+
65
+
If this option is set to **No**, then all users are able to sign in, and other applications and services are able to obtain an access token to the application. This option also allows any external users that may have been invited into your organization to sign in.
66
+
67
+
This option only applies to the following types of applications and services:
60
68
61
-
If this option is set to **Yes**, then users and other applications or services must first be assigned this application before being able to access it.
62
-
63
-
If this option is set to **No**, then all users are able to sign in, and other applications and services are able to obtain an access token to the application.
64
-
65
-
This option only applies to the following types of applications and services:
66
69
- Applications using SAML
67
70
- OpenID Connect
68
71
- OAuth 2.0
69
72
- WS-Federation for user sign
70
-
- Application Proxy applications with Azure AD pre-authentication enabled
71
-
- Applications or services for which other applications or service are requesting access tokens
73
+
- Application Proxy applications with Azure AD preauthentication enabled
74
+
- Applications or services for which other applications or service are requesting access tokens
72
75
73
-
## Visible to users
76
+
## Visible to users
74
77
75
-
Makes the application visible in My Apps and the O365 Launcher
78
+
Makes the application visible in My Apps and the Microsoft 365 Launcher
76
79
77
-
If this option is set to **Yes**, then assigned users see the application on the My Apps portal and O365 app launcher.
80
+
If this option is set to **Yes**, then assigned users see the application on the My Apps portal and Microsoft 365 app launcher.
78
81
79
-
If this option is set to **No**, then no users see this application on their My Apps portal and O365 launcher.
82
+
If this option is set to **No**, then no users see this application on their My Apps portal and Microsoft 365 launcher.
80
83
81
84
Make sure that a homepage URL is included or else the application can't be launched from the My Apps portal.
82
85
83
-
Regardless of whether assignment is required or not, only assigned users are able to see this application in the My Apps portal. If you want certain users to see the application in the My Apps portal, but everyone to be able to access it, assign the users in the **Users and Groups** tab, and set assignment required to **No**.
86
+
Regardless of whether assignment is required or not, only assigned users are able to see this application in the My Apps portal. If you want certain users to see the application in the My Apps portal, but everyone to be able to access it, assign the users in the **Users and Groups** tab, and set assignment required to **No**.
84
87
85
-
## Notes
88
+
## Notes
86
89
87
-
You can use this field to add any information that is relevant for the management of the application. The field is a free text field with a maximum size of 1024 characters.
90
+
You can use this field to add any information that is relevant for the management of the application. The field is a free text field with a maximum size of 1024 characters.
Copy file name to clipboardExpand all lines: articles/azure-web-pubsub/socketio-overview.md
+10-12Lines changed: 10 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: Overview of Web PubSub for Socket.IO
3
-
description: Get an overview of Azure Web PubSub support for the open-source Socket.IO library.
2
+
title: Overview Socket.IO on Azure
3
+
description: Get an overview of Azure's support for the open-source Socket.IO library.
4
4
keywords: Socket.IO, Socket.IO on Azure, multi-node Socket.IO, scaling Socket.IO
5
5
author: kevinguo-ed
6
6
ms.author: kevinguo
@@ -9,27 +9,25 @@ ms.service: azure-web-pubsub
9
9
ms.topic: how-to
10
10
---
11
11
12
-
# Overview of Web PubSub for Socket.IO
12
+
# Overview Socket.IO on Azure
13
13
14
14
> [!NOTE]
15
-
> Web PubSub for Socket.IO feature is in public preview. We welcome any feedback and suggestions. Please reach out to the service team at [email protected].
15
+
> The support of Socket.IO on Azure is in public preview. We welcome any feedback and suggestions. Please reach out to the service team at [email protected].
16
16
17
-
Web PubSub for Socket.IO is a fully managed cloud offering for [Socket.IO](https://socket.io/). Socket.IO is a widely popular open-source library for real-time messaging between clients and a server. Web PubSub for Socket.IO is a feature of the Azure Web PubSub service.
17
+
Socket.IO is a widely popular open-source library for real-time messaging between clients and a server. Managing stateful and persistent connections between clients and a server is often a source of frustration for Socket.IO users. The problem is more acute when multiple Socket.IO instances are spread across servers.
18
18
19
-
Managing stateful and persistent connections between clients and a server is often a source of frustration for Socket.IO users. The problem is more acute when multiple Socket.IO instances are spread across servers.
20
-
21
-
Web PubSub for Socket.IO removes the burden of deploying, hosting, and coordinating Socket.IO instances for developers. Development teams can then focus on building real-time experiences by using familiar APIs from the Socket.IO library.
19
+
Azure provides a fully managed cloud solution for [Socket.IO](https://socket.io/). This support removes the burden of deploying, hosting, and coordinating Socket.IO instances for developers. Development teams can then focus on building real-time experiences by using familiar APIs from the Socket.IO library.
22
20
23
21
## Simplified architecture
24
-
Web PubSub for Socket.IO removes the need for an "adapter" server component when scaling out a Socket.IO app, allowing the development team to reap the benefits for a simplified architecture.
22
+
This feature removes the need for an "adapter" server component when scaling out a Socket.IO app, allowing the development team to reap the benefits of a simplified architecture.
25
23
26
24
:::image type="content" source="./media/socketio-service-internal/typical-architecture-managed-socketio.jpg" alt-text="Screenshot of a typical architecture of a fully managed Socket.IO app.":::
27
25
28
26
## Benefits over hosting a Socket.IO app yourself
29
27
30
-
The following table shows the benefits of using the fully managed Azure service.
28
+
The following table shows the benefits of using the fully managed solution from Azure.
31
29
32
-
| Item | Hosting a Socket.IO app yourself | Using Web PubSub for Socket.IO|
30
+
| Item | Hosting a Socket.IO app yourself | Using Socket.IO on Azure|
33
31
|------------|------------|------------|
34
32
| Deployment | Customer managed | Azure managed |
35
33
| Hosting | Customer needs to provision enough server resources to serve and maintain persistent connections | Azure managed |
@@ -44,7 +42,7 @@ A common approach to meeting the concurrency and latency challenge is to [scale
44
42
45
43
:::image type="content" source="./media/socketio-overview/typical-architecture-self-hosted-socketio-app.jpg" alt-text="Diagram of a typical architecture of a self-hosted Socket.IO app.":::
46
44
47
-
With Web PubSub for Socket.IO, you're freed from handling scaling issues and implementing code logic related to using an adapter.
45
+
With Socket.IO on Azure, you're freed from handling scaling issues and implementing code logic related to using an adapter.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/concept-agentless-containers.md
+1-23Lines changed: 1 addition & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,29 +28,7 @@ All of these capabilities are available as part of the [Defender CSPM](concept-c
28
28
29
29
## Agentless discovery and visibility within Kubernetes components
30
30
31
-
Agentless discovery for Kubernetes provides API-based discovery of information about Kubernetes cluster architecture, workload objects, and setup.
32
-
33
-
### How does agentless discovery for Kubernetes work?
34
-
35
-
The discovery process is based on snapshots taken at intervals:
36
-
37
-
:::image type="content" source="media/concept-agentless-containers/diagram-permissions-architecture.png" alt-text="Diagram of the permissions architecture." lightbox="media/concept-agentless-containers/diagram-permissions-architecture.png":::
38
-
39
-
When you enable the agentless discovery for Kubernetes extension, the following process occurs:
40
-
41
-
-**Create**: Defender for Cloud creates an identity in customer environments called CloudPosture/securityOperator/DefenderCSPMSecurityOperator.
42
-
-**Assign**: Defender for Cloud assigns a built-in role called **Kubernetes Agentless Operator** to that identity on subscription scope. The role contains the following permissions:
43
-
44
-
- AKS read (Microsoft.ContainerService/managedClusters/read)
45
-
- AKS Trusted Access with the following permissions:
Learn more about [AKS Trusted Access](/azure/aks/trusted-access-feature).
51
-
52
-
-**Discover**: Using the system assigned identity, Defender for Cloud performs a discovery of the AKS clusters in your environment using API calls to the API server of AKS.
53
-
-**Bind**: Upon discovery of an AKS cluster, Defender for Cloud performs an AKS bind operation between the created identity and the Kubernetes role “Microsoft.Security/pricings/microsoft-defender-operator”. The role is visible via API and gives Defender for Cloud data plane read permission inside the cluster.
31
+
Agentless discovery for Kubernetes provides API-based discovery of information about Kubernetes cluster architecture, workload objects, and setup. For more information, see [Agentless discovery for Kubernetes](defender-for-containers-introduction.md#agentless-discovery-for-kubernetes).
0 commit comments