Skip to content

Commit bc3cfbf

Browse files
committed
[AKS] Resolving merge conflict
2 parents 8fd4d22 + c7dea75 commit bc3cfbf

9 files changed

+75
-59
lines changed

articles/active-directory/connect/active-directory-aadconnect-version-history.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.devlang: na
1212
ms.topic: article
1313
ms.tgt_pltfrm: na
1414
ms.workload: identity
15-
ms.date: 08/10/2018
15+
ms.date: 08/21/2018
1616
ms.component: hybrid
1717
ms.author: billmath
1818

@@ -36,7 +36,7 @@ Download| [Download Azure AD Connect](http://go.microsoft.com/fwlink/?LinkId=615
3636

3737
### Release status
3838

39-
7/20/2018: Released for download and auto upgrade. The auto upgrade process is still in progress.
39+
8/21/2018: Released for download and auto upgrade.
4040

4141
### New features and improvements
4242

articles/active-directory/develop/howto-get-appsource-certified.md

Lines changed: 27 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -14,41 +14,46 @@ ms.devlang: na
1414
ms.topic: article
1515
ms.tgt_pltfrm: na
1616
ms.workload: identity
17-
ms.date: 08/03/2017
17+
ms.date: 08/21/2018
1818
ms.author: celested
1919
ms.reviewer: andret
2020
ms.custom: aaddev
2121
---
2222

2323
# How to get AppSource Certified for Azure Active Directory
24+
2425
[Microsoft AppSource](https://appsource.microsoft.com/) is a destination for business users to discover, try, and manage line-of-business SaaS applications (standalone SaaS and add-on to existing Microsoft SaaS products).
2526

26-
To list a standalone SaaS application on AppSource, your application must accept single sign-on from work accounts from any company or organization that has Azure Active Directory. The sign-in process must use the [OpenID Connect](v1-protocols-openid-connect-code.md) or [OAuth 2.0](v1-protocols-oauth-code.md) protocols. SAML integration is not accepted for AppSource certification.
27+
To list a standalone SaaS application on AppSource, your application must accept single sign-on from work accounts from any company or organization that has Azure Active Directory (Azure AD). The sign-in process must use the [OpenID Connect](v1-protocols-openid-connect-code.md) or [OAuth 2.0](v1-protocols-oauth-code.md) protocols. SAML integration is not accepted for AppSource certification.
2728

2829
## Guides and code samples
29-
If you want to learn about how to integrate your application with Azure Active Directory using Open ID connect, follow our guides and code samples in the [Azure Active Directory developer's guide](azure-ad-developers-guide.md#get-started "Get Started with Azure AD for developers").
30+
31+
If you want to learn about how to integrate your application with Azure AD using Open ID connect, follow our guides and code samples in the [Azure Active Directory developer's guide](azure-ad-developers-guide.md#get-started "Get Started with Azure AD for developers").
3032

3133
## Multi-tenant applications
3234

33-
An application that accepts sign-ins from users from any company or organization that have Azure Active Directory without requiring a separate instance, configuration, or deployment is known as a *multi-tenant application*. AppSource recommends that applications implement multi-tenancy to enable the *single-click* free trial experience.
35+
A *multi-tenant application* is an application that accepts sign-ins from users from any company or organization that have Azure AD without requiring a separate instance, configuration, or deployment. AppSource recommends that applications implement multi-tenancy to enable the *single-click* free trial experience.
3436

35-
In order to enable multi-tenancy on your application:
36-
- Set `Multi-Tenanted` property to `Yes` on your application registration's information in the [Azure Portal](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/RegisteredApps) (by default, applications created in the Azure Portal are configured as *single-tenant*)
37-
- Update your code to send requests to the '`common`' endpoint (update the endpoint from *https://login.microsoftonline.com/{yourtenant}* to *https://login.microsoftonline.com/common*)
38-
- For some platforms, like ASP.NET, you need also to update your code to accept multiple issuers
37+
To enable multi-tenancy on your application, follow these steps:
38+
1. Set `Multi-Tenanted` property to `Yes` on your application registration's information in the [Azure portal](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/RegisteredApps). By default, applications created in the Azure portal are configured as *[single-tenant](#single-tenant-applications)*.
39+
1. Update your code to send requests to the `common` endpoint. To do this, update the endpoint from `https://login.microsoftonline.com/{yourtenant}` to `https://login.microsoftonline.com/common*`.
40+
1. For some platforms, like ASP .NET, you need also to update your code to accept multiple issuers.
3941

40-
For more information about multi-tenancy, see: [How to sign in any Azure Active Directory (AD) user using the multi-tenant application pattern](howto-convert-app-to-be-multi-tenant.md).
42+
For more information about multi-tenancy, see [How to sign in any Azure Active Directory (Azure AD) user using the multi-tenant application pattern](howto-convert-app-to-be-multi-tenant.md).
4143

4244
### Single-tenant applications
43-
Applications that only accept sign-ins from users of a defined Azure Active Directory instance are known as *single-tenant application*. External users (including Work or School accounts from other organizations, or personal account) can sign in to a single-tenant application after adding each user as *guest account* to the Azure Active Directory instance that the application is registered. You can add users as guest accounts to an Azure Active Directory via the [*Azure AD B2B collaboration*](../b2b/what-is-b2b.md) - and it can be done [programatically](../../active-directory-b2c/code-samples.md). When you add a user as guest account to an Azure Active Directory, an invitation email is sent to the user, who has to accept the invitation by clicking on the link in the invitation email. Invitations that are sent to an additional user in an inviting organization that is also a member of the partner organization are not required to accept an invitation to sign in.
4445

45-
Single-tenant applications can enable the *Contact Me* experience, but if you want to enable the single-click/ free trial experience that AppSource recommends, enable multi-tenancy on your application instead.
46+
A *single-tenant application* is an application that only accepts sign-ins from users of a defined Azure AD instance. External users (including work or school accounts from other organizations, or personal accounts) can sign in to a single-tenant application after adding each user as a guest account to the Azure AD instance that the application is registered.
4647

48+
You can add users as guest accounts to Azure AD through the [Azure AD B2B collaboration](../b2b/what-is-b2b.md) and you can do this [programatically](../../active-directory-b2c/code-samples.md). When using B2B, users can create a self-service portal that does not require an invitation to sign in. For more info, see [Self-service portal for Azure AD B2B collaboration sign-up](https://docs.microsoft.com/azure/active-directory/b2b/self-service-portal).
49+
50+
Single-tenant applications can enable the *Contact Me* experience, but if you want to enable the single-click/free trial experience that AppSource recommends, enable multi-tenancy on your application instead.
4751

4852
## AppSource trial experiences
4953

50-
### Free Trial (Customer-led trial experience)
51-
The *customer-led trial* is the experience that AppSource recommends as it offers a single-click access to your application. Below an illustration of how this experience looks like:<br/><br/>
54+
### Free trial (customer-led trial experience)
55+
56+
The customer-led trial is the experience that AppSource recommends as it offers a single-click access to your application. Below an illustration of how this experience looks like:<br/><br/>
5257

5358
<table >
5459
<tr>
@@ -63,8 +68,9 @@ The *customer-led trial* is the experience that AppSource recommends as it offer
6368
</tr>
6469
</table>
6570

66-
### Contact Me (Partner-led trial experience)
67-
The *partner trial experience* can be used when a manual or a long-term operation needs to happen to provision the user/ company: for example, your application needs to provision virtual machines, database instances, or operations that take much time to complete. In this case, after user selects the *'Request Trial'* button and fills out a form, AppSource sends you the user's contact information. Upon receiving this information, you then provision the environment and send the instructions to the user on how to access the trial experience:<br/><br/>
71+
### Contact me (partner-led trial experience)
72+
73+
You can use the partner trial experience when a manual or a long-term operation needs to happen to provision the user/company--for example, your application needs to provision virtual machines, database instances, or operations that take much time to complete. In this case, after the user selects the **Request Trial** button and fills out a form, AppSource sends you the user's contact information. When you receive this information, you then provision the environment and send the instructions to the user on how to access the trial experience:<br/><br/>
6874

6975
<table valign="top">
7076
<tr>
@@ -97,17 +103,18 @@ The *partner trial experience* can be used when a manual or a long-term operatio
97103
</table>
98104

99105
### More information
106+
100107
For more information about the AppSource trial experience, see [this video](https://aka.ms/trialexperienceforwebapps).
101108

102109
## Next Steps
103110

104-
- For more information on building applications that support Azure Active Directory sign-ins, see [Authentication Scenarios for Azure AD](https://docs.microsoft.com/azure/active-directory/develop/active-directory-authentication-scenarios)
105-
111+
- For more information on building applications that support Azure AD sign-ins, see [Authentication scenarios for Azure AD](https://docs.microsoft.com/azure/active-directory/develop/authentication-scenarios).
106112
- For information on how to list your SaaS application in AppSource, go see [AppSource Partner Information](https://appsource.microsoft.com/partners)
107113

108114

109-
## Get Support
110-
For Azure Active Directory integration, we use [Stack Overflow](http://stackoverflow.com/questions/tagged/azure-active-directory+appsource) with the community to provide support.
115+
## Get support
116+
117+
For Azure AD integration, we use [Stack Overflow](http://stackoverflow.com/questions/tagged/azure-active-directory+appsource) with the community to provide support.
111118

112119
We highly recommend you ask your questions on Stack Overflow first and browse existing issues to see if someone has asked your question before. Make sure that your questions or comments are tagged with [`[azure-active-directory]` and `[appsource]`](http://stackoverflow.com/questions/tagged/azure-active-directory+appsource).
113120

@@ -121,4 +128,4 @@ Use the following comments section to provide feedback and help us refine and sh
121128
[AAD-QuickStart-Web-Apps]: azure-ad-developers-guide.md#get-started
122129

123130

124-
<!--Image references-->
131+
<!--Image references-->

articles/active-directory/develop/v2-permissions-and-consent.md

Lines changed: 14 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.devlang: na
1616
ms.topic: article
17-
ms.date: 01/07/2017
17+
ms.date: 08/21/2018
1818
ms.author: celested
1919
ms.reviewer: hirsin, dastrock
2020
ms.custom: aaddev
@@ -70,6 +70,19 @@ If your app does not request the `offline_access` scope, it won't receive refres
7070

7171
For more information about how to get and use refresh tokens, see the [v2.0 protocol reference](active-directory-v2-protocols.md).
7272

73+
## Accessing v1.0 resources
74+
v2.0 applications can request tokens and consent for v1.0 applications (such as the PowerBI API `https://analysis.windows.net/powerbi/api` or Sharepoint API `https://{tenant}.sharepoint.com`). To do so, you can reference the app URI and scope string in the `scope` parameter. For example, `scope=https://analysis.windows.net/powerbi/api/Dataset.Read.All` would request the PowerBI `View all Datasets` permission for your application.
75+
76+
To request multiple permissions, append the entire URI with a space or `+`, e.g. `scope=https://analysis.windows.net/powerbi/api/Dataset.Read.All+https://analysis.windows.net/powerbi/api/Report.Read.All`. This requests both the `View all Datasets` and `View all Reports` permissions. Note that as with all Azure AD scopes and permissions, applications can only make a request to one resource at a time - so the request `scope=https://analysis.windows.net/powerbi/api/Dataset.Read.All+https://api.skypeforbusiness.com/Conversations.Initiate`, which requests both the PowerBI `View all Datasets` permission and the Skype for Business `Initiate conversations` permission, will be rejected due to requesting permissions on two different resources.
77+
78+
### v1.0 resources and tenancy
79+
Both the v1.0 and v2.0 Azure AD protocols use a `{tenant}` parameter embedded in the URI (`https://login.microsoftonline.com/{tenant}/oauth2/`). When using the v2.0 endpoint to access a v1.0 organizational resource, the `common` and `consumers` tenants cannot be used, as these resources are only accessible with organizational (Azure AD) accounts. Thus, when accessing these resources, only the tenant GUID or `organizations` can be used as the `{tenant}` parameter.
80+
81+
If an application attempts to access an organizational v1.0 resource using an incorrect tenant, an error similar to the one below will be returned.
82+
83+
`AADSTS90124: Resource 'https://analysis.windows.net/powerbi/api' (Microsoft.Azure.AnalysisServices) is not supported over the /common or /consumers endpoints. Please use the /organizations or tenant-specific endpoint.`
84+
85+
7386
## Requesting individual user consent
7487
In an [OpenID Connect or OAuth 2.0](active-directory-v2-protocols.md) authorization request, an app can request the permissions it needs by using the `scope` query parameter. For example, when a user signs in to an app, the app sends a request like the following example (with line breaks added for legibility):
7588

articles/active-directory/manage-apps/application-proxy-publish-azure-portal.md

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -2,19 +2,15 @@
22
title: Publish apps with Azure AD Application Proxy | Microsoft Docs
33
description: Publish on-premises applications to the cloud with Azure AD Application Proxy in the Azure portal.
44
services: active-directory
5-
documentationcenter: ''
65
author: barbkess
76
manager: mtillman
8-
97
ms.service: active-directory
108
ms.component: app-mgmt
119
ms.workload: identity
12-
ms.tgt_pltfrm: na
13-
ms.devlang: na
1410
ms.topic: conceptual
15-
ms.date: 05/24/2018
11+
ms.date: 08/20/2018
1612
ms.author: barbkess
17-
ms.reviewer: harshja
13+
ms.reviewer: japere
1814
ms.custom: it-pro
1915
---
2016

@@ -69,6 +65,7 @@ Follow these steps to publish your apps with Application Proxy. If you haven't a
6965
![Configure your application](./media/application-proxy-publish-azure-portal/configure-app.png)
7066
5. If necessary, configure additional settings. For most applications, you should keep these settings in their default states.
7167
- **Backend Application Timeout**: Set this value to **Long** only if your application is slow to authenticate and connect.
68+
- **Use HTTP-Only Cookie**: Set this value to **Yes** to have Application Proxy cookies include the HTTPOnly flag in the HTTP response header.
7269
- **Translate URLs in Headers**: Keep this value as **Yes** unless your application required the original host header in the authentication request.
7370
- **Translate URLs in Application Body**: Keep this value as **No** unless you have hardcoded HTML links to other on-premises applications, and don't use custom domains. For more information, see [Link translation with Application Proxy](application-proxy-configure-hard-coded-link-translation.md).
7471

articles/aks/kubelet-logs.md

Lines changed: 16 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,36 +1,34 @@
11
---
2-
title: Get kubelet logs from Azure Kubernetes Service (AKS)
3-
description: Get kubelet logs from Azure Kubernetes Service (AKS) cluster nodes
2+
title: View kubelet logs in Azure Kubernetes Service (AKS)
3+
description: How to view troubleshooting information in the kubelet logs from Azure Kubernetes Service (AKS) nodes
44
services: container-service
55
author: iainfoulds
6-
manager: jeconnoc
76

87
ms.service: container-service
98
ms.topic: article
10-
ms.date: 05/08/2018
9+
ms.date: 08/21/2018
1110
ms.author: iainfou
12-
ms.custom: mvc
1311
---
1412

1513
# Get kubelet logs from Azure Kubernetes Service (AKS) cluster nodes
1614

17-
Occasionally, you may need to get kubelet logs from an Azure Kubernetes Service (AKS) node for troubleshooting purposes. This document details one option for pulling these logs.
15+
Occasionally, you may need to get *kubelet* logs from an Azure Kubernetes Service (AKS) node for troubleshooting purposes. This article shows you how you can use `journalctl` to view the *kubelet* logs.
1816

1917
## Create an SSH connection
2018

21-
First, create an SSH connection with the node on which you need to pull kubelet logs. This operation is detailed in the [SSH into Azure Kubernetes Service (AKS) cluster nodes][aks-ssh] document.
19+
First, create an SSH connection with the node on which you need to view *kubelet* logs. This operation is detailed in the [SSH into Azure Kubernetes Service (AKS) cluster nodes][aks-ssh] document.
2220

2321
## Get kubelet logs
2422

25-
Once you have connected to the node, run the following command to pull the kubelet logs.
23+
Once you have connected to the node, run the following command to pull the *kubelet* logs:
2624

27-
```azurecli-interactive
28-
journalctl -u kubelet -o cat
25+
```console
26+
sudo journalctl -u kubelet -o cat
2927
```
3028

31-
Sample Output:
29+
The following sample output shows the *kubelet* log data:
3230

33-
```console
31+
```
3432
I0508 12:26:17.905042 8672 kubelet_node_status.go:497] Using Node Hostname from cloudprovider: "aks-agentpool-11482510-0"
3533
I0508 12:26:27.943494 8672 kubelet_node_status.go:497] Using Node Hostname from cloudprovider: "aks-agentpool-11482510-0"
3634
I0508 12:26:28.920125 8672 server.go:796] GET /stats/summary: (10.370874ms) 200 [[Ruby] 10.244.0.2:52292]
@@ -54,5 +52,10 @@ I0508 12:28:48.321952 8672 kubelet_node_status.go:497] Using Node Hostname fr
5452
I0508 12:28:58.344656 8672 kubelet_node_status.go:497] Using Node Hostname from cloudprovider: "aks-agentpool-11482510-0"
5553
```
5654

55+
## Next steps
56+
57+
If you need additional troubleshooting information from the Kubernetes master, see [view Kubernetes master node logs in AKS][aks-master-logs].
58+
5759
<!-- LINKS - internal -->
58-
[aks-ssh]: ssh.md
60+
[aks-ssh]: ssh.md
61+
[aks-master-logs]: view-master-logs.md

articles/key-vault/key-vault-ovw-storage-keys.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: key-vault
88
author: bryanla
99
ms.author: bryanla
1010
manager: mbaldwin
11-
ms.date: 10/12/2017
11+
ms.date: 08/21/2017
1212
---
1313
# Azure Key Vault Storage Account Keys
1414

@@ -103,18 +103,18 @@ accountSasCredential.UpdateSASToken(sasToken);
103103

104104
## Getting started
105105

106-
### Setup for role-based access control (RBAC) permissions
106+
### Give Key Vault access to your Storage Account
107107

108-
The Azure Key Vault application identity needs permissions to *list* and
109-
*regenerate* keys for a storage account. Set up these permissions using the
110-
following steps:
108+
Like many applications, Key Vault is registered with Azure AD in order to use OAuth to access other services. During registration, [a service principal](/azure/active-directory/develop/app-objects-and-service-principals) object is created, which is used to represent the application's identity at run time. The service principal is also used to authorize the application's identity to access another resource, through role-based access control (RBAC).
109+
110+
The Azure Key Vault application identity needs permissions to *list* and *regenerate* keys for your storage account. Set up these permissions using the following steps:
111111

112112
```powershell
113113
# Get the resource ID of the Azure Storage Account you want to manage.
114114
# Below, we are fetching a storage account using Azure Resource Manager
115115
$storage = Get-AzureRmStorageAccount -ResourceGroupName "mystorageResourceGroup" -StorageAccountName "mystorage"
116116
117-
# Get ObjectId of Azure Key Vault Identity
117+
# Get Application ID of Azure Key Vault's service principal
118118
$servicePrincipal = Get-AzureRmADServicePrincipal -ServicePrincipalName cfa8b339-82a2-471a-a3c9-0fc0be7a4093
119119
120120
# Assign Storage Key Operator role to Azure Key Vault Identity

articles/logic-apps/manage-logic-apps-with-visual-studio.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,13 @@ title: Manage logic apps with Visual Studio - Azure Logic Apps | Microsoft Docs
33
description: Manage logic apps and other Azure assets with Visual Studio Cloud Explorer
44
services: logic-apps
55
ms.service: logic-apps
6-
ms.prod: visual-studio-dev15
76
ms.technology: vs-azure
87
ms.workload: azure-vs
98
author: ecfan
109
ms.author: estfan
1110
manager: jeconnoc
1211
ms.topic: article
13-
ms.custom: mvc, vs-azure
12+
ms.custom: mvc
1413
ms.date: 03/15/2018
1514
ms.reviewer: klam, LADocs
1615
ms.suite: integration

0 commit comments

Comments
 (0)