Skip to content

Commit af24453

Browse files
authored
Merge pull request #201577 from MicrosoftDocs/main
6/14 AM Publish
2 parents d7a4ef4 + 32072c6 commit af24453

File tree

82 files changed

+543
-477
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

82 files changed

+543
-477
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -203,7 +203,7 @@
203203
},
204204
{
205205
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-managing-alert-instances.md" ,
206-
"redirect_url": "/azure/azure-monitor/alerts/alerts-page.md",
206+
"redirect_url": "/azure/azure-monitor/alerts/alerts-page",
207207
"redirect_document_id": false
208208
},
209209
{

articles/active-directory/develop/active-directory-v2-protocols.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ Four parties are typically involved in an OAuth 2.0 and OpenID Connect authentic
3737

3838
## Tokens
3939

40-
The parties in an authentication flow use **bearer tokens** to assure identification (authentication) and to grant or deny access to protected resources (authorization). Bearer tokens in the Microsoft identity platform are formatted as [JSON Web Tokens](https://tools.ietf.org/html/rfc7519) (JWT).
40+
The parties in an authentication flow use **bearer tokens** to assure, verify, and authenticate a principal (user, host, or service) and to grant or deny access to protected resources (authorization). Bearer tokens in the Microsoft identity platform are formatted as [JSON Web Tokens](https://tools.ietf.org/html/rfc7519) (JWT).
4141

4242
Three types of bearer tokens are used by the Microsoft identity platform as *security tokens*:
4343

articles/active-directory/fundamentals/active-directory-get-started-premium.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ Before you sign up for Active Directory Premium 1 or Premium 2, you must first d
3030
Signing up using your Azure subscription with previously purchased and activated Azure AD licenses, automatically activates the licenses in the same directory. If that's not the case, you must still activate your license plan and your Azure AD access. For more information about activating your license plan, see [Activate your new license plan](#activate-your-new-license-plan). For more information about activating your Azure AD access, see [Activate your Azure AD access](#activate-your-azure-ad-access).
3131

3232
## Sign up using your existing Azure or Microsoft 365 subscription
33-
As an Azure or Microsoft 365 subscriber, you can purchase the Azure Active Directory Premium editions online. For detailed steps, see [Buy or remove licenses](/microsoft-365/commerce/licenses/buy-licenses?view=o365-worldwide).
33+
As an Azure or Microsoft 365 subscriber, you can purchase the Azure Active Directory Premium editions online. For detailed steps, see [Buy or remove licenses](/microsoft-365/commerce/licenses/buy-licenses?view=o365-worldwide&preserve-view=true).
3434

3535
## Sign up using your Enterprise Mobility + Security licensing plan
3636
Enterprise Mobility + Security is a suite, comprised of Azure AD Premium, Azure Information Protection, and Microsoft Intune. If you already have an EMS license, you can get started with Azure AD, using one of these licensing options:

articles/active-directory/saas-apps/wikispaces-tutorial.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@ To configure Azure AD single sign-on with Wikispaces, perform the following step
102102
`https://session.wikispaces.net/<instancename>`
103103

104104
> [!NOTE]
105-
> These values are not real. Update these values with the actual Sign on URL and Identifier. Contact [Wikispaces Client support team](https://wikispaces.psu.edu/) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
105+
> These values are not real. Update these values with the actual Sign on URL and Identifier. Contact Wikispaces Client support team to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
106106

107107
5. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Federation Metadata XML** from the given options as per your requirement and save it on your computer.
108108

@@ -120,7 +120,7 @@ To configure Azure AD single sign-on with Wikispaces, perform the following step
120120

121121
### Configure Wikispaces Single Sign-On
122122

123-
To configure single sign-on on **Wikispaces** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [Wikispaces support team](https://wikispaces.psu.edu/). They set this setting to have the SAML SSO connection set properly on both sides.
123+
To configure single sign-on on **Wikispaces** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to Wikispaces support team. They set this setting to have the SAML SSO connection set properly on both sides.
124124

125125
### Create an Azure AD test user
126126

@@ -214,4 +214,4 @@ When you click the Wikispaces tile in the Access Panel, you should be automatica
214214

215215
- [What is application access and single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
216216

217-
- [What is Conditional Access in Azure Active Directory?](../conditional-access/overview.md)
217+
- [What is Conditional Access in Azure Active Directory?](../conditional-access/overview.md)

articles/aks/certificate-rotation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ az vmss run-command invoke -g MC_rg_myAKSCluster_region -n vmss-name --instance-
5555

5656
## Certificate Auto Rotation
5757

58-
For AKS to automatically rotate non-CA certificates, the cluster must have [TLS Bootstrapping](https://kubernetes.io/docs/reference/command-line-tools-reference/kubelet-tls-bootstrapping/) which has been enabled by default in all Azure regions.
58+
For AKS to automatically rotate non-CA certificates, the cluster must have [TLS Bootstrapping](https://kubernetes.io/docs/reference/access-authn-authz/kubelet-tls-bootstrapping/) which has been enabled by default in all Azure regions.
5959

6060
> [!Note]
6161
> If you have an existing cluster you have to upgrade that cluster to enable Certificate Auto-Rotation.

articles/aks/internal-lb.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ You must have the following resource installed:
105105

106106
### Create a Private Link service connection
107107

108-
To attach an Azure Private Link service to an internal load balancer, create a service manifest named `internal-lb-pls.yaml` with the service type *LoadBalancer* and the *azure-load-balancer-internal* and *azure-pls-create* annotation as shown in the example below. For more options, refer to the [Azure Private Link Service Integration](https://kubernetes-sigs.github.io/cloud-provider-azure/development/design-docs/pls-integration/) design document
108+
To attach an Azure Private Link service to an internal load balancer, create a service manifest named `internal-lb-pls.yaml` with the service type *LoadBalancer* and the *azure-load-balancer-internal* and *azure-pls-create* annotation as shown in the example below. For more options, refer to the [Azure Private Link Service Integration](https://kubernetes-sigs.github.io/cloud-provider-azure/topics/pls-integration/) design document
109109

110110
```yaml
111111
apiVersion: v1

articles/aks/operator-best-practices-cluster-security.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,13 @@ This article focuses on how to secure your AKS cluster. You learn how to:
2222
2323
You can also read the best practices for [container image management][best-practices-container-image-management] and for [pod security][best-practices-pod-security].
2424

25-
You can also use [Azure Kubernetes Services integration with Defender for Cloud][security-center-aks] to help detect threats and view recommendations for securing your AKS clusters.
25+
26+
## Enable threat protection
27+
28+
> **Best practice guidance**
29+
>
30+
> You can enable [Defender for Containers](../defender-for-cloud/defender-for-containers-introduction.md) to help secure your containers. Defender for Containers can assess cluster configurations and provide security recommendations, run vulnerability scans, and provide real-time protection and alerting for Kubernetes nodes and clusters.
31+
2632

2733
## Secure access to the API server and cluster nodes
2834

@@ -335,4 +341,4 @@ For Windows Server nodes, regularly perform a node image upgrade operation to sa
335341
[pod-security-contexts]: developer-best-practices-pod-security.md#secure-pod-access-to-resources
336342
[aks-ssh]: ssh.md
337343
[security-center-aks]: ../defender-for-cloud/defender-for-kubernetes-introduction.md
338-
[node-image-upgrade]: node-image-upgrade.md
344+
[node-image-upgrade]: node-image-upgrade.md

articles/applied-ai-services/form-recognizer/quickstarts/try-v3-rest-api.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -119,11 +119,7 @@ After you've called the [**Analyze document**](https://westus.dev.cognitive.micr
119119
#### GET request
120120

121121
```bash
122-
<<<<<<< HEAD
123-
curl -v -X GET "{endpoint}/formrecognizer/documentModels/{model name}/analyzeResults/{resultId}?api-version=2022-06-30-preview" -H "Ocp-Apim-Subscription-Key: {key}"
124-
=======
125122
curl -v -X GET "{endpoint}/formrecognizer/documentModels/{modelID}/analyzeResults/{resultId}?api-version=2022-06-30-preview" -H "Ocp-Apim-Subscription-Key: {key}"
126-
>>>>>>> resolve-merge-conflict
127123
```
128124

129125
#### Examine the response
3.78 KB
Loading

articles/azure-arc/servers/onboard-ansible-playbooks.md

Lines changed: 32 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -42,33 +42,54 @@ If you are onboarding machines to Azure Arc-enabled servers, copy the following
4242
subscription_id: 'INSERT-SUBSCRIPTION-ID'
4343
location: 'INSERT-LOCATION'
4444
tasks:
45+
- name: Check if the Connected Machine Agent has already been downloaded on Linux servers
46+
stat:
47+
path: /usr/bin/azvmagent
48+
get_attributes: False
49+
get_checksum: False
50+
get_mine: azcmagent_downloaded
51+
register: azcmagent_downloaded
52+
when: ansible_system == 'Linux'
53+
- name: Check if the Connected Machine Agent has already been downloaded on Windows servers
54+
stat:
55+
path: C:\Program Files\AzureConnectedMachineAgent
56+
get_attributes: False
57+
get_checksum: False
58+
get_mine: azcmagent_downloaded
59+
register: azcmagent_downloaded
60+
when: ansible_system == 'Windows'
4561
- name: Download the Connected Machine Agent on Linux servers
4662
become: yes
4763
get_url:
4864
url: https://aka.ms/azcmagent
4965
dest: ~/install_linux_azcmagent.sh
5066
mode: '700'
51-
when: ansible_system == 'Linux'
67+
when: (ansible_system == 'Linux') and (not azcmagent_downloaded.stat.exists)
5268
- name: Download the Connected Machine Agent on Windows servers
5369
win_get_url:
5470
url: https://aka.ms/AzureConnectedMachineAgent
5571
dest: C:\AzureConnectedMachineAgent.msi
56-
when: ansible_os_family == 'Windows'
72+
when: (ansible_os_family == 'Windows') and (not azcmagent_downloaded.stat.exists)
5773
- name: Install the Connected Machine Agent on Linux servers
5874
become: yes
5975
shell: bash ~/install_linux_azcmagent.sh
60-
when: ansible_system == 'Linux'
76+
when: (ansible_system == 'Linux') and (not azcmagent_downloaded.stat.exists)
6177
- name: Install the Connected Machine Agent on Windows servers
6278
win_package:
6379
path: C:\AzureConnectedMachineAgent.msi
64-
when: ansible_os_family == 'Windows'
80+
when: (ansible_os_family == 'Windows') and (not azcmagent_downloaded.stat.exists)
81+
- name: Check if the Connected Machine Agent has already been connected
82+
become: true
83+
command:
84+
cmd: azcmagent show --join
85+
register: azcmagent_connected
6586
- name: Connect the Connected Machine Agent on Linux servers to Azure Arc
6687
become: yes
6788
shell: sudo azcmagent connect --service-principal-id {{ azure.service_principal_id }} --service-principal-secret {{ azure.service_principal_secret }} --resource-group {{ azure.resource_group }} --tenant-id {{ azure.tenant_id }} --location {{ azure.location }} --subscription-id {{ azure.subscription_id }}
68-
when: ansible_system == 'Linux'
89+
when: (azcmagent_connected.rc == 0) and (ansible_system == 'Linux')
6990
- name: Connect the Connected Machine Agent on Windows servers to Azure
7091
win_shell: '& $env:ProgramFiles\AzureConnectedMachineAgent\azcmagent.exe connect --service-principal-id "{{ azure.service_principal_id }}" --service-principal-secret "{{ azure.service_principal_secret }}" --resource-group "{{ azure.resource_group }}" --tenant-id "{{ azure.tenant_id }}" --location "{{ azure.location }}" --subscription-id "{{ azure.subscription_id }}"'
71-
when: ansible_os_family == 'Windows'
92+
when: (azcmagent_connected.rc == 0) and (ansible_os_family == 'Windows')
7293
```
7394
7495
## Modify the Ansible playbook
@@ -77,15 +98,17 @@ After downloading the Ansible playbook, complete the following steps:
7798
7899
1. Within the Ansible playbook, modify the variables under the **vars section** with the service principal and Azure details collected earlier:
79100
80-
* Service Principal Id
101+
* Service Principal ID
81102
* Service Principal Secret
82103
* Resource Group
83-
* Tenant Id
84-
* Subscription Id
104+
* Tenant ID
105+
* Subscription ID
85106
* Region
86107
87108
1. Enter the correct hosts field capturing the target servers for onboarding to Azure Arc. You can employ [Ansible patterns](https://docs.ansible.com/ansible/latest/user_guide/intro_patterns.html#common-patterns) to selectively target which hybrid machines to onboard.
88109
110+
1. This template passes the service principal secret as a variable in the Ansible playbook. Please note that an [Ansible vault](https://docs.ansible.com/ansible/latest/user_guide/vault.html) could be used to encrypt this secret and the variables could be passed through a configuration file.
111+
89112
## Run the Ansible playbook
90113
91114
From the Ansible control node, run the Ansible playbook by invoking the `ansible-playbook` command:

0 commit comments

Comments
 (0)