Skip to content

Commit bb96987

Browse files
authored
Merge pull request #226542 from lauradolan/sync
Dirty PR to fix merge conflicts in release-sap-architecture
2 parents 0cdf543 + 34ce1bb commit bb96987

File tree

282 files changed

+3205
-2716
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

282 files changed

+3205
-2716
lines changed

articles/active-directory-b2c/identity-provider-facebook.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ If you don't already have a Facebook account, sign up at [https://www.facebook.c
5353
1. Select **Save Changes**.
5454
1. From the menu, select the **plus** sign or **Add Product** link next to **PRODUCTS**. Under the **Add Products to Your App**, select **Set up** under **Facebook Login**.
5555
1. From the menu, select **Facebook Login**, select **Settings**.
56-
1. In **Valid OAuth redirect URIs**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-name.onmicrosoft.com/oauth2/authresp`. Replace `your-tenant-name` with the name of your tenant, and `your-domain-name` with your custom domain.
56+
1. In **Valid OAuth redirect URIs**, enter `https://your-tenant-name.b2clogin.com/your-tenant-id/oauth2/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-id/oauth2/authresp`. Replace `your-tenant-id` with the id of your tenant, and `your-domain-name` with your custom domain.
5757
1. Select **Save Changes** at the bottom of the page.
5858
1. To make your Facebook application available to Azure AD B2C, select the Status selector at the top right of the page and turn it **On** to make the Application public, and then select **Switch Mode**. At this point, the Status should change from **Development** to **Live**. For more information, see [Facebook App Development](https://developers.facebook.com/docs/development/release).
5959

@@ -135,4 +135,4 @@ If the sign-in process is successful, your browser is redirected to `https://jwt
135135
- Learn how to [pass Facebook token to your application](idp-pass-through-user-flow.md).
136136
- Check out the Facebook federation [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers#facebook), and how to pass Facebook access token [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers#facebook-with-access-token)
137137

138-
::: zone-end
138+
::: zone-end

articles/active-directory/develop/scenario-mobile-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 05/07/2019
12+
ms.date: 02/07/2023
1313
ms.author: henrymbugua
1414
ms.reviewer: brandwe, jmprieur
1515
ms.custom: aaddev, identityplatformtop40
@@ -38,7 +38,7 @@ Considerations for mobile apps:
3838

3939
- **User experience is key**: Allow users to see the value of your app before you ask for sign-in. Request only the required permissions.
4040
- **Support all user configurations**: Many mobile business users must adhere to conditional-access policies and device-compliance policies. Be sure to support these key scenarios.
41-
- **Implement single sign-on (SSO)**: By using MSAL and Microsoft identity platform, you can enable single sign-on through the device's browser or Microsoft Authenticator (and Intune Company Portal on Android).
41+
- **Implement single sign-on (SSO)**: By using MSAL and Microsoft identity platform, you can enable SSO through the device's browser or Microsoft Authenticator (and Intune Company Portal on Android).
4242
- **Implement shared device mode**: Enable your application to be used in shared-device scenarios, for example hospitals, manufacturing, retail, and finance. [Read more about supporting shared device mode](msal-shared-devices.md).
4343

4444
## Specifics

articles/active-directory/develop/v2-supported-account-types.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -9,34 +9,34 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 07/14/2020
12+
ms.date: 02/06/2023
1313
ms.author: henrymbugua
1414
ms.reviewer: saeeda, jmprieur
1515
ms.custom: aaddev, identityplatformtop40
1616
---
1717

1818
# Supported account types
1919

20-
This article explains what account types (sometimes called *audiences*) are supported in the Microsoft identity platform applications.
20+
This article explains what account types (sometimes called _audiences_) are supported in the Microsoft identity platform applications.
2121

2222
<!-- This section can be in an include for many of the scenarios (SPA, web app signing-in users, protecting a web API, Desktop (depending on the flows), Mobile -->
2323

2424
## Account types in the public cloud
2525

2626
In the Microsoft Azure public cloud, most types of apps can sign in users with any audience:
2727

28-
- If you're writing a line-of-business (LOB) application, you can sign in users in your own organization. Such an application is sometimes called *single-tenant*.
29-
- If you're an ISV, you can write an application that signs in users:
28+
- If you're writing a line-of-business (LOB) application, you can sign in users in your own organization. Such an application is sometimes called _single-tenant_.
29+
- If you're an independent software vendor (ISV), you can write an application that signs in users:
3030

31-
- In any organization. Such an application is called a *multitenant* web application. You'll sometimes read that it signs in users with their work or school accounts.
31+
- In any organization. Such an application is called a _multitenant_ web application. You'll sometimes read that it signs in users with their work or school accounts.
3232
- With their work or school or personal Microsoft accounts.
3333
- With only personal Microsoft accounts.
34-
34+
3535
- If you're writing a business-to-consumer application, you can also sign in users with their social identities, by using Azure Active Directory B2C (Azure AD B2C).
3636

3737
## Account type support in authentication flows
3838

39-
Some account types can't be used with certain authentication flows. For instance, in desktop, UWP, or daemon applications:
39+
Some account types can't be used with certain authentication flows. For instance, in desktop, Universal Windows Platform (UWP), or daemon applications:
4040

4141
- Daemon applications can be used only with Azure AD organizations. It doesn't make sense to try to use daemon applications to manipulate Microsoft personal accounts. The admin consent will never be granted.
4242
- You can use the integrated Windows authentication flow only with work or school accounts (in your organization or any organization). Integrated Windows authentication works with domain accounts, and it requires the machines to be domain-joined or Azure AD-joined. This flow doesn't make sense for personal Microsoft accounts.

articles/active-directory/manage-apps/v2-howto-app-gallery-listing.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,7 @@ To publish your application in the gallery, you must first read and agree to spe
3030
- Implement support for *single sign-on* (SSO). To learn more about supported options, see [Plan a single sign-on deployment](plan-sso-deployment.md).
3131
- For password SSO, make sure that your application supports form authentication so that password vaulting can be used.
3232
- For federated applications (OpenID and SAML/WS-Fed), the application must support the [software-as-a-service (SaaS) model](https://azure.microsoft.com/overview/what-is-saas/). Enterprise gallery applications must support multiple user configurations and not any specific user.
33+
- For federated applications (OpenID and SAML/WS-Fed), the application can be single **or** multitenanted
3334
- For Open ID Connect, the application must be multitenanted and the [Azure AD consent framework](../develop/consent-framework.md) must be correctly implemented.
3435
- Provisioning is optional yet highly recommended. To learn more about Azure AD SCIM, see [build a SCIM endpoint and configure user provisioning with Azure AD](../app-provisioning/use-scim-to-provision-users-and-groups.md).
3536

articles/aks/azure-cni-overlay.md

Lines changed: 27 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: azure-kubernetes-service
77
ms.subservice: aks-networking
88
ms.topic: how-to
99
ms.custom: references_regions
10-
ms.date: 02/03/2023
10+
ms.date: 02/06/2023
1111
---
1212

1313
# Configure Azure CNI Overlay networking in Azure Kubernetes Service (AKS)
@@ -17,12 +17,25 @@ The traditional [Azure Container Networking Interface (CNI)](./configure-azure-c
1717
With Azure CNI Overlay, the cluster nodes are deployed into an Azure Virtual Network (VNet) subnet, whereas pods are assigned IP addresses from a private CIDR logically different from the VNet hosting the nodes. Pod and node traffic within the cluster use an overlay network, and Network Address Translation (using the node's IP address) is used to reach resources outside the cluster. This solution saves a significant amount of VNet IP addresses and enables you to seamlessly scale your cluster to very large sizes. An added advantage is that the private CIDR can be reused in different AKS clusters, truly extending the IP space available for containerized applications in AKS.
1818

1919
> [!NOTE]
20-
> Azure CNI Overlay is currently available only in the following regions:
21-
> - North Central US
22-
> - West Central US
23-
> - East US
24-
> - UK South
25-
> - Australia East
20+
> Azure CNI Overlay is currently **_unavailable_** in the following regions:
21+
> - East US 2
22+
> - Central US
23+
> - South Central US
24+
> - West US
25+
> - West US 2
26+
> - West US 3
27+
> - Southeast Asia
28+
> - Sweden Central
29+
> - France Central
30+
> - Norway East
31+
> - Switzerland North
32+
> - Qatar Central
33+
> - Jio India West
34+
> - Jio India Central
35+
> - UAE Central
36+
> - UAE North
37+
> - Brazil Southeast
38+
2639

2740
## Overview of overlay networking
2841

@@ -42,13 +55,13 @@ Ingress connectivity to the cluster can be achieved using an ingress controller
4255

4356
Like Azure CNI Overlay, Kubenet assigns IP addresses to pods from an address space logically different from the VNet but has scaling and other limitations. The below table provides a detailed comparison between Kubenet and Azure CNI Overlay. If you do not want to assign VNet IP addresses to pods due to IP shortage, then Azure CNI Overlay is the recommended solution.
4457

45-
| Area | Azure CNI Overlay | Kubenet |
46-
| -- | -- | -- |
47-
| Cluster scale | 1000 nodes and 250 pods/node | 400 nodes and 250 pods/node |
48-
| Network configuration | Simple - no additional configuration required for pod networking | Complex - requires route tables and UDRs on cluster subnet for pod networking |
49-
| Pod connectivity performance | Performance on par with VMs in a VNet | Additional hop adds minor latency |
50-
| Kubernetes Network Policies | Azure Network Policies, Calico | Calico |
51-
| OS platforms supported | Linux and Windows | Linux only |
58+
| Area | Azure CNI Overlay | Kubenet |
59+
|------------------------------|------------------------------------------------------------------|-------------------------------------------------------------------------------|
60+
| Cluster scale | 1000 nodes and 250 pods/node | 400 nodes and 250 pods/node |
61+
| Network configuration | Simple - no additional configuration required for pod networking | Complex - requires route tables and UDRs on cluster subnet for pod networking |
62+
| Pod connectivity performance | Performance on par with VMs in a VNet | Additional hop adds minor latency |
63+
| Kubernetes Network Policies | Azure Network Policies, Calico | Calico |
64+
| OS platforms supported | Linux and Windows | Linux only |
5265

5366
## IP address planning
5467

articles/aks/image-cleaner.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.author: nickoman
55
author: nickomang
66
services: container-service
77
ms.topic: article
8-
ms.date: 02/03/2023
8+
ms.date: 02/07/2023
99
---
1010

1111
# Use Image Cleaner to clean up stale images on your Azure Kubernetes Service cluster (preview)
@@ -166,7 +166,7 @@ az aks update -g MyResourceGroup -n MyManagedCluster
166166

167167
## Logging
168168

169-
Deletion image logs are stored in `eraser-aks-nodepool-xxx` pods for manually deleted images, and in `eraser-collector-xxx` pods for automatically deleted images.
169+
Deletion image logs are stored in `eraser-aks-nodepool-xxx` pods for manually deleted images, and in `collector-aks-nodes-xxx` pods for automatically deleted images.
170170

171171
You can view these logs by running `kubectl logs <pod name> -n kubesystem`. However, this command may return only the most recent logs, since older logs are routinely deleted. To view all logs, follow these steps to enable the [Azure Monitor add-on](./monitor-aks.md) and use the Container Insights pod log table.
172172

@@ -193,7 +193,7 @@ You can view these logs by running `kubectl logs <pod name> -n kubesystem`. Howe
193193

194194
1. In the Azure portal, search for the workspace resource ID, then select **Logs**.
195195

196-
1. Copy this query into the table, replacing `name` with either `eraser-aks-nodepool-xxx` (for manual mode) or `eraser-collector-xxx` (for automatic mode).
196+
1. Copy this query into the table, replacing `name` with either `eraser-aks-nodepool-xxx` (for manual mode) or `collector-aks-nodes-xxx` (for automatic mode).
197197

198198
```kusto
199199
let startTimestamp = ago(1h);

articles/api-management/api-management-gateways-overview.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -67,16 +67,17 @@ The following table compares features available in the managed gateway versus th
6767
| [Custom domains](configure-custom-domain.md) | ✔️ | ✔️ | ✔️ |
6868
| [Built-in cache](api-management-howto-cache.md) | ✔️ |||
6969
| [External Redis-compatible cache](api-management-howto-cache-external.md) | ✔️ | ✔️ | ✔️ |
70-
| [Virtual network injection](virtual-network-concepts.md) | Developer, Premium || ✔️<sup>1</sup> |
70+
| [Virtual network injection](virtual-network-concepts.md) | Developer, Premium || ✔️<sup>1,2</sup> |
7171
| [Private endpoints](private-endpoint.md) | ✔️ |||
7272
| [Availability zones](zone-redundancy.md) | Premium || ✔️<sup>1</sup> |
7373
| [Multi-region deployment](api-management-howto-deploy-multi-region.md) | Premium || ✔️<sup>1</sup> |
74-
| [CA root certificates](api-management-howto-ca-certificates.md) for certificate validation | ✔️ || ✔️<sup>2</sup> |
74+
| [CA root certificates](api-management-howto-ca-certificates.md) for certificate validation | ✔️ || ✔️<sup>3</sup> |
7575
| [Managed domain certificates](configure-custom-domain.md?tabs=managed#domain-certificate-options) | ✔️ | ✔️ ||
7676
| [TLS settings](api-management-howto-manage-protocols-ciphers.md) | ✔️ | ✔️ | ✔️ |
7777

7878
<sup>1</sup> Depends on how the gateway is deployed, but is the responsibility of the customer.<br/>
79-
<sup>2</sup> Requires configuration of local CA certificates.<br/>
79+
<sup>2</sup> Connectivity to the self-hosted gateway v2 [configuration endpoint](self-hosted-gateway-overview.md#fqdn-dependencies) requires DNS resolution of the default endpoint hostname; custom domain name is currently not supported.<br/>
80+
<sup>3</sup> Requires configuration of local CA certificates.<br/>
8081

8182
### Backend APIs
8283

articles/api-management/api-management-using-with-internal-vnet.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,8 @@ This article explains how to set up VNet connectivity for your API Management in
2020
* Git
2121

2222
> [!NOTE]
23-
> None of the API Management endpoints are registered on the public DNS. The endpoints remain inaccessible until you [configure DNS](#dns-configuration) for the VNet.
23+
> * None of the API Management endpoints are registered on the public DNS. The endpoints remain inaccessible until you [configure DNS](#dns-configuration) for the VNet.
24+
> * To use the self-hosted gateway in this mode, also enable private connectivity to the self-hosted gateway [configuration endpoint](self-hosted-gateway-overview.md#fqdn-dependencies). Currently, API Management doesn't enable configuring a custom domain name for the v2 endpoint.
2425
2526
Use API Management in internal mode to:
2627

articles/api-management/how-to-self-hosted-gateway-on-kubernetes-in-production.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ We recommend setting resource requests to two cores and 2 GiB as a starting poin
9595

9696
## Custom domain names and SSL certificates
9797

98-
If you use custom domain names for the API Management endpoints, especially if you use a custom domain name for the Management endpoint, you might need to update the value of `config.service.endpoint` in the **\<gateway-name\>.yaml** file to replace the default domain name with the custom domain name. Make sure that the Management endpoint can be accessed from the pod of the self-hosted gateway in the Kubernetes cluster.
98+
If you use custom domain names for the [API Management endpoints](self-hosted-gateway-overview.md#fqdn-dependencies), especially if you use a custom domain name for the Management endpoint, you might need to update the value of `config.service.endpoint` in the **\<gateway-name\>.yaml** file to replace the default domain name with the custom domain name. Make sure that the Management endpoint can be accessed from the pod of the self-hosted gateway in the Kubernetes cluster.
9999

100100
In this scenario, if the SSL certificate that's used by the Management endpoint isn't signed by a well-known CA certificate, you must make sure that the CA certificate is trusted by the pod of the self-hosted gateway.
101101

0 commit comments

Comments
 (0)