Skip to content

Commit c5a1629

Browse files
committed
2 parents 7598e8c + f615985 commit c5a1629

File tree

48 files changed

+1659
-496
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

48 files changed

+1659
-496
lines changed

articles/active-directory/authentication/concept-registration-mfa-sspr-combined.md

Lines changed: 20 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 06/17/2022
9+
ms.date: 09/23/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Combined security information registration for Azure Active Directory overview
1919

20-
Before combined registration, users registered authentication methods for Azure AD Multi-Factor Authentication and self-service password reset (SSPR) separately. People were confused that similar methods were used for Multi-Factor Authentication and SSPR but they had to register for both features. Now, with combined registration, users can register once and get the benefits of both Multi-Factor Authentication and SSPR. We recommend this video on [How to enable and configure SSPR in Azure AD](https://www.youtube.com/watch?v=rA8TvhNcCvQ)
20+
Before combined registration, users registered authentication methods for Azure AD Multi-Factor Authentication and self-service password reset (SSPR) separately. People were confused that similar methods were used for multifactor authentication and SSPR but they had to register for both features. Now, with combined registration, users can register once and get the benefits of both multifactor authentication and SSPR. We recommend this video on [How to enable and configure SSPR in Azure AD](https://www.youtube.com/watch?v=rA8TvhNcCvQ)
2121

2222
> [!NOTE]
2323
> Starting on August 15th 2020, all new Azure AD tenants will be automatically enabled for combined registration.
@@ -50,7 +50,7 @@ If you want to force a specific language, you can add `?lng=<language>` to the e
5050

5151
## Methods available in combined registration
5252

53-
Combined registration supports the following authentication methods and actions:
53+
Combined registration supports the authentication methods and actions in the following table.
5454

5555
| Method | Register | Change | Delete |
5656
| --- | --- | --- | --- |
@@ -66,9 +66,9 @@ Combined registration supports the following authentication methods and actions:
6666
| FIDO2 security keys<br />*Managed mode only from the [Security info](https://mysignins.microsoft.com/security-info) page*| Yes | Yes | Yes |
6767

6868
> [!NOTE]
69-
> App passwords are available only to users who have been enforced for Multi-Factor Authentication. App passwords are not available to users who are enabled for Multi-Factor Authentication via a Conditional Access policy.
69+
> App passwords are available only to users who have been enforced for Azure AD Multi-Factor Authentication. App passwords are not available to users who are enabled for Azure AD Multi-Factor Authentication by a Conditional Access policy.
7070
71-
Users can set one of the following options as the default Multi-Factor Authentication method:
71+
Users can set one of the following options as the default multifactor authentication method.
7272

7373
- Microsoft Authenticator – push notification or passwordless
7474
- Authenticator app or hardware token – code
@@ -87,23 +87,23 @@ There are two modes of combined registration: interrupt and manage.
8787
- **Interrupt mode** is a wizard-like experience, presented to users when they register or refresh their security info at sign-in.
8888
- **Manage mode** is part of the user profile and allows users to manage their security info.
8989

90-
For both modes, users who have previously registered a method that can be used for Multi-Factor Authentication need to perform Multi-Factor Authentication before they can access their security info. Users must confirm their information before continuing to use their previously registered methods.
90+
For both modes, users who have previously registered a method that can be used for Azure AD Multi-Factor Authentication need to perform multifactor authentication before they can access their security info. Users must confirm their information before continuing to use their previously registered methods.
9191

9292

9393

9494
### Interrupt mode
9595

96-
Combined registration adheres to both Multi-Factor Authentication and SSPR policies, if both are enabled for your tenant. These policies control whether a user is interrupted for registration during sign-in and which methods are available for registration. If only an SSPR policy is enabled, then users will be able to skip the registration interruption and complete it at a later time.
96+
Combined registration adheres to both multifactor authentication and SSPR policies, if both are enabled for your tenant. These policies control whether a user is interrupted for registration during sign-in and which methods are available for registration. If only an SSPR policy is enabled, then users will be able to skip the registration interruption and complete it at a later time.
9797

9898
The following are sample scenarios where users might be prompted to register or refresh their security info:
9999

100-
- *Multi-Factor Authentication registration enforced through Identity Protection:* Users are asked to register during sign-in. They register Multi-Factor Authentication methods and SSPR methods (if the user is enabled for SSPR).
101-
- *Multi-Factor Authentication registration enforced through per-user Multi-Factor Authentication:* Users are asked to register during sign-in. They register Multi-Factor Authentication methods and SSPR methods (if the user is enabled for SSPR).
102-
- *Multi-Factor Authentication registration enforced through Conditional Access or other policies:* Users are asked to register when they use a resource that requires Multi-Factor Authentication. They register Multi-Factor Authentication methods and SSPR methods (if the user is enabled for SSPR).
100+
- *Multifactor Authentication registration enforced through Identity Protection:* Users are asked to register during sign-in. They register multifactor authentication methods and SSPR methods (if the user is enabled for SSPR).
101+
- *Multifactor Authentication registration enforced through per-user multifactor authentication:* Users are asked to register during sign-in. They register multifactor authentication methods and SSPR methods (if the user is enabled for SSPR).
102+
- *Multifactor Authentication registration enforced through Conditional Access or other policies:* Users are asked to register when they use a resource that requires multifactor authentication. They register multifactor authentication methods and SSPR methods (if the user is enabled for SSPR).
103103
- *SSPR registration enforced:* Users are asked to register during sign-in. They register only SSPR methods.
104104
- *SSPR refresh enforced:* Users are required to review their security info at an interval set by the admin. Users are shown their info and can confirm the current info or make changes if needed.
105105

106-
When registration is enforced, users are shown the minimum number of methods needed to be compliant with both Multi-Factor Authentication and SSPR policies, from most to least secure. Users going through combined registration where both MFA and SSPR registration is enforced and the SSPR policy requires two methods will first be required to register an MFA method as the first method and can select another MFA or SSPR specific method as the second registered method (e.g. email, security questions etc.)
106+
When registration is enforced, users are shown the minimum number of methods needed to be compliant with both multifactor authentication and SSPR policies, from most to least secure. Users going through combined registration where both MFA and SSPR registration is enforced and the SSPR policy requires two methods will first be required to register an MFA method as the first method and can select another MFA or SSPR specific method as the second registered method (e.g. email, security questions etc.)
107107

108108
Consider the following example scenario:
109109

@@ -116,7 +116,7 @@ The following flowchart describes which methods are shown to a user when interru
116116

117117
![Combined security info flowchart](media/concept-registration-mfa-sspr-combined/combined-security-info-flow-chart.png)
118118

119-
If you have both Multi-Factor Authentication and SSPR enabled, we recommend that you enforce Multi-Factor Authentication registration.
119+
If you have both multifactor authentication and SSPR enabled, we recommend that you enforce multifactor authentication registration.
120120

121121
If the SSPR policy requires users to review their security info at regular intervals, users are interrupted during sign-in and shown all their registered methods. They can confirm the current info if it's up to date, or they can make changes if they need to. Users must perform multi-factor authentication when accessing this page.
122122

@@ -130,21 +130,27 @@ Users can access manage mode by going to [https://aka.ms/mysecurityinfo](https:/
130130

131131
An admin has enforced registration.
132132

133-
A user has not set up all required security info and goes to the Azure portal. After the user enters the user name and password, the user is prompted to set up security info. The user then follows the steps shown in the wizard to set up the required security info. If your settings allow it, the user can choose to set up methods other than those shown by default. After users complete the wizard, they review the methods they set up and their default method for Multi-Factor Authentication. To complete the setup process, the user confirms the info and continues to the Azure portal.
133+
A user has not set up all required security info and goes to the Azure portal. After the user enters the user name and password, the user is prompted to set up security info. The user then follows the steps shown in the wizard to set up the required security info. If your settings allow it, the user can choose to set up methods other than those shown by default. After users complete the wizard, they review the methods they set up and their default method for multifactor authentication. To complete the setup process, the user confirms the info and continues to the Azure portal.
134134

135135
### Set up security info from My Account
136136

137137
An admin has not enforced registration.
138138

139139
A user who hasn't yet set up all required security info goes to [https://myaccount.microsoft.com](https://myaccount.microsoft.com). The user selects **Security info** in the left pane. From there, the user chooses to add a method, selects any of the methods available, and follows the steps to set up that method. When finished, the user sees the method that was set up on the Security info page.
140140

141+
### Set up other methods after partial registration
142+
143+
If a user has partially satisfied MFA or SSPR registration due to existing authentication method registrations performed by the user or admin, users will only be asked to register additional information allowed by the Authentication methods policy. If more than one other authentication method is available for the user to choose and register, an option on the registration experience titled **I want to set up another method** will be shown and allow the user to set up their desired authentication method.
144+
145+
:::image type="content" border="true" source="./media/concept-registration-mfa-sspr-combined/other-method.png" alt-text="Screenshot of how to set up another method." :::
146+
141147
### Delete security info from My Account
142148

143149
A user who has previously set up at least one method navigates to [https://aka.ms/mysecurityinfo](https://aka.ms/mysecurityinfo). The user chooses to delete one of the previously registered methods. When finished, the user no longer sees that method on the Security info page.
144150

145151
### Change the default method from My Account
146152

147-
A user who has previously set up at least one method that can be used for Multi-Factor Authentication navigates to [https://aka.ms/mysecurityinfo](https://aka.ms/mysecurityinfo). The user changes the current default method to a different default method. When finished, the user sees the new default method on the Security info page.
153+
A user who has previously set up at least one method that can be used for multifactor authentication navigates to [https://aka.ms/mysecurityinfo](https://aka.ms/mysecurityinfo). The user changes the current default method to a different default method. When finished, the user sees the new default method on the Security info page.
148154

149155
### Switch directory
150156

35.6 KB
Loading

articles/aks/image-cleaner.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,14 +5,16 @@ ms.author: nickoman
55
author: nickomang
66
services: container-service
77
ms.topic: article
8-
ms.date: 09/16/2022
8+
ms.date: 09/26/2022
99
---
1010

1111
# Use ImageCleaner to clean up stale images on your Azure Kubernetes Service cluster (preview)
1212

1313
It's common to use pipelines to build and deploy images on Azure Kubernetes Service (AKS) clusters. While great for image creation, this process often doesn't account for the stale images left behind and can lead to image bloat on cluster nodes. These images can present security issues as they may contain vulnerabilities. By cleaning these unreferenced images, you can remove an area of risk in your clusters. When done manually, this process can be time intensive, which ImageCleaner can mitigate via automatic image identification and removal.
1414

15-
ImageCleaner is a feature inherited from Eraser. For more information on Eraser, see [Eraser plugin](https://github.com/Azure/eraser)
15+
> [!NOTE]
16+
> ImageCleaner is a feature based on [Eraser](https://github.com/Azure/eraser).
17+
> On an AKS cluster, the feature name and property name is `ImageCleaner` while the relevant ImageCleaner pods' names contain `Eraser`.
1618
1719
[!INCLUDE [preview features callout](./includes/preview/preview-callout.md)]
1820

@@ -114,6 +116,7 @@ az aks update -g MyResourceGroup -n MyManagedCluster \
114116
--image-cleaner-interval-hours 48
115117
```
116118

119+
After the feature is enabled, the `eraser-controller-manager-xxx` pod and `collector-aks-xxx` pod will be deployed.
117120
Based on your configuration, ImageCleaner will generate an `ImageList` containing non-running and vulnerable images at the desired interval. ImageCleaner will automatically remove these images from cluster nodes.
118121

119122
## Manually remove images
@@ -136,7 +139,7 @@ And apply it to the cluster:
136139
kubectl apply -f image-list.yml
137140
```
138141

139-
A job will trigger which causes ImageCleaner to remove the desired images from all nodes.
142+
A job named `eraser-aks-xxx`will be triggerred which causes ImageCleaner to remove the desired images from all nodes.
140143

141144
## Disable ImageCleaner
142145

articles/api-management/powershell-create-service-instance.md

Lines changed: 23 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,29 +1,31 @@
11
---
2-
title: Quickstart - Create Azure API Management instance using PowerShell | Microsoft Docs
3-
description: Create a new Azure API Management instance by using Azure PowerShell.
2+
title: Quickstart - Create API Management instance - PowerShell
3+
description: Use this quickstart to create a new Azure API Management instance by using Azure PowerShell cmdlets.
44
services: api-management
5-
documentationcenter: ''
65
author: dlepow
76
ms.service: api-management
87
ms.topic: quickstart
98
ms.custom: mvc, devx-track-azurepowershell, mode-api, devdivchpfy22
10-
ms.date: 03/30/2022
9+
ms.date: 09/21/2022
1110
ms.author: danlep
1211
---
1312

1413
# Quickstart: Create a new Azure API Management service instance by using PowerShell
1514

16-
Azure API Management (APIM) helps organizations publish APIs to external, partner, and internal developers to unlock the potential of their data and services. API Management provides the core competencies to ensure a successful API program through developer engagement, business insights, analytics, security, and protection. APIM lets you create and manage modern API gateways for existing backend services hosted anywhere. For more information, see the [Overview](api-management-key-concepts.md).
15+
In this quickstart, you create a new API Management instance by using Azure PowerShell cmdlets.
1716

18-
This quickstart describes the steps for creating a new API Management instance by using Azure PowerShell cmdlets.
17+
Azure API Management helps organizations publish APIs to external, partner, and internal developers to unlock the potential of their data and services. API Management provides the core competencies to ensure a successful API program through developer engagement, business insights, analytics, security, and protection. API Management lets you create and manage modern API gateways for existing backend services hosted anywhere.
1918

20-
[!INCLUDE [quickstarts-free-trial-note](../../includes/quickstarts-free-trial-note.md)]
19+
## Prerequisites
2120

22-
[!INCLUDE [updated-for-az](../../includes/updated-for-az.md)]
21+
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
2322

24-
[!INCLUDE [cloud-shell-try-it.md](../../includes/cloud-shell-try-it.md)]
23+
- Azure Cloud Shell or Azure PowerShell
24+
25+
[!INCLUDE [cloud-shell-try-it-no-header](../../includes/cloud-shell-try-it-no-header.md)]
26+
27+
If you choose to install and use the PowerShell locally, this quickstart requires the Azure PowerShell module version 1.0 or later. Run `Get-Module -ListAvailable Az` to find the version. If you need to upgrade, see [Install Azure PowerShell module](/powershell/azure/install-Az-ps). If you're running PowerShell locally, you also need to run `Connect-AzAccount` to create a connection with Azure.
2528

26-
If you choose to install and use the PowerShell locally, this tutorial requires the Azure PowerShell module version 1.0 or later. Run `Get-Module -ListAvailable Az` to find the version. If you need to upgrade, see [Install Azure PowerShell module](/powershell/azure/install-Az-ps). If you're running PowerShell locally, you also need to run `Connect-AzAccount` to create a connection with Azure.
2729

2830
## Create resource group
2931

@@ -35,13 +37,13 @@ The following command creates a resource group named *myResourceGroup* in the We
3537
New-AzResourceGroup -Name myResourceGroup -Location WestUS
3638
```
3739

38-
## Create an API Management service
40+
## Create an API Management instance
3941

4042
Now that you have a resource group, you can create an API Management service instance. Create one by using [New-AzApiManagement](/powershell/module/az.apimanagement/new-azapimanagement) and provide a service name and publisher details. The service name must be unique within Azure.
4143

4244
In the following example, *myapim* is used for the service name. Update the name to a unique value. Also, update the organization name of the API publisher and the admin email address to receive notifications.
4345

44-
By default, the command creates the instance in the Developer tier, an economical option to evaluate Azure API Management. This tier isn't for production use. For more information about scaling the API Management tiers, see [upgrade and scale](upgrade-and-scale.md).
46+
By default, the command creates the instance in the Developer tier, an economical option to evaluate Azure API Management. This tier isn't for production use. For more information about the API Management tiers, see [Feature-based comparison of the Azure API Management tiers](api-management-features.md).
4547

4648
> [!NOTE]
4749
> This is a long-running action. It can take between 30 and 40 minutes to create and activate an API Management service in this tier.
@@ -67,7 +69,7 @@ Name : myapim
6769
Location : West US
6870
Sku : Developer
6971
Capacity : 1
70-
CreatedTimeUtc : 9/9/2020 9:07:43 PM
72+
CreatedTimeUtc : 9/9/2022 9:07:43 PM
7173
ProvisioningState : Succeeded
7274
RuntimeUrl : https://myapim.azure-api.net
7375
RuntimeRegionalUrl : https://myapi-westus-01.regional.azure-api.net
@@ -91,6 +93,14 @@ AdditionalRegions : {}
9193
SslSetting : Microsoft.Azure.Commands.ApiManagement.Models.PsApiManagementSslSetting
9294
Identity :
9395
EnableClientCertificate :
96+
EnableClientCertificate :
97+
Zone :
98+
DisableGateway : False
99+
MinimalControlPlaneApiVersion :
100+
PublicIpAddressId :
101+
PlatformVersion : stv2
102+
PublicNetworkAccess : Enabled
103+
PrivateEndpointConnections :
94104
ResourceGroupName : myResourceGroup
95105

96106
```
-119 KB
Loading
-117 KB
Loading

0 commit comments

Comments
 (0)