Skip to content

Commit b945935

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into linux-fixes-1
2 parents 9f3672f + 5bb8528 commit b945935

File tree

48 files changed

+972
-428
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

48 files changed

+972
-428
lines changed

articles/active-directory/governance/entitlement-management-logic-apps-integration.md

Lines changed: 17 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ These triggers to Logic Apps are controlled in a tab within access package polic
7070
1. The **Extension Configuration** tab allows you to decide if your extension has “launch and continue” or “launch and wait” behavior. With “Launch and continue” the linked policy action on the access package, such as a request, triggers the Logic App attached to the custom extension. After the Logic App is triggered, the entitlement management process associated with the access package will continue. For “Launch and wait”, we'll pause the associated access package action until after the Logic App linked to the extension completes its task, and a resume action is sent by the admin to continue the process. If no response is sent back in the wait time period defined, this process would be considered a failure. This process is further described below in its own section [Configuring custom extensions that pause entitlement management processes](entitlement-management-logic-apps-integration.md#configuring-custom-extensions-that-pause-entitlement-management-processes).
7171

7272

73-
1. In the **Details** tab, choose whether you’d like to use an existing Logic App. Selecting Yes in the field “Create new logic app” (default) creates a new blank Logic App that is already linked to this custom extension. Regardless, you need to provide:
73+
1. In the **Details** tab, choose whether you’d like to use an existing consumption plan Logic App. Selecting Yes in the field “Create new logic app” (default) creates a new blank consumption plan Logic App that is already linked to this custom extension. Regardless, you need to provide:
7474

7575
1. An Azure subscription.
7676

@@ -161,7 +161,7 @@ A new update to the custom extensions feature is the ability to pause the access
161161

162162
This pause process allows admins to have control of workflows they’d like to run before continuing with access lifecycle tasks in entitlement management. The only exception to this is if a timeout occurs. Launch and wait processes require a timeout of up to 14 days noted in minutes, hours, or days. If a resume response isn't sent back to entitlement management by the time the “timeout” period elapses, the entitlement management request workflow process pauses.
163163

164-
The admin is responsible for configuring an automated process that is able to send the API **resume request** payload back to entitlement management, once the Logic App workflow has completed. To send back the resume request payload, follow the instructions here in the graph API documents. See information here on the [resume request](/graph/api/accesspackageassignmentrequest-resume)
164+
The admin is responsible for configuring an automated process that is able to send the API **resume request** payload back to entitlement management, once the Logic App workflow has completed. To send back the resume request payload, follow the instructions here in the graph API documents. See information here on the [resume request](/graph/api/accesspackageassignmentrequest-resume).
165165

166166
Specifically, when an access package policy has been enabled to call out a custom extension and the request processing is waiting for the callback from the customer, the customer can initiate a resume action. It's performed on an [accessPackageAssignmentRequest](/graph/api/resources/accesspackageassignmentrequest) object whose **requestStatus** is in a **WaitingForCallback** state.
167167

@@ -171,12 +171,25 @@ The resume request can be sent back for the following stages:
171171
microsoft.graph.accessPackageCustomExtensionStage.assignmentRequestCreated
172172
microsoft.graph.accessPackageCustomExtensionStage.assignmentRequestApproved
173173
microsoft.graph.accessPackageCustomExtensionStage.assignmentRequestGranted
174-
Microsoft.graph.accessPackageCustomExtensionStage.assignmentRequestRemoved
174+
microsoft.graph.accessPackageCustomExtensionStage.assignmentRequestRemoved
175175
``
176176

177177
The following flow diagram shows the entitlement management callout to Logic Apps workflow:
178-
:::image type="content" source="media/entitlement-management-logic-apps/extensibility-diagram-flow.png" alt-text="A screenshot of the extensibility user diagram." lightbox="media/entitlement-management-logic-apps/extensibility-diagram-flow.png":::
178+
:::image type="content" source="media/entitlement-management-logic-apps/extensibility-diagram-flow.png" alt-text="A diagram of the entitlement management call to the logic apps workflow." lightbox="media/entitlement-management-logic-apps/extensibility-diagram-flow.png":::
179179

180+
The diagram flow diagram shows:
181+
182+
1. The user creates a custom endpoint able to receive the call from the Identity Service
183+
1. The identity service makes a test call to confirm the endpoint can be called by the Identity Service
184+
1. The User calls Graph API to request to add a user to an access package
185+
1. The Identity Service is added to the queue triggering the backend workflow
186+
1. Entitlement Management Service request processing calls the logic app with the request payload
187+
1. Workflow expects the accepted code
188+
1. The Entitlement Management Service waits for the blocking custom action to resume
189+
1. The customer system calls the request resume API to the identity service to resume processing the request
190+
1. The identity service adds the resume request message to the Entitlement Management Service queue resuming the backend workflow
191+
1. The Entitlement Management Service is resumed from the blocked state
192+
180193
An example of a resume request payload is:
181194

182195
``` http
128 KB
Loading

articles/aks/TOC.yml

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,9 @@
1414
- name: Getting started
1515
items:
1616
- name: Well-architected considerations
17-
href: /azure/architecture/framework/services/compute/azure-kubernetes-service/azure-kubernetes-service?bc=/azure/aks/breadcrumb/toc.json&toc=/azure/aks/toc.json?WT.mc_id=AKSDOCSTOC
17+
href: /azure/architecture/framework/services/compute/azure-kubernetes-service/azure-kubernetes-service?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
1818
- name: Plan your implementation
19-
href: /azure/architecture/reference-architectures/containers/aks-start-here?bc=/azure/aks/breadcrumb/toc.json&toc=/azure/aks/toc.json?WT.mc_id=AKSDOCSTOC
19+
href: /azure/architecture/reference-architectures/containers/aks-start-here?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
2020
- name: Optimize costs
2121
href: best-practices-cost.md
2222
- name: Quickstarts
@@ -86,7 +86,7 @@
8686
- name: Vulnerability management
8787
href: concepts-vulnerability-management.md
8888
- name: Security Baseline
89-
href: /security/benchmark/azure/baselines/aks-security-baseline?context=/azure/aks/context/aks-context
89+
href: /security/benchmark/azure/baselines/aks-security-baseline?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
9090
- name: Container Security
9191
href: concepts-security.md
9292
- name: Security controls by Azure Policy
@@ -127,7 +127,7 @@
127127
- name: Overview
128128
href: best-practices.md
129129
- name: Baseline architecture for an AKS cluster
130-
href: /azure/architecture/reference-architectures/containers/aks/secure-baseline-aks
130+
href: /azure/architecture/reference-architectures/containers/aks/secure-baseline-aks?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
131131
maintainContext: True
132132
- name: Security
133133
items:
@@ -164,22 +164,22 @@
164164
- name: Plan and execute a migration
165165
href: aks-migration.md
166166
- name: Spring Boot
167-
href: /azure/developer/java/migration/migrate-spring-boot-to-azure-kubernetes-service
167+
href: /azure/developer/java/migration/migrate-spring-boot-to-azure-kubernetes-service?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
168168
maintainContext: false
169169
- name: Tomcat
170-
href: /azure/developer/java/migration/migrate-tomcat-to-containers-on-azure-kubernetes-service
170+
href: /azure/developer/java/migration/migrate-tomcat-to-containers-on-azure-kubernetes-service?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
171171
maintainContext: false
172172
- name: Wildfly
173-
href: /azure/developer/java/migration/migrate-wildfly-to-wildfly-on-azure-kubernetes-service
173+
href: /azure/developer/java/migration/migrate-wildfly-to-wildfly-on-azure-kubernetes-service?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
174174
maintainContext: false
175175
- name: WebLogic
176-
href: /azure/developer/java/migration/migrate-weblogic-to-wildfly-on-azure-kubernetes-service
176+
href: /azure/developer/java/migration/migrate-weblogic-to-wildfly-on-azure-kubernetes-service?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
177177
maintainContext: false
178178
- name: WebSphere
179-
href: /azure/developer/java/migration/migrate-websphere-to-wildfly-on-azure-kubernetes-service
179+
href: /azure/developer/java/migration/migrate-websphere-to-wildfly-on-azure-kubernetes-service?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
180180
maintainContext: false
181181
- name: JBoss EAP
182-
href: /azure/developer/java/migration/migrate-jboss-eap-to-wildfly-on-azure-kubernetes-service
182+
href: /azure/developer/java/migration/migrate-jboss-eap-to-wildfly-on-azure-kubernetes-service?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
183183
maintainContext: false
184184
- name: Java web app containerization and migration
185185
href: ../migrate/tutorial-app-containerization-java-kubernetes.md
@@ -341,7 +341,7 @@
341341
- name: Use Azure Policy
342342
href: use-azure-policy.md
343343
- name: Control deployments with Azure Policy
344-
href: ../governance/policy/concepts/policy-for-kubernetes.md?toc=/azure/aks/toc.json
344+
href: ../governance/policy/concepts/policy-for-kubernetes.md?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
345345
maintainContext: true
346346
- name: Node security
347347
items:
@@ -598,7 +598,7 @@
598598
- name: Kubernetes Event-driven Autoscaler (KEDA) integrations
599599
href: keda-integrations.md
600600
- name: Troubleshoot Kubernetes Event-driven Autoscaler (KEDA)
601-
href: /troubleshoot/azure/azure-kubernetes/troubleshoot-kubernetes-event-driven-autoscaling-add-on?context=/azure/aks/context/aks-context
601+
href: /troubleshoot/azure/azure-kubernetes/troubleshoot-kubernetes-event-driven-autoscaling-add-on?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
602602
- name: Use cluster extensions
603603
href: cluster-extensions.md
604604
- name: DevOps
@@ -607,7 +607,7 @@
607607
href: /azure/developer/ansible/aks-configure-clusters
608608
maintainContext: true
609609
- name: Jenkins continuous deployment
610-
href: /azure/developer/jenkins/deploy-from-github-to-aks
610+
href: /azure/developer/jenkins/deploy-from-github-to-aks?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
611611
- name: Azure DevOps Project
612612
href: ../devops-project/azure-devops-project-aks.md
613613
maintainContext: true

articles/api-management/TOC.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -91,6 +91,9 @@
9191
- name: Observability
9292
href: observability.md
9393
displayName: monitoring
94+
- name: Compute platform
95+
href: compute-infrastructure.md
96+
displayName: stv1, stv2
9497
- name: DevOps and CI/CD
9598
href: devops-api-development-templates.md
9699
- name: APIs
@@ -152,6 +155,8 @@
152155
- name: Recover a deleted instance
153156
displayName: soft delete
154157
href: soft-delete.md
158+
- name: Migrate to stv2 platform
159+
href: migrate-stv1-to-stv2.md
155160
- name: Configure networking
156161
items:
157162
- name: Connect to a virtual network

articles/api-management/api-management-howto-aad.md

Lines changed: 5 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ description: Learn how to enable user sign-in to the API Management developer po
66
author: dlepow
77
ms.service: api-management
88
ms.topic: article
9-
ms.date: 03/17/2023
9+
ms.date: 04/18/2023
1010
ms.author: danlep
1111
ms.custom: engagement-fy23
1212
---
@@ -152,26 +152,11 @@ Now that you've enabled access for users in an Azure AD tenant, you can:
152152
* Add Azure AD groups into API Management.
153153
* Control product visibility using Azure AD groups.
154154

155-
Follow these steps to grant:
156-
* `User.Read` **delegated** permission for Microsoft Graph API.
157-
* `Directory.ReadAll` **application** permission for Microsoft Graph API.
158-
159-
1. Update the first 3 lines of the following Azure CLI script to match your environment and run it.
160-
161-
```azurecli
162-
$subId = "Your Azure subscription ID" # Example: "1fb8fadf-03a3-4253-8993-65391f432d3a"
163-
$tenantId = "Your Azure AD Tenant or Organization ID" # Example: 0e054eb4-e5d0-43b8-ba1e-d7b5156f6da8"
164-
$appObjectID = "Application Object ID that has been registered in AAD" # Example: "2215b54a-df84-453f-b4db-ae079c0d2619"
165-
#Login and Set the Subscription
166-
az login
167-
az account set --subscription $subId
168-
#Assign the following permission: Microsoft Graph Delegated Permission: User.Read, Microsoft Graph Application Permission: Directory.ReadAll
169-
az rest --method PATCH --uri "https://graph.microsoft.com/v1.0/$($tenantId)/applications/$($appObjectID)" --body "{'requiredResourceAccess':[{'resourceAccess': [{'id': 'e1fe6dd8-ba31-4d61-89e7-88639da4683d','type': 'Scope'},{'id': '7ab1d382-f21e-4acd-a863-ba3e13f7da61','type': 'Role'}],'resourceAppId': '00000003-0000-0000-c000-000000000000'}]}"
170-
```
171-
172-
1. Sign out and sign back in to the Azure portal.
173155
1. Navigate to the App Registration page for the application you registered in [the previous section](#enable-user-sign-in-using-azure-ad---portal).
174-
1. Select **API Permissions**. You should see the permissions granted by the Azure CLI script in step 1.
156+
1. Select **API Permissions**.
157+
1. Add the following minimum **application** permissions for Microsoft Graph API:
158+
* `User.Read.All` application permission – so API Management can read the user’s group membership to perform group synchronization at the time the user logs in.
159+
* `Group.Read.All` application permission – so API Management can read the Azure AD groups when an administrator tries to add the group to API Management using the **Groups** blade in the portal.
175160
1. Select **Grant admin consent for {tenantname}** so that you grant access for all users in this directory.
176161

177162
Now you can add external Azure AD groups from the **Groups** tab of your API Management instance.

articles/api-management/breaking-changes/stv1-platform-retirement-august-2024.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ documentationcenter: ''
66
author: dlepow
77
ms.service: api-management
88
ms.topic: reference
9-
ms.date: 08/26/2022
9+
ms.date: 01/10/2023
1010
ms.author: danlep
1111
---
1212

@@ -40,7 +40,7 @@ After 31 August 2024, any instance hosted on the `stv1` platform won't be suppor
4040

4141
**Migrate all your existing instances hosted on the `stv1` compute platform to the `stv2` compute platform by 31 August 2024.**
4242

43-
If you have existing instances hosted on the `stv1` platform, you can follow our [migration guide](../compute-infrastructure.md#how-do-i-migrate-to-the-stv2-platform) which provides all the details to ensure a successful migration.
43+
If you have existing instances hosted on the `stv1` platform, you can follow our [migration guide](../migrate-stv1-to-stv2.md) which provides all the details to ensure a successful migration.
4444

4545
## Help and support
4646

0 commit comments

Comments
 (0)