Skip to content

Commit bf0cfed

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 34b35cf + 5bf890c commit bf0cfed

File tree

172 files changed

+2096
-2400
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

172 files changed

+2096
-2400
lines changed

articles/active-directory-b2c/identity-provider-facebook.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ If you don't already have a Facebook account, sign up at [https://www.facebook.c
5353
1. Select **Save Changes**.
5454
1. From the menu, select the **plus** sign or **Add Product** link next to **PRODUCTS**. Under the **Add Products to Your App**, select **Set up** under **Facebook Login**.
5555
1. From the menu, select **Facebook Login**, select **Settings**.
56-
1. In **Valid OAuth redirect URIs**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-name.onmicrosoft.com/oauth2/authresp`. Replace `your-tenant-name` with the name of your tenant, and `your-domain-name` with your custom domain.
56+
1. In **Valid OAuth redirect URIs**, enter `https://your-tenant-name.b2clogin.com/your-tenant-id/oauth2/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-id/oauth2/authresp`. Replace `your-tenant-id` with the id of your tenant, and `your-domain-name` with your custom domain.
5757
1. Select **Save Changes** at the bottom of the page.
5858
1. To make your Facebook application available to Azure AD B2C, select the Status selector at the top right of the page and turn it **On** to make the Application public, and then select **Switch Mode**. At this point, the Status should change from **Development** to **Live**. For more information, see [Facebook App Development](https://developers.facebook.com/docs/development/release).
5959

@@ -135,4 +135,4 @@ If the sign-in process is successful, your browser is redirected to `https://jwt
135135
- Learn how to [pass Facebook token to your application](idp-pass-through-user-flow.md).
136136
- Check out the Facebook federation [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers#facebook), and how to pass Facebook access token [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers#facebook-with-access-token)
137137

138-
::: zone-end
138+
::: zone-end

articles/active-directory/develop/scenario-mobile-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 05/07/2019
12+
ms.date: 02/07/2023
1313
ms.author: henrymbugua
1414
ms.reviewer: brandwe, jmprieur
1515
ms.custom: aaddev, identityplatformtop40
@@ -38,7 +38,7 @@ Considerations for mobile apps:
3838

3939
- **User experience is key**: Allow users to see the value of your app before you ask for sign-in. Request only the required permissions.
4040
- **Support all user configurations**: Many mobile business users must adhere to conditional-access policies and device-compliance policies. Be sure to support these key scenarios.
41-
- **Implement single sign-on (SSO)**: By using MSAL and Microsoft identity platform, you can enable single sign-on through the device's browser or Microsoft Authenticator (and Intune Company Portal on Android).
41+
- **Implement single sign-on (SSO)**: By using MSAL and Microsoft identity platform, you can enable SSO through the device's browser or Microsoft Authenticator (and Intune Company Portal on Android).
4242
- **Implement shared device mode**: Enable your application to be used in shared-device scenarios, for example hospitals, manufacturing, retail, and finance. [Read more about supporting shared device mode](msal-shared-devices.md).
4343

4444
## Specifics

articles/active-directory/develop/v2-supported-account-types.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -9,34 +9,34 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 07/14/2020
12+
ms.date: 02/06/2023
1313
ms.author: henrymbugua
1414
ms.reviewer: saeeda, jmprieur
1515
ms.custom: aaddev, identityplatformtop40
1616
---
1717

1818
# Supported account types
1919

20-
This article explains what account types (sometimes called *audiences*) are supported in the Microsoft identity platform applications.
20+
This article explains what account types (sometimes called _audiences_) are supported in the Microsoft identity platform applications.
2121

2222
<!-- This section can be in an include for many of the scenarios (SPA, web app signing-in users, protecting a web API, Desktop (depending on the flows), Mobile -->
2323

2424
## Account types in the public cloud
2525

2626
In the Microsoft Azure public cloud, most types of apps can sign in users with any audience:
2727

28-
- If you're writing a line-of-business (LOB) application, you can sign in users in your own organization. Such an application is sometimes called *single-tenant*.
29-
- If you're an ISV, you can write an application that signs in users:
28+
- If you're writing a line-of-business (LOB) application, you can sign in users in your own organization. Such an application is sometimes called _single-tenant_.
29+
- If you're an independent software vendor (ISV), you can write an application that signs in users:
3030

31-
- In any organization. Such an application is called a *multitenant* web application. You'll sometimes read that it signs in users with their work or school accounts.
31+
- In any organization. Such an application is called a _multitenant_ web application. You'll sometimes read that it signs in users with their work or school accounts.
3232
- With their work or school or personal Microsoft accounts.
3333
- With only personal Microsoft accounts.
34-
34+
3535
- If you're writing a business-to-consumer application, you can also sign in users with their social identities, by using Azure Active Directory B2C (Azure AD B2C).
3636

3737
## Account type support in authentication flows
3838

39-
Some account types can't be used with certain authentication flows. For instance, in desktop, UWP, or daemon applications:
39+
Some account types can't be used with certain authentication flows. For instance, in desktop, Universal Windows Platform (UWP), or daemon applications:
4040

4141
- Daemon applications can be used only with Azure AD organizations. It doesn't make sense to try to use daemon applications to manipulate Microsoft personal accounts. The admin consent will never be granted.
4242
- You can use the integrated Windows authentication flow only with work or school accounts (in your organization or any organization). Integrated Windows authentication works with domain accounts, and it requires the machines to be domain-joined or Azure AD-joined. This flow doesn't make sense for personal Microsoft accounts.

articles/aks/image-cleaner.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.author: nickoman
55
author: nickomang
66
services: container-service
77
ms.topic: article
8-
ms.date: 02/03/2023
8+
ms.date: 02/07/2023
99
---
1010

1111
# Use Image Cleaner to clean up stale images on your Azure Kubernetes Service cluster (preview)
@@ -166,7 +166,7 @@ az aks update -g MyResourceGroup -n MyManagedCluster
166166

167167
## Logging
168168

169-
Deletion image logs are stored in `eraser-aks-nodepool-xxx` pods for manually deleted images, and in `eraser-collector-xxx` pods for automatically deleted images.
169+
Deletion image logs are stored in `eraser-aks-nodepool-xxx` pods for manually deleted images, and in `collector-aks-nodes-xxx` pods for automatically deleted images.
170170

171171
You can view these logs by running `kubectl logs <pod name> -n kubesystem`. However, this command may return only the most recent logs, since older logs are routinely deleted. To view all logs, follow these steps to enable the [Azure Monitor add-on](./monitor-aks.md) and use the Container Insights pod log table.
172172

@@ -193,7 +193,7 @@ You can view these logs by running `kubectl logs <pod name> -n kubesystem`. Howe
193193

194194
1. In the Azure portal, search for the workspace resource ID, then select **Logs**.
195195

196-
1. Copy this query into the table, replacing `name` with either `eraser-aks-nodepool-xxx` (for manual mode) or `eraser-collector-xxx` (for automatic mode).
196+
1. Copy this query into the table, replacing `name` with either `eraser-aks-nodepool-xxx` (for manual mode) or `collector-aks-nodes-xxx` (for automatic mode).
197197

198198
```kusto
199199
let startTimestamp = ago(1h);

articles/api-management/api-management-gateways-overview.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -67,16 +67,17 @@ The following table compares features available in the managed gateway versus th
6767
| [Custom domains](configure-custom-domain.md) | ✔️ | ✔️ | ✔️ |
6868
| [Built-in cache](api-management-howto-cache.md) | ✔️ |||
6969
| [External Redis-compatible cache](api-management-howto-cache-external.md) | ✔️ | ✔️ | ✔️ |
70-
| [Virtual network injection](virtual-network-concepts.md) | Developer, Premium || ✔️<sup>1</sup> |
70+
| [Virtual network injection](virtual-network-concepts.md) | Developer, Premium || ✔️<sup>1,2</sup> |
7171
| [Private endpoints](private-endpoint.md) | ✔️ |||
7272
| [Availability zones](zone-redundancy.md) | Premium || ✔️<sup>1</sup> |
7373
| [Multi-region deployment](api-management-howto-deploy-multi-region.md) | Premium || ✔️<sup>1</sup> |
74-
| [CA root certificates](api-management-howto-ca-certificates.md) for certificate validation | ✔️ || ✔️<sup>2</sup> |
74+
| [CA root certificates](api-management-howto-ca-certificates.md) for certificate validation | ✔️ || ✔️<sup>3</sup> |
7575
| [Managed domain certificates](configure-custom-domain.md?tabs=managed#domain-certificate-options) | ✔️ | ✔️ ||
7676
| [TLS settings](api-management-howto-manage-protocols-ciphers.md) | ✔️ | ✔️ | ✔️ |
7777

7878
<sup>1</sup> Depends on how the gateway is deployed, but is the responsibility of the customer.<br/>
79-
<sup>2</sup> Requires configuration of local CA certificates.<br/>
79+
<sup>2</sup> Connectivity to the self-hosted gateway v2 [configuration endpoint](self-hosted-gateway-overview.md#fqdn-dependencies) requires DNS resolution of the default endpoint hostname; custom domain name is currently not supported.<br/>
80+
<sup>3</sup> Requires configuration of local CA certificates.<br/>
8081

8182
### Backend APIs
8283

articles/api-management/api-management-using-with-internal-vnet.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,8 @@ This article explains how to set up VNet connectivity for your API Management in
2020
* Git
2121

2222
> [!NOTE]
23-
> None of the API Management endpoints are registered on the public DNS. The endpoints remain inaccessible until you [configure DNS](#dns-configuration) for the VNet.
23+
> * None of the API Management endpoints are registered on the public DNS. The endpoints remain inaccessible until you [configure DNS](#dns-configuration) for the VNet.
24+
> * To use the self-hosted gateway in this mode, also enable private connectivity to the self-hosted gateway [configuration endpoint](self-hosted-gateway-overview.md#fqdn-dependencies). Currently, API Management doesn't enable configuring a custom domain name for the v2 endpoint.
2425
2526
Use API Management in internal mode to:
2627

articles/api-management/how-to-self-hosted-gateway-on-kubernetes-in-production.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ We recommend setting resource requests to two cores and 2 GiB as a starting poin
9595

9696
## Custom domain names and SSL certificates
9797

98-
If you use custom domain names for the API Management endpoints, especially if you use a custom domain name for the Management endpoint, you might need to update the value of `config.service.endpoint` in the **\<gateway-name\>.yaml** file to replace the default domain name with the custom domain name. Make sure that the Management endpoint can be accessed from the pod of the self-hosted gateway in the Kubernetes cluster.
98+
If you use custom domain names for the [API Management endpoints](self-hosted-gateway-overview.md#fqdn-dependencies), especially if you use a custom domain name for the Management endpoint, you might need to update the value of `config.service.endpoint` in the **\<gateway-name\>.yaml** file to replace the default domain name with the custom domain name. Make sure that the Management endpoint can be accessed from the pod of the self-hosted gateway in the Kubernetes cluster.
9999

100100
In this scenario, if the SSL certificate that's used by the Management endpoint isn't signed by a well-known CA certificate, you must make sure that the CA certificate is trusted by the pod of the self-hosted gateway.
101101

articles/api-management/self-hosted-gateway-overview.md

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -97,17 +97,18 @@ To operate properly, each self-hosted gateway needs outbound connectivity on por
9797

9898
| Description | Required for v1 | Required for v2 | Notes |
9999
|:------------|:---------------------|:---------------------|:------|
100-
| Hostname of the configuration endpoint | `<apim-service-name>.management.azure-api.net` | `<apim-service-name>.configuration.azure-api.net` | |
100+
| Hostname of the configuration endpoint | `<apim-service-name>.management.azure-api.net` | `<apim-service-name>.configuration.azure-api.net` | Connectivity to v2 endpoint requires DNS resolution of the default hostname.<br/><br/>Currently, API Management doesn't enable configuring a custom domain name for the v2 endpoint<sup>1</sup>. |
101101
| Public IP address of the API Management instance | ✔️ | ✔️ | IP addresses of primary location is sufficient. |
102-
| Public IP addresses of Azure Storage [service tag](../virtual-network/service-tags-overview.md) | ✔️ | Optional<sup>1</sup> | IP addresses must correspond to primary location of API Management instance. |
103-
| Hostname of Azure Blob Storage account | ✔️ | Optional<sup>1</sup> | Account associated with instance (`<blob-storage-account-name>.blob.core.windows.net`) |
104-
| Hostname of Azure Table Storage account | ✔️ | Optional<sup>1</sup> | Account associated with instance (`<table-storage-account-name>.table.core.windows.net`) |
105-
| Endpoints for [Azure Application Insights integration](api-management-howto-app-insights.md) | Optional<sup>2</sup> | Optional<sup>2</sup> | Minimal required endpoints are:<ul><li>`rt.services.visualstudio.com:443`</li><li>`dc.services.visualstudio.com:443`</li><li>`{region}.livediagnostics.monitor.azure.com:443`</li></ul>Learn more in [Azure Monitor docs](../azure-monitor/app/ip-addresses.md#outgoing-ports) |
106-
| Endpoints for [Event Hubs integration](api-management-howto-log-event-hubs.md) | Optional<sup>2</sup> | Optional<sup>2</sup> | Learn more in [Azure Event Hubs docs](../event-hubs/network-security.md) |
107-
| Endpoints for [external cache integration](api-management-howto-cache-external.md) | Optional<sup>2</sup> | Optional<sup>2</sup> | This requirement depends on the external cache that is being used |
108-
109-
<sup>1</sup> Only required in v2 when API inspector or quotas are used in policies.<br/>
110-
<sup>2</sup> Only required when feature is used and requires public IP address, port and hostname information.<br/>
102+
| Public IP addresses of Azure Storage [service tag](../virtual-network/service-tags-overview.md) | ✔️ | Optional<sup>2</sup> | IP addresses must correspond to primary location of API Management instance. |
103+
| Hostname of Azure Blob Storage account | ✔️ | Optional<sup>2</sup> | Account associated with instance (`<blob-storage-account-name>.blob.core.windows.net`) |
104+
| Hostname of Azure Table Storage account | ✔️ | Optional<sup>2</sup> | Account associated with instance (`<table-storage-account-name>.table.core.windows.net`) |
105+
| Endpoints for [Azure Application Insights integration](api-management-howto-app-insights.md) | Optional<sup>3</sup> | Optional<sup>3</sup> | Minimal required endpoints are:<ul><li>`rt.services.visualstudio.com:443`</li><li>`dc.services.visualstudio.com:443`</li><li>`{region}.livediagnostics.monitor.azure.com:443`</li></ul>Learn more in [Azure Monitor docs](../azure-monitor/app/ip-addresses.md#outgoing-ports) |
106+
| Endpoints for [Event Hubs integration](api-management-howto-log-event-hubs.md) | Optional<sup>3</sup> | Optional<sup>3</sup> | Learn more in [Azure Event Hubs docs](../event-hubs/network-security.md) |
107+
| Endpoints for [external cache integration](api-management-howto-cache-external.md) | Optional<sup>3</sup> | Optional<sup>3</sup> | This requirement depends on the external cache that is being used |
108+
109+
<sup>1</sup>For an API Management instance in an internal virtual network, enable private connectivity to the v2 configuration endpoint from the location of the self-hosted gateway, for example, using a private DNS in a peered network.<br/>
110+
<sup>2</sup>Only required in v2 when API inspector or quotas are used in policies.<br/>
111+
<sup>3</sup> Only required when feature is used and requires public IP address, port, and hostname information.<br/>
111112

112113
> [!IMPORTANT]
113114
> * DNS hostnames must be resolvable to IP addresses and the corresponding IP addresses must be reachable.

0 commit comments

Comments
 (0)