Skip to content

Commit a7ea63e

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into vnet-pl-sql
2 parents 8778494 + 647dacc commit a7ea63e

File tree

8 files changed

+637
-77
lines changed

8 files changed

+637
-77
lines changed

articles/active-directory/develop/howto-call-a-web-api-with-postman.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ zone_pivot_groups: web-api-howto-prereq
1818

1919
::: zone pivot="no-api"
2020

21-
This article shows you how to call a protected ASP.NET Core web API using [Postman](https://www.postman.com/). Postman is an application that lets you send HTTP requests to a web API to test its authorization and access control (authentication) policies. In this article, you'll register a web app and a web API in a tenant on the Azure portal. The web app is used to get an access token generated by the Microsoft identity platform. Next, you'll use the token to make an authorized call to the web API using Postman.
21+
This article shows you how to call a protected ASP.NET Core web API using [Postman](https://www.postman.com/). Postman is an application that lets you send HTTP requests to a web API to test its authorization and access control (authentication) policies. In this article, you'll register a web app and a web API in a tenant. The web app is used to get an access token generated by the Microsoft identity platform. Next, you'll use the token to make an authorized call to the web API using Postman.
2222

2323
::: zone-end
2424

@@ -69,10 +69,10 @@ The Microsoft identity platform requires your application to be registered befor
6969

7070
Follow these steps to create the web API registration:
7171

72-
1. Sign in to the [Azure portal](https://portal.azure.com).
72+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Developer](../roles/permissions-reference.md#application-developer).
7373
1. If access to multiple tenants is available, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which you want to register the application.
74-
1. Search for and select **Azure Active Directory**.
75-
1. Under **Manage**, select **App registrations > New registration**.
74+
1. Browse to **Identity** > **Applications** > **Application registrations**.
75+
1. Select **New registration**.
7676
1. Enter a **Name** for the application, such as _NewWebAPI1_.
7777
1. For **Supported account types**, select **Accounts in this organizational directory only**. For information on different account types, select **Help me choose** option.
7878
1. Select **Register**.
@@ -116,8 +116,8 @@ Follow these steps to create the web app registration:
116116

117117
::: zone pivot="no-api"
118118

119-
1. Select **Home** to return to the home page. Search for and select **Azure Active Directory**.
120-
1. Under **Manage**, select **App registrations** > **New registration**.
119+
Select **Home** to return to the home page. Browse to **Identity** > **Applications** > **Application registrations**.
120+
1. Select **New registration**.
121121
1. Enter a **Name** for the application, such as `web-app-calls-web-api`.
122122
1. For **Supported account types**, select **Accounts in this organizational directory only**. For information on different account types, select the **Help me choose** option.
123123
1. Under **Redirect URI (optional)**, select **Web**, and then enter `http://localhost` in the URL text box.
@@ -127,26 +127,26 @@ Follow these steps to create the web app registration:
127127

128128
::: zone pivot="api"
129129

130-
1. Sign in to the [Azure portal](https://portal.azure.com).
131-
1. If access to multiple tenants is available, use the Directories + subscriptions filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which you want to register the application.
132-
1. Search for and select **Azure Active Directory**.
133-
1. Under **Manage**, select **App registrations** > **New registration**.
130+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Developer](../roles/permissions-reference.md#application-developer).
131+
1. If access to multiple tenants is available, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which you want to register the application.
132+
1. Browse to **Identity** > **Applications** > **Application registrations**.
133+
1. Select **New registration**.
134134
1. Enter a Name for the application, such as `web-app-calls-web-api`.
135135
1. For **Supported account types**, select **Accounts in this organizational directory only**. For information on different account types, select the **Help me choose** option.
136136
1. Under **Redirect URI (optional)**, select **Web**, and then enter `http://localhost` in the URL text box.
137137
1. Select **Register**.
138138

139139
::: zone-end
140140

141-
When registration is complete, the Azure portal displays the app registration's **Overview** pane. Record the **Directory (tenant) ID** and the **Application (client) ID** to be used in later steps.
141+
The application's **Overview** pane is displayed when registration is complete. Record the **Directory (tenant) ID** and the **Application (client) ID** to be used in later steps.
142142

143143
#### Add a client secret
144144

145145
A client secret is a string value your app can use to identity itself, and is sometimes referred to as an _application password_. The web app uses the client secret to prove its identity when it requests tokens.
146146

147147
Follow these steps to configure a client secret:
148148

149-
1. From the **Overview** pane in the Azure portal, under **Manage**, select **Certificates & secrets** > **Client secrets** > **New client secret**.
149+
1. From the **Overview** pane, under **Manage**, select **Certificates & secrets** > **Client secrets** > **New client secret**.
150150
1. Add a description for your client secret, for example _My client secret_.
151151
1. Select an expiration for the secret or specify a custom lifetime.
152152

@@ -162,14 +162,14 @@ By specifying a web API's scopes, the web app can obtain an access token contain
162162

163163
Follow these steps to configure client's permissions to the web API:
164164

165-
1. From the **Overview** pane of your application in the Azure portal, under **Manage**, select **API permissions** > **Add a permission** > **My APIs**.
165+
1. From the **Overview** pane of your application, under **Manage**, select **API permissions** > **Add a permission** > **My APIs**.
166166
1. Select **NewWebAPI1** or the API that you wish to add permissions to.
167167
1. Under **Select permissions**, check the box next to **Forecast.Read**. You may need to expand the **Permission** list. This selects the permissions the client app should have on behalf of the signed-in user.
168168
1. Select **Add permissions** to complete the process.
169169

170170
After adding these permissions to your API, you should see the selected permissions under **Configured permissions**.
171171

172-
You may also notice the **User.Read** permission for the Microsoft Graph API. This permission is added automatically when you register an app in the Azure portal.
172+
You may also notice the **User.Read** permission for the Microsoft Graph API. This permission is added automatically when you register an app.
173173

174174
::: zone pivot="no-api"
175175

@@ -183,8 +183,8 @@ You may also notice the **User.Read** permission for the Microsoft Graph API. Th
183183

184184
1. Navigate to `ms-identity-docs-code-dotnet/web-api` folder and open `appsettings.json`, replace the `{APPLICATION_CLIENT_ID}` and `{DIRECTORY_TENANT_ID}` with:
185185

186-
- `{APPLICATION_CLIENT_ID}` is the web API **Application (client) ID** on the app's **Overview** pane **App registrations** in the Azure portal.
187-
- `{DIRECTORY_TENANT_ID}` is the web API **Directory (tenant) ID** on the app's **Overview** pane **App registrations** in the Azure portal.
186+
- `{APPLICATION_CLIENT_ID}` is the web API **Application (client) ID** on the app's **Overview** pane **App registrations**.
187+
- `{DIRECTORY_TENANT_ID}` is the web API **Directory (tenant) ID** on the app's **Overview** pane **App registrations**.
188188

189189
1. Execute the following command to start the app:
190190

articles/active-directory/develop/howto-configure-app-instance-property-locks.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -34,19 +34,19 @@ The following property usage scenarios are considered as sensitive:
3434

3535
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
3636

37-
To configure an app instance lock using the Azure portal:
37+
To configure an app instance lock:
3838

39-
1. Sign in to the <a href="https://portal.azure.com/" target="_blank">Azure portal</a>.
40-
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="./media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant that contains the app registration you want to configure.
41-
1. Search for and select **Azure Active Directory**.
42-
1. Under **Manage**, select **App registrations**, and then select the application you want to configure.
39+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
40+
1. If access to multiple tenants is available, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which you want to register the application.
41+
1. Browse to **Identity** > **Applications** > **Application registrations**.
42+
1. Select the application you want to configure.
4343
1. Select **Authentication**, and then select **Configure** under the *App instance property lock* section.
4444

45-
:::image type="content" source="media/howto-configure-app-instance-property-locks/app-instance-lock-configure-overview.png" alt-text="Screenshot of an app registration's app instance lock in the Azure portal.":::
45+
:::image type="content" source="media/howto-configure-app-instance-property-locks/app-instance-lock-configure-overview.png" alt-text="Screenshot of an app registration's app instance lock.":::
4646

4747
2. In the **App instance property lock** pane, enter the settings for the lock. The table following the image describes each setting and their parameters.
4848

49-
:::image type="content" source="media/howto-configure-app-instance-property-locks/app-instance-lock-configure-properties.png" alt-text="Screenshot of an app registration's app instance property lock context pane in the Azure portal.":::
49+
:::image type="content" source="media/howto-configure-app-instance-property-locks/app-instance-lock-configure-properties.png" alt-text="Screenshot of an app registration's app instance property lock context pane.":::
5050

5151
| Field | Description |
5252
| ---------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |

articles/aks/concepts-storage.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Concepts - Storage in Azure Kubernetes Services (AKS)
33
description: Learn about storage in Azure Kubernetes Service (AKS), including volumes, persistent volumes, storage classes, and claims.
44
ms.topic: conceptual
5-
ms.date: 06/27/2023
5+
ms.date: 08/30/2023
66

77
---
88

@@ -251,15 +251,15 @@ For mounting a volume in a Windows container, specify the drive letter and path.
251251

252252
## Next steps
253253

254-
For associated best practices, see [Best practices for storage and backups in AKS][operator-best-practices-storage].
254+
For associated best practices, see [Best practices for storage and backups in AKS][operator-best-practices-storage] and [AKS Storage Considerations][azure-aks-storage-considerations].
255255

256256
To see how to use CSI drivers, see the following how-to articles:
257257

258-
- [Enable Container Storage Interface (CSI) drivers for Azure Disk, Azure Files, and Azure Blob storage on Azure Kubernetes Service][csi-storage-drivers]
258+
- [Container Storage Interface (CSI) drivers for Azure Disk, Azure Files, and Azure Blob storage on Azure Kubernetes Service][csi-storage-drivers]
259259
- [Use Azure Disk CSI driver in Azure Kubernetes Service][azure-disk-csi]
260260
- [Use Azure Files CSI driver in Azure Kubernetes Service][azure-files-csi]
261-
- [Use Azure Blob storage CSI driver (preview) in Azure Kubernetes Service][azure-blob-csi]
262-
- [Integrate Azure NetApp Files with Azure Kubernetes Service][azure-netapp-files]
261+
- [Use Azure Blob storage CSI driver in Azure Kubernetes Service][azure-blob-csi]
262+
- [Configure Azure NetApp Files with Azure Kubernetes Service][azure-netapp-files]
263263

264264
For more information on core Kubernetes and AKS concepts, see the following articles:
265265

@@ -292,3 +292,4 @@ For more information on core Kubernetes and AKS concepts, see the following arti
292292
[general-purpose-machine-sizes]: ../virtual-machines/sizes-general.md
293293
[azure-files-azure-netapp-comparison]: ../storage/files/storage-files-netapp-comparison.md
294294
[azure-disk-customer-managed-key]: azure-disk-customer-managed-keys.md
295+
[azure-aks-storage-considerations]: /azure/cloud-adoption-framework/scenarios/app-platform/aks/storage

articles/firewall/forced-tunneling.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,19 @@
11
---
22
title: Azure Firewall forced tunneling
3-
description: You can configure forced tunneling to route Internet-bound traffic to an additional firewall or network virtual appliance for further processing.
3+
description: You can configure forced tunneling to route Internet-bound traffic to an another firewall or network virtual appliance for further processing.
44
services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: article
8-
ms.date: 06/02/2022
8+
ms.date: 08/30/2023
99
ms.author: victorh
1010
---
1111

1212
# Azure Firewall forced tunneling
1313

1414
When you configure a new Azure Firewall, you can route all Internet-bound traffic to a designated next hop instead of going directly to the Internet. For example, you may have a default route advertised via BGP or using User Defined Route (UDR) to force traffic to an on-premises edge firewall or other network virtual appliance (NVA) to process network traffic before it's passed to the Internet. To support this configuration, you must create Azure Firewall with Forced Tunnel configuration enabled. This is a mandatory requirement to avoid service disruption. If this is a pre-existing firewall, you must recreate the firewall in Forced Tunnel mode to support this configuration. For more information, see the [Azure Firewall FAQ](firewall-faq.yml#how-can-i-stop-and-start-azure-firewall) about stopping and restarting a firewall in Forced Tunnel mode.
1515

16-
Some customers prefer not to expose a public IP address directly to the Internet. In this case, you can deploy Azure Firewall in Forced Tunneling mode without a public IP address. This configuration creates a management interface with a public IP address that is used by Azure Firewall for its operations. The public IP address is used exclusively by the Azure platform and can't be used for any other purpose.The tenant data path network can be configured without a public IP address, and Internet traffic can be forced tunneled to another Firewall or completely blocked.
16+
Some customers prefer not to expose a public IP address directly to the Internet. In this case, you can deploy Azure Firewall in Forced Tunneling mode without a public IP address. This configuration creates a management interface with a public IP address that is used by Azure Firewall for its operations. The public IP address is used exclusively by the Azure platform and can't be used for any other purpose. The tenant data path network can be configured without a public IP address, and Internet traffic can be forced tunneled to another Firewall or completely blocked.
1717

1818
Azure Firewall provides automatic SNAT for all outbound traffic to public IP addresses. Azure Firewall doesn’t SNAT when the destination IP address is a private IP address range per IANA RFC 1918. This logic works perfectly when you egress directly to the Internet. However, with forced tunneling enabled, Internet-bound traffic is SNATed to one of the firewall private IP addresses in the AzureFirewallSubnet. This hides the source address from your on-premises firewall. You can configure Azure Firewall to not SNAT regardless of the destination IP address by adding *0.0.0.0/0* as your private IP address range. With this configuration, Azure Firewall can never egress directly to the Internet. For more information, see [Azure Firewall SNAT private IP address ranges](snat-private-range.md).
1919

@@ -25,7 +25,7 @@ Azure Firewall provides automatic SNAT for all outbound traffic to public IP add
2525
2626
## Forced tunneling configuration
2727

28-
You can configure Forced Tunneling during Firewall creation by enabling Forced Tunnel mode as shown below. To support forced tunneling, Service Management traffic is separated from customer traffic. An additional dedicated subnet named **AzureFirewallManagementSubnet** (minimum subnet size /26) is required with its own associated public IP address. This public IP address is for management traffic. It is used exclusively by the Azure platform and can't be used for any other purpose.
28+
You can configure Forced Tunneling during Firewall creation by enabling Forced Tunnel mode as shown in the following screenshot. To support forced tunneling, Service Management traffic is separated from customer traffic. Another dedicated subnet named **AzureFirewallManagementSubnet** (minimum subnet size /26) is required with its own associated public IP address. This public IP address is for management traffic. It's used exclusively by the Azure platform and can't be used for any other purpose.
2929

3030
In Forced Tunneling mode, the Azure Firewall service incorporates the Management subnet (AzureFirewallManagementSubnet) for its *operational* purposes. By default, the service associates a system-provided route table to the Management subnet. The only route allowed on this subnet is a default route to the Internet and *Propagate gateway* routes must be disabled. Avoid associating customer route tables to the Management subnet when you create the firewall.
3131

@@ -41,7 +41,7 @@ If you enable forced tunneling, Internet-bound traffic is SNATed to one of the f
4141

4242
If your organization uses a public IP address range for private networks, Azure Firewall SNATs the traffic to one of the firewall private IP addresses in AzureFirewallSubnet. However, you can configure Azure Firewall to **not** SNAT your public IP address range. For more information, see [Azure Firewall SNAT private IP address ranges](snat-private-range.md).
4343

44-
Once you configure Azure Firewall to support forced tunneling, you can't undo the configuration. If you remove all other IP configurations on your firewall, the management IP configuration is removed as well and the firewall is deallocated. The public IP address assigned to the management IP configuration can't be removed, but you can assign a different public IP address.
44+
Once you configure Azure Firewall to support forced tunneling, you can't undo the configuration. If you remove all other IP configurations on your firewall, the management IP configuration is removed as well, and the firewall is deallocated. The public IP address assigned to the management IP configuration can't be removed, but you can assign a different public IP address.
4545

4646
## Next steps
4747

Loading

0 commit comments

Comments
 (0)