You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Access tokens and ID tokens are short-lived. After they expire, you must refresh them to continue to access resources. When you refresh the access token, Azure AD B2C returns a new token. The refreshed access token will have updated `nbf` (not before), `iat` (issued at), and `exp` (expiration) claim values. All other claim values will be the same as the originally issued access token.
182
182
183
183
184
-
To refresh the toke, submit another POST request to the `/token` endpoint. This time, provide the `refresh_token` instead of the `code`:
184
+
To refresh the token, submit another POST request to the `/token` endpoint. This time, provide the `refresh_token` instead of the `code`:
185
185
186
186
```http
187
187
POST https://{tenant}.b2clogin.com/{tenant}.onmicrosoft.com/{policy}/oauth2/v2.0/token HTTP/1.1
Copy file name to clipboardExpand all lines: articles/azure-vmware/configure-vmware-hcx.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ After you complete these steps, you'll have a production-ready environment for c
22
22
23
23
-[VMware HCX Connector](install-vmware-hcx.md) has been installed.
24
24
25
-
- If you plan to use VMware HCX Enterprise, make sure you've enabled the [VMware HCX Enterprise](https://cloud.vmware.com/community/2019/08/08/introducing-hcx-enterprise/) add-on through a [support request](https://portal.azure.com/#create/Microsoft.Support). It's a free 12-month trial in Azure VMware Solution.
25
+
- If you plan to use VMware HCX Enterprise, make sure you've enabled the [VMware HCX Enterprise](https://cloud.vmware.com/community/2019/08/08/introducing-hcx-enterprise/) add-on through a [support request](https://portal.azure.com/#create/Microsoft.Support). VMware HCX Enterprise edition is available and supported on Azure VMware Solution, at no additional cost.
26
26
27
27
- If you plan to [enable VMware HCX MON](https://docs.vmware.com/en/VMware-HCX/4.1/hcx-user-guide/GUID-0E254D74-60A9-479C-825D-F373C41F40BC.html), make sure you have:
Copy file name to clipboardExpand all lines: articles/azure-vmware/enable-public-ip-nsx-edge.md
+10-7Lines changed: 10 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,6 +27,9 @@ With this capability, you have the following features:
27
27
- DDoS Security protection against network traffic in and out of the Internet.
28
28
- HCX Migration support over the Public Internet.
29
29
30
+
>[!IMPORTANT]
31
+
>You can configure up to 64 total Public IP addresses across these network blocks. If you want to configure more than 64 Public IP addresses, please submit a support ticket stating how many.
32
+
30
33
## Prerequisites
31
34
- Azure VMware Solution private cloud
32
35
- DNS Server configured on the NSX-T Datacenter
@@ -100,18 +103,18 @@ A No NAT rule can be used to exclude certain matches from performing Network Add
100
103
### Inbound Internet Access for VMs
101
104
A Destination Network Translation Service (DNAT) is used to expose a VM on a specific Public IP address and/or a specific port. This service provides inbound internet access to your workload VMs.
102
105
103
-
**Log in VMware NSX-T**
106
+
**Log in to VMware NSX-T**
104
107
1. From your Azure VMware Solution private cloud, select **VMware credentials**.
105
108
2. Locate your NSX-T URL and credentials.
106
109
3. Log in to **VMware NSX-T**.
107
110
108
111
**Configure the DNAT rule**
109
-
1. Name the rule.
110
-
1. Select **DNAT** as the action.
111
-
1. Enter the reserved Public IP in the destination match. This IP is from the range of Public IPs reserved from the Azure VMware Solution Portal.
112
-
1. Enter the VM Private IP in the translated IP.
113
-
1. Select **SAVE**.
114
-
1. Optionally, configure the Translated Port or source IP for more specific matches.
112
+
1. Name the rule.
113
+
1. Select **DNAT** as the action.
114
+
1. Enter the reserved Public IP in the destination match. This IP is from the range of Public IPs reserved from the Azure VMware Solution Portal.
115
+
1. Enter the VM Private IP in the translated IP.
116
+
1. Select **SAVE**.
117
+
1. Optionally, configure the Translated Port or source IP for more specific matches.
115
118
116
119
The VM is now exposed to the internet on the specific Public IP and/or specific ports.
Copy file name to clipboardExpand all lines: articles/azure-vmware/enable-vmware-cds-with-azure.md
+9-1Lines changed: 9 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,6 +21,8 @@ The following diagram shows typical architecture for Cloud Director services wit
21
21
22
22
VMware Cloud Director supports multi-tenancy by using organizations. A single organization can have multiple organization virtual data centers (VDC). Each Organization’s VDC can have their own dedicated Tier-1 router (Edge Gateway) which is further connected with the provider’s managed shared Tier-0 router.
23
23
24
+
[Learn more about CDs on Azure VMware Solutions refernce architecture](https://cloudsolutions.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/docs/cloud-director-service-reference-architecture-for-azure-vmware-solution.pdf)
25
+
24
26
## Connect tenants and their organization virtual datacenters to Azure vNet based resources
25
27
26
28
To provide access to vNET based Azure resources, each tenant can have their own dedicated Azure vNET with Azure VPN gateway. A site-to-site VPN between customer organization VDC and Azure vNET is established. To achieve this connectivity, the provider will provide public IP to the organization VDC. Organization VDC’s administrator can configure IPSEC VPN connectivity from the Cloud Director service portal.
@@ -168,5 +170,11 @@ For more information about VMware Cloud Director Availability, see [VMware Cloud
168
170
169
171
**Answer**: This offering is supported in all Azure regions where Azure VMware Solution is available except for Brazil South and South Africa. Ensure that the region you wish to connect to VMware Cloud Director service is within a 150-milliseconds round trip time for latency with VMware Cloud Director service.
170
172
173
+
**Question**: How do I configure VMware Cloud Director service on Microsoft Azure VMware Solutions?
174
+
175
+
**Answer**[Learn about how to configure CDs on Azure VMware Solutions](https://docs.vmware.com/en/VMware-Cloud-Director-service/services/using-vmware-cloud-director-service/GUID-602DE9DD-E7F6-4114-BD89-347F9720A831.html)
176
+
171
177
## Next steps
172
-
[VMware Cloud Director service Documentation](https://docs.vmware.com/en/VMware-Cloud-Director-service/index.html)
178
+
179
+
[VMware Cloud Director Service Documentation](https://docs.vmware.com/en/VMware-Cloud-Director-service/index.html)
180
+
[Migration to Azure VMware Solutions with Cloud Director service](https://cloudsolutions.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/docs/migration-to-azure-vmware-solution-with-cloud-director-service.pdf)
Copy file name to clipboardExpand all lines: articles/sentinel/connect-aws.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -256,6 +256,7 @@ Permissions policies that must be applied to the [Microsoft Sentinel role you cr
256
256
257
257
For more information, see [Monitor the health of your data connectors](monitor-data-connector-health.md).
258
258
259
+
Learn how to [troubleshoot Amazon Web Services S3 connector issues](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/troubleshoot-amazon-web-services-s3-connector-issues/ba-p/3608072).
Copy file name to clipboardExpand all lines: articles/synapse-analytics/security/synapse-workspace-understand-what-role-you-need.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,6 +46,10 @@ You can review the status of running notebooks and jobs in Apache Spark pools if
46
46
47
47
You can review logs and cancel running jobs and pipelines if you're a Synapse Compute Operator at the workspace or for a specific Spark pool or pipeline.
48
48
49
+
### Debug pipelines
50
+
51
+
You can review and make changes in pipelines as a Synapse User, but if you want to be able to debug it you also need to have Synapse Credential User.
52
+
49
53
### Publish and save your code
50
54
51
55
You can publish new or updated code artifacts to the service if you're a Synapse Artifact Publisher, Synapse Contributor, or Synapse Administrator.
Copy file name to clipboardExpand all lines: articles/virtual-network/service-tags-overview.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,7 +55,7 @@ By default, service tags reflect the ranges for the entire cloud. Some service t
55
55
|**AzureAttestation**| Azure Attestation. | Outbound | No | Yes |
56
56
|**AzureBackup**|Azure Backup.<br/><br/>**Note**: This tag has a dependency on the **Storage** and **AzureActiveDirectory** tags. | Outbound | No | Yes |
57
57
|**AzureBotService**| Azure Bot Service. | Outbound | No | No |
58
-
|**AzureCloud**| All [datacenter public IP addresses](https://www.microsoft.com/download/details.aspx?id=56519). |Outbound| Yes | Yes |
58
+
|**AzureCloud**| All [datacenter public IP addresses](https://www.microsoft.com/download/details.aspx?id=56519). |Both| Yes | Yes |
59
59
|**AzureCognitiveSearch**| Azure Cognitive Search. <br/><br/>This tag or the IP addresses covered by this tag can be used to grant indexers secure access to data sources. For more information about indexers, see [indexer connection documentation](../search/search-indexer-troubleshooting.md#connection-errors). <br/><br/> **Note**: The IP of the search service isn't included in the list of IP ranges for this service tag and **also needs to be added** to the IP firewall of data sources. | Inbound | No | No |
60
60
|**AzureConnectors**| This tag represents the IP addresses used for managed connectors that make inbound webhook callbacks to the Azure Logic Apps service and outbound calls to their respective services, for example, Azure Storage or Azure Event Hubs. | Both | Yes | Yes |
|**AzureDigitalTwins**| Azure Digital Twins.<br/><br/>**Note**: This tag or the IP addresses covered by this tag can be used to restrict access to endpoints configured for event routes. | Inbound | No | Yes |
70
70
|**AzureEventGrid**| Azure Event Grid. | Both | No | No |
71
71
|**AzureFrontDoor.Frontend** <br/> **AzureFrontDoor.Backend** <br/> **AzureFrontDoor.FirstParty**| Azure Front Door. | Both | No | No |
Copy file name to clipboardExpand all lines: includes/virtual-network-multiple-ip-addresses-intro.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,11 +21,14 @@ An Azure Virtual Machine (VM) has one or more network interfaces (NIC) attached
21
21
22
22
* Hosting multiple websites or services with different IP addresses and SSL certificates on a single server.
23
23
* Serve as a network virtual appliance, such as a firewall or load balancer.
24
-
* The ability to add any of the private IP addresses for any of the NICs to an Azure Load Balancer back-end pool. In the past, only the primary IP address for the primary NIC could be added to a back-end pool. To learn more about how to load balance multiple IP configurations, read the [Load balancing multiple IP configurations](../articles/load-balancer/load-balancer-multiple-ip.md?toc=%2fazure%2fvirtual-network%2ftoc.json) article.
24
+
* The ability to add any of the private IP addresses for any of the NICs to an Azure Load Balancer back-end pool. In the past, only the primary IP address for the primary NIC could be added to a back-end pool. To learn more about how to load balance inbound multiple IP configurations, read the [Load balancing multiple IP configurations](../articles/load-balancer/load-balancer-multiple-ip.md?toc=%2fazure%2fvirtual-network%2ftoc.json) article.
25
+
26
+
> [!NOTE]
27
+
> Secondary IPConfigs are not supported for use in Outbound rules in Public Load Balancers.
25
28
26
29
Every NIC attached to a VM has one or more IP configurations associated to it. Each configuration is assigned one static or dynamic private IP address. Each configuration may also have one public IP address resource associated to it. A public IP address resource has either a dynamic or static public IP address assigned to it. To learn more about IP addresses in Azure, read the [IP addresses in Azure](../articles/virtual-network/ip-services/public-ip-addresses.md) article.
27
30
28
31
> [!NOTE]
29
32
> All IP configurations on a single NIC must be associated to the same subnet. If multiple IPs on different subnets are desired, multiple NICs on a VM can be used. To learn more about multiple NICs on a VM in Azure, read the [Create VM with Multiple NICs](../articles/virtual-machines/windows/multiple-nics.md) article.
30
33
31
-
There is a limit to how many private IP addresses can be assigned to a NIC. There is also a limit to how many public IP addresses that can be used in an Azure subscription. See the [Azure limits](../articles/azure-resource-manager/management/azure-subscription-service-limits.md?toc=%2fazure%2fvirtual-network%2ftoc.json#azure-resource-manager-virtual-networking-limits) article for details.
34
+
There is a limit to how many private IP addresses can be assigned to a NIC. There is also a limit to how many public IP addresses that can be used in an Azure subscription. See the [Azure limits](../articles/azure-resource-manager/management/azure-subscription-service-limits.md?toc=%2fazure%2fvirtual-network%2ftoc.json#azure-resource-manager-virtual-networking-limits) article for details.
0 commit comments