Skip to content

Commit c2ca86e

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into work-ios-edit
2 parents 9f7a8ff + 6f84711 commit c2ca86e

File tree

237 files changed

+1156
-1477
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

237 files changed

+1156
-1477
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24664,6 +24664,11 @@
2466424664
"redirect_url": "/azure/storage/common/storage-security-guide",
2466524665
"redirect_document_id": true
2466624666
},
24667+
{
24668+
"source_path": "articles/storage/common/storage-security-guide.md",
24669+
"redirect_url": "/azure/storage/blobs/security-recommendations",
24670+
"redirect_document_id": true
24671+
},
2466724672
{
2466824673
"source_path": "articles/storage/storage-service-encryption-customer-managed-keys.md",
2466924674
"redirect_url": "/azure/storage/common/storage-service-encryption-customer-managed-keys",

articles/active-directory/develop/quickstart-v2-dotnet-native-aspnet.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: quickstart
1111
ms.workload: identity
12-
ms.date: 10/30/2019
12+
ms.date: 12/12/2019
1313
ms.author: jmprieur
1414
ms.custom: aaddev, identityplatformtop40, scenarios:getting-started, languages:ASP.NET
1515
#Customer intent: As an application developer, I want to know how to set up OpenId Connect authentication in a web application built using Node.js with Express.
@@ -73,7 +73,7 @@ If you want to register your apps manually, as a first step you'll need to:
7373
- Keep **State** as **Enabled**
7474
- Select **Add scope**
7575

76-
### Configure the service and client projects to match the registered Web API
76+
### Configure the service project to match the registered Web API
7777

7878
1. Open the solution in Visual Studio and then open the **Web.config** file under the root of **TodoListService** project.
7979
1. Replace the value of `ida:ClientId` parameter with the **Client ID (Application ID)** from the application you just registered in the Application Registration Portal.
@@ -101,7 +101,7 @@ In this step, you configure your *TodoListClient* project by registering a new a
101101
- Change **Supported account types** to **Accounts in any organizational directory**.
102102
- Select **Register** to create the application.
103103
1. From the app's Overview page, select the **Authentication** section.
104-
- In the **Redirect URLs** | **Suggested Redirect URLs for public clients (mobile, desktop)** section, check **urn:ietf:wg:oauth:2.0:oob**
104+
- In the **Redirect URIs** | **Suggested Redirect URIs for public clients (mobile, desktop)** section, check **https://login.microsoftonline.com/common/oauth2/nativeclient**
105105
- Select **Save**.
106106
1. Select the **API permissions** section
107107
- Click the **Add a permission** button and then,

articles/active-directory/develop/quickstart-v2-uwp.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: quickstart
1111
ms.workload: identity
12-
ms.date: 07/16/2019
12+
ms.date: 12/12/2019
1313
ms.author: jmprieur
1414
ms.custom: aaddev, identityplatformtop40, scenarios:getting-started, languages:UWP
1515
#Customer intent: As an application developer, I want to learn how my Universal Windows Platform (XAML) application can get an access token and call an API that's protected by an Microsoft identity platform endpoint.
@@ -48,13 +48,12 @@ This quickstart contains a code sample that demonstrates how a Universal Windows
4848
> - In the **Supported account types** section, select **Accounts in any organizational directory and personal Microsoft accounts (for example, Skype, Xbox, Outlook.com)**.
4949
> - Select **Register** to create the application.
5050
> 1. In the list of pages for the app, select **Authentication**.
51-
> 1. Expand the **Desktop + devices** section. (If **Desktop + devices** is not visible, first click the top banner to view the preview Authentication experience)
52-
> 1. Under the **Redirect URI** section, select **Add URI**. Type **urn:ietf:wg:oauth:2.0:oob**.
51+
> 1. In the **Redirect URIs** | **Suggested Redirect URIs for public clients (mobile, desktop)** section, check **https://login.microsoftonline.com/common/oauth2/nativeclient**.
5352
> 1. Select **Save**.
5453
5554
> [!div renderon="portal" class="sxs-lookup"]
5655
> #### Step 1: Configure your application
57-
> For the code sample for this quickstart to work, you need to add a redirect URI as **urn:ietf:wg:oauth:2.0:oob**.
56+
> For the code sample for this quickstart to work, you need to add a redirect URI as **https://login.microsoftonline.com/common/oauth2/nativeclient**.
5857
> > [!div renderon="portal" id="makechanges" class="nextstepaction"]
5958
> > [Make this change for me]()
6059
>

articles/active-directory/develop/quickstart-v2-windows-desktop.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: quickstart
1111
ms.workload: identity
12-
ms.date: 07/16/2019
12+
ms.date: 12/12/2019
1313
ms.author: jmprieur
1414
ms.custom: aaddev, identityplatformtop40
1515
#Customer intent: As an application developer, I want to learn how my Windows desktop .NET application can get an access token and call an API that's protected by an Microsoft identity platform endpoint.
@@ -47,13 +47,12 @@ In this quickstart, you'll learn how to write a Windows desktop .NET (WPF) appli
4747
> - In the **Supported account types** section, select **Accounts in any organizational directory and personal Microsoft accounts (for example, Skype, Xbox, Outlook.com)**.
4848
> - Select **Register** to create the application.
4949
> 1. In the list of pages for the app, select **Authentication**.
50-
> 1. Expand the **Desktop + devices** section. (If **Desktop + devices** is not visible, first click the top banner to view the preview Authentication experience)
51-
> 1. Under the **Redirect URI** section, select **Add URI**. Type **urn:ietf:wg:oauth:2.0:oob**.
50+
> 1. In the **Redirect URIs** | **Suggested Redirect URIs for public clients (mobile, desktop)** section, check **https://login.microsoftonline.com/common/oauth2/nativeclient**.
5251
> 1. Select **Save**.
5352
5453
> [!div class="sxs-lookup" renderon="portal"]
5554
> #### Step 1: Configure your application in Azure portal
56-
> For the code sample for this quickstart to work, you need to add a reply URL as **urn:ietf:wg:oauth:2.0:oob**.
55+
> For the code sample for this quickstart to work, you need to add a reply URL as **https://login.microsoftonline.com/common/oauth2/nativeclient**.
5756
> > [!div renderon="portal" id="makechanges" class="nextstepaction"]
5857
> > [Make this change for me]()
5958
>

articles/active-directory/develop/tutorial-v2-windows-desktop.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.devlang: na
1313
ms.topic: tutorial
1414
ms.tgt_pltfrm: na
1515
ms.workload: identity
16-
ms.date: 04/10/2019
16+
ms.date: 12/12/2019
1717
ms.author: jmprieur
1818
ms.custom: aaddev, identityplatformtop40
1919
ms.collection: M365-identity-device-management
@@ -102,9 +102,9 @@ To register your application and add your application registration information t
102102
- Select **Register** to create the application.
103103
1. In the list of pages for the app, select **Authentication**.
104104
1. In the **Redirect URIs** section, in the Redirect URIs list:
105-
1. In the **TYPE** column select **Public client (mobile & desktop)**.
106-
1. In the **REDIRECT URI** column, enter `urn:ietf:wg:oauth:2.0:oob`
107-
1. Select **Save**.
105+
1. In the **TYPE** column select **Public client/native (mobile & desktop)**.
106+
1. In the **REDIRECT URI** column, enter `https://login.microsoftonline.com/common/oauth2/nativeclient`
107+
1. Select **Register**.
108108
1. Go to Visual Studio, open the *App.xaml.cs* file, and then replace `Enter_the_Application_Id_here` in the code snippet below with the application ID that you just registered and copied.
109109
110110
```csharp

articles/active-directory/develop/tutorial-v2-windows-uwp.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.devlang: na
1313
ms.topic: tutorial
1414
ms.tgt_pltfrm: na
1515
ms.workload: identity
16-
ms.date: 09/24/2019
16+
ms.date: 12/13/2019
1717
ms.author: jmprieur
1818
ms.custom: aaddev, identityplatformtop40
1919
ms.collection: M365-identity-device-management
@@ -349,7 +349,7 @@ Now you need to register your application:
349349
Configure authentication for your application:
350350

351351
1. Back in the [Azure portal](https://portal.azure.com), under **Manage**, select **Authentication**.
352-
1. In the **Redirect URIs** list, for **TYPE**, select **Public client (mobile & desktop)** and enter `urn:ietf:wg:oauth:2.0:oob` for **REDIRECT URI**.
352+
1. In the **Redirect URIs** | **Suggested Redirect URIs for public clients (mobile, desktop)** section, check **https://login.microsoftonline.com/common/oauth2/nativeclient**.
353353
1. Select **Save**.
354354

355355
Configure API permissions for your application:

articles/active-directory/develop/v1-protocols-oauth-code.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.workload: identity
1313
ms.tgt_pltfrm: na
1414
ms.devlang: na
1515
ms.topic: conceptual
16-
ms.date: 08/30/2019
16+
ms.date: 12/12/2019
1717
ms.author: ryanwi
1818
ms.reviewer: hirsin
1919
ms.custom: aaddev
@@ -59,7 +59,7 @@ client_id=6731de76-14a6-49ae-97bc-6eba6914391e
5959
| tenant |required |The `{tenant}` value in the path of the request can be used to control who can sign into the application. The allowed values are tenant identifiers, for example, `8eaef023-2b34-4da1-9baa-8bc8c9d6a490` or `contoso.onmicrosoft.com` or `common` for tenant-independent tokens |
6060
| client_id |required |The Application ID assigned to your app when you registered it with Azure AD. You can find this in the Azure Portal. Click **Azure Active Directory** in the services sidebar, click **App registrations**, and choose the application. |
6161
| response_type |required |Must include `code` for the authorization code flow. |
62-
| redirect_uri |recommended |The redirect_uri of your app, where authentication responses can be sent and received by your app. It must exactly match one of the redirect_uris you registered in the portal, except it must be url encoded. For native & mobile apps, you should use the default value of `urn:ietf:wg:oauth:2.0:oob`. |
62+
| redirect_uri |recommended |The redirect_uri of your app, where authentication responses can be sent and received by your app. It must exactly match one of the redirect_uris you registered in the portal, except it must be url encoded. For native & mobile apps, you should use the default value of `https://login.microsoftonline.com/common/oauth2/nativeclient`. |
6363
| response_mode |optional |Specifies the method that should be used to send the resulting token back to your app. Can be `query`, `fragment`, or `form_post`. `query` provides the code as a query string parameter on your redirect URI. If you're requesting an ID token using the implicit flow, you cannot use `query` as specified in the [OpenID spec](https://openid.net/specs/oauth-v2-multiple-response-types-1_0.html#Combinations). If you're requesting just the code, you can use `query`, `fragment`, or `form_post`. `form_post` executes a POST containing the code to your redirect URI. The default is `query` for a code flow. |
6464
| state |recommended |A value included in the request that is also returned in the token response. A randomly generated unique value is typically used for [preventing cross-site request forgery attacks](https://tools.ietf.org/html/rfc6749#section-10.12). The state is also used to encode information about the user's state in the app before the authentication request occurred, such as the page or view they were on. |
6565
| resource | recommended |The App ID URI of the target web API (secured resource). To find the App ID URI, in the Azure Portal, click **Azure Active Directory**, click **Application registrations**, open the application's **Settings** page, then click **Properties**. It may also be an external resource like `https://graph.microsoft.com`. This is required in one of either the authorization or token requests. To ensure fewer authentication prompts place it in the authorization request to ensure consent is received from the user. |

articles/aks/load-balancer-standard.md

Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,10 @@ The following limitations apply when you create and manage AKS clusters that sup
5353
* You can only use one type of load balancer SKU (Basic or Standard) in a single cluster.
5454
* *Standard* SKU Load Balancers only support *Standard* SKU IP Addresses.
5555

56+
## Use the *Standard* SKU load balancer
57+
58+
When you create an AKS cluster, by default, the *Standard* SKU load balancer is used when you run services in that cluster. For example, [the quickstart using the Azure CLI][aks-quickstart-cli] deploys a sample application that uses the *Standard* SKU load balancer.
59+
5660
## Configure the load balancer to be internal
5761

5862
You can also configure the load balancer to be internal and not expose a public IP. To configure the load balancer as internal, add `service.beta.kubernetes.io/azure-load-balancer-internal: "true"` as an annotation to the *LoadBalancer* service. You can see an example yaml manifest as well as more details about an internal load balancer [here][internal-lb-yaml].
@@ -175,12 +179,34 @@ AllocatedOutboundPorts EnableTcpReset IdleTimeoutInMinutes Name
175179

176180
In the example output, *AllocatedOutboundPorts* is 0. The value for *AllocatedOutboundPorts* means that SNAT port allocation reverts to automatic assignment based on backend pool size. See [Load Balancer outbound rules][azure-lb-outbound-rules] and [Outbound connections in Azure][azure-lb-outbound-connections] for more details.
177181

182+
## Restrict access to specific IP ranges
183+
184+
The Network Security Group (NSG) associated with the virtual network for the load balancer, by default, has a rule to allow all inbound external traffic. You can update this rule to only allow specific IP ranges for inbound traffic. The following manifest uses *loadBalancerSourceRanges* to specify a new IP range for inbound external traffic:
185+
186+
```yaml
187+
apiVersion: v1
188+
kind: Service
189+
metadata:
190+
name: azure-vote-front
191+
spec:
192+
type: LoadBalancer
193+
ports:
194+
- port: 80
195+
selector:
196+
app: azure-vote-front
197+
loadBalancerSourceRanges:
198+
- MY_EXTERNAL_IP_RANGE
199+
```
200+
201+
The above example updates the rule to only allow inbound external traffic from the *MY_EXTERNAL_IP_RANGE* range. More information about using this method to restrict access to the load balancer service is available in the [Kubernetes documentation][kubernetes-cloud-provider-firewall].
202+
178203
## Next steps
179204
180205
Learn more about Kubernetes services at the [Kubernetes services documentation][kubernetes-services].
181206
182207
<!-- LINKS - External -->
183208
[kubectl]: https://kubernetes.io/docs/user-guide/kubectl/
209+
[kubernetes-cloud-provider-firewall]: https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/#restrict-access-for-loadbalancer-service
184210
[kubectl-delete]: https://kubernetes.io/docs/reference/generated/kubectl/kubectl-commands#delete
185211
[kubectl-get]: https://kubernetes.io/docs/reference/generated/kubectl/kubectl-commands#get
186212
[kubectl-apply]: https://kubernetes.io/docs/reference/generated/kubectl/kubectl-commands#apply

articles/application-gateway/configure-keyvault-ps.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,6 +60,7 @@ Set-AzKeyVaultAccessPolicy -VaultName $kv -PermissionsToSecrets get -ObjectId $i
6060
$policy = New-AzKeyVaultCertificatePolicy -ValidityInMonths 12 `
6161
-SubjectName "CN=www.contoso11.com" -IssuerName self `
6262
-RenewAtNumberOfDaysBeforeExpiry 30
63+
Set-AzKeyVaultAccessPolicy -VaultName $kv -EmailAddress <your email address> -PermissionsToCertificates create,get,list
6364
$certificate = Add-AzKeyVaultCertificate -VaultName $kv -Name "cert1" -CertificatePolicy $policy
6465
$certificate = Get-AzKeyVaultCertificate -VaultName $kv -Name "cert1"
6566
$secretId = $certificate.SecretId.Replace($certificate.Version, "")
@@ -136,4 +137,4 @@ $appgw = New-AzApplicationGateway -Name $appgwName -Identity $appgwIdentity -Res
136137

137138
## Next steps
138139

139-
[Learn more about SSL termination](ssl-overview.md)
140+
[Learn more about SSL termination](ssl-overview.md)

articles/automation/automation-alert-metric.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,8 @@
22
title: Monitor Azure Automation runbooks with metric alerts
33
description: This article walks you through monitoring Azure Automation runbooks based off of metrics
44
services: automation
5-
ms.service: automation
6-
author: mgoedtel
7-
ms.author: magoedte
85
ms.date: 11/01/2018
96
ms.topic: article
10-
manager: carmonm
117
---
128
# Monitoring runbooks with metric alerts
139

0 commit comments

Comments
 (0)