Skip to content

Commit ae510de

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into pl-firewall-patch
2 parents 33affa4 + 5986272 commit ae510de

File tree

76 files changed

+670
-745
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

76 files changed

+670
-745
lines changed

articles/active-directory/app-proxy/application-proxy-ping-access-publishing-guide.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Azure Active Directory (Azure AD) Application Proxy has partnered with PingAcces
2121

2222
With PingAccess for Azure AD, you can give users access and single sign-on (SSO) to applications that use headers for authentication. Application Proxy treats these applications like any other, using Azure AD to authenticate access and then passing traffic through the connector service. PingAccess sits in front of the applications and translates the access token from Azure AD into a header. The application then receives the authentication in the format it can read.
2323

24-
Your users wont notice anything different when they sign in to use your corporate applications. They can still work from anywhere on any device. The Application Proxy connectors direct remote traffic to all apps without regard to their authentication type, so theyll still balance loads automatically.
24+
Your users won't notice anything different when they sign in to use your corporate applications. They can still work from anywhere on any device. The Application Proxy connectors direct remote traffic to all apps without regard to their authentication type, so they'll still balance loads automatically.
2525

2626
## How do I get access?
2727

@@ -31,7 +31,7 @@ For more information, see [Azure Active Directory editions](../fundamentals/what
3131

3232
## Publish your application in Azure
3333

34-
This article is for people to publish an application with this scenario for the first time. Besides detailing the publishing steps, it guides you in getting started with both Application Proxy and PingAccess. If youve already configured both services but want a refresher on the publishing steps, skip to the [Add your application to Azure AD with Application Proxy](#add-your-application-to-azure-ad-with-application-proxy) section.
34+
This article is for people to publish an application with this scenario for the first time. Besides detailing the publishing steps, it guides you in getting started with both Application Proxy and PingAccess. If you've already configured both services but want a refresher on the publishing steps, skip to the [Add your application to Azure AD with Application Proxy](#add-your-application-to-azure-ad-with-application-proxy) section.
3535

3636
> [!NOTE]
3737
> Since this scenario is a partnership between Azure AD and PingAccess, some of the instructions exist on the Ping Identity site.
@@ -77,7 +77,7 @@ To publish your own on-premises application:
7777
> [!NOTE]
7878
> For a more detailed walkthrough of this step, see [Add an on-premises app to Azure AD](../app-proxy/application-proxy-add-on-premises-application.md#add-an-on-premises-app-to-azure-ad).
7979
80-
1. **Internal URL**: Normally you provide the URL that takes you to the apps sign-in page when youre on the corporate network. For this scenario, the connector needs to treat the PingAccess proxy as the front page of the application. Use this format: `https://<host name of your PingAccess server>:<port>`. The port is 3000 by default, but you can configure it in PingAccess.
80+
1. **Internal URL**: Normally you provide the URL that takes you to the app's sign-in page when you're on the corporate network. For this scenario, the connector needs to treat the PingAccess proxy as the front page of the application. Use this format: `https://<host name of your PingAccess server>:<port>`. The port is 3000 by default, but you can configure it in PingAccess.
8181

8282
> [!WARNING]
8383
> For this type of single sign-on, the internal URL must use `https` and can't use `http`. Also, there is a constraint when configuring an application that no two apps should have the same internal URL as this allows App Proxy to maintain distinction between applications.
@@ -86,7 +86,7 @@ To publish your own on-premises application:
8686
1. **Translate URL in Headers**: Choose **No**.
8787

8888
> [!NOTE]
89-
> If this is your first application, use port 3000 to start and come back to update this setting if you change your PingAccess configuration. For subsequent applications, the port will need to match the Listener youve configured in PingAccess. Learn more about [listeners in PingAccess](https://docs.pingidentity.com/access/sources/dita/topic?category=pingaccess&Releasestatus_ce=Current&resourceid=pa_assigning_key_pairs_to_https_listeners).
89+
> If this is your first application, use port 3000 to start and come back to update this setting if you change your PingAccess configuration. For subsequent applications, the port will need to match the Listener you've configured in PingAccess. Learn more about [listeners in PingAccess](https://docs.pingidentity.com/access/sources/dita/topic?category=pingaccess&Releasestatus_ce=Current&resourceid=pa_assigning_key_pairs_to_https_listeners).
9090
9191
1. Select **Add**. The overview page for the new application appears.
9292

@@ -121,7 +121,7 @@ In addition to the external URL, an authorize endpoint of Azure Active Directory
121121

122122
Finally, set up your on-premises application so that users have read access and other applications have read/write access:
123123

124-
1. From the **App registrations** sidebar for your application, select **API permissions** > **Add a permission** > **Microsoft APIs** > **Microsoft Graph**. The **Request API permissions** page for **Microsoft Graph** appears, which contains the APIs for Windows Azure Active Directory.
124+
1. From the **App registrations** sidebar for your application, select **API permissions** > **Add a permission** > **Microsoft APIs** > **Microsoft Graph**. The **Request API permissions** page for **Microsoft Graph** appears, which contains the permissions for Microsoft Graph.
125125

126126
![Shows the Request API permissions page](./media/application-proxy-configure-single-sign-on-with-ping-access/required-permissions.png)
127127

articles/logic-apps/.openpublishing.redirection.logic-apps.json

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,15 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/logic-apps/logic-apps-enterprise-integration-x12-encode.md",
5+
"redirect_url": "/azure/logic-apps/logic-apps-enterprise-integration-x12",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/logic-apps/logic-apps-enterprise-integration-x12-decode.md",
10+
"redirect_url": "/azure/logic-apps/logic-apps-enterprise-integration-x12",
11+
"redirect_document_id": false
12+
},
313
{
414
"source_path_from_root": "/articles/logic-apps/update-consumption-workflow-schema.md",
515
"redirect_url": "/azure/logic-apps/update-workflow-definition-language-schema",
@@ -262,12 +272,12 @@
262272
},
263273
{
264274
"source_path_from_root": "/articles/app-service-logic/app-service-logic-enterprise-integration-x12-decode.md",
265-
"redirect_url": "/azure/logic-apps/logic-apps-enterprise-integration-x12-decode",
275+
"redirect_url": "/azure/logic-apps/logic-apps-enterprise-integration-x12",
266276
"redirect_document_id": false
267277
},
268278
{
269279
"source_path_from_root": "/articles/app-service-logic/app-service-logic-enterprise-integration-x12-encode.md",
270-
"redirect_url": "/azure/logic-apps/logic-apps-enterprise-integration-x12-encode",
280+
"redirect_url": "/azure/logic-apps/logic-apps-enterprise-integration-x12",
271281
"redirect_document_id": false
272282
},
273283
{

articles/logic-apps/logic-apps-enterprise-integration-as2-mdn-acknowledgment.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,11 +3,9 @@ title: AS2 MDN acknowledgments
33
description: Learn about Message Disposition Notification (MDN) acknowledgments for AS2 messages in Azure Logic Apps.
44
services: logic-apps
55
ms.suite: integration
6-
author: S-Jindal
7-
ms.author: shivamjindal
86
ms.reviewer: estfan, azla
97
ms.topic: reference
10-
ms.date: 08/23/2022
8+
ms.date: 08/15/2023
119
---
1210

1311
# MDN acknowledgments for AS2 messages in Azure Logic Apps

articles/logic-apps/logic-apps-enterprise-integration-as2-message-settings.md

Lines changed: 11 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: divyaswarnkar
77
ms.author: divswa
88
ms.reviewer: estfan, azla
99
ms.topic: reference
10-
ms.date: 08/23/2022
10+
ms.date: 08/15/2023
1111
---
1212

1313
# Reference for AS2 message settings in agreements for Azure Logic Apps
@@ -16,35 +16,34 @@ ms.date: 08/23/2022
1616

1717
This reference describes the properties that you can set in an AS2 agreement for specifying how to handle messages between [trading partners](logic-apps-enterprise-integration-partners.md). Set up these properties based on your agreement with the partner that exchanges messages with you.
1818

19-
<a name="AS2-incoming-messages"></a>
19+
<a name="as2-inbound-messages"></a>
2020

2121
## AS2 Receive settings
2222

23-
![Select "Receive Settings"](./media/logic-apps-enterprise-integration-as2-message-settings/receive-settings.png)
23+
![Screenshot shows Azure portal and AS2 agreement settings for inbound messages.](./media/logic-apps-enterprise-integration-as2-message-settings/receive-settings.png)
2424

2525
| Property | Required | Description |
2626
|----------|----------|-------------|
2727
| **Override message properties** | No | Overrides the properties on incoming messages with your property settings. |
28-
| **Message should be signed** | No | Specifies whether all incoming messages must be digitally signed. If you require signing, from the **Certificate** list, select an existing guest partner public certificate for validating the signature on the messages. If you don't have a certificate, learn more about [adding certificates](../logic-apps/logic-apps-enterprise-integration-certificates.md). |
29-
| **Message should be encrypted** | No | Specifies whether all incoming messages must be encrypted. Non-encrypted messages are rejected. If you require encryption, from the **Certificate** list, select an existing host partner private certificate for decrypting incoming messages. If you don't have a certificate, learn more about [adding certificates](../logic-apps/logic-apps-enterprise-integration-certificates.md). |
28+
| **Message should be signed** | No | Specifies whether all incoming messages must be digitally signed. If you require signing, from the **Certificate** list, select an existing guest partner public certificate for validating the signature on the messages. If you don't have a certificate, learn more about [adding certificates](logic-apps-enterprise-integration-certificates.md). |
29+
| **Message should be encrypted** | No | Specifies whether all incoming messages must be encrypted. Non-encrypted messages are rejected. If you require encryption, from the **Certificate** list, select an existing host partner private certificate for decrypting incoming messages. If you don't have a certificate, learn more about [adding certificates](logic-apps-enterprise-integration-certificates.md). |
3030
| **Message should be compressed** | No | Specifies whether all incoming messages must be compressed. Non-compressed messages are rejected. |
3131
| **Disallow Message ID duplicates** | No | Specifies whether to allow messages with duplicate IDs. If you disallow duplicate IDs, select the number of days between checks. You can also choose whether to suspend duplicates. |
3232
| **MDN Text** | No | Specifies the default message disposition notification (MDN) that you want sent to the message sender. |
33-
| **Send MDN** | No | Specifies whether to send synchronous MDNs for received messages. |
33+
| **Send MDN** | No | Specifies whether to send synchronous MDNs for received messages. |
3434
| **Send signed MDN** | No | Specifies whether to send signed MDNs for received messages. If you require signing, from the **MIC Algorithm** list, select the algorithm to use for signing messages. |
3535
| **Send asynchronous MDN** | No | Specifies whether to send MDNs asynchronously. If you select asynchronous MDNs, in the **URL** box, specify the URL for where to send the MDNs. |
36-
||||
3736

38-
<a name="AS2-outgoing-messages"></a>
37+
<a name="as2-outbound-messages"></a>
3938

4039
## AS2 Send settings
4140

42-
![Select "Send Settings"](./media/logic-apps-enterprise-integration-as2-message-settings/send-settings.png)
41+
![Screenshot shows Azure portal and AS2 agreement settings for outbound messages.](./media/logic-apps-enterprise-integration-as2-message-settings/send-settings.png)
4342

4443
| Property | Required | Description |
4544
|----------|----------|-------------|
46-
| **Enable message signing** | No | Specifies whether all outgoing messages must be digitally signed. If you require signing, select these values: <p>- From the **Signing Algorithm** list, select the algorithm to use for signing messages. <br>- From the **Certificate** list, select an existing host partner private certificate for signing messages. If you don't have a certificate, learn more about [adding certificates](../logic-apps/logic-apps-enterprise-integration-certificates.md). |
47-
| **Enable message encryption** | No | Specifies whether all outgoing messages must be encrypted. If you require encryption, select these values: <p>- From the **Encryption Algorithm** list, select the guest partner public certificate algorithm to use for encrypting messages. <br>- From the **Certificate** list, select an existing guest partner public certificate for encrypting outgoing messages. If you don't have a certificate, learn more about [adding certificates](../logic-apps/logic-apps-enterprise-integration-certificates.md). |
45+
| **Enable message signing** | No | Specifies whether all outgoing messages must be digitally signed. If you require signing, select these values: <br><br>- From the **Signing Algorithm** list, select the algorithm to use for signing messages. <br>- From the **Certificate** list, select an existing host partner private certificate for signing messages. If you don't have a certificate, learn more about [adding certificates](logic-apps-enterprise-integration-certificates.md). |
46+
| **Enable message encryption** | No | Specifies whether all outgoing messages must be encrypted. If you require encryption, select these values: <br><br>- From the **Encryption Algorithm** list, select the guest partner public certificate algorithm to use for encrypting messages. <br>- From the **Certificate** list, select an existing guest partner public certificate for encrypting outgoing messages. If you don't have a certificate, learn more about [adding certificates](logic-apps-enterprise-integration-certificates.md). |
4847
| **Enable message compression** | No | Specifies whether all outgoing messages must be compressed. |
4948
| **Unfold HTTP headers** | No | Puts the HTTP `content-type` header onto a single line. |
5049
| **Transmit file name in MIME header** | No | Specifies whether to include the file name in the MIME header. |
@@ -53,8 +52,7 @@ This reference describes the properties that you can set in an AS2 agreement for
5352
| **Request asynchronous MDN** | No | Specifies whether to receive MDNs asynchronously. If you select asynchronous MDNs, in the **URL** box, specify the URL for where to send the MDNs. |
5453
| **Enable NRR** | No | Specifies whether to require non-repudiation receipt (NRR). This communication attribute provides evidence that the data was received as addressed. |
5554
| **SHA2 Algorithm format** | No | Specifies the MIC algorithm format to use for signing in the headers for the outgoing AS2 messages or MDN |
56-
||||
5755

5856
## Next steps
5957

60-
[Exchange AS2 messages](../logic-apps/logic-apps-enterprise-integration-as2.md)
58+
[Exchange AS2 messages](logic-apps-enterprise-integration-as2.md)

0 commit comments

Comments
 (0)