You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/how-to-connect-modify-group-writeback.md
+31-9Lines changed: 31 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,16 +33,38 @@ If the original version of group writeback is already enabled and in use in your
33
33
To configure directory settings to disable automatic writeback of newly created Microsoft 365 groups, use one of these methods:
34
34
35
35
- Azure portal: Update the `NewUnifiedGroupWritebackDefault` setting to `false`.
36
-
- PowerShell: Use the [New-AzureADDirectorySetting](../enterprise-users/groups-settings-cmdlets.md) cmdlet. For example:
36
+
- PowerShell: Use the [Microsoft Graph PowerShell SDK](/powershell/microsoftgraph/installation?view=graph-powershell-1.0&preserve-view=true). For example:
37
37
38
38
```PowerShell
39
-
$TemplateId = (Get-AzureADDirectorySettingTemplate | where {$_.DisplayName -eq "Group.Unified" }).Id
40
-
$Template = Get-AzureADDirectorySettingTemplate | where -Property Id -Value $TemplateId -EQ
# Create a directory setting using the Template values hashtable including the updated value
56
+
$params = @{}
57
+
$params.Add("TemplateId", $Template.Id)
58
+
$params.Add("Values", @())
59
+
$TemplateValues.Keys | ForEach-Object {
60
+
$params.Values += @(@{Name = $_; Value = $TemplateValues[$_]})
61
+
}
62
+
New-MgDirectorySetting -BodyParameter $params
44
63
```
45
64
65
+
> [!NOTE]
66
+
> We recommend using Microsoft Graph PowerShell SDK with [Windows PowerShell 7](/powershell/scripting/whats-new/migrating-from-windows-powershell-51-to-powershell-7?view=powershell-7.3&preserve-view=true).
67
+
46
68
- Microsoft Graph: Use the [directorySetting](/graph/api/resources/directorysetting?view=graph-rest-beta&preserve-view=true) resource type.
47
69
48
70
### Disable writeback for all existing Microsoft 365 group
@@ -56,7 +78,7 @@ To disable writeback of all Microsoft 365 groups that were created before these
56
78
#Import-module
57
79
Import-module Microsoft.Graph
58
80
59
-
#Connect to MgGraph and select the Beta API Version
81
+
#Connect to MgGraph with necessary scope and select the Beta API Version
60
82
Connect-MgGraph -Scopes Group.ReadWrite.All
61
83
Select-MgProfile -Name beta
62
84
@@ -68,8 +90,8 @@ To disable writeback of all Microsoft 365 groups that were created before these
> We recomend using Microsoft Graph PowerShell SDK with [Windows PowerShell 7](/powershell/scripting/whats-new/migrating-from-windows-powershell-51-to-powershell-7?view=powershell-7.3&preserve-view=true)
72
-
93
+
```
94
+
73
95
- Microsoft Graph Explorer: Use a [group object](/graph/api/group-update?tabs=http&view=graph-rest-beta&preserve-view=true).
74
96
75
97
## Delete groups when they're disabled for writeback or soft deleted
Copy file name to clipboardExpand all lines: articles/aks/cluster-container-registry-integration.md
-3Lines changed: 0 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,9 +17,6 @@ You can set up the AKS to ACR integration using the Azure CLI or Azure PowerShel
17
17
> [!IMPORTANT]
18
18
> There is a latency issue with Azure Active Directory groups when attaching ACR. If the AcrPull role is granted to an Azure AD group and the kubelet identity is added to the group to complete the RBAC configuration, there might be up to a one-hour delay before the RBAC group takes effect. We recommended you to use the [Bring your own kubelet identity][byo-kubelet-identity] as a workaround. You can pre-create a user-assigned identity, add it to the Azure AD group, then use the identity as the kubelet identity to create an AKS cluster. This ensures the identity is added to the Azure AD group before a token is generated by kubelet, which avoids the latency issue.
19
19
20
-
> [!IMPORTANT]
21
-
> There is a latency issue with Azure Active Directory groups when attaching ACR. If the AcrPull role is granted to an Azure AD group and the kubelet identity is added to the group to complete the RBAC configuration, there might be up to a one-hour delay before the RBAC group update takes effect. We recommended you use the [Bring your own kubelet identity][byo-kubelet-identity] in the meantime. You can pre-create a user-assigned identity, add it to the Azure AD group, and then use the identity as the kubelet identity to create an AKS cluster. This ensures the identity is first added to the Azure AD group and then a token is generated by kubelet, which works around the latency issue.
22
-
23
20
> [!NOTE]
24
21
> This article covers automatic authentication between AKS and ACR. If you need to pull an image from a private external registry, use an [image pull secret][image-pull-secret].
Copy file name to clipboardExpand all lines: articles/aks/workload-identity-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ author: mgoedtel
8
8
9
9
---
10
10
11
-
# Use an Azure AD workload identity (preview) on Azure Kubernetes Service (AKS)
11
+
# Use Azure AD workload identity (preview) with Azure Kubernetes Service (AKS)
12
12
13
13
Today with Azure Kubernetes Service (AKS), you can assign [managed identities at the pod-level][use-azure-ad-pod-identity], which has been a preview feature. This pod-managed identity allows the hosted workload or application access to resources through Azure Active Directory (Azure AD). For example, a workload stores files in Azure Storage, and when it needs to access those files, the pod authenticates itself against the resource as an Azure managed identity. This authentication method has been replaced with [Azure Active Directory (Azure AD) workload identities][azure-ad-workload-identity] (preview), which integrate with the Kubernetes native capabilities to federate with any external identity providers. This approach is simpler to use and deploy, and overcomes several limitations in Azure AD pod-managed identity:
Copy file name to clipboardExpand all lines: articles/app-service/app-service-plan-manage.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,7 +42,7 @@ You can create an empty App Service plan, or you can create a plan as part of ap
42
42
You can move an app to another App Service plan, as long as the source plan and the target plan are in the _same resource group and geographical region_.
43
43
44
44
> [!NOTE]
45
-
> Azure deploys each new App Service plan into a deployment unit, internally called a webspace. Each region can have many webspaces, but your app can only move between plans that are created in the same webspace. An App Service Environment is an isolated webspace, so apps can be moved between plans in the same App Service Environment, but not between plans in different App Service Environments.
45
+
> Azure deploys each new App Service plan into a deployment unit, internally called a webspace. Each region can have many webspaces, but your app can only move between plans that are created in the same webspace. An App Service Environment can have multiple webspaces, but your app can only move between plans that are created in the same webspace.
46
46
>
47
47
> You can’t specify the webspace you want when creating a plan, but it’s possible to ensure that a plan is created in the same webspace as an existing plan. In brief, all plans created with the same resource group, region combination and operating system are deployed into the same webspace. For example, if you created a plan in resource group A and region B, then any plan you subsequently create in resource group A and region B is deployed into the same webspace. Note that plans can’t move webspaces after they’re created, so you can’t move a plan into “the same webspace” as another plan by moving it to another resource group.
0 commit comments