Skip to content

Commit c1b8a35

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into wsown
2 parents 8581969 + 53e3ca4 commit c1b8a35

File tree

68 files changed

+526
-407
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

68 files changed

+526
-407
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -760,7 +760,7 @@
760760
},
761761
{
762762
"path_to_root": "azure-spring-apps-reference-architecture",
763-
"url": "https://github.com/Azure/azure-spring-apps-reference-architecture",
763+
"url": "https://github.com/Azure/azure-spring-apps-landing-zone-accelerator",
764764
"branch": "reference-architecture",
765765
"branch_mapping": {}
766766
},

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22440,6 +22440,11 @@
2244022440
"source_path": "articles/private-multi-access-edge-compute-mec/metaswitch-fusion-core-overview.md",
2244122441
"redirect_URL": "/azure/private-5g-core",
2244222442
"redirect_document_id": false
22443+
},
22444+
{
22445+
"source_path": "articles/communications-gateway/rotate-secrets.md",
22446+
"redirect_URL": "/azure/communications-gateway/whats-new",
22447+
"redirect_document_id": false
2244322448
}
2244422449
]
2244522450
}

articles/active-directory/app-provisioning/on-premises-scim-provisioning.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -64,3 +64,4 @@ The following video provides an overview of on-premises provisoning.
6464
- [App provisioning](user-provisioning.md)
6565
- [Generic SQL connector](on-premises-sql-connector-configure.md)
6666
- [Tutorial: ECMA Connector Host generic SQL connector](tutorial-ecma-sql-connector.md)
67+
- [Known issues](known-issues.md)

articles/active-directory/app-provisioning/scim-validator-tutorial.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 09/13/2022
11+
ms.date: 03/17/2023
1212
ms.custom: template-tutorial
1313
ms.reviewer: arvinh
1414
---
@@ -41,7 +41,7 @@ The first step is to select a testing method to validate your SCIM endpoint.
4141

4242
**Use default attributes** - The system provides the default attributes, and you modify them to meet your need.
4343

44-
**Discover schema** - If your end point supports /Schema, this option will allow the tool to discover the supported attributes. We recommend this option as it reduces the overhead of updating your app as you build it out.
44+
**Discover schema** - If your end point supports /Schema, this option lets the tool discover the supported attributes. We recommend this option as it reduces the overhead of updating your app as you build it out.
4545

4646
**Upload Azure AD Schema** - Upload the schema you've downloaded from your sample app on Azure AD.
4747

@@ -75,7 +75,7 @@ Finally, you need to test and validate your endpoint.
7575

7676
### Use Postman to test endpoints (optional)
7777

78-
In addition to using the SCIM Validator tool, you can also use Postman to validate an endpoint. This example provides a set of tests in Postman that validate CRUD (create, read, update, and delete) operations on users and groups, filtering, updates to group membership, and disabling users.
78+
In addition to using the SCIM Validator tool, you can also use Postman to validate an endpoint. This example provides a set of tests in Postman. The example validates create, read, update, and delete (CRUD) operations. The operations are validated on users and groups, filtering, updates to group membership, and disabling users.
7979

8080
The endpoints are in the `{host}/scim/` directory, and you can use standard HTTP requests to interact with them. To modify the `/scim/` route, see *ControllerConstant.cs* in **AzureADProvisioningSCIMreference** > **ScimReferenceApi** > **Controllers**.
8181

@@ -120,10 +120,10 @@ If you created any Azure resources in your testing that are no longer needed, do
120120
## Known Issues with Azure AD SCIM Validator
121121

122122
- Soft deletes (disables) aren’t yet supported.
123-
- The time zone format is randomly generated and will fail for systems that try to validate it.
124-
- The preferred language format is randomly generated and will fail for systems that try to validate it.
123+
- The time zone format is randomly generated and fails for systems that try to validate it.
124+
- The preferred language format is randomly generated and fails for systems that try to validate it.
125125
- The patch user remove attributes may attempt to remove mandatory/required attributes for certain systems. Such failures should be ignored.
126126

127127

128128
## Next steps
129-
- [Learn how to add an app that is not in the Azure AD app gallery](../manage-apps/overview-application-gallery.md)
129+
- [Learn how to add an app that's not in the Azure AD app gallery](../manage-apps/overview-application-gallery.md)

articles/active-directory/app-provisioning/use-scim-to-build-users-and-groups-endpoints.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 03/16/2023
11+
ms.date: 03/17/2023
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---
@@ -102,7 +102,7 @@ That's it! Your SCIM endpoint is now published, and you can use the Azure App Se
102102
103103
## Test your SCIM endpoint
104104
105-
Requests to a SCIM endpoint require authorization. The SCIM standard has multiple options for authentication and authorization, including cookies, basic authentication, TLS client authentication, or any of the methods listed in [RFC 7644](https://tools.ietf.org/html/rfc7644#section-2).
105+
Requests to a SCIM endpoint require authorization. The SCIM standard has multiple options available. Requests can use cookies, basic authentication, TLS client authentication, or any of the methods listed in [RFC 7644](https://tools.ietf.org/html/rfc7644#section-2).
106106
107107
Be sure to avoid methods that aren't secure, such as username and password, in favor of a more secure method such as OAuth. Azure AD supports long-lived bearer tokens (for gallery and non-gallery applications) and the OAuth authorization grant (for gallery applications).
108108

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 03/16/2023
11+
ms.date: 03/17/2023
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---

articles/active-directory/devices/concept-primary-refresh-token.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ The following Windows components play a key role in requesting and using a PRT:
3636
A PRT contains claims found in most Azure AD refresh tokens. In addition, there are some device-specific claims included in the PRT. They are as follows:
3737

3838
* **Device ID**: A PRT is issued to a user on a specific device. The device ID claim `deviceID` determines the device the PRT was issued to the user on. This claim is later issued to tokens obtained via the PRT. The device ID claim is used to determine authorization for Conditional Access based on device state or compliance.
39-
* **Session key**: The session key is an encrypted symmetric key, generated by the Azure AD authentication service, issued as part of the PRT. The session key acts as the proof of possession when a PRT is used to obtain tokens for other applications.
39+
* **Session key**: The session key is an encrypted symmetric key, generated by the Azure AD authentication service, issued as part of the PRT. The session key acts as the proof of possession when a PRT is used to obtain tokens for other applications. Session key is rolled on Windows 10 or newer Azure AD joined or Hybrid Azure AD joined devices if it's older than 30 days.
4040

4141
### Can I see what’s in a PRT?
4242

@@ -133,6 +133,9 @@ A PRT can get a multifactor authentication (MFA) claim in specific scenarios. Wh
133133

134134
Windows 10 or newer maintain a partitioned list of PRTs for each credential. So, there’s a PRT for each of Windows Hello for Business, password, or smartcard. This partitioning ensures that MFA claims are isolated based on the credential used, and not mixed up during token requests.
135135

136+
> [!NOTE]
137+
> When using password to sign into Windows 10 or newer Azure AD joined or Hybrid Azure AD joined device, MFA during WAM interactive sign in may be required after session key associated with PRT is rolled.
138+
136139
## How is a PRT invalidated?
137140

138141
A PRT is invalidated in the following scenarios:

articles/active-directory/governance/what-is-provisioning.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: amycolannino
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: overview
10-
ms.date: 08/01/2022
10+
ms.date: 01/05/2023
1111
ms.subservice: compliance
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management
@@ -56,6 +56,8 @@ For more information, see [What is HR driven provisioning?](../app-provisioning/
5656

5757
In Azure AD, the term **[app provisioning](../app-provisioning/user-provisioning.md)** refers to automatically creating copies of user identities in the applications that users need access to, for applications that have their own data store, distinct from Azure AD or Active Directory. In addition to creating user identities, app provisioning includes the maintenance and removal of user identities from those apps, as the user's status or roles change. Common scenarios include provisioning an Azure AD user into applications like [Dropbox](../saas-apps/dropboxforbusiness-provisioning-tutorial.md), [Salesforce](../saas-apps/salesforce-provisioning-tutorial.md), [ServiceNow](../saas-apps/servicenow-provisioning-tutorial.md), as each of these applications have their own user repository distinct from Azure AD.
5858

59+
Azure AD also supports provisioning users into applications hosted on-premises or in a virtual machine, without having to open up any firewalls. If your application supports [SCIM](https://aka.ms/scimoverview), or you've built a SCIM gateway to connect to your legacy application, you can use the Azure AD Provisioning agent to [directly connect](https://learn.microsoft.com/azure/active-directory/app-provisioning/on-premises-scim-provisioning) with your application and automate provisioning and deprovisioning. If you have legacy applications that don't support SCIM and rely on an [LDAP](https://learn.microsoft.com/azure/active-directory/app-provisioning/on-premises-ldap-connector-configure) user store or a [SQL](https://learn.microsoft.com/azure/active-directory/app-provisioning/on-premises-sql-connector-configure) database, Azure AD can support those as well.
60+
5961
For more information, see [What is app provisioning?](../app-provisioning/user-provisioning.md)
6062

6163
## Inter-directory provisioning
@@ -76,4 +78,4 @@ For more information, see [What is inter-directory provisioning?](../hybrid/what
7678
- [What is identity lifecycle management?](what-is-identity-lifecycle-management.md)
7779
- [What is HR driven provisioning?](../app-provisioning/what-is-hr-driven-provisioning.md)
7880
- [What is app provisioning?](../app-provisioning/user-provisioning.md)
79-
- [What is inter-directory provisioning?](../hybrid/what-is-inter-directory-provisioning.md)
81+
- [What is inter-directory provisioning?](../hybrid/what-is-inter-directory-provisioning.md)

articles/azure-arc/kubernetes/extensions-release.md

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: "Available extensions for Azure Arc-enabled Kubernetes clusters"
3-
ms.date: 03/02/2023
3+
ms.date: 03/17/2023
44
ms.topic: how-to
55
description: "See which extensions are currently available for Azure Arc-enabled Kubernetes clusters and view release notes."
66
---
@@ -110,14 +110,30 @@ For more information, see [Introduction to Kubernetes compute target in AzureML]
110110

111111
## Flux (GitOps)
112112

113-
- **Supported distributions**: All Cloud Native Computing Foundation (CNCF) certified Kubernetes clusters. Not currently supported for ARM 64.
113+
- **Supported distributions**: All Cloud Native Computing Foundation (CNCF) certified Kubernetes clusters.
114114

115115
[GitOps on AKS and Azure Arc-enabled Kubernetes](conceptual-gitops-flux2.md) uses [Flux v2](https://fluxcd.io/docs/), a popular open-source tool set, to help manage cluster configuration and application deployment. GitOps is enabled in the cluster as a `Microsoft.KubernetesConfiguration/extensions/microsoft.flux` cluster extension resource.
116116

117117
For more information, see [Tutorial: Deploy applications using GitOps with Flux v2](tutorial-use-gitops-flux2.md).
118118

119119
The currently supported versions of the `microsoft.flux` extension are described below. The most recent version of the Flux v2 extension and the two previous versions (N-2) are supported. We generally recommend that you use the most recent version of the extension.
120120

121+
### 1.7.0 (March 2023)
122+
123+
Flux version: [Release v0.39.0](https://github.com/fluxcd/flux2/releases/tag/v0.39.0)
124+
125+
- source-controller: v0.34.0
126+
- kustomize-controller: v0.33.0
127+
- helm-controller: v0.29.0
128+
- notification-controller: v0.31.0
129+
- image-automation-controller: v0.29.0
130+
- image-reflector-controller: v0.24.0
131+
132+
Changes made for this version:
133+
134+
- Upgrades Flux to [v0.39.0](https://github.com/fluxcd/flux2/releases/tag/v0.39.0)
135+
- Flux extension is now supported on ARM64-based clusters
136+
121137
### 1.6.4 (February 2023)
122138

123139
Changes made for this version:
@@ -160,22 +176,6 @@ Changes made for this version:
160176
- Fixes bug where [deleting the extension may fail on AKS with Windows node pool](https://github.com/Azure/AKS/issues/3191)
161177
- Adds support for sasToken for Azure blob storage at account level as well as container level
162178

163-
### 1.6.0 (September 2022)
164-
165-
Flux version: [Release v0.33.0](https://github.com/fluxcd/flux2/releases/tag/v0.33.0)
166-
167-
- source-controller: v0.28.0
168-
- kustomize-controller: v0.27.1
169-
- helm-controller: v0.23.1
170-
- notification-controller: v0.25.2
171-
- image-automation-controller: v0.24.2
172-
- image-reflector-controller: v0.20.1
173-
174-
Changes made for this version:
175-
176-
- Upgrades Flux to [v0.33.0](https://github.com/fluxcd/flux2/releases/tag/v0.33.0)
177-
- Fixes Helm-related [security issue](https://github.com/fluxcd/flux2/security/advisories/GHSA-p2g7-xwvr-rrw3)
178-
179179
## Dapr extension for Azure Kubernetes Service (AKS) and Arc-enabled Kubernetes
180180

181181
[Dapr](https://dapr.io/) is a portable, event-driven runtime that simplifies building resilient, stateless, and stateful applications that run on the cloud and edge and embrace the diversity of languages and developer frameworks. The Dapr extension eliminates the overhead of downloading Dapr tooling and manually installing and managing the runtime on your clusters.

articles/azure-functions/durable/durable-functions-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ Durable Functions is designed to work with all Azure Functions programming langu
2828
| Java | Functions 4.0+ | Java 8+ | 4.x bundles |
2929

3030
> [!NOTE]
31-
> The new programming model for authoring Functions in Python (V2) is currently in preview. Compared to the current model, the new experience is designed to have a more idiomatic and intuitive. To learn more, see Azure Functions Python [developer guide](../functions-reference-python.md?pivots=python-mode-decorators).
31+
> The new programming model for authoring Functions in Python (V2) is currently in preview. Compared to the current model, the new experience is designed to be more idiomatic and intuitive for Python programmers. To learn more, see Azure Functions Python [developer guide](../functions-reference-python.md?pivots=python-mode-decorators).
3232
>
3333
> In the following code snippets, Python (PM2) denotes programming model V2, the new experience.
3434

0 commit comments

Comments
 (0)