Skip to content

Commit b9b841d

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into release-preview-sqldb-edge
2 parents a8bb373 + 3d3c48b commit b9b841d

File tree

95 files changed

+1991
-1216
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

95 files changed

+1991
-1216
lines changed
4 KB
Loading

articles/active-directory/develop/reference-v2-libraries.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -84,6 +84,7 @@ See also [Scenarios by supported platforms and languages](authentication-flows-a
8484
| Platform | Library name | Tested version | Source code | Sample |
8585
|:---:|:---:|:---:|:---:|:---:|
8686
|![JavaScript](media/sample-v2-code/logo_js.png)|[Hello.js](https://adodson.com/hello.js/) | Version 1.13.5 |[Hello.js](https://github.com/MrSwitch/hello.js) |[SPA](https://github.com/Azure-Samples/active-directory-javascript-graphapi-v2) |
87+
|![Vue](media/sample-v2-code/logo_vue.png)|[Vue MSAL](https://github.com/mvertopoulos/vue-msal) | Version 3.0.3 |[vue-msal](https://github.com/mvertopoulos/vue-msal) | |
8788
| ![Java](media/sample-v2-code/logo_java.png) | [Scribe Java](https://github.com/scribejava/scribejava) | [Version 3.2.0](https://github.com/scribejava/scribejava/releases/tag/scribejava-3.2.0) | [ScribeJava](https://github.com/scribejava/scribejava/) | |
8889
| ![Java](media/sample-v2-code/logo_java.png) | [Gluu OpenID Connect library](https://github.com/GluuFederation/oxAuth) | [Version 3.0.2](https://github.com/GluuFederation/oxAuth/releases/tag/3.0.2) | [Gluu OpenID Connect library](https://github.com/GluuFederation/oxAuth) | |
8990
| ![Python](media/sample-v2-code/logo_python.png) | [Requests-OAuthlib](https://github.com/requests/requests-oauthlib) | [Version 1.2.0](https://github.com/requests/requests-oauthlib/releases/tag/v1.2.0) | [Requests-OAuthlib](https://github.com/requests/requests-oauthlib) | |

articles/active-directory/hybrid/reference-connect-version-history.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,17 @@ Not all releases of Azure AD Connect will be made available for auto upgrade. Th
4343
>
4444
>Please refer to [this article](https://docs.microsoft.com/azure/active-directory/hybrid/how-to-upgrade-previous-version) to learn more about how to upgrade Azure AD Connect to the latest version.
4545
46+
## 1.5.30.0
47+
48+
### Release status
49+
05/07/2020: Released for download
50+
51+
### Fixed issues
52+
- Fixed an issue where unselected domains were getting incorrectly selected from the wizard UI.
53+
- Fixed an issue in the ADSyncConfig PowerShell module, where invoking DSACLS command used in all the Set-ADSync* Permissions cmdlets would cause one of the following errors:
54+
- `GrantAclsNoInheritance : The parameter is incorrect. The command failed to complete successfully.`
55+
- `GrantAcls : No GUID Found for computer …`
56+
4657
## 1.5.29.0
4758

4859
### Release status
@@ -100,6 +111,7 @@ This hotfix build fixes an issue with build 1.5.18.0 if you have the Group Filte
100111
- Fixed an issue with the creation of the Azure Active Directory synchronization account where enabling Directory Extensions or PHS may fail because the account has not propagated across all service replicas before attempted use.
101112
- Fixed a bug in the sync errors compression utility that was not handling surrogate characters correctly.
102113
- Fixed a bug in the auto upgrade which left the server in the scheduler suspended state.
114+
- Fixed a bug in the Domain/OU filtering page that would remove the Run Profiles of a domain by just partially expanding the domain tree, without making any changes.
103115

104116
## 1.4.38.0
105117
### Release status

articles/active-directory/saas-apps/smarteru-tutorial.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,12 +18,11 @@ ms.date: 03/19/2019
1818
ms.author: jeedes
1919

2020
---
21+
# Tutorial: Azure Active Directory integration with SmarterU
2122

2223
> [!NOTE]
2324
> The process for integrating SmarterU with Azure Active Directory is also documented and maintained in the [SmarterU help system](https://help.smarteru.com/ID2053086).
2425
25-
# Tutorial: Azure Active Directory integration with SmarterU
26-
2726
In this tutorial, you learn how to integrate SmarterU with Azure Active Directory (Azure AD).
2827
Integrating SmarterU with Azure AD provides you with the following benefits:
2928

articles/aks/concepts-security.md

Lines changed: 11 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Concepts - Security in Azure Kubernetes Services (AKS)
33
description: Learn about security in Azure Kubernetes Service (AKS), including master and node communication, network policies, and Kubernetes secrets.
44
services: container-service
55
ms.topic: conceptual
6-
ms.date: 03/01/2019
6+
ms.date: 05/08/2020
77

88
---
99

@@ -23,7 +23,9 @@ This article introduces the core concepts that secure your applications in AKS:
2323

2424
In AKS, the Kubernetes master components are part of the managed service provided by Microsoft. Each AKS cluster has its own single-tenanted, dedicated Kubernetes master to provide the API Server, Scheduler, etc. This master is managed and maintained by Microsoft.
2525

26-
By default, the Kubernetes API server uses a public IP address and a fully qualified domain name (FQDN). You can control access to the API server using Kubernetes role-based access controls and Azure Active Directory. For more information, see [Azure AD integration with AKS][aks-aad].
26+
By default, the Kubernetes API server uses a public IP address and a fully qualified domain name (FQDN). You can limit access to the API server endpoint using [authorized IP ranges][authorized-ip-ranges]. You can also create a fully [private cluster][private-clusters] to limit API server access to your virtual network.
27+
28+
You can control access to the API server using Kubernetes role-based access controls and Azure Active Directory. For more information, see [Azure AD integration with AKS][aks-aad].
2729

2830
## Node security
2931

@@ -62,6 +64,10 @@ For connectivity and security with on-premises networks, you can deploy your AKS
6264

6365
To filter the flow of traffic in virtual networks, Azure uses network security group rules. These rules define the source and destination IP ranges, ports, and protocols that are allowed or denied access to resources. Default rules are created to allow TLS traffic to the Kubernetes API server. As you create services with load balancers, port mappings, or ingress routes, AKS automatically modifies the network security group for traffic to flow appropriately.
6466

67+
### Kubernetes network policy
68+
69+
To limit network traffic between pods in your cluster, AKS offers support for [Kubernetes network policies][network-policy]. With network policies, you can choose to allow or deny specific network paths within the cluster based on namespaces and label selectors.
70+
6571
## Kubernetes Secrets
6672

6773
A Kubernetes *Secret* is used to inject sensitive data into pods, such as access credentials or keys. You first create a Secret using the Kubernetes API. When you define your pod or deployment, a specific Secret can be requested. Secrets are only provided to nodes that have a scheduled pod that requires it, and the Secret is stored in *tmpfs*, not written to disk. When the last pod on a node that requires a Secret is deleted, the Secret is deleted from the node's tmpfs. Secrets are stored within a given namespace and can only be accessed by pods within the same namespace.
@@ -100,3 +106,6 @@ For additional information on core Kubernetes and AKS concepts, see the followin
100106
[operator-best-practices-cluster-security]: operator-best-practices-cluster-security.md
101107
[developer-best-practices-pod-security]:developer-best-practices-pod-security.md
102108
[nodepool-upgrade]: use-multiple-node-pools.md#upgrade-a-node-pool
109+
[authorized-ip-ranges]: api-server-authorized-ip-ranges.md
110+
[private-clusters]: private-clusters.md
111+
[network-policy]: use-network-policies.md

articles/automation/automation-hybrid-runbook-worker.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ The process to install a Hybrid Runbook Worker depends on the operating system.
3636

3737
The recommended installation method is to use an Azure Automation runbook to completely automate the process of configuring a Windows computer. The second method is to follow a step-by-step procedure to manually install and configure the role. For Linux machines, you run a Python script to install the agent on the machine.
3838

39-
## <a name="network-planning"></a>Network configuration
39+
## <a name="network-planning"></a>Network planning
4040

4141
For the Hybrid Runbook Worker to connect to and register with Azure Automation, it must have access to the port number and URLs described in this section. The worker must also have access to the [ports and URLs required for Log Analytics agent](../azure-monitor/platform/agent-windows.md) to connect to the Azure Monitor Log Analytics workspace.
4242

articles/automation/troubleshoot/update-agent-issues-linux.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -77,14 +77,14 @@ This check determines if the agent is reporting to multiple workspaces. Multihom
7777

7878
### Hybrid Runbook Worker
7979

80-
This check verifies if the Log Analytics agent for Linux has the Hybrid Runbook Worker package. This package is required for Update Management to work.
80+
This check verifies if the Log Analytics agent for Linux has the Hybrid Runbook Worker package. This package is required for Update Management to work. To learn more, see [The Log Analytics agent for Linux isn't running](hybrid-runbook-worker.md#oms-agent-not-running).
81+
82+
Update Management downloads Hybrid Runbook Worker packages from the operations endpoint. Therefore, if the Hybrid Runbook Worker is not running and the [operations endpoint](#operations-endpoint) fails, the update can fail.
8183

8284
### Hybrid Runbook Worker status
8385

84-
This check makes sure the Hybrid Runbook Worker is running on the machine. The following processes should be present if the Hybrid Runbook Worker is running correctly. To learn more, see [Troubleshooting the Log Analytics Agent for Linux](hybrid-runbook-worker.md#oms-agent-not-running).
86+
This check makes sure the Hybrid Runbook Worker is running on the machine. The processes in the example below should be present if the Hybrid Runbook Worker is running correctly.
8587

86-
> [!NOTE]
87-
> If the Hybrid Runbook Worker is not running and the operations endpoint has failed, the update can fail. Update Management downloads the hybrid worker packages from the operations endpoint.
8888

8989
```bash
9090
nxautom+ 8567 1 0 14:45 ? 00:00:00 python /opt/microsoft/omsconfig/modules/nxOMSAutomationWorker/DSCResources/MSFT_nxOMSAutomationWorkerResource/automationworker/worker/main.py /var/opt/microsoft/omsagent/state/automationworker/oms.conf rworkspace:<workspaceId> <Linux hybrid worker version>
@@ -102,13 +102,13 @@ This check makes sure that the machine has access to the internet.
102102

103103
This check determines if the Hybrid Runbook Worker can properly communicate with Azure Automation in the Log Analytics workspace.
104104

105-
Proxy and firewall configurations must allow the Hybrid Runbook Worker agent to communicate with the registration endpoint. For a list of addresses and ports to open, see [Network planning for Hybrid Workers](../automation-hybrid-runbook-worker.md#network-planning).
105+
Proxy and firewall configurations must allow the Hybrid Runbook Worker agent to communicate with the registration endpoint. For a list of addresses and ports to open, see [Network planning](../automation-hybrid-runbook-worker.md#network-planning).
106106

107107
### Operations endpoint
108108

109-
This check determines if the agent can properly communicate with the Job Runtime Data Service.
109+
This check determines if the Log Analytics agent can properly communicate with the Job Runtime Data Service.
110110

111-
Proxy and firewall configurations must allow the Hybrid Runbook Worker agent to communicate with the Job Runtime Data Service. For a list of addresses and ports to open, see [Network planning for Hybrid Workers](../automation-hybrid-runbook-worker.md#network-planning).
111+
Proxy and firewall configurations must allow the Hybrid Runbook Worker agent to communicate with the Job Runtime Data Service. For a list of addresses and ports to open, see [Network planning](../automation-hybrid-runbook-worker.md#network-planning).
112112

113113
### Log Analytics endpoint 1
114114

articles/automation/troubleshoot/update-agent-issues.md

Lines changed: 14 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -22,21 +22,21 @@ There can be many reasons why your machine isn't showing up as ready (healthy) i
2222
> [!NOTE]
2323
> There can be a slight delay between what the Azure portal shows and the current state of a machine.
2424
25-
This article discusses how to run the troubleshooter for Azure machines from the Azure portal, and non-Azure machines in the [offline scenario](#troubleshoot-offline). The troubleshooter now includes checks for Windows Server Update Services (WSUS) and for the autodownload and install keys.
25+
This article discusses how to run the troubleshooter for Azure machines from the Azure portal, and non-Azure machines in the [offline scenario](#troubleshoot-offline).
2626

2727
> [!NOTE]
28-
> The troubleshooter script currently doesn't route traffic through a proxy server if one is configured.
28+
> The troubleshooter script now includes checks for Windows Server Update Services (WSUS) and for the autodownload and install keys.
2929
3030
## Start the troubleshooter
3131

32-
For Azure machines, you can launch the **Troubleshoot Update Agent** page by selecting the **Troubleshoot** link under the **Update Agent Readiness** column in the portal. For non-Azure machines, the link brings you to this article. See the [offline instructions](#troubleshoot-offline) to troubleshoot a non-Azure machine.
32+
For Azure machines, you can launch the Troubleshoot Update Agent page by selecting the **Troubleshoot** link under the **Update Agent Readiness** column in the portal. For non-Azure machines, the link brings you to this article. See the [offline instructions](#troubleshoot-offline) to troubleshoot a non-Azure machine.
3333

3434
![Screenshot of the Update Management list of virtual machines](../media/update-agent-issues/vm-list.png)
3535

3636
> [!NOTE]
3737
> To check the health of the Hybrid Runbook Worker, the VM must be running. If the VM isn't running, a **Start the VM** button appears.
3838
39-
On the **Troubleshoot Update Agent** page, select **Run checks** to start the troubleshooter. The troubleshooter uses [Run Command](../../virtual-machines/windows/run-command.md) to run a script on the machine, to verify dependencies. When the troubleshooter is finished, it returns the result of the checks.
39+
On the Troubleshoot Update Agent page, select **Run checks** to start the troubleshooter. The troubleshooter uses [Run Command](../../virtual-machines/windows/run-command.md) to run a script on the machine, to verify dependencies. When the troubleshooter is finished, it returns the result of the checks.
4040

4141
![Screenshot of the Troubleshoot Update Agent page](../media/update-agent-issues/troubleshoot-page.png)
4242

@@ -48,19 +48,19 @@ Results are shown on the page when they're ready. The checks sections show what'
4848

4949
### Operating system
5050

51-
The operating system check verifies whether the Hybrid Runbook Worker is running one of the following operating systems:
51+
The operating system check verifies whether the Hybrid Runbook Worker is running one of the operating systems shown in the next table.
5252

5353
|Operating system |Notes |
5454
|---------|---------|
5555
|Windows Server 2012 and later |.NET Framework 4.6 or later is required. ([Download the .NET Framework](/dotnet/framework/install/guide-for-developers).)<br/> Windows PowerShell 5.1 is required. ([Download Windows Management Framework 5.1](https://www.microsoft.com/download/details.aspx?id=54616).) |
5656

5757
### .NET 4.6.2
5858

59-
The .NET Framework check verifies that the system has a minimum of [.NET Framework 4.6.2](https://www.microsoft.com/en-us/download/details.aspx?id=53345) installed.
59+
The .NET Framework check verifies that the system has [.NET Framework 4.6.2](https://www.microsoft.com/en-us/download/details.aspx?id=53345) or later installed.
6060

6161
### WMF 5.1
6262

63-
The WMF check verifies that the system has the required version of the Windows Management Framework (WMF): [Windows Management Framework 5.1](https://www.microsoft.com/download/details.aspx?id=54616).
63+
The WMF check verifies that the system has the required version of the Windows Management Framework (WMF), which is [Windows Management Framework 5.1](https://www.microsoft.com/download/details.aspx?id=54616).
6464

6565
### TLS 1.2
6666

@@ -72,30 +72,33 @@ This check determines whether you're using TLS 1.2 to encrypt your communication
7272

7373
This check determines whether the agent can properly communicate with the agent service.
7474

75-
Proxy and firewall configurations must allow the Hybrid Runbook Worker agent to communicate with the registration endpoint. For a list of addresses and ports to open, see [Network planning for Hybrid Workers](../automation-hybrid-runbook-worker.md#network-planning).
75+
Proxy and firewall configurations must allow the Hybrid Runbook Worker agent to communicate with the registration endpoint. For a list of addresses and ports to open, see [Network planning](../automation-hybrid-runbook-worker.md#network-planning).
7676

7777
### Operations endpoint
7878

7979
This check determines whether the agent can properly communicate with the Job Runtime Data Service.
8080

81-
Proxy and firewall configurations must allow the Hybrid Runbook Worker agent to communicate with the Job Runtime Data Service. For a list of addresses and ports to open, see [Network planning for Hybrid Workers](../automation-hybrid-runbook-worker.md#network-planning).
81+
Proxy and firewall configurations must allow the Hybrid Runbook Worker agent to communicate with the Job Runtime Data Service. For a list of addresses and ports to open, see [Network planning](../automation-hybrid-runbook-worker.md#network-planning).
8282

8383
## VM service health checks
8484

8585
### Monitoring agent service status
8686

8787
This check determines if the Log Analytics agent for Windows (`healthservice`) is running on the machine. To learn more about troubleshooting the service, see [The Log Analytics agent for Windows isn't running](hybrid-runbook-worker.md#mma-not-running).
8888

89-
To reinstall the Log Analytics agent for Windows, see [Install and configure the Log Analytics agent for Windows](../../azure-monitor/learn/quick-collect-windows-computer.md#install-the-agent-for-windows).
89+
To reinstall the Log Analytics agent for Windows, see [Install the agent for Windows](../../azure-monitor/learn/quick-collect-windows-computer.md#install-the-agent-for-windows).
9090

9191
### Monitoring agent service events
9292

9393
This check determines whether any 4502 events appear in the Azure Operations Manager log on the machine in the past 24 hours.
9494

95-
To learn more about this event, see the [troubleshooting guide](hybrid-runbook-worker.md#event-4502) for this event.
95+
To learn more about this event, see the [Event 4502 in the Operations Manager log](hybrid-runbook-worker.md#event-4502) for this event.
9696

9797
## Access permissions checks
9898

99+
> [!NOTE]
100+
> The troubleshooter currently doesn't route traffic through a proxy server if one is configured.
101+
99102
### Crypto folder access
100103

101104
The Crypto folder access check determines whether the local system account has access to C:\ProgramData\Microsoft\Crypto\RSA.

articles/azure-app-configuration/overview-managed-identity.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,10 @@
11
---
22
title: Configure managed identities with Azure App Configuration
33
description: Learn how managed identities work in Azure App Configuration and how to configure a managed identity
4-
author: jpconnock
5-
4+
author: barbkess
65
ms.topic: article
76
ms.date: 02/25/2020
8-
ms.author: jeconnoc
7+
ms.author: barbkess
98
ms.reviewer: lcozzens
109
ms.service: azure-app-configuration
1110

articles/azure-app-configuration/quickstart-feature-flag-spring-boot.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ Use the [Spring Initializr](https://start.spring.io/) to create a new Spring Boo
5959
```xml
6060
<dependency>
6161
<groupId>com.microsoft.azure</groupId>
62-
<artifactId>spring-cloud-azure-appconfiguration-config</artifactId>
62+
<artifactId>spring-cloud-azure-appconfiguration-config-web</artifactId>
6363
<version>1.1.2</version>
6464
</dependency>
6565
<dependency>
@@ -78,7 +78,7 @@ Use the [Spring Initializr](https://start.spring.io/) to create a new Spring Boo
7878
```xml
7979
<dependency>
8080
<groupId>com.microsoft.azure</groupId>
81-
<artifactId>spring-cloud-azure-appconfiguration-config</artifactId>
81+
<artifactId>spring-cloud-azure-appconfiguration-config-web</artifactId>
8282
<version>1.2.2</version>
8383
</dependency>
8484
<dependency>

0 commit comments

Comments
 (0)