Skip to content

Commit b8c9d15

Browse files
authored
Merge pull request #201818 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 155729d + fdca371 commit b8c9d15

File tree

5 files changed

+14
-13
lines changed

5 files changed

+14
-13
lines changed

articles/active-directory/develop/msal-net-client-assertions.md

Lines changed: 5 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ MSAL.NET has four methods to provide either credentials or assertions to the con
3131
- `.WithClientClaims()`
3232

3333
> [!NOTE]
34-
> While it is possible to use the `WithClientAssertion()` API to acquire tokens for the confidential client, we do not recommend using it by default as it is more advanced and is designed to handle very specific scenarios which are not common. Using the `.WithCertificate()` API will allow MSAL.NET to handle this for you. This api offers you the ability to customize your authentication request if needed but the default assertion created by `.WithCertificate()` will suffice for most authentication scenarios. This API can also be used as a workaround in some scenarios where MSAL.NET fails to perform the signing operation internally.
34+
> While it is possible to use the `WithClientAssertion()` API to acquire tokens for the confidential client, we do not recommend using it by default as it is more advanced and is designed to handle very specific scenarios which are not common. Using the `.WithCertificate()` API will allow MSAL.NET to handle this for you. This api offers you the ability to customize your authentication request if needed but the default assertion created by `.WithCertificate()` will suffice for most authentication scenarios. This API can also be used as a workaround in some scenarios where MSAL.NET fails to perform the signing operation internally. The difference between the two is using the `WithCertificate()` requires the certificate and private key to be available on the machine creating the assertion, and using the `WithClientAssertion()` allows you to compute the assertion somewhere else, like inside the Azure Key Vault or from Managed Identity, or with a Hardware security module.
3535
3636
### Signed assertions
3737

@@ -49,13 +49,10 @@ You can also use the delegate form, which enables you to compute the assertion j
4949
```csharp
5050
string signedClientAssertion = ComputeAssertion();
5151
app = ConfidentialClientApplicationBuilder.Create(config.ClientId)
52-
.WithClientAssertion(() => { return GetSignedClientAssertion(); } )
53-
.Build();
54-
55-
// or in async manner
56-
57-
app = ConfidentialClientApplicationBuilder.Create(config.ClientId)
58-
.WithClientAssertion(async cancellationToken => { return await GetClientAssertionAsync(cancellationToken); })
52+
.WithClientAssertion(async (AssertionRequestOptions options) => {
53+
// use 'options.ClientID' or 'options.TokenEndpoint' to generate client assertion
54+
return await GetClientAssertionAsync(options.ClientID, options.TokenEndpoint, options.CancellationToken);
55+
})
5956
.Build();
6057
```
6158

articles/azure-arc/data/create-complete-managed-instance-directly-connected.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -181,7 +181,7 @@ NAME STATE
181181
<namespace> Ready
182182
```
183183

184-
## Create an Azure Arc-enabled SQL Managed Instance
184+
## Create an instance of Azure Arc-enabled SQL Managed Instance
185185

186186
1. In the portal, locate the resource group.
187187
1. In the resource group, select **Create**.

articles/defender-for-cloud/defender-for-containers-architecture.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ These components are required in order to receive the full protection offered by
8080

8181
- **[Azure Arc-enabled Kubernetes](../azure-arc/kubernetes/overview.md)** - An agent based solution that connects your EKS clusters to Azure. Azure then is capable of providing services such as Defender, and Policy as [Arc extensions](../azure-arc/kubernetes/extensions.md).
8282

83-
- **The Defender extension** – The [DeamonSet](https://kubernetes.io/docs/concepts/workloads/controllers/daemonset/) that collects signals from hosts using [eBPF technology](https://ebpf.io/), and provides runtime protection. The extension is registered with a Log Analytics workspace, and used as a data pipeline. However, the audit log data isn't stored in the Log Analytics workspace.
83+
- **The Defender extension** – The [DaemonSet](https://kubernetes.io/docs/concepts/workloads/controllers/daemonset/) that collects signals from hosts using [eBPF technology](https://ebpf.io/), and provides runtime protection. The extension is registered with a Log Analytics workspace, and used as a data pipeline. However, the audit log data isn't stored in the Log Analytics workspace.
8484

8585
- **The Azure Policy extension** - The workload's configuration information is collected by the Azure Policy add-on. The Azure Policy add-on extends the open-source [Gatekeeper v3](https://github.com/open-policy-agent/gatekeeper) admission controller webhook for [Open Policy Agent](https://www.openpolicyagent.org/). The extension registers as a web hook to Kubernetes admission control and makes it possible to apply at-scale enforcements, and safeguards on your clusters in a centralized, consistent manner. For more information, see [Understand Azure Policy for Kubernetes clusters](../governance/policy/concepts/policy-for-kubernetes.md).
8686

@@ -99,7 +99,7 @@ These components are required in order to receive the full protection offered by
9999

100100
- **[Azure Arc-enabled Kubernetes](../azure-arc/kubernetes/overview.md)** - An agent based solution that connects your EKS clusters to Azure. Azure then is capable of providing services such as Defender, and Policy as [Arc extensions](../azure-arc/kubernetes/extensions.md).
101101

102-
- **The Defender extension** – The [DeamonSet](https://kubernetes.io/docs/concepts/workloads/controllers/daemonset/) that collects signals from hosts using [eBPF technology](https://ebpf.io/), and provides runtime protection. The extension is registered with a Log Analytics workspace, and used as a data pipeline. However, the audit log data isn't stored in the Log Analytics workspace.
102+
- **The Defender extension** – The [DaemonSet](https://kubernetes.io/docs/concepts/workloads/controllers/daemonset/) that collects signals from hosts using [eBPF technology](https://ebpf.io/), and provides runtime protection. The extension is registered with a Log Analytics workspace, and used as a data pipeline. However, the audit log data isn't stored in the Log Analytics workspace.
103103

104104
- **The Azure Policy extension** - The workload's configuration information is collected by the Azure Policy add-on. The Azure Policy add-on extends the open-source [Gatekeeper v3](https://github.com/open-policy-agent/gatekeeper) admission controller webhook for [Open Policy Agent](https://www.openpolicyagent.org/). The extension registers as a web hook to Kubernetes admission control and makes it possible to apply at-scale enforcements, and safeguards on your clusters in a centralized, consistent manner. For more information, see [Understand Azure Policy for Kubernetes clusters](../governance/policy/concepts/policy-for-kubernetes.md).
105105

articles/event-grid/consume-private-endpoints.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Then, you can use a private link configured in Azure Functions or your webhook d
1717
:::image type="content" source="./media/consume-private-endpoints/deliver-private-link-service.svg" alt-text="Deliver via private link service":::
1818

1919

20-
Under this configuration, the traffic goes over the public IP/internet from Event Grid to Event Hubs, Service Bus, or Azure Storage, but the channel can be encrypted and a managed identity of Event Grid is used. If you configure your Azure Functions or webhook deployed to your virtual network to use an Event Hubs, Service Bus, or Azure Storage via private link, that section of the traffic will evidently stay within Azure.
20+
Under this configuration, the secured traffic from Event Grid to Event Hubs, Service Bus, or Azure Storage, [stays on the Microsoft backbone](../networking/microsoft-global-network.md#get-the-premium-cloud-network) and a managed identity of Event Grid is used. Configuring your Azure Function or webhook from within your virtual network to use an Event Hubs, Service Bus, or Azure Storage via private link ensures the traffic between those services and your function or webhook stays within your virtual network perimeter.
2121

2222
## Deliver events to Event Hubs using managed identity
2323
To deliver events to event hubs in your Event Hubs namespace using managed identity, follow these steps:
@@ -44,4 +44,4 @@ To deliver events to Storage queues using managed identity, follow these steps:
4444

4545

4646
## Next steps
47-
For more information about delivering events using a managed identity, see [Event delivery using a managed identity](managed-service-identity.md).
47+
For more information about delivering events using a managed identity, see [Event delivery using a managed identity](managed-service-identity.md).

articles/iot-dps/quick-create-simulated-device-x509.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -581,6 +581,10 @@ In this section, you'll use your Windows command prompt.
581581
```
582582

583583
If you want to pass the certificate and password as a parameter, you can use the following format.
584+
585+
>[!NOTE]
586+
>Additional parameters can be passed along while running the application to change the TransportType (-t) and the GlobalDeviceEndpoint (-g).
587+
584588

585589
```cmd
586590
dotnet run -- -s 0ne00000A0A -c certificate.pfx -p 1234

0 commit comments

Comments
 (0)