Skip to content

Commit aeb9736

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into nw-nsgflow
2 parents 35cf1e1 + 0d75bb9 commit aeb9736

File tree

733 files changed

+1119
-864
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

733 files changed

+1119
-864
lines changed

articles/active-directory-b2c/data-residency.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,8 @@ Azure AD B2C is **generally available worldwide** with the option for **data res
3232

3333
If you enable [Go-Local add-on](#go-local-add-on), you can store your data exclusively in a specific country/region.
3434

35+
> [!NOTE]
36+
> Azure AD B2C is generally available in the Microsoft Azure global cloud and Microsoft Azure operated by 21Vianet. Azure AD B2C is not available in Microsoft Azure Government.
3537
3638
## Region availability
3739

articles/active-directory-b2c/faq.yml

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -268,12 +268,9 @@ sections:
268268
No, Azure AD B2C tenants don't support [group-based assignment to Microsoft Entra Enterprise Applications](../active-directory/manage-apps/assign-user-or-group-access-portal.md).
269269
270270
- question: |
271-
What Azure AD B2C features are unavailable in Microsoft Azure Government?
271+
Is Azure AD B2C available in Microsoft Azure Government?
272272
answer: |
273-
The following AD B2C features are currently unavailable in Microsoft Azure Government:
274-
275-
* API connectors
276-
* Conditional Access
273+
No, Azure AD B2C is not available in Microsoft Azure Government.
277274
278275
- question: |
279276
I am using rolling refresh tokens for my application and I am getting an invalid_grant error on redeeming newly acquired refresh tokens well within their set validity period. Why does this happen?

articles/application-gateway/application-gateway-backend-health-troubleshooting.md

Lines changed: 24 additions & 23 deletions
Large diffs are not rendered by default.

articles/application-gateway/configuration-http-settings.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: application-gateway
55
author: greg-lindsay
66
ms.service: azure-application-gateway
77
ms.topic: conceptual
8-
ms.date: 03/17/2023
8+
ms.date: 09/30/2023
99
ms.author: greglin
1010
---
1111

@@ -15,7 +15,7 @@ The application gateway routes traffic to the backend servers by using the confi
1515

1616
## Cookie-based affinity
1717

18-
Azure Application Gateway uses gateway-managed cookies for maintaining user sessions. When a user sends the first request to Application Gateway, it sets an affinity cookie in the response with a hash value which contains the session details, so that the subsequent requests carrying the affinity cookie will be routed to the same backend server for maintaining stickiness.
18+
Azure Application Gateway uses gateway-managed cookies for maintaining user sessions. When a user sends the first request to Application Gateway, it sets an affinity cookie in the response with a hash value which contains the session details, so that the subsequent requests carrying the affinity cookie are routed to the same backend server for maintaining stickiness.
1919

2020
This feature is useful when you want to keep a user session on the same server and when session state is saved locally on the server for a user session. If the application can't handle cookie-based affinity, you can't use this feature. To use it, make sure that the clients support cookies.
2121
> [!NOTE]
@@ -26,7 +26,7 @@ The [Chromium browser](https://www.chromium.org/Home) [v80 update](https://chrom
2626

2727
To support this change, starting February 17 2020, Application Gateway (all the SKU types) will inject another cookie called *ApplicationGatewayAffinityCORS* in addition to the existing *ApplicationGatewayAffinity* cookie. The *ApplicationGatewayAffinityCORS* cookie has two more attributes added to it (*"SameSite=None; Secure"*) so that sticky sessions are maintained even for cross-origin requests.
2828

29-
Note that the default affinity cookie name is *ApplicationGatewayAffinity* and you can change it. In case you're using a custom affinity cookie name, an additional cookie is added with CORS as suffix. For example, *CustomCookieNameCORS*.
29+
Note that the default affinity cookie name is *ApplicationGatewayAffinity* and you can change it. If you deploy multiple application gateway instances in the same network topology, you must set unique cookie names for each instance. If you're using a custom affinity cookie name, an additional cookie is added with `CORS` as suffix. For example: *CustomCookieNameCORS*.
3030

3131
> [!NOTE]
3232
> If the attribute *SameSite=None* is set, it is mandatory that the cookie also contains the *Secure* flag, and must be sent over HTTPS. If session affinity is required over CORS, you must migrate your workload to HTTPS.
@@ -46,7 +46,7 @@ You can apply this setting to all backend pool members by enabling Connection Dr
4646
|Default value when Connection Draining is not enabled in Backend Setting| 30 seconds |
4747
|User-defined value when Connection Draining is enabled in Backend Setting | 1 to 3600 seconds |
4848

49-
The only exception to this are requests bound for deregistering instances because of gateway-managed session affinity and will continue to be forwarded to the deregistering instances.
49+
The only exception to this are requests bound for deregistering instances because of gateway-managed session affinity. These requests continue to be forwarded to the deregistering instances.
5050

5151
## Protocol
5252

@@ -60,7 +60,7 @@ This setting specifies the port where the backend servers listen to traffic from
6060

6161
## Trusted root certificate
6262

63-
If you select HTTPS as the backend protocol, the Application Gateway requires a trusted root certificate to trust the backend pool for end-to-end SSL. By default, the **Use well known CA certificate** option is set to **No**. If you plan to use a self-signed certificate, or a certificate signed by an internal Certificate Authority, then you must provide the Application Gateway the matching public certificate that the backend pool will be using. This certificate must be uploaded directly to the Application Gateway in .CER format.
63+
If you select HTTPS as the backend protocol, the Application Gateway requires a trusted root certificate to trust the backend pool for end-to-end SSL. By default, the **Use well known CA certificate** option is set to **No**. If you plan to use a self-signed certificate, or a certificate signed by an internal Certificate Authority, then you must provide the Application Gateway the matching public certificate used by the backend pool. This certificate must be uploaded directly to the Application Gateway in .CER format.
6464

6565
If you plan to use a certificate on the backend pool that is signed by a trusted public Certificate Authority, then you can set the **Use well known CA certificate** option to **Yes** and skip uploading a public certificate.
6666

@@ -101,7 +101,7 @@ This setting associates a [custom probe](application-gateway-probe-overview.md#c
101101
102102
## Configuring the host name
103103

104-
Application Gateway allows for the connection established to the backend to use a *different* hostname than the one used by the client to connect to Application Gateway. While this configuration can be useful in some cases, overriding the hostname to be different between the client and application gateway and application gateway to backend target, should be done with care.
104+
Application Gateway allows for the connection established to the backend to use a *different* hostname than the one used by the client to connect to Application Gateway. While this configuration can be useful in some cases, exercise caution when overriding the hostname such that it is different between the application gateway and the client compared to the backend target.
105105

106106
In production, it is recommended to keep the hostname used by the client towards the application gateway as the same hostname used by the application gateway to the backend target. This avoids potential issues with absolute URLs, redirect URLs, and host-bound cookies.
107107

6.92 KB
Loading
-36.4 KB
Loading
-772 Bytes
Loading
Loading
-3.88 KB
Loading
-3.97 KB
Loading

0 commit comments

Comments
 (0)