Skip to content

Commit a5dcc8e

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into ds-prcleanup1
2 parents 6fb1469 + 87303f5 commit a5dcc8e

File tree

120 files changed

+1495
-753
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

120 files changed

+1495
-753
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43765,6 +43765,11 @@
4376543765
"redirect_url": "/azure/cognitive-services/acoustics/what-is-acoustics",
4376643766
"redirect_document_id": false
4376743767
},
43768+
{
43769+
"source_path": "articles/cognitive-services/Acoustics/index.md",
43770+
"redirect_url": "/azure/cognitive-services/acoustics/what-is-acoustics",
43771+
"redirect_document_id": false
43772+
},
4376843773
{
4376943774
"source_path": "articles/iot-central/howto-export-data.md",
4377043775
"redirect_url": "/azure/iot-central/core/howto-export-data-event-hubs-service-bus",

articles/active-directory/reports-monitoring/concept-sign-ins.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -173,13 +173,17 @@ The **Location** - The location the connection was initiated from:
173173
**Correlation ID** - The correlation ID of the activity.
174174

175175

176+
177+
176178
**Conditional access** - The status of the applied conditional access rules
177179

178-
- Not applied
180+
- **Not applied**: No policy applied to the user and application during sign-in.
181+
182+
- **Success**: One or more conditional access policies applied to the user and application (but not necessarily the other conditions) during sign-in.
183+
184+
- **Failure**: One or more conditional access policies applied and was not satisfied during sign-in.
179185

180-
- Success
181186

182-
- Failure
183187

184188

185189

articles/active-directory/saas-apps/brivo-onair-identity-connector-provisioning-tutorial.md

Lines changed: 23 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ The objective of this tutorial is to demonstrate the steps to be performed in Br
3232
The scenario outlined in this tutorial assumes that you already have the following prerequisites:
3333

3434
* An Azure AD tenant
35-
* [A Brivo Onair Identity Connector tenant](https://www.brivo.com/quote)
35+
* [A Brivo Onair Identity Connector tenant](https://www.brivo.com/lp/quote)
3636
* A user account in Brivo Onair Identity Connector with Senior Administrator permissions.
3737

3838
## Assigning users to Brivo Onair Identity Connector
@@ -50,17 +50,17 @@ Before configuring and enabling automatic user provisioning, you should decide w
5050

5151
## Setup Brivo Onair Identity Connector for provisioning
5252

53-
1. Sign in to your [Brivo Onair Identity Connector Admin Console](https://acs.brivo.com/login/). Navigate to **Account > Account Settings**.
53+
1. Sign in to your [Brivo Onair Identity Connector Admin Console](https://acs.brivo.com/login/). Navigate to **Account > Account Settings**.
5454

55-
![Brivo Onair Identity Connector Admin Console](media/brivo-onair-identity-connector-provisioning-tutorial/admin.png)
55+
![Brivo Onair Identity Connector Admin Console](media/brivo-onair-identity-connector-provisioning-tutorial/admin.png)
5656

5757
2. Click on **Azure AD** tab. On the **Azure AD** details page re-enter the password of your senior administrator account. Click on **Submit**.
5858

59-
![Brivo Onair Identity Connector azure](media/brivo-onair-identity-connector-provisioning-tutorial/azuread.png)
59+
![Brivo Onair Identity Connector azure](media/brivo-onair-identity-connector-provisioning-tutorial/azuread.png)
6060

61-
3. Click on **Copy Token** button and save the **Secret Token**. This value will be entered in the Secret Token field in the Provisioning tab of your Brivo Onair Identity Connector application in the Azure portal.
61+
3. Click on **Copy Token** button and save the **Secret Token**. This value will be entered in the Secret Token field in the Provisioning tab of your Brivo Onair Identity Connector application in the Azure portal.
6262

63-
![Brivo Onair Identity Connector token](media/brivo-onair-identity-connector-provisioning-tutorial/token.png)
63+
![Brivo Onair Identity Connector token](media/brivo-onair-identity-connector-provisioning-tutorial/token.png)
6464

6565
## Add Brivo Onair Identity Connector from the gallery
6666

@@ -70,19 +70,19 @@ Before configuring Brivo Onair Identity Connector for automatic user provisionin
7070

7171
1. In the **[Azure portal](https://portal.azure.com)**, in the left navigation panel, select **Azure Active Directory**.
7272

73-
![The Azure Active Directory button](common/select-azuread.png)
73+
![The Azure Active Directory button](common/select-azuread.png)
7474

7575
2. Go to **Enterprise applications**, and then select **All applications**.
7676

77-
![The Enterprise applications blade](common/enterprise-applications.png)
77+
![The Enterprise applications blade](common/enterprise-applications.png)
7878

7979
3. To add a new application, select the **New application** button at the top of the pane.
8080

81-
![The New application button](common/add-new-app.png)
81+
![The New application button](common/add-new-app.png)
8282

8383
4. In the search box, enter **Brivo Onair Identity Connector**, select **Brivo Onair Identity Connector** in the results panel, and then click the **Add** button to add the application.
8484

85-
![Brivo Onair Identity Connector in the results list](common/search-new-app.png)
85+
![Brivo Onair Identity Connector in the results list](common/search-new-app.png)
8686

8787
## Configuring automatic user provisioning to Brivo Onair Identity Connector
8888

@@ -92,59 +92,59 @@ This section guides you through the steps to configure the Azure AD provisioning
9292

9393
1. Sign in to the [Azure portal](https://portal.azure.com). Select **Enterprise Applications**, then select **All applications**.
9494

95-
![Enterprise applications blade](common/enterprise-applications.png)
95+
![Enterprise applications blade](common/enterprise-applications.png)
9696

9797
2. In the applications list, select **Brivo Onair Identity Connector**.
9898

99-
![The Brivo Onair Identity Connector link in the Applications list](common/all-applications.png)
99+
![The Brivo Onair Identity Connector link in the Applications list](common/all-applications.png)
100100

101101
3. Select the **Provisioning** tab.
102102

103-
![Provisioning tab](common/provisioning.png)
103+
![Provisioning tab](common/provisioning.png)
104104

105105
4. Set the **Provisioning Mode** to **Automatic**.
106106

107-
![Provisioning tab](common/provisioning-automatic.png)
107+
![Provisioning tab](common/provisioning-automatic.png)
108108

109109
5. Under the **Admin Credentials** section, input `https://scim.brivo.com/ActiveDirectory/v2/` in **Tenant URL**. Input the **SCIM Authentication Token** value retrieved earlier in **Secret Token**. Click **Test Connection** to ensure Azure AD can connect to Brivo Onair Identity Connector. If the connection fails, ensure your Brivo Onair Identity Connector account has Admin permissions and try again.
110110

111-
![Tenant URL + Token](common/provisioning-testconnection-tenanturltoken.png)
111+
![Tenant URL + Token](common/provisioning-testconnection-tenanturltoken.png)
112112

113113
6. In the **Notification Email** field, enter the email address of a person or group who should receive the provisioning error notifications and check the checkbox - **Send an email notification when a failure occurs**.
114114

115-
![Notification Email](common/provisioning-notification-email.png)
115+
![Notification Email](common/provisioning-notification-email.png)
116116

117117
7. Click **Save**.
118118

119119
8. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to Brivo Onair Identity Connector**.
120120

121-
![Brivo Onair Identity Connector User Mappings](media/brivo-onair-identity-connector-provisioning-tutorial/user-mappings.png )
121+
![Brivo Onair Identity Connector User Mappings](media/brivo-onair-identity-connector-provisioning-tutorial/user-mappings.png )
122122

123123
9. Review the user attributes that are synchronized from Azure AD to Brivo Onair Identity Connector in the **Attribute Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in Brivo Onair Identity Connector for update operations. Select the **Save** button to commit any changes.
124124

125-
![Brivo Onair Identity Connector User Attributes](media/brivo-onair-identity-connector-provisioning-tutorial/user-attributes.png)
125+
![Brivo Onair Identity Connector User Attributes](media/brivo-onair-identity-connector-provisioning-tutorial/user-attributes.png)
126126

127127
10. Under the **Mappings** section, select **Synchronize Azure Active Directory Groups to Brivo Onair Identity Connector**.
128128

129-
![Brivo Onair Identity Connector Group Mappings](media/brivo-onair-identity-connector-provisioning-tutorial/group-mappings.png)
129+
![Brivo Onair Identity Connector Group Mappings](media/brivo-onair-identity-connector-provisioning-tutorial/group-mappings.png)
130130

131131
11. Review the group attributes that are synchronized from Azure AD to Brivo Onair Identity Connector in the **Attribute Mapping** section. The attributes selected as **Matching** properties are used to match the groups in Brivo Onair Identity Connector for update operations. Select the **Save** button to commit any changes.
132132

133-
![Brivo Onair Identity Connector Group Attributes](media/brivo-onair-identity-connector-provisioning-tutorial/group-attributes.png)
133+
![Brivo Onair Identity Connector Group Attributes](media/brivo-onair-identity-connector-provisioning-tutorial/group-attributes.png)
134134

135135
12. To configure scoping filters, refer to the following instructions provided in the [Scoping filter tutorial](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
136136

137137
13. To enable the Azure AD provisioning service for Brivo Onair Identity Connector, change the **Provisioning Status** to **On** in the **Settings** section.
138138

139-
![Provisioning Status Toggled On](common/provisioning-toggle-on.png)
139+
![Provisioning Status Toggled On](common/provisioning-toggle-on.png)
140140

141141
14. Define the users and/or groups that you would like to provision to Brivo Onair Identity Connector by choosing the desired values in **Scope** in the **Settings** section.
142142

143-
![Provisioning Scope](common/provisioning-scope.png)
143+
![Provisioning Scope](common/provisioning-scope.png)
144144

145145
15. When you are ready to provision, click **Save**.
146146

147-
![Saving Provisioning Configuration](common/provisioning-configuration-save.png)
147+
![Saving Provisioning Configuration](common/provisioning-configuration-save.png)
148148

149149
This operation starts the initial synchronization of all users and/or groups defined in **Scope** in the **Settings** section. The initial sync takes longer to perform than subsequent syncs, which occur approximately every 40 minutes as long as the Azure AD provisioning service is running. You can use the **Synchronization Details** section to monitor progress and follow links to provisioning activity report, which describes all actions performed by the Azure AD provisioning service on Brivo Onair Identity Connector.
150150

articles/aks/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -221,6 +221,8 @@
221221
href: limit-egress-traffic.md
222222
- name: Enable Azure Active Directory integration
223223
items:
224+
- name: Azure AD v2.0
225+
href: azure-ad-v2.md
224226
- name: Use the Azure CLI
225227
href: azure-ad-integration-cli.md
226228
- name: Use the Azure portal

articles/aks/azure-ad-v2.md

Lines changed: 151 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,151 @@
1+
---
2+
title: Use Azure AD v2.0 in Azure Kubernetes Service
3+
description: Learn how to use Azure AD v2.0 in Azure Kubernetes Service (AKS)
4+
services: container-service
5+
manager: gwallace
6+
ms.topic: article
7+
ms.date: 03/24/2020
8+
---
9+
10+
# Integrate Azure AD v2.0 in Azure Kubernetes Service (Preview)
11+
12+
> [!Note]
13+
> Existing Azure AD v1.0 clusters are not affected by the new Azure AD v2.0 feature for Azure Kubernetes Service (AKS).
14+
15+
Azure AD v2.0 is designed to simplify the Azure AD v1.0 experience, where users were required to create a client app, a server app, and required the Azure AD tenant to grant Directory Read permissions.
16+
In the new version, the AKS resource provider manages the client and server apps for you. Instead of using a persistent "Application Permission," the AKS resource provider uses a "Delegated Permission" via an on-behalf-of flow to get an access token to Graph API. Azure AD v2.0 enabled clusters use a limited scoped Graph API privilege (GroupMembers.Read.All) to query group membership only when the overage indicator is present (when there are more than 250 group claims).
17+
18+
## Limitations
19+
20+
* You can't currently upgrade an existing Azure AD v1.0 cluster to Azure AD v2.0.
21+
22+
> [!IMPORTANT]
23+
> AKS preview features are available on a self-service, opt-in basis. Previews are provided "as-is" and "as available," and are excluded from the Service Level Agreements and limited warranty. AKS previews are partially covered by customer support on a best-effort basis. As such, these features are not meant for production use. For more information, see the following support articles:
24+
>
25+
> - [AKS Support Policies](support-policies.md)
26+
> - [Azure Support FAQ](faq.md)
27+
28+
## Before you begin
29+
30+
You must have the following resources installed:
31+
32+
- The Azure CLI, version 2.2.0 or later
33+
- The aks-preview 0.4.38 extension
34+
- Kubectl with a minimum version of [1.18 beta](https://github.com/kubernetes/kubernetes/blob/master/CHANGELOG/CHANGELOG-1.18.md#client-binaries)
35+
36+
To install/update the aks-preview extension or later, use the following Azure CLI commands:
37+
38+
```azurecli
39+
az extension add --name aks-preview
40+
az extension list
41+
```
42+
43+
```azurecli
44+
az extension update --name aks-preview
45+
az extension list
46+
```
47+
48+
To install kubectl, use the following
49+
```azurecli
50+
curl -LO "https://storage.googleapis.com/kubernetes-release/release/v1.18.0-beta.2/bin/darwin/amd64/kubectl"
51+
chmod +x ./kubectl
52+
sudo mv ./kubectl /usr/local/bin/kubectl
53+
kubectl version --client
54+
```
55+
56+
Use [these instructions](https://kubernetes.io/docs/tasks/tools/install-kubectl/) for other operating systems.
57+
58+
> [!CAUTION]
59+
> After you register a feature on a subscription, you can't currently unregister that feature. When you enable some preview features, defaults might be used for all AKS clusters created afterward in the subscription. Don't enable preview features on production subscriptions. Instead, use a separate subscription to test preview features and gather feedback.
60+
61+
```azurecli-interactive
62+
az feature register --name AAD-V2 --namespace Microsoft.ContainerService
63+
```
64+
65+
It might take several minutes for the status to show as **Registered**. You can check the registration status by using the [az feature list](https://docs.microsoft.com/cli/azure/feature?view=azure-cli-latest#az-feature-list) command:
66+
67+
```azurecli-interactive
68+
az feature list -o table --query "[?contains(name, 'Microsoft.ContainerService/AAD-V2')].{Name:name,State:properties.state}"
69+
```
70+
71+
When the status shows as registered, refresh the registration of the `Microsoft.ContainerService` resource provider by using the [az provider register](https://docs.microsoft.com/cli/azure/provider?view=azure-cli-latest#az-provider-register) command:
72+
73+
```azurecli-interactive
74+
az provider register --namespace Microsoft.ContainerService
75+
```
76+
77+
## Create an AKS cluster with Azure AD v2.0 enabled
78+
79+
You can now create an AKS cluster by using the following CLI commands.
80+
81+
First, create an Azure resource group:
82+
83+
```azurecli-interactive
84+
# Create an Azure resource group
85+
az group create --name myResourceGroup --location centralus
86+
```
87+
88+
Then, create an AKS cluster:
89+
90+
```azurecli-interactive
91+
az aks create -g MyResourceGroup -n MyManagedCluster --enable-aad
92+
```
93+
The above command creates a three node AKS cluster, but the user, who created the cluster, by default, is not a member of a group that has access to this cluster. This user needs to create an Azure AD group, add themselves as a member of the group, and then update the cluster as shown below. Follow instructions [here](https://docs.microsoft.com/azure/active-directory/fundamentals/active-directory-groups-create-azure-portal)
94+
95+
Once you've created a group and added yourself (and others) as a member, you can update the cluster with the Azure AD group using the following command
96+
97+
```azurecli-interactive
98+
az aks update -g MyResourceGroup -n MyManagedCluster --enable-aad [--aad-admin-group-object-ids <id1,id2>] [--aad-tenant-id <id>]
99+
```
100+
Alternatively, if you first create a group and add members, you can enable the Azure AD group at create time using the following command,
101+
102+
```azurecli-interactive
103+
az aks create -g MyResourceGroup -n MyManagedCluster --enable-aad [--aad-admin-group-object-ids <id1,id2>] [--aad-tenant-id <id>]
104+
```
105+
106+
A successful creation of an Azure AD v2 cluster has the following section in the response body
107+
```
108+
"Azure ADProfile": {
109+
"adminGroupObjectIds": null,
110+
"clientAppId": null,
111+
"managed": true,
112+
"serverAppId": null,
113+
"serverAppSecret": null,
114+
"tenantId": "72f9****-****-****-****-****d011db47"
115+
}
116+
```
117+
118+
The cluster is created within a few minutes.
119+
120+
## Accessing an Azure AD v2.0 enabled cluster
121+
To get the admin credentials to access the cluster:
122+
123+
```azurecli-interactive
124+
az aks get-credentials --resource-group myResourceGroup --name MyManagedCluster --admin
125+
```
126+
Now use the kubectl get nodes command to view nodes in the cluster:
127+
128+
```azurecli-interactive
129+
kubectl get nodes
130+
131+
NAME STATUS ROLES AGE VERSION
132+
aks-nodepool1-15306047-0 Ready agent 102m v1.15.10
133+
aks-nodepool1-15306047-1 Ready agent 102m v1.15.10
134+
aks-nodepool1-15306047-2 Ready agent 102m v1.15.10
135+
```
136+
137+
To get the user credentials to access the cluster:
138+
139+
```azurecli-interactive
140+
kubectl get nodes
141+
```
142+
143+
Follow the instructions to sign in.
144+
145+
**error: You must be logged in to the server (Unauthorized)**
146+
147+
The user above gets an error because the user is not a part of a group that has access to the cluster.
148+
149+
150+
151+

0 commit comments

Comments
 (0)