Skip to content

Commit a89f986

Browse files
authored
Merge pull request #115767 from jlian/master
New experience for private link and MSI
2 parents 42d8e14 + 25cbe32 commit a89f986

15 files changed

+96
-187
lines changed

articles/active-directory/managed-identities-azure-resources/services-support-managed-identities.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -119,6 +119,16 @@ Refer to the following list to configure managed identity for Azure Functions (i
119119
- [Azure PowerShell](/azure/app-service/overview-managed-identity#using-azure-powershell)
120120
- [Azure Resource Manager template](/azure/app-service/overview-managed-identity#using-an-azure-resource-manager-template)
121121

122+
### Azure IoT Hub
123+
124+
Managed identity type | All Generally Available<br>Global Azure Regions | Azure Government | Azure Germany | Azure China 21Vianet |
125+
| --- | :-: | :-: | :-: | :-: |
126+
| System assigned | ![Available][check] | ![Available][check] | Not available | ![Available][check] |
127+
| User assigned | Not available | Not available | Not available | Not available |
128+
129+
Refer to the following list to configure managed identity for Azure Data Factory V2 (in regions where available):
130+
131+
- [Azure portal](../../iot-hub/virtual-network-support.md#turn-on-managed-identity-for-iot-hub)
122132

123133
### Azure Kubernetes Service (AKS)
124134

articles/iot-hub/iot-hub-ip-filtering.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: robinsh
55
ms.service: iot-hub
66
services: iot-hub
77
ms.topic: conceptual
8-
ms.date: 05/12/2020
8+
ms.date: 05/25/2020
99
ms.author: robinsh
1010
---
1111

@@ -34,17 +34,19 @@ Any connection attempt from an IP address that matches a rejecting IP rule in yo
3434

3535
By default, the **IP Filter** grid in the portal for an IoT hub is empty. This default setting means that your hub accepts connections from any IP address. This default setting is equivalent to a rule that accepts the 0.0.0.0/0 IP address range.
3636

37-
![IoT Hub default IP filter settings](./media/iot-hub-ip-filtering/ip-filter-default.png)
37+
To get to the IP Filter settings page, select **Networking**, **Public access**, then choose **Selected IP Ranges**:
38+
39+
:::image type="content" source="media/iot-hub-ip-filtering/ip-filter-default.png" alt-text="IoT Hub default IP filter settings":::
3840

3941
## Add or edit an IP filter rule
4042

4143
To add an IP filter rule, select **+ Add IP Filter Rule**.
4244

43-
![Add an IP filter rule to an IoT hub](./media/iot-hub-ip-filtering/ip-filter-add-rule.png)
45+
:::image type="content" source="./media/iot-hub-ip-filtering/ip-filter-add-rule.png" alt-text="Add an IP filter rule to an IoT hub":::
4446

4547
After selecting **Add IP Filter Rule**, fill in the fields.
4648

47-
![After selecting Add an IP Filter rule](./media/iot-hub-ip-filtering/ip-filter-after-selecting-add.png)
49+
:::image type="content" source="./media/iot-hub-ip-filtering/ip-filter-after-selecting-add.png" alt-text="After selecting Add an IP Filter rule":::
4850

4951
* Provide a **name** for the IP Filter rule. This must be a unique, case-insensitive, alphanumeric string up to 128 characters long. Only the ASCII 7-bit alphanumeric characters plus `{'-', ':', '/', '\', '.', '+', '%', '_', '#', '*', '?', '!', '(', ')', ',', '=', '@', ';', '''}` are accepted.
5052

@@ -54,7 +56,7 @@ After selecting **Add IP Filter Rule**, fill in the fields.
5456

5557
After filling in the fields, select **Save** to save the rule. You see an alert notifying you that the update is in progress.
5658

57-
![Notification about saving an IP filter rule](./media/iot-hub-ip-filtering/ip-filter-save-new-rule.png)
59+
:::image type="content" source="./media/iot-hub-ip-filtering/ip-filter-save-new-rule.png" alt-text="Notification about saving an IP filter rule":::
5860

5961
The **Add** option is disabled when you reach the maximum of 10 IP filter rules.
6062

@@ -64,7 +66,7 @@ To edit an existing rule, select the data you want to change, make the change, t
6466

6567
To delete an IP filter rule, select the trash can icon on that row and then select **Save**. The rule is removed and the change is saved.
6668

67-
![Delete an IoT Hub IP filter rule](./media/iot-hub-ip-filtering/ip-filter-delete-rule.png)
69+
:::image type="content" source="./media/iot-hub-ip-filtering/ip-filter-delete-rule.png" alt-text="Delete an IoT Hub IP filter rule":::
6870

6971
## Retrieve and update IP filters using Azure CLI
7072

@@ -154,11 +156,10 @@ You can change the order of your IP filter rules in the grid by clicking the thr
154156

155157
To save your new IP filter rule order, click **Save**.
156158

157-
![Change the order of your IoT Hub IP filter rules](./media/iot-hub-ip-filtering/ip-filter-rule-order.png)
159+
:::image type="content" source="media/iot-hub-ip-filtering/ip-filter-rule-order.png" alt-text="Change the order of your IoT HUb IP filter rules":::
158160

159161
## Next steps
160162

161163
To further explore the capabilities of IoT Hub, see:
162164

163-
* [Operations monitoring](iot-hub-operations-monitoring.md)
164165
* [IoT Hub metrics](iot-hub-metrics.md)

articles/iot-hub/iot-hub-tls-deprecating-1-0-and-1-1.md

Lines changed: 17 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -17,15 +17,26 @@ To provide best-in-class encryption, IoT Hub is moving to Transport Layer Securi
1717

1818
IoT Hub will continue to support TLS 1.0/1.1 until further notice. However, we recommend that all customers migrate to TLS 1.2 as soon as possible.
1919

20-
## Supported ciphers
20+
## Deprecating TLS 1.1 ciphers
2121

22-
The timeline for availability of various ciphers used in TLS handshake is as follows:
22+
* `TLS_ECDHE_RSA_WITH_AES_256_CBC_SH`
23+
* `TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA`
24+
* `TLS_RSA_WITH_AES_256_CBC_SHA`
25+
* `TLS_RSA_WITH_AES_128_CBC_SHA`
26+
* `TLS_RSA_WITH_3DES_EDE_CBC_SHA`
2327

24-
* TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (currently supported)
25-
* TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (will be supported in second half of 2020)
26-
* TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (will be supported in second half of 2020)
27-
* TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (will be supported in second half of 2020)
28+
## Deprecating TLS 1.0 ciphers
2829

30+
* `TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA`
31+
* `TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA`
32+
* `TLS_RSA_WITH_AES_256_CBC_SHA`
33+
* `TLS_RSA_WITH_AES_128_CBC_SHA`
34+
* `TLS_RSA_WITH_3DES_EDE_CBC_SHA`
35+
36+
## TLS 1.2 ciphers
37+
38+
See [IoT Hub TLS 1.2 recommended ciphers](iot-hub-tls-support.md#recommended-ciphers).
39+
2940
## Customer feedback
3041

3142
While the TLS 1.2 enforcement is an industry-wide best-in-class encryption choice and will be enabled as planned, we still would like to hear from customers regarding their specific deployments and difficulties adopting TLS 1.2. For this purpose, you can send your comments to [[email protected]](mailto:[email protected]).

articles/iot-hub/iot-hub-tls-support.md

Lines changed: 19 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ The created IoT Hub resource using this configuration will refuse device and ser
4949
> [!NOTE]
5050
> The `minTlsVersion` property is read-only and cannot be changed once your IoT Hub resource is created. It is therefore essential that you properly test and validate that *all* your IoT devices and services are compatible with TLS 1.2 and the [recommended ciphers](#recommended-ciphers) in advance.
5151
52-
### Supported regions
52+
## Supported regions
5353

5454
IoT Hubs that require the use of TLS 1.2 can be created in the following regions:
5555

@@ -62,7 +62,7 @@ IoT Hubs that require the use of TLS 1.2 can be created in the following regions
6262
> [!NOTE]
6363
> Upon failovers, the `minTlsVersion` property of your IoT Hub will remain effective in the geo-paired region post-failover.
6464
65-
### Recommended ciphers
65+
## Recommended ciphers
6666

6767
IoT Hubs that are configured to accept only TLS 1.2 will also enforce the use of the following recommended ciphers:
6868

@@ -71,7 +71,22 @@ IoT Hubs that are configured to accept only TLS 1.2 will also enforce the use of
7171
* `TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256`
7272
* `TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384`
7373

74-
### Use TLS 1.2 in your IoT Hub SDKs
74+
For IoT Hubs not configured for TLS 1.2 enforcement, TLS 1.2 still works with the following ciphers:
75+
76+
* `TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256`
77+
* `TLS_DHE_RSA_WITH_AES_256_GCM_SHA384`
78+
* `TLS_DHE_RSA_WITH_AES_128_GCM_SHA256`
79+
* `TLS_RSA_WITH_AES_256_GCM_SHA384`
80+
* `TLS_RSA_WITH_AES_128_GCM_SHA256`
81+
* `TLS_RSA_WITH_AES_256_CBC_SHA256`
82+
* `TLS_RSA_WITH_AES_128_CBC_SHA256`
83+
* `TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA`
84+
* `TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA`
85+
* `TLS_RSA_WITH_AES_256_CBC_SHA`
86+
* `TLS_RSA_WITH_AES_128_CBC_SHA`
87+
* `TLS_RSA_WITH_3DES_EDE_CBC_SHA`
88+
89+
## Use TLS 1.2 in your IoT Hub SDKs
7590

7691
Use the links below to configure TLS 1.2 and allowed ciphers in IoT Hub client SDKs.
7792

@@ -84,6 +99,6 @@ Use the links below to configure TLS 1.2 and allowed ciphers in IoT Hub client S
8499
| NodeJS | Version 1.12.2 or newer | [Link](https://aka.ms/Tls_Node_SDK_IoT) |
85100

86101

87-
### Use TLS 1.2 in your IoT Edge setup
102+
## Use TLS 1.2 in your IoT Edge setup
88103

89104
IoT Edge devices can be configured to use TLS 1.2 when communicating with IoT Hub. For this purpose, use the [IoT Edge documentation page](https://github.com/Azure/iotedge/blob/master/edge-modules/edgehub-proxy/README.md).

articles/iot-hub/iot-hub-understand-ip-address.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.date: 11/21/2019
1515
The IP address prefixes of IoT Hub public endpoints are published periodically under the _AzureIoTHub_ [service tag](../virtual-network/service-tags-overview.md).
1616

1717
> [!NOTE]
18-
> For devices that are deployed inside of on-premises networks, Azure IoT Hub supports VNET connectivity integration with private endpoints. See [IoT Hub support for VNET's](./virtual-network-support.md#ingress-connectivity-to-iot-hub-using-private-endpoints) for more information.
18+
> For devices that are deployed inside of on-premises networks, Azure IoT Hub supports VNET connectivity integration with private endpoints. See [IoT Hub support for VNet](./virtual-network-support.md) for more information.
1919
2020

2121
You may use these IP address prefixes to control connectivity between IoT Hub and your devices or network assets in order to implement a variety of network isolation goals:
36.9 KB
Loading
41.9 KB
Loading
83.8 KB
Loading
41.8 KB
Loading
-4.42 KB
Loading

0 commit comments

Comments
 (0)