Skip to content

Commit c237384

Browse files
authored
Merge pull request #218210 from MicrosoftDocs/main
Publish to live, Monday 4 AM PST, 11/14
2 parents bb57ceb + b6bd2b8 commit c237384

31 files changed

+446
-129
lines changed

articles/active-directory/app-provisioning/partner-driven-integrations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717
The Azure Active Directory Provisioning service allows you to provision users and groups into both [SaaS](user-provisioning.md) and [on-premises](on-premises-scim-provisioning.md) applications. There are four integration paths:
1818

1919
**Option 1 - Azure AD Application Gallery:**
20-
Popular third party applications, such as Dropbox, Snowflake, and Workplace by Facebook, are made available for customers through the Azure AD application gallery. New applications can easily be onboarded to the gallery using the [application network portal](../azuread-dev/howto-app-gallery-listing.md).
20+
Popular third party applications, such as Dropbox, Snowflake, and Workplace by Facebook, are made available for customers through the Azure AD application gallery. New applications can easily be onboarded to the gallery using the [application network portal](../manage-apps/v2-howto-app-gallery-listing.md).
2121

2222
**Option 2 - Implement a SCIM compliant API for your application:**
2323
If your line-of-business application supports the [SCIM](https://aka.ms/scimoverview) standard, it can easily be integrated with the [Azure AD SCIM client](use-scim-to-provision-users-and-groups.md).

articles/active-directory/app-proxy/application-proxy-secure-api-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -134,7 +134,7 @@ You've now registered the AppProxyNativeAppSample app in Azure Active Directory.
134134
The last step is to configure the native app. The code snippet that's used in the following steps is based on [Add the Microsoft Authentication Library to your code (.NET C# sample)](application-proxy-configure-native-client-application.md#step-4-add-the-microsoft-authentication-library-to-your-code-net-c-sample). The code is customized for this example. The code must be added to the *Form1.cs* file in the NativeClient sample app where it will cause the [MSAL library](../develop/reference-v2-libraries.md) to acquire the token for requesting the API call and attach it as bearer to the header in the request.
135135

136136
> [!NOTE]
137-
> The sample app uses [Azure Active Directory Authentication Library (ADAL)](../azuread-dev/active-directory-authentication-libraries.md). Read how to [add MSAL to your project](../develop/tutorial-v2-windows-desktop.md#add-msal-to-your-project). Remember to [add the reference to MSAL](../develop/tutorial-v2-windows-desktop.md#add-the-code-to-initialize-msal) to the class and remove the ADAL reference.
137+
> The sample app uses Azure Active Directory Authentication Library (ADAL). Read how to [add MSAL to your project](../develop/tutorial-v2-windows-desktop.md#add-msal-to-your-project). Remember to [add the reference to MSAL](../develop/tutorial-v2-windows-desktop.md#add-the-code-to-initialize-msal) to the class and remove the ADAL reference.
138138
139139
To configure the native app code:
140140

articles/active-directory/develop/reference-breaking-changes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -220,9 +220,9 @@ Today, `?e= "f"&g=h` is parsed identically as `?e=f&g=h` - so `e` == `f`. Wit
220220

221221
**Effective date**: July 26, 2019
222222

223-
**Endpoints impacted**: Both [v1.0](../azuread-dev/v1-oauth2-client-creds-grant-flow.md) and [v2.0](./v2-oauth2-client-creds-grant-flow.md)
223+
**Endpoints impacted**: Both v1.0 and [v2.0](./v2-oauth2-client-creds-grant-flow.md)
224224

225-
**Protocol impacted**: [Client Credentials (app-only tokens)](../azuread-dev/v1-oauth2-client-creds-grant-flow.md)
225+
**Protocol impacted**: Client Credentials (app-only tokens)
226226

227227
A security change took effect on July 26, 2019 changing the way app-only tokens (via the client credentials grant) are issued. Previously, applications were allowed to get tokens to call any other app, regardless of presence in the tenant or roles consented to for that application. This behavior has been updated so that for resources (sometimes called web APIs) set to be single-tenant (the default), the client application must exist within the resource tenant. Existing consent between the client and the API is still not required, and apps should still be doing their own authorization checks to ensure that a `roles` claim is present and contains the expected value for the API.
228228

articles/active-directory/fundamentals/whats-new-archive.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5927,7 +5927,7 @@ We're removing the multifactor authentication (MFA) server IP address from the [
59275927
**Service category:** Authentications (Logins)
59285928
**Product capability:** User Authentication
59295929

5930-
On July 26, 2019, we changed how we provide app-only tokens through the [client credentials grant](../azuread-dev/v1-oauth2-client-creds-grant-flow.md). Previously, apps could get tokens to call other apps, regardless of whether the client app was in the tenant. We've updated this behavior so single-tenant resources, sometimes called Web APIs, can only be called by client apps that exist in the resource tenant.
5930+
On July 26, 2019, we changed how we provide app-only tokens through the [client credentials grant](../develop/v2-oauth2-client-creds-grant-flow.md). Previously, apps could get tokens to call other apps, regardless of whether the client app was in the tenant. We've updated this behavior so single-tenant resources, sometimes called Web APIs, can only be called by client apps that exist in the resource tenant.
59315931

59325932
If your app isn't located in the resource tenant, you'll get an error message that says, `The service principal named <app_name> was not found in the tenant named <tenant_name>. This can happen if the application has not been installed by the administrator of the tenant.` To fix this problem, you must create the client app service principal in the tenant, using either the [admin consent endpoint](../develop/v2-permissions-and-consent.md#using-the-admin-consent-endpoint) or [through PowerShell](../develop/howto-authenticate-service-principal-powershell.md), which ensures your tenant has given the app permission to operate within the tenant.
59335933

articles/aks/azure-ad-integration-cli.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,15 +4,15 @@ description: Learn how to use the Azure CLI to create and Azure Active Directory
44
services: container-service
55
author: TomGeske
66
ms.topic: article
7-
ms.date: 07/29/2021
7+
ms.date: 11/11/2021
88
ms.author: miwithro
99

1010
---
1111

1212
# Integrate Azure Active Directory with Azure Kubernetes Service using the Azure CLI (legacy)
1313

1414
> [!WARNING]
15-
> **The feature described in this document, Azure AD Integration (legacy), will be deprecated on February 29th 2024.
15+
> **The feature described in this document, Azure AD Integration (legacy), will be deprecated on June 1st, 2023.
1616
>
1717
> AKS has a new improved [AKS-managed Azure AD][managed-aad] experience that doesn't require you to manage server or client application. If you want to migrate follow the instructions [here][managed-aad-migrate].
1818

articles/aks/use-kms-etcd-encryption.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Use Key Management Service (KMS) etcd encryption in Azure Kubernetes Serv
33
description: Learn how to use the Key Management Service (KMS) etcd encryption with Azure Kubernetes Service (AKS)
44
services: container-service
55
ms.topic: article
6-
ms.date: 11/01/2022
6+
ms.date: 11/09/2022
77
---
88

99
# Add Key Management Service (KMS) etcd encryption to an Azure Kubernetes Service (AKS) cluster
@@ -23,7 +23,7 @@ For more information on using the KMS plugin, see [Encrypting Secret Data at Res
2323
* Azure CLI version 2.39.0 or later. Run `az --version` to find your version. If you need to install or upgrade, see [Install Azure CLI][azure-cli-install].
2424

2525
> [!WARNING]
26-
> KMS only supports Konnectivity and [API Server Vnet Integration][api-server-vnet-integration].
26+
> KMS supports Konnectivity or [API Server Vnet Integration][api-server-vnet-integration].
2727
> You can use `kubectl get po -n kube-system` to verify the results show that a konnectivity-agent-xxx pod is running. If there is, it means the AKS cluster is using Konnectivity. When using VNet integration, you can run the command `az aks cluster show -g -n` to verify the setting `enableVnetIntegration` is set to **true**.
2828
2929
## Limitations

articles/aks/use-managed-identity.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Use a managed identity in Azure Kubernetes Service
33
description: Learn how to use a system-assigned or user-assigned managed identity in Azure Kubernetes Service (AKS)
44
ms.topic: article
5-
ms.date: 09/27/2022
5+
ms.date: 11/08/2022
66
---
77

88
# Use a managed identity in Azure Kubernetes Service
@@ -175,7 +175,7 @@ A custom control plane managed identity enables access to be granted to the exis
175175

176176
> [!NOTE]
177177
> USDOD Central, USDOD East, USGov Iowa regions in Azure US Government cloud aren't currently supported.
178-
>
178+
>
179179
> AKS will create a system-assigned kubelet identity in the Node resource group if you do not [specify your own kubelet managed identity][Use a pre-created kubelet managed identity].
180180
181181
If you don't have a managed identity, you should create one by running the [az identity][az-identity-create] command.
@@ -201,6 +201,8 @@ The output should resemble the following:
201201
}
202202
```
203203

204+
Before creating the cluster, you need to [add the role assignment for control plane identity][add role assignment for control plane identity].
205+
204206
Run the following command to create a cluster with your existing identity:
205207

206208
```azurecli-interactive
@@ -465,4 +467,5 @@ Use [Azure Resource Manager templates ][aks-arm-template] to create a managed id
465467
[Bring your own control plane managed identity]: use-managed-identity.md#bring-your-own-control-plane-managed-identity
466468
[Use a pre-created kubelet managed identity]: use-managed-identity.md#use-a-pre-created-kubelet-managed-identity
467469
[workload-identity-overview]: workload-identity-overview.md
468-
[aad-pod-identity]: use-azure-ad-pod-identity.md
470+
[aad-pod-identity]: use-azure-ad-pod-identity.md
471+
[add role assignment for control plane identity]: use-managed-identity.md#add-role-assignment-for-control-plane-identity

articles/aks/use-multiple-node-pools.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -139,20 +139,20 @@ az aks nodepool add \
139139

140140
Mariner is an open-source Linux distribution available as an AKS container host. It provides high reliability, security, and consistency. Mariner only includes the minimal set of packages needed for running container workloads, which improves boot times and overall performance.
141141

142-
You can add a Mariner node pool into your existing cluster using the `az aks nodepool add` command and specifying `--os-sku mariner`.
142+
You can add a Mariner node pool into your existing cluster using the `az aks nodepool add` command and specifying `--os-sku CBLMariner`.
143143

144144
```azurecli
145145
az aks nodepool add \
146146
--resource-group myResourceGroup \
147147
--cluster-name myAKSCluster \
148-
--os-sku mariner
148+
--os-sku CBLMariner
149149
```
150150

151151
### Migrate Ubuntu nodes to Mariner
152152

153153
Use the following instructions to migrate your Ubuntu nodes to Mariner nodes.
154154

155-
1. Add a Mariner node pool into your existing cluster using the `az aks nodepool add` command and specifying `--os-sku mariner`.
155+
1. Add a Mariner node pool into your existing cluster using the `az aks nodepool add` command and specifying `--os-sku CBLMariner`.
156156

157157
> [!NOTE]
158158
> When adding a new Mariner node pool, you need to add at least one as `--mode System`. Otherwise, AKS won't allow you to delete your existing Ubuntu node pool.

articles/aks/use-pod-security-policies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.date: 03/25/2021
99
# Preview - Secure your cluster using pod security policies in Azure Kubernetes Service (AKS)
1010

1111
> [!Important]
12-
> The feature described in this article, pod security policy (preview), will be deprecated starting with Kubernetes version 1.21, and it will be removed in version 1.25. AKS will mark the pod security policy as Deprecated with the AKS API on 06-01-2023. You can migrate pod security policy to pod security admission controller before the deprecation deadline.
12+
> The feature described in this article, pod security policy (preview), will be deprecated starting with Kubernetes version 1.21, and it will be removed in version 1.25. AKS will mark the pod security policy as Deprecated with the AKS API on 06-01-2023 and remove it in version 1.25. You can migrate pod security policy to pod security admission controller before the deprecation deadline.
1313
1414
After pod security policy (preview) is deprecated, you must have already migrated to Pod Security Admission controller or disabled the feature on any existing clusters using the deprecated feature to perform future cluster upgrades and stay within Azure support.
1515

articles/analysis-services/analysis-services-refresh-azure-automation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Refresh Azure Analysis Services models with Azure Automation | Microsoft Docs
33
description: This article describes how to code model refreshes for Azure Analysis Services by using Azure Automation.
44
author: chrislound
5-
ms.service: analysis-services
5+
ms.service: azure-analysis-services
66
ms.topic: conceptual
77
ms.date: 12/01/2020
88
ms.author: chlound

0 commit comments

Comments
 (0)