You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/how-to-connect-pta-faq.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.workload: identity
12
12
ms.tgt_pltfrm: na
13
13
ms.devlang: na
14
14
ms.topic: conceptual
15
-
ms.date: 04/15/2019
15
+
ms.date: 03/09/2020
16
16
ms.subservice: hybrid
17
17
ms.author: billmath
18
18
ms.collection: M365-identity-device-management
@@ -39,7 +39,7 @@ No. Pass-through Authentication is only available in the worldwide instance of A
39
39
Yes. All Conditional Access capabilities, including Azure Multi-Factor Authentication, work with Pass-through Authentication.
40
40
41
41
## Does Pass-through Authentication support "Alternate ID" as the username, instead of "userPrincipalName"?
42
-
To a limited extent, Pass-through Authentication supports Alternate ID as the username when configured in Azure AD Connect. As a pre-requisite, Azure AD Connect needs to synchronize the on-premises Active Directory `UserPrincipalName` attribute to Azure AD. This makes the `UserPrincipalName` on the on-premises AD and Azure AD become identical. If you would like to use another attribute to synchronize from on-premises AD as the UPN to Azure AD, you will have to use either Password Hash sync or AD FS. For more information, see [Custom installation of Azure AD Connect](how-to-connect-install-custom.md). Not all Office 365 applications support `Alternate ID`. Refer to the specific application's documentation support statement.
42
+
Sign in using a non-UPN value, such as an alternate email, is currently being tested in private preview for both pass-through authentication (PTA) and password hash sync (PHS).
43
43
44
44
## Does password hash synchronization act as a fallback to Pass-through Authentication?
Copy file name to clipboardExpand all lines: articles/aks/update-credentials.md
+29-10Lines changed: 29 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,28 +1,30 @@
1
1
---
2
2
title: Reset the credentials for an Azure Kubernetes Service (AKS) cluster
3
-
description: Learn how update or reset the service principal credentials for a cluster in Azure Kubernetes Service (AKS)
3
+
description: Learn how update or reset the service principal or AAD Application credentials for an Azure Kubernetes Service (AKS) cluster
4
4
services: container-service
5
5
ms.topic: article
6
-
ms.date: 05/31/2019
6
+
ms.date: 03/11/2019
7
7
8
8
---
9
9
10
-
# Update or rotate the credentials for a service principal in Azure Kubernetes Service (AKS)
10
+
# Update or rotate the credentials for Azure Kubernetes Service (AKS)
11
11
12
12
By default, AKS clusters are created with a service principal that has a one-year expiration time. As you near the expiration date, you can reset the credentials to extend the service principal for an additional period of time. You may also want to update, or rotate, the credentials as part of a defined security policy. This article details how to update these credentials for an AKS cluster.
13
13
14
+
You may also have [integrated your AKS cluster with Azure Active Directory][aad-integration], and use it as an authentication provider for your cluster. In that case you will have 2 more identities created for your cluster, the AAD Server App and the AAD Client App, you may also reset those credentials.
15
+
14
16
## Before you begin
15
17
16
18
You need the Azure CLI version 2.0.65 or later installed and configured. Run `az --version` to find the version. If you need to install or upgrade, see [Install Azure CLI][install-azure-cli].
17
19
18
-
## Choose to update or create a service principal
20
+
## Update or create a new Service Principal for your AKS cluster
19
21
20
22
When you want to update the credentials for an AKS cluster, you can choose to:
21
23
22
24
* update the credentials for the existing service principal used by the cluster, or
23
25
* create a service principal and update the cluster to use these new credentials.
24
26
25
-
### Update Existing Service Principal Expiration
27
+
### Reset Existing Service Principal Credential
26
28
27
29
To update the credentials for the existing service principal, get the service principal ID of your cluster using the [az aks show][az-aks-show] command. The following example gets the ID for the cluster named *myAKSCluster* in the *myResourceGroup* resource group. The service principal ID is set as a variable named *SP_ID* for use in additional command.
28
30
@@ -37,11 +39,11 @@ With a variable set that contains the service principal ID, now reset the creden
Now continue on to [update AKS cluster with new credentials](#update-aks-cluster-with-new-credentials). This step is necessary for the Service Principal changes to reflect on the AKS cluster.
42
+
Now continue on to [update AKS cluster with new service principal credentials](#update-aks-cluster-with-new-service-principal-credentials). This step is necessary for the Service Principal changes to reflect on the AKS cluster.
41
43
42
44
### Create a New Service Principal
43
45
44
-
If you chose to update the existing service principal credentials in the previous section, skip this step. Continue to [update AKS cluster with new credentials](#update-aks-cluster-with-new-credentials).
46
+
If you chose to update the existing service principal credentials in the previous section, skip this step. Continue to [update AKS cluster with new service principal credentials](#update-aks-cluster-with-new-service-principal-credentials).
45
47
46
48
To create a service principal and then update the AKS cluster to use these new credentials, use the [az ad sp create-for-rbac][az-ad-sp-create] command. In the following example, the `--skip-assignment` parameter prevents any additional default assignments being assigned:
Now continue on to [update AKS cluster with new credentials](#update-aks-cluster-with-new-credentials). This step is necessary for the Service Principal changes to reflect on the AKS cluster.
72
+
Now continue on to [update AKS cluster with new service principal credentials](#update-aks-cluster-with-new-service-principal-credentials). This step is necessary for the Service Principal changes to reflect on the AKS cluster.
71
73
72
-
## Update AKS cluster with new credentials
74
+
## Update AKS cluster with new Service Principal credentials
73
75
74
76
Regardless of whether you chose to update the credentials for the existing service principal or create a service principal, you now update the AKS cluster with your new credentials using the [az aks update-credentials][az-aks-update-credentials] command. The variables for the *--service-principal* and *--client-secret* are used:
75
77
@@ -84,14 +86,31 @@ az aks update-credentials \
84
86
85
87
It takes a few moments for the service principal credentials to be updated in the AKS.
86
88
89
+
## Update AKS Cluster with new AAD Application credentials
90
+
91
+
You may create new AAD Server and Client applications by following the [AAD integration steps][create-aad-app]. Or reset your existing AAD Applications following the [same method as for service principal reset](#reset-existing-service-principal-credential). After that you just need to update your cluster AAD Application credentials using the same [az aks update-credentials][az-aks-update-credentials] command but using the *--reset-aad* variables.
In this article, the service principal for the AKS cluster itself was updated. For more information on how to manage identity for workloads within a cluster, see [Best practices for authentication and authorization in AKS][best-practices-identity].
106
+
In this article, the service principal for the AKS cluster itself and the AAD Integration Applications were updated. For more information on how to manage identity for workloads within a cluster, see [Best practices for authentication and authorization in AKS][best-practices-identity].
Copy file name to clipboardExpand all lines: articles/application-gateway/application-gateway-metrics.md
+3-7Lines changed: 3 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -121,10 +121,6 @@ For Application Gateway, the following metrics are available:
121
121
122
122
Count of successful requests that Application Gateway has served. The request count can be further filtered to show count per each/specific backend pool-http setting combination.
123
123
124
-
-**Web Application Firewall matched rules**
125
-
126
-
-**Web Application Firewall triggered rules**
127
-
128
124
### Backend metrics
129
125
130
126
For Application Gateway, the following metrics are available:
@@ -176,9 +172,9 @@ For Application Gateway, the following metrics are available:
176
172
177
173
Count of successful requests that Application Gateway has served. The request count can be further filtered to show count per each/specific backend pool-http setting combination.
Copy file name to clipboardExpand all lines: articles/application-gateway/multiple-site-overview.md
+12-6Lines changed: 12 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,14 +4,14 @@ description: This article provides an overview of the Azure Application Gateway
4
4
services: application-gateway
5
5
author: vhorne
6
6
ms.service: application-gateway
7
-
ms.date: 1/7/2020
7
+
ms.date: 03/11/2020
8
8
ms.author: amsriva
9
9
ms.topic: conceptual
10
10
---
11
11
12
12
# Application Gateway multiple site hosting
13
13
14
-
Multiple site hosting enables you to configure more than one web application on the same port of an application gateway. This feature allows you to configure a more efficient topology for your deployments by adding up to 100 websites to one application gateway. Each website can be directed to its own backend pool. In the following example, application gateway is serving traffic for contoso.com and fabrikam.com from two back-end server pools called ContosoServerPool and FabrikamServerPool.
14
+
Multiple site hosting enables you to configure more than one web application on the same port of an application gateway. This feature allows you to configure a more efficient topology for your deployments by adding up to 100 websites to one application gateway. Each website can be directed to its own backend pool. In the following example, application gateway serves traffic for `contoso.com` and `fabrikam.com` from two back-end server pools called ContosoServerPool and FabrikamServerPool.
@@ -20,7 +20,7 @@ Multiple site hosting enables you to configure more than one web application on
20
20
21
21
Requests for `http://contoso.com` are routed to ContosoServerPool, and `http://fabrikam.com` are routed to FabrikamServerPool.
22
22
23
-
Similarly two subdomains of the same parent domain can be hosted on the same application gateway deployment. Examples of using subdomains could include`http://blog.contoso.com` and `http://app.contoso.com` hosted on a single application gateway deployment.
23
+
Similarly, you can host multiple subdomains of the same parent domain on the same application gateway deployment. For example, you can host`http://blog.contoso.com` and `http://app.contoso.com` on a single application gateway deployment.
24
24
25
25
## Host headers and Server Name Indication (SNI)
26
26
@@ -30,11 +30,17 @@ There are three common mechanisms for enabling multiple site hosting on the same
30
30
2. Use host name to host multiple web applications on the same IP address.
31
31
3. Use different ports to host multiple web applications on the same IP address.
32
32
33
-
Currently an application gateway gets a single public IP address on which it listens for traffic. Therefore supporting multiple applications, each with its own IP address, is currently not supported. Application Gateway supports hosting multiple applications each listening on different ports but this scenario would require the applications to accept traffic on non-standard ports and is often not a desired configuration. Application Gateway relies on HTTP 1.1 host headers to host more than one website on the same public IP address and port. The sites hosted on application gateway can also support SSL offload with Server Name Indication (SNI) TLS extension. This scenario means that the client browser and backend web farm must support HTTP/1.1 and TLS extension as defined in RFC 6066.
33
+
Currently Application Gateway supports a single public IP address where it listens for traffic. So multiple applications, each with its own IP address is currently not supported.
34
+
35
+
Application Gateway supports multiple applications each listening on different ports, but this scenario requires the applications to accept traffic on non-standard ports. This is often not a configuration that you want.
36
+
37
+
Application Gateway relies on HTTP 1.1 host headers to host more than one website on the same public IP address and port. The sites hosted on application gateway can also support SSL offload with Server Name Indication (SNI) TLS extension. This scenario means that the client browser and backend web farm must support HTTP/1.1 and TLS extension as defined in RFC 6066.
34
38
35
39
## Listener configuration element
36
40
37
-
Existing HTTPListener configuration element is enhanced to support host name and server name indication elements, which is used by application gateway to route traffic to appropriate backend pool. The following code example is the snippet of HttpListeners element from template file.
41
+
Existing HTTPListener configuration elements are enhanced to support host name and server name indication elements. It's used by Application Gateway to route traffic to the appropriate backend pool.
42
+
43
+
The following code example is the snippet of an HttpListeners element from a template file:
38
44
39
45
```json
40
46
"httpListeners": [
@@ -76,7 +82,7 @@ You can visit [Resource Manager template using multiple site hosting](https://gi
76
82
77
83
## Routing rule
78
84
79
-
There is no change required in the routing rule. The routing rule 'Basic' should continue to be chosen to tie the appropriate site listener to the corresponding backend address pool.
85
+
There's no change required in the routing rule. The routing rule 'Basic' should continue to be chosen to tie the appropriate site listener to the corresponding backend address pool.
0 commit comments