Skip to content

Commit b93d06d

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into azuread-accessreviews-multistagereview
2 parents 86c4eb2 + b25b223 commit b93d06d

File tree

24 files changed

+108
-92
lines changed

24 files changed

+108
-92
lines changed

articles/active-directory-b2c/claim-resolver-overview.md

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 1/11/2022
12+
ms.date: 02/16/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -47,6 +47,8 @@ The following table lists the claim resolvers with information about the languag
4747
| {Culture:RegionName} | The two letter ISO code for the region. | US |
4848
| {Culture:RFC5646} | The RFC5646 language code. | en-US |
4949

50+
Check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-resolver#culture) of the culture claim resolvers.
51+
5052
## Policy
5153

5254
The following table lists the claim resolvers with information about the policy used in the authorization request:
@@ -58,6 +60,7 @@ The following table lists the claim resolvers with information about the policy
5860
| {Policy:TenantObjectId} | The tenant object ID of the relying party policy. | 00000000-0000-0000-0000-000000000000 |
5961
| {Policy:TrustFrameworkTenantId} | The tenant ID of the trust framework. | your-tenant.onmicrosoft.com |
6062

63+
Check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-resolver#policy) of the policy claim resolvers.
6164

6265
## Context
6366

@@ -73,6 +76,8 @@ The following table lists the contextual claim resolvers of the authorization re
7376
| {Context:IPAddress} | The user IP address. | 11.111.111.11 |
7477
| {Context:KMSI} | Indicates whether [Keep me signed in](session-behavior.md?pivots=b2c-custom-policy#enable-keep-me-signed-in-kmsi) checkbox is selected. | true |
7578

79+
Check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-resolver#context) of the context claim resolvers.
80+
7681
## Claims
7782

7883
This section describes how to get a claim value as a claim resolver.
@@ -100,6 +105,8 @@ The following table lists the claim resolvers with information about the OpenID
100105
| {OIDC:Scope} |The `scope` query string parameter. | openid |
101106
| {OIDC:Username}| The [resource owner password credentials flow](add-ropc-policy.md) user's username.| [email protected]|
102107

108+
Check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-resolver#openid-connect-relying-party-application) of the OpenID Connect claim resolvers.
109+
103110
## OAuth2 key-value parameters
104111

105112
Any parameter name included as part of an OIDC or OAuth2 request can be mapped to a claim in the user journey. For example, the request from the application might include a query string parameter with a name of `app_session`, `loyalty_number`, or any custom query string.
@@ -127,6 +134,8 @@ The following table lists the claim resolvers with information about the SAML a
127134
| {SAML:Subject} | The `Subject` from the NameId element of the SAML AuthN request.|
128135
| {SAML:Binding} | The `ProtocolBinding` attribute value, from the `AuthnRequest` element of the SAML request. | urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST |
129136

137+
Check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-resolver#saml-service-provider) of the SAML claim resolvers.
138+
130139
## OAuth2 identity provider
131140

132141
The following table lists the [OAuth2 identity provider](oauth2-technical-profile.md) claim resolvers:
@@ -157,7 +166,6 @@ To use the OAuth2 identity provider claim resolvers, set the output claim's `Par
157166
</ClaimsProvider>
158167
```
159168

160-
161169
## Using claim resolvers
162170

163171
You can use claims resolvers with the following elements:
@@ -287,3 +295,7 @@ In a [Relying party](relyingparty.md) policy technical profile, you may want to
287295
</TechnicalProfile>
288296
</RelyingParty>
289297
```
298+
299+
## Next steps
300+
301+
- Find more [claims resolvers samples](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-resolver) on the Azure AD B2C community GitHub repo

articles/active-directory-b2c/claimsschema.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 03/05/2020
11+
ms.date: 02/16/2022
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
ms.custom: "b2c-support"
@@ -238,6 +238,8 @@ The Identity Experience Framework renders the email address claim with email for
238238

239239
Azure AD B2C supports a variety of user input types, such as a textbox, password, and dropdown list that can be used when manually entering claim data for the claim type. You must specify the **UserInputType** when you collect information from the user by using a [self-asserted technical profile](self-asserted-technical-profile.md) and [display controls](display-controls.md).
240240

241+
Check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims#user-input-types) of the user input type.
242+
241243
The **UserInputType** element available user input types:
242244

243245
| UserInputType | Supported ClaimType | Description |

articles/active-directory/authentication/active-directory-certificate-based-authentication-android.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 11/21/2019
9+
ms.date: 02/16/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -24,9 +24,6 @@ Android devices can use certificate-based authentication (CBA) to authenticate t
2424

2525
Configuring this feature eliminates the need to enter a username and password combination into certain mail and Microsoft Office applications on your mobile device.
2626

27-
This topic provides you with the requirements and the supported scenarios for configuring CBA on an Android device for users of tenants in Office 365 Enterprise, Business, Education, US Government, China, and Germany plans.
28-
29-
This feature is available in preview in Office 365 US Government Defense and Federal plans.
3027

3128
## Microsoft mobile applications support
3229

articles/active-directory/authentication/active-directory-certificate-based-authentication-ios.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 04/17/2020
9+
ms.date: 02/16/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -23,7 +23,6 @@ To improve security, iOS devices can use certificate-based authentication (CBA)
2323

2424
Using certificates eliminates the need to enter a username and password combination into certain mail and Microsoft Office applications on your mobile device.
2525

26-
This article details the requirements and the supported scenarios for configuring CBA on an iOS device. CBA for iOS is available across Azure public clouds, Microsoft Government Cloud, Microsoft Cloud Germany, and Microsoft Azure China 21Vianet.
2726

2827
## Microsoft mobile applications support
2928

articles/active-directory/authentication/concept-mfa-data-residency.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 06/03/2021
9+
ms.date: 02/16/2021
1010

1111
ms.author: justinha
1212
author: justinha
@@ -53,7 +53,7 @@ For Azure public clouds, excluding Azure AD B2C authentication, the NPS Extensio
5353
| Voice call | Multifactor authentication logs<br/>Multifactor authentication activity report data store<br/>Blocked users (if fraud was reported) |
5454
| Microsoft Authenticator notification | Multifactor authentication logs<br/>Multifactor authentication activity report data store<br/>Blocked users (if fraud was reported)<br/>Change requests when the Microsoft Authenticator device token changes |
5555

56-
For Microsoft Azure Government, Microsoft Azure Germany, Microsoft Azure operated by 21Vianet, Azure AD B2C authentication, the NPS extension, and the Windows Server 2016 or 2019 AD FS adapter, the following personal data is stored:
56+
For Microsoft Azure Government, Microsoft Azure operated by 21Vianet, Azure AD B2C authentication, the NPS extension, and the Windows Server 2016 or 2019 AD FS adapter, the following personal data is stored:
5757

5858
| Event type | Data store type |
5959
|--------------------------------------|-----------------|
@@ -125,7 +125,6 @@ The following table shows the location for service logs for sovereign clouds.
125125

126126
| Sovereign cloud | Sign-in logs | Multifactor authentication activity report | Multifactor authentication service logs |
127127
|--------------------------------------|--------------------------------------|--------------------------------------------|-----------------------------------------|
128-
| Microsoft Azure Germany | Germany | United States | United States |
129128
| Azure China 21Vianet | China | United States | United States |
130129
| Microsoft Government Cloud | United States | United States | United States |
131130

articles/active-directory/authentication/concept-registration-mfa-sspr-combined.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 07/29/2021
9+
ms.date: 02/16/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -31,7 +31,7 @@ This article outlines what combined security registration is. To get started wit
3131

3232
Before enabling the new experience, review this administrator-focused documentation and the user-focused documentation to ensure you understand the functionality and effect of this feature. Base your training on the [user documentation](https://support.microsoft.com/account-billing/set-up-your-security-info-from-a-sign-in-prompt-28180870-c256-4ebf-8bd7-5335571bf9a8) to prepare your users for the new experience and help to ensure a successful rollout.
3333

34-
Azure AD combined security information registration is available for Azure US Government but not Azure Germany or Azure China 21Vianet.
34+
Azure AD combined security information registration is available for Azure US Government but not Azure China 21Vianet.
3535

3636
> [!IMPORTANT]
3737
> Users that are enabled for both the original preview and the enhanced combined registration experience see the new behavior. Users that are enabled for both experiences see only the My Account experience. The *My Account* aligns with the look and feel of combined registration and provides a seamless experience for users. Users can see My Account by going to [https://myaccount.microsoft.com](https://myaccount.microsoft.com).

articles/azure-arc/kubernetes/faq.md

Lines changed: 3 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -4,15 +4,13 @@ services: azure-arc
44
ms.service: azure-arc
55
ms.date: 02/15/2022
66
ms.topic: conceptual
7-
author: csand-msft
8-
ms.author: csand
97
description: "This article contains a list of frequently asked questions related to Azure Arc-enabled Kubernetes and Azure GitOps"
10-
keywords: "Kubernetes, Arc, Azure, containers, configuration, GitOps, Flux, faq"
8+
keywords: "Kubernetes, Arc, Azure, containers, configuration, GitOps, faq"
119
---
1210

13-
# Frequently Asked Questions - Azure Arc-enabled Kubernetes
11+
# Frequently Asked Questions - Azure Arc-enabled Kubernetes and GitOps
1412

15-
This article addresses frequently asked questions about Azure Arc-enabled Kubernetes.
13+
This article addresses frequently asked questions about Azure Arc-enabled Kubernetes and GitOps.
1614

1715
## What is the difference between Azure Arc-enabled Kubernetes and Azure Kubernetes Service (AKS)?
1816

@@ -81,32 +79,6 @@ This feature applies baseline configurations (like network policies, role bindin
8179

8280
The compliance state of each GitOps configuration is reported back to Azure. This lets you keep track of any failed deployments.
8381

84-
## Error installing the microsoft.flux extension (Flux v2)
85-
86-
The `microsoft.flux` extension installs the Flux controllers and Azure GitOps agents into your Azure Arc-enabled Kubernetes or AKS clusters. If you experience an error during installation below are some troubleshooting actions.
87-
88-
* Error message
89-
90-
```console
91-
{'code':'DeploymentFailed','message':'At least one resource deployment operation failed. Please list deployment operations for details. Please see https://aka.ms/DeployOperations for usage details.','details':[{'code':'ExtensionCreationFailed','message':' Request failed to https://management.azure.com/subscriptions/<SUBSCRIPTION_ID>/resourceGroups/<RESOURCE_GROUP>/providers/Microsoft.ContainerService/managedclusters/<CLUSTER_NAME>/extensionaddons/flux?api-version=2021-03-01. Error code: BadRequest. Reason: Bad Request'}]}
92-
```
93-
94-
* For AKS cluster, assure that the subscription has the following feature flag enabled: `Microsoft.ContainerService/AKS-ExtensionManager`.
95-
96-
```console
97-
az feature register --namespace Microsoft.ContainerService --name AKS-ExtensionManager
98-
```
99-
100-
* Force delete the extension.
101-
102-
```console
103-
az k8s-extension delete --force -g <RESOURCE_GROUP> -c <CLUSTER_NAME> -n flux -t <managedClusters OR connectedClusters>
104-
```
105-
106-
* Assure that the cluster does not have any policies that restrict creation of the `flux-system` namespace or resources in that namespace.
107-
108-
After you have verified the above, you can re-install the extension.
109-
11082
## Does Azure Arc-enabled Kubernetes store any customer data outside of the cluster's region?
11183

11284
The feature to enable storing customer data in a single region is currently only available in the Southeast Asia Region (Singapore) of the Asia Pacific Geo and Brazil South (Sao Paulo State) Region of Brazil Geo. For all other regions, customer data is stored in Geo. For more information, see [Trust Center](https://azure.microsoft.com/global-infrastructure/data-residency/).

articles/azure-arc/kubernetes/troubleshooting.md

Lines changed: 34 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,15 @@ title: "Troubleshoot common Azure Arc-enabled Kubernetes issues"
33
services: azure-arc
44
ms.service: azure-arc
55
#ms.subservice: azure-arc-kubernetes coming soon
6-
ms.date: 12/07/2021
6+
ms.date: 02/15/2022
77
ms.topic: article
8-
description: "Troubleshooting common issues with Azure Arc-enabled Kubernetes clusters."
9-
keywords: "Kubernetes, Arc, Azure, containers"
8+
description: "Troubleshooting common issues with Azure Arc-enabled Kubernetes clusters and GitOps."
9+
keywords: "Kubernetes, Arc, Azure, containers, GitOps, Flux"
1010
---
1111

12-
# Azure Arc-enabled Kubernetes troubleshooting
12+
# Azure Arc-enabled Kubernetes and GitOps troubleshooting
1313

14-
This document provides troubleshooting guides for issues with connectivity, permissions, and agents.
14+
This document provides troubleshooting guides for issues with Azure Arc-enabled Kubernetes connectivity, permissions, and agents. It also provides troubleshooting guides for Azure GitOps, which can be used in either Azure Arc-enabled Kubernetes or Azure Kubernetes Service (AKS) clusters.
1515

1616
## General troubleshooting
1717

@@ -216,12 +216,15 @@ metadata:
216216

217217
### Installing the `microsoft.flux` extension (Flux v2)
218218

219-
If the `microsoft.flux` extension is in a failed state, you can run a script to investigate. The cluster-type parameter can be set to `connectedClusters` for Arc cluster or `managedClusters` for AKS cluster. The name of the `microsoft.flux` extension will be "flux" if the extension was installed automatically during creation of a `fluxConfigurations` resource. Look in the "statuses" object for information.
219+
The `microsoft.flux` extension installs the Flux controllers and Azure GitOps agents into your Azure Arc-enabled Kubernetes or Azure Kubernetes Service (AKS) clusters. If the extension is not already installed in a cluster and you create a GitOps configuration resource for that cluster, the extension will be installed automatically.
220+
221+
If you experience an error during installation or if the extension is in a failed state, you can first run a script to investigate. The cluster-type parameter can be set to `connectedClusters` for an Arc-enabled cluster or `managedClusters` for an AKS cluster. The name of the `microsoft.flux` extension will be "flux" if the extension was installed automatically during creation of a GitOps configuration. Look in the "statuses" object for information.
220222

221223
One example:
222224

223225
```console
224-
az k8s-extension show --resource-group RESOURCE_GROUP --cluster-name CLUSTER_NAME --cluster-type connectedClusters -n flux
226+
az k8s-extension show -g <RESOURCE_GROUP> -c <CLUSTER_NAME> -n flux -t <connectedClusters or managedClusters>
227+
flux
225228

226229
...
227230
"statuses": [
@@ -238,7 +241,7 @@ az k8s-extension show --resource-group RESOURCE_GROUP --cluster-name CLUSTER_NAM
238241
Another example:
239242

240243
```console
241-
az k8s-extension show --resource-group RESOURCE_GROUP --cluster-name CLUSTER_NAME --cluster-type connectedClusters -n flux
244+
az k8s-extension show -g <RESOURCE_GROUP> -c <CLUSTER_NAME> -n flux -t <connectedClusters or managedClusters>
242245

243246
"statuses": [
244247
{
@@ -251,19 +254,37 @@ az k8s-extension show --resource-group RESOURCE_GROUP --cluster-name CLUSTER_NAM
251254
]
252255
```
253256

254-
In both of these cases, delete the `flux-system` namespace and uninstall the Helm release. This should resolve the extension installation issue.
257+
Another example from the portal:
255258

256259
```console
257-
kubectl delete namespaces flux-system -A
258-
helm uninstall flux -n -flux-system
260+
{'code':'DeploymentFailed','message':'At least one resource deployment operation failed. Please list
261+
deployment operations for details. Please see https://aka.ms/DeployOperations for usage details.
262+
','details':[{'code':'ExtensionCreationFailed', 'message':' Request failed to https://management.azure.com/
263+
subscriptions/<SUBSCRIPTION_ID>/resourceGroups/<RESOURCE_GROUP>/providers/Microsoft.ContainerService/
264+
managedclusters/<CLUSTER_NAME>/extensionaddons/flux?api-version=2021-03-01. Error code: BadRequest.
265+
Reason: Bad Request'}]}
259266
```
260267

261-
If that doesn't resolve the issue, you can delete the extension. After deleting the extension, you can either [re-create a flux configuration](./tutorial-use-gitops-flux2.md) which will install the flux extension automatically or you can re-install the flux extension manually.
268+
For all these cases, possible remediation actions are to force delete the extension, uninstall the Helm release, and delete the `flux-system` namespace from the cluster.
262269

263270
```console
264-
az k8s-extension delete --resource-group RESOURCE_GROUP --cluster-name CLUSTER_NAME --cluster-type connectedClusters –name flux
271+
az k8s-extension delete --force -g <RESOURCE_GROUP> -c <CLUSTER_NAME> -n flux -t <managedClusters OR connectedClusters>
272+
helm uninstall flux -n flux-system
273+
kubectl delete namespaces flux-system
265274
```
266275

276+
Some other aspects to consider:
277+
278+
* For AKS cluster, assure that the subscription has the following feature flag enabled: `Microsoft.ContainerService/AKS-ExtensionManager`.
279+
280+
```console
281+
az feature register --namespace Microsoft.ContainerService --name AKS-ExtensionManager
282+
```
283+
284+
* Assure that the cluster does not have any policies that restrict creation of the `flux-system` namespace or resources in that namespace.
285+
286+
With these actions accomplished you can either [re-create a flux configuration](./tutorial-use-gitops-flux2.md) which will install the flux extension automatically or you can re-install the flux extension manually.
287+
267288
## Monitoring
268289

269290
Azure Monitor for containers requires its DaemonSet to be run in privileged mode. To successfully set up a Canonical Charmed Kubernetes cluster for monitoring, run the following command:

articles/azure-netapp-files/azure-netapp-files-solution-architectures.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.service: azure-netapp-files
1212
ms.workload: storage
1313
ms.tgt_pltfrm: na
1414
ms.topic: conceptual
15-
ms.date: 02/10/2022
15+
ms.date: 02/16/2022
1616
ms.author: anfdocs
1717
---
1818
# Solution architectures using Azure NetApp Files
@@ -82,7 +82,6 @@ This section provides references to SAP on Azure solutions.
8282
### Generic SAP and SAP Netweaver
8383

8484
* [Run SAP NetWeaver in Windows on Azure - Azure Architecture Center](/azure/architecture/reference-architectures/sap/sap-netweaver)
85-
* [SAP applications on Microsoft Azure using Azure NetApp Files](https://www.netapp.com/us/media/tr-4746.pdf)
8685
* [High availability for SAP NetWeaver on Azure VMs on SUSE Linux Enterprise Server with Azure NetApp Files for SAP applications](../virtual-machines/workloads/sap/high-availability-guide-suse-netapp-files.md)
8786
* [High availability for SAP NetWeaver on Azure VMs on Red Hat Enterprise Linux with Azure NetApp Files for SAP applications](../virtual-machines/workloads/sap/high-availability-guide-rhel-netapp-files.md)
8887
* [High availability for SAP NetWeaver on Azure VMs on Windows with Azure NetApp Files (SMB) for SAP applications](../virtual-machines/workloads/sap/high-availability-guide-windows-netapp-files-smb.md)

articles/communication-services/quickstarts/voice-video-calling/includes/video-calling/video-calling-windows.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,5 @@
1+
[!INCLUDE [Public Preview](../../../../includes/public-preview-include-document.md)]
2+
13
In this quickstart, you'll learn how to start a 1:1 video call using the Azure Communication Services Calling SDK for Windows.
24

35
## Prerequisites

0 commit comments

Comments
 (0)