Skip to content

Commit b626d03

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into us366769-vnet-toc
2 parents 204276d + df75196 commit b626d03

File tree

140 files changed

+1583
-1119
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

140 files changed

+1583
-1119
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5223,6 +5223,11 @@
52235223
"source_path_from_root": "/articles/reliability/cross-region-replication-azure-no-pair.md",
52245224
"redirect_url": "/azure/reliability/regions-multi-region-nonpaired",
52255225
"redirect_document_id": false
5226+
},
5227+
{
5228+
"source_path_from_root": "/articles/reliability/reliability-hdinsight-on-aks.md",
5229+
"redirect_url": "/azure/reliability/overview-reliability-guidance",
5230+
"redirect_document_id": false
52265231
}
52275232
]
52285233
}

articles/active-directory-b2c/identity-provider-generic-saml-options.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -422,7 +422,7 @@ Upon an application sign-out request, Azure AD B2C attempts to sign out from you
422422

423423
## Debug SAML protocol
424424

425-
To help configure and debug federation with a SAML identity provider, you can use a browser extension for the SAML protocol, such as [SAML DevTools extension](https://chrome.google.com/webstore/detail/saml-devtools-extension/jndllhgbinhiiddokbeoeepbppdnhhio) for Chrome, [SAML-tracer](https://addons.mozilla.org/es/firefox/addon/saml-tracer/) for FireFox, or [Microsoft Edge or Internet Explorer developer tools](https://techcommunity.microsoft.com/t5/microsoft-sharepoint-blog/gathering-a-saml-token-using-edge-or-ie-developer-tools/ba-p/320957).
425+
To help configure and debug federation with a SAML identity provider, you can use a browser extension for the SAML protocol, such as [SAML DevTools extension](https://chrome.google.com/webstore/detail/saml-devtools-extension/jndllhgbinhiiddokbeoeepbppdnhhio) for Chrome, [SAML-tracer](https://addons.mozilla.org/es/firefox/addon/saml-tracer/) for Firefox, or [Microsoft Edge or Internet Explorer developer tools](https://techcommunity.microsoft.com/t5/microsoft-sharepoint-blog/gathering-a-saml-token-using-edge-or-ie-developer-tools/ba-p/320957).
426426

427427
Using these tools, you can check the integration between Azure AD B2C and your SAML identity provider. For example:
428428

articles/active-directory-b2c/troubleshoot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -165,7 +165,7 @@ Use **Run now** and `https://jwt.ms` to test your policies independently of your
165165

166166
## Troubleshoot SAML protocol
167167

168-
To help configure and debug the integration with your service provider, you can use a browser extension for the SAML protocol, for example, [SAML DevTools extension](https://chrome.google.com/webstore/detail/saml-devtools-extension/jndllhgbinhiiddokbeoeepbppdnhhio) for Chrome, [SAML-tracer](https://addons.mozilla.org/es/firefox/addon/saml-tracer/) for FireFox, or [Edge or Internet Explorer developer tools](https://techcommunity.microsoft.com/t5/microsoft-sharepoint-blog/gathering-a-saml-token-using-edge-or-ie-developer-tools/ba-p/320957).
168+
To help configure and debug the integration with your service provider, you can use a browser extension for the SAML protocol, for example, [SAML DevTools extension](https://chrome.google.com/webstore/detail/saml-devtools-extension/jndllhgbinhiiddokbeoeepbppdnhhio) for Chrome, [SAML-tracer](https://addons.mozilla.org/es/firefox/addon/saml-tracer/) for Firefox, or [Edge or Internet Explorer developer tools](https://techcommunity.microsoft.com/t5/microsoft-sharepoint-blog/gathering-a-saml-token-using-edge-or-ie-developer-tools/ba-p/320957).
169169

170170
The following screenshot demonstrates how the SAML DevTools extension presents the SAML request Azure AD B2C sends to the identity provider, and the SAML response.
171171

articles/app-service/environment/networking.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -141,7 +141,7 @@ For more information about Private Endpoint and Web App, see [Azure Web App Priv
141141

142142
## DNS
143143

144-
The following sections describe the DNS considerations and configuration that apply inbound to and outbound from your App Service Environment. The examples use the domain suffix `appserviceenvironment.net` from Azure Public Cloud. If you're using other clouds like Azure Government, you need to use their respective domain suffix. For App Service Environment domains, the site name is truncated at 40 characters because of DNS limits. If you have a slot, the slot name is truncated at 19 characters.
144+
The following sections describe the DNS considerations and configuration that apply inbound to and outbound from your App Service Environment. The examples use the domain suffix `appserviceenvironment.net` from Azure Public Cloud. If you're using other clouds like Azure Government, you need to use their respective domain suffix. For App Service Environment domains, the site name is truncated at 59 characters because of DNS limits. For App Service Environment domains with slots, the site name is truncated at 40 characters and the slot name is truncated at 19 characters because of DNS limits.
145145

146146
### DNS configuration to your App Service Environment
147147

articles/app-service/environment/overview.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -152,6 +152,7 @@ App Service Environment v3 is available in the following regions:
152152
| Korea Central |||
153153
| Korea South || |
154154
| Mexico Central ||** |
155+
| New Zealand North |||
155156
| North Central US || |
156157
| North Europe |||
157158
| Norway East |||
@@ -243,6 +244,7 @@ The following sections list the regional pricing tiers (SKUs) availability for A
243244
| Korea Central ||| |
244245
| Korea South ||||
245246
| Mexico Central ||| |
247+
| New Zealand North ||| |
246248
| North Central US ||||
247249
| North Europe ||||
248250
| Norway East ||||

articles/app-service/wordpress-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ Key tools for debugging and monitoring WordPress sites include:
9090
- **[SSH Access](configure-linux-open-ssh-session.md?pivots=container-linux)**
9191

9292
### PhpMyAdmin
93-
WordPress on App Service utilizes an Azure Database for MySQL flexible server, which is integrated into a VNET. This setup restricts database access to within the VNET. WordPress on App Service includes phpMyAdmin by default. You can access it at: https://`<your-site-link>`/phpmyadmin.
93+
WordPress on App Service utilizes an Azure Database for MySQL Flexible Server, which is integrated into a VNET. This setup restricts database access to within the VNET. WordPress on App Service includes phpMyAdmin by default. You can access it at: https://`<your-site-link>`/phpmyadmin.
9494

9595
If you are using Managed Identities, you can log in to phpMyAdmin by using the value from DATABASE_USERNAME environment variable as the username and the token as the password. To find the token use your Kudu SSH to run the following command:
9696

articles/azure-resource-manager/managed-applications/publish-managed-identity.md

Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -359,6 +359,70 @@ The response contains an array of tokens under the `value` property:
359359
| `resourceId` | The Azure resource ID for the issued token. This value is either the managed application ID or the user-assigned managed identity ID. |
360360
| `token_type` | The type of the token. |
361361

362+
## Create a managed identity and role assignment for managed applications
363+
364+
This section describes how to create a managed identity and assign a role as part of a managed application using publisher access mode.
365+
366+
1. Create a managed identity using an Azure Resource Manager template.
367+
368+
```json
369+
{
370+
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
371+
"contentVersion": "1.0.0.0",
372+
"resources": [
373+
{
374+
"type": "Microsoft.ManagedIdentity/userAssignedIdentities",
375+
"apiVersion": "2018-11-30",
376+
"name": "myManagedIdentity",
377+
"location": "[resourceGroup().location]"
378+
}
379+
]
380+
}
381+
```
382+
383+
1. To allow for managed identity propagation, create a sleep time of 30 seconds.
384+
385+
Since the managed identity is not in the home tenant of the target scope, you must apply a delay between creating the managed identity and assigning the role to allow the managed identity to propagate between tenants. Without this delay, Azure Resource Manager might not recognize this identity when used in the template and fail within a future deployment script.
386+
387+
```json
388+
{
389+
"type": "Microsoft.Resources/deploymentScripts",
390+
"apiVersion": "2020-10-01",
391+
"name": "sleepScript",
392+
"location": "[resourceGroup().location]",
393+
"properties": {
394+
"azPowerShellVersion": "2.0",
395+
"scriptContent": "Start-Sleep -Seconds 30",
396+
"timeout": "PT1H",
397+
"cleanupPreference": "OnSuccess",
398+
"retentionInterval": "P1D"
399+
},
400+
"dependsOn": [
401+
"myManagedIdentity"
402+
]
403+
}
404+
```
405+
406+
1. Assign the Contributor role to the managed identity at the scope of the managed resource group.
407+
408+
```json
409+
{
410+
"type": "Microsoft.Authorization/roleAssignments",
411+
"apiVersion": "2020-04-01-preview",
412+
"name": "[guid(resourceGroup().id, 'Contributor')]",
413+
"properties": {
414+
"roleDefinitionId": "[subscriptionResourceId('Microsoft.Authorization/roleDefinitions', 'b24988ac-6180-42a0-ab88-20f7382dd24c')]",
415+
"principalId": "[reference(resourceId('Microsoft.ManagedIdentity/userAssignedIdentities', 'myManagedIdentity'), '2018-11-30').principalId]",
416+
"scope": "[resourceGroup().id]",
417+
"delegatedManagedIdentityResourceId": "[resourceId('Microsoft.ManagedIdentity/userAssignedIdentities','myManagedIdentity')]"
418+
},
419+
"dependsOn": [
420+
"myManagedIdentity",
421+
"sleepScript"
422+
]
423+
}
424+
```
425+
362426
## Next steps
363427

364428
> [!div class="nextstepaction"]

articles/azure-resource-manager/management/create-private-link-access-commands.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ To create the private link association, use:
7777

7878
# [Azure CLI](#tab/azure-cli)
7979

80-
### Example
80+
### Example
8181

8282
```azurecli
8383
# Login first with az login if not using Cloud Shell

0 commit comments

Comments
 (0)