Skip to content

Commit c62264d

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into heidist-fresh
2 parents 74b6c6a + e84ca57 commit c62264d

File tree

43 files changed

+776
-137
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

43 files changed

+776
-137
lines changed

articles/active-directory-b2c/add-api-connector-token-enrichment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -144,7 +144,7 @@ Content-type: application/json
144144
| -------------------------------------------------- | ----------------- | -------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
145145
| version | String | Yes | The version of your API. |
146146
| action | String | Yes | Value must be `Continue`. |
147-
| \<builtInUserAttribute> | \<attribute-type> | No | They can returned in the token if selected as an **Application claim**. |
147+
| \<builtInUserAttribute> | \<attribute-type> | No | They can be returned in the token if selected as an **Application claim**. |
148148
| \<extension\_{extensions-app-id}\_CustomAttribute> | \<attribute-type> | No | The claim does not need to contain `_<extensions-app-id>_`, it is *optional*. They can returned in the token if selected as an **Application claim**. |
149149

150150
::: zone-end

articles/active-directory/authentication/concept-authentication-passwordless.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 09/13/2022
9+
ms.date: 09/15/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -179,7 +179,7 @@ Here are some factors for you to consider when choosing Microsoft passwordless t
179179

180180
||**Windows Hello for Business**|**Passwordless sign-in with the Authenticator app**|**FIDO2 security keys**|
181181
|:-|:-|:-|:-|
182-
|**Pre-requisite**| Windows 10, version 1809 or later<br>Azure Active Directory| Authenticator app<br>Phone (iOS and Android devices running Android 8.0 or above.)|Windows 10, version 1903 or later<br>Azure Active Directory|
182+
|**Pre-requisite**| Windows 10, version 1809 or later<br>Azure Active Directory| Authenticator app<br>Phone (iOS and Android devices)|Windows 10, version 1903 or later<br>Azure Active Directory|
183183
|**Mode**|Platform|Software|Hardware|
184184
|**Systems and devices**|PC with a built-in Trusted Platform Module (TPM)<br>PIN and biometrics recognition |PIN and biometrics recognition on phone|FIDO2 security devices that are Microsoft compatible|
185185
|**User experience**|Sign in using a PIN or biometric recognition (facial, iris, or fingerprint) with Windows devices.<br>Windows Hello authentication is tied to the device; the user needs both the device and a sign-in component such as a PIN or biometric factor to access corporate resources.|Sign in using a mobile phone with fingerprint scan, facial or iris recognition, or PIN.<br>Users sign in to work or personal account from their PC or mobile phone.|Sign in using FIDO2 security device (biometrics, PIN, and NFC)<br>User can access device based on organization controls and authenticate based on PIN, biometrics using devices such as USB security keys and NFC-enabled smartcards, keys, or wearables.|

articles/active-directory/authentication/howto-authentication-passwordless-phone.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ services: active-directory
77
ms.service: active-directory
88
ms.subservice: authentication
99
ms.topic: how-to
10-
ms.date: 09/13/2022
10+
ms.date: 09/15/2022
1111

1212

1313
ms.author: justinha
@@ -48,7 +48,7 @@ The Azure AD accounts can be in the same tenant or different tenants. Guest acco
4848
To use passwordless phone sign-in with Microsoft Authenticator, the following prerequisites must be met:
4949

5050
- Recommended: Azure AD Multi-Factor Authentication, with push notifications allowed as a verification method. Push notifications to your smartphone or tablet help the Authenticator app to prevent unauthorized access to accounts and stop fraudulent transactions. The Authenticator app automatically generates codes when set up to do push notifications so a user has a backup sign-in method even if their device doesn't have connectivity.
51-
- Latest version of Microsoft Authenticator installed on devices running iOS 12.0 or greater, or Android 8.0 or greater.
51+
- Latest version of Microsoft Authenticator installed on devices running iOS or Android.
5252
- For Android, the device that runs Microsoft Authenticator must be registered to an individual user. We're actively working to enable multiple accounts on Android.
5353
- For iOS, the device must be registered with each tenant where it's used to sign in. For example, the following device must be registered with Contoso and Wingtiptoys to allow all accounts to sign in:
5454

articles/active-directory/managed-identities-azure-resources/how-to-view-associated-resources-for-an-identity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ https://management.azure.com/subscriptions/{resourceID of user-assigned identity
6464

6565
| Parameter | Example |Description |
6666
|---|---|---|
67-
| $filter | ```'type' eq 'microsoft.cognitiveservices/account' and contains(name, 'test')``` | An OData expression that allows you to filter any of the available fields: name, type, resourceGroup, subscriptionId, subscriptionDisplayName<br/><br/>The following operations are supported: ```and```, ```or```, ```eq``` and ```contains``` |
67+
| $filter | ```type eq 'microsoft.cognitiveservices/account' and contains(name, 'test')``` | An OData expression that allows you to filter any of the available fields: name, type, resourceGroup, subscriptionId, subscriptionDisplayName<br/><br/>The following operations are supported: ```and```, ```or```, ```eq``` and ```contains``` |
6868
| $orderby | ```name asc``` | An OData expression that allows you to order by any of the available fields |
6969
| $skip | 50 | The number of items you want to skip while paging through the results. |
7070
| $top | 10 | The number of resources to return. 0 will return only a count of the resources. |

articles/active-directory/saas-apps/jiramicrosoft-tutorial.md

Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -118,6 +118,37 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
118118

119119
![The Certificate download link](common/copy-metadataurl.png)
120120

121+
122+
123+
124+
1. The Name ID attribute in Azure AD can be mapped to any desired user attribute by editing the Attributes & Claims section.
125+
126+
> [!div class="mx-imgBorder"]
127+
> ![Screenshot showing how to edit Attributes and Claims.](common/edit-attribute.png)
128+
129+
a. After clicking on Edit, any desired user attribute can be mapped by clicking on Unique User Identifier (Name ID).
130+
131+
> [!div class="mx-imgBorder"]
132+
> ![Screenshot showing the NameID in Attributes and Claims.](common/attribute-nameID.png)
133+
134+
b. On the next screen, the desired attribute name like user.userprincipalname can be selected as an option from the Source Attribute dropdown menu.
135+
136+
> [!div class="mx-imgBorder"]
137+
> ![Screenshot showing how to select Attributes and Claims.](common/attribute-select.png)
138+
139+
c. The selection can then be saved by clicking on the Save button at the top.
140+
141+
> [!div class="mx-imgBorder"]
142+
> ![Screenshot showing how to save Attributes and Claims.](common/attribute-save.png)
143+
144+
d. Now, the user.userprincipalname attribute source in Azure AD is mapped to the Name ID attribute name in Azure AD which will be compared with the username attribute in Atlassian by the SSO plugin.
145+
146+
> [!div class="mx-imgBorder"]
147+
> ![Screenshot showing how to review Attributes and Claims.](common/attribute-review.png)
148+
149+
> [!NOTE]
150+
> The SSO service provided by Microsoft Azure supports SAML authentication which is able to perform user identification using different attributes such as givenname (first name), surname (last name), email (email address), and user principal name (username). We recommend not to use email as an authentication attribute as email addresses are not always verified by Azure AD. The plugin compares the values of Atlassian username attribute with the NameID attribute in Azure AD in order to determine the valid user authentication.
151+
121152
### Create an Azure AD test user
122153

123154
In this section, you'll create a test user in the Azure portal called B.Simon.

articles/active-directory/verifiable-credentials/verifiable-credentials-configure-tenant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -139,7 +139,7 @@ To add the required permissions, follow these steps:
139139

140140
1. Select **APIs my organization uses**.
141141

142-
1. Search for the **Verifiable Credentials Service Request** service principal, and select it.
142+
1. Search for the **Verifiable Credentials Service Request** and **Verifiable Credentials Service** service principals, and select them.
143143

144144
![Screenshot that shows how to select the service principal.](media/verifiable-credentials-configure-tenant/add-app-api-permissions-select-service-principal.png)
145145

articles/aks/update-credentials.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ SP_ID=$(az aks show --resource-group myResourceGroup --name myAKSCluster \
5555
With a variable set that contains the service principal ID, now reset the credentials using [az ad sp credential reset][az-ad-sp-credential-reset]. The following example lets the Azure platform generate a new secure secret for the service principal. This new secure secret is also stored as a variable.
5656

5757
```azurecli-interactive
58-
SP_SECRET=$(az ad sp credential reset --name "$SP_ID" --query password -o tsv)
58+
SP_SECRET=$(az ad sp credential reset --id "$SP_ID" --query password -o tsv)
5959
```
6060

6161
Now continue on to [update AKS cluster with new service principal credentials](#update-aks-cluster-with-new-service-principal-credentials). This step is necessary for the Service Principal changes to reflect on the AKS cluster.
@@ -141,4 +141,4 @@ In this article, the service principal for the AKS cluster itself and the Azure
141141
[az-ad-sp-credential-list]: /cli/azure/ad/sp/credential#az_ad_sp_credential_list
142142
[az-ad-sp-credential-reset]: /cli/azure/ad/sp/credential#az_ad_sp_credential_reset
143143
[node-image-upgrade]: ./node-image-upgrade.md
144-
[node-surge-upgrade]: upgrade-cluster.md#customize-node-surge-upgrade
144+
[node-surge-upgrade]: upgrade-cluster.md#customize-node-surge-upgrade

articles/app-service/manage-custom-dns-buy-domain.md

Lines changed: 5 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -183,39 +183,27 @@ To test the custom domain, navigate to it in the browser.
183183

184184
## Renew the domain
185185

186-
The App Service domain you bought is valid for one year from the time of purchase. By default, the domain is configured to renew automatically by charging your payment method for the next year. You can manually renew your domain name.
186+
The App Service domain you bought is valid for one year from the time of purchase. You can configure to renew your domain automatically which will charge your payment method when your domain renews the following year. You can also manually renew your domain name.
187187

188-
If you want to turn off automatic renewal, or if you want to manually renew your domain, follow the steps here.
188+
If you want to configure automatic renewal, or if you want to manually renew your domain, follow the steps here.
189189

190190
1. In the search bar, search for and select **App Service Domains**.
191191

192192
![Portal navigation to Azure App Service domains](./media/app-service-web-tutorial-custom-domain/view-app-service-domains.png)
193193

194194
1. In the **App Service Domains** section, select the domain you want to configure.
195195

196-
1. From the left navigation of the domain, select **Domain renewal**. To stop renewing your domain automatically, select **Off**. The setting takes effect immediately.
196+
1. From the left navigation of the domain, select **Domain renewal**. To start renewing your domain automatically, select **On**, otherwise select **Off**. The setting takes effect immediately. If automatic renewal is enabled, on the day after your domain expiration date, Azure attempts to bill you for the domain name renewal.
197197

198198
![Screenshot that shows the option to automatically renew your domain.](./media/custom-dns-web-site-buydomains-web-app/dncmntask-cname-buydomains-autorenew.png)
199199

200200
> [!NOTE]
201201
> When navigating away from the page, disregard the "Your unsaved edits will be discarded" error by clicking **OK**.
202202
>
203203
204-
To manually renew your domain, select **Renew domain**. However, this button is not active until [90 days before the domain's expiration](#when-domain-expires).
204+
To manually renew your domain, select **Renew domain**. However, this button is not active until 90 days before the domain's expiration date.
205205

206-
If your domain renewal is successful, you receive an email notification within 24 hours.
207-
208-
## When domain expires
209-
210-
Azure deals with expiring or expired App Service domains as follows:
211-
212-
* If automatic renewal is disabled: 90 days before domain expiration, a renewal notification email is sent to you and the **Renew domain** button is activated in the portal.
213-
* If automatic renewal is enabled: On the day after your domain expiration date, Azure attempts to bill you for the domain name renewal.
214-
* If an error occurs during automatic renewal (for example, your card on file is expired), or if automatic renewal is disabled and you allow the domain to expire, Azure notifies you of the domain expiration and parks your domain name. You can [manually renew](#renew-the-domain) your domain.
215-
* On the 4th and 12th days day after expiration, Azure sends you additional notification emails. You can [manually renew](#renew-the-domain) your domain. On the 5th day after expiration, DNS resolution stops for the expired domain.
216-
* On the 19th day after expiration, your domain remains on hold but becomes subject to a redemption fee. You can call customer support to renew your domain name, subject to any applicable renewal and redemption fees.
217-
* On the 25th day after expiration, Azure puts your domain up for auction with a domain name industry auction service. You can call customer support to renew your domain name, subject to any applicable renewal and redemption fees.
218-
* On the 30th day after expiration, you're no longer able to redeem your domain.
206+
If your domain renewal is successful, you receive an email notification within 24 hours.
219207

220208
<a name="custom"></a>
221209

articles/azure-arc/vmware-vsphere/day2-operations-resource-bridge.md

Lines changed: 15 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Perform ongoing administration for Arc-enabled VMware vSphere
33
description: Learn how to perform day 2 administrator operations related to Azure Arc-enabled VMware vSphere
44
ms.topic: how-to
5-
ms.date: 08/25/2022
5+
ms.date: 09/15/2022
66

77
---
88

@@ -68,11 +68,15 @@ There are two different sets of credentials stored on the Arc resource bridge. Y
6868
- **Account for Arc resource bridge**. This account is used for deploying the Arc resource bridge VM and will be used for upgrade.
6969
- **Account for VMware cluster extension**. This account is used to discover inventory and perform all VM operations through Azure Arc-enabled VMware vSphere
7070
71-
To update the credentials of the account for Arc resource bridge, use the Azure CLI command [`az arcappliance update-infracredentials vmware`](/cli/azure/arcappliance/update-infracredentials#az-arcappliance-update-infracredentials-vmware). Run the command from a workstation that can access cluster configuration IP address of the Arc resource bridge locally:
71+
To update the credentials of the account for Arc resource bridge, run the following Azure CLI commands . Run the commands from a workstation that can access cluster configuration IP address of the Arc resource bridge locally:
7272
7373
```azurecli
74-
az arcappliance update-infracredentials vmware --kubeconfig <kubeconfig>
74+
az account set -s <subscription id>
75+
az arcappliance get-credentials -n <name of the appliance> -g <resource group name>
76+
az arcappliance update-infracredentials vmware --kubeconfig kubeconfig
7577
```
78+
For more details on the commands see [`az arcappliance get-credentials`](/cli/azure/arcappliance/get-credentials#az-arcappliance-get-credentials) and [`az arcappliance update-infracredentials vmware`](/cli/azure/arcappliance/update-infracredentials#az-arcappliance-update-infracredentials-vmware).
79+
7680

7781
To update the credentials used by the VMware cluster extension on the resource bridge. This command can be run from anywhere with `connectedvmware` CLI extension installed.
7882

@@ -84,28 +88,22 @@ az connectedvmware vcenter connect --custom-location <name of the custom locatio
8488

8589
For any issues encountered with the Azure Arc resource bridge, you can collect logs for further investigation. To collect the logs, use the Azure CLI [`Az arcappliance log`](/cli/azure/arcappliance/logs#az-arcappliance-logs-vmware) command.
8690

87-
The `az arcappliance log` command must be run from a workstation that can communicate with the Arc resource bridge either via the cluster configuration IP address or the IP address of the Arc resource bridge VM.
88-
89-
To save the logs to a destination folder, run the following command. This command requires connectivity to cluster configuration IP address.
91+
To save the logs to a destination folder, run the following commands. These commands need connectivity to cluster configuration IP address.
9092

9193
```azurecli
92-
az arcappliance logs <provider> --kubeconfig <path to kubeconfig> --out-dir <path to specified output directory>
94+
az account set -s <subscription id>
95+
az arcappliance get-credentials -n <name of the appliance> -g <resource group name>
96+
az arcappliance logs vmware --kubeconfig kubeconfig --out-dir <path to specified output directory>
9397
```
9498

95-
If the Kubernetes cluster on the resource bridge isn't in functional state, you can use the following command. This command requires connectivity to IP address of the Azure Arc resource bridge VM via SSH
99+
If the Kubernetes cluster on the resource bridge isn't in functional state, you can use the following commands. These commands require connectivity to IP address of the Azure Arc resource bridge VM via SSH
96100

97101
```azurecli
98-
az arcappliance logs <provider> --out-dir <path to specified output directory> --ip XXX.XXX.XXX.XXX
102+
az account set -s <subscription id>
103+
az arcappliance get-credentials -n <name of the appliance> -g <resource group name>
104+
az arcappliance logs vmware --out-dir <path to specified output directory> --ip XXX.XXX.XXX.XXX
99105
```
100106

101-
During initial onboarding, SSH keys are saved to the workstation. If you're running this command from the workstation that was used for onboarding, no other steps are required.
102-
103-
If you're running this command from a different workstation, make sure the following files are copied to the new workstation in the same location.
104-
105-
- For a Windows workstation, `C:\ProgramData\kva\.ssh\logkey` and `C:\ProgramData\kva\.ssh\logkey.pub`
106-
107-
- For a Linux workstation, `$HOME\.KVA\.ssh\logkey` and `$HOME\.KVA\.ssh\logkey.pub`
108-
109107
## Next steps
110108

111109
- [Troubleshoot common issues related to resource bridge](../resource-bridge/troubleshoot-resource-bridge.md)

articles/azure-arc/vmware-vsphere/overview.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: What is Azure Arc-enabled VMware vSphere (preview)?
33
description: Azure Arc-enabled VMware vSphere (preview) extends Azure governance and management capabilities to VMware vSphere infrastructure and delivers a consistent management experience across both platforms.
44
ms.topic: overview
5-
ms.date: 11/10/2021
5+
ms.date: 09/15/2022
66
ms.custom: references_regions
77
---
88

@@ -29,7 +29,7 @@ To deliver this experience, you need to deploy the [Azure Arc resource bridge](.
2929
Azure Arc-enabled VMware vSphere (preview) works with VMware vSphere version 6.7 and 7.
3030

3131
> [!NOTE]
32-
> Azure Arc-enabled VMware vSphere (preview) supports vCenters with a maximum of 2500 VMs. If your vCenter has more than 2500 VMs, it is not recommended to use Arc-enabled VMware vSphere with it at this point.
32+
> Azure Arc-enabled VMware vSphere (preview) supports vCenters with a maximum of 9500 VMs. If your vCenter has more than 9500 VMs, it is not recommended to use Arc-enabled VMware vSphere with it at this point.
3333
3434
## Supported scenarios
3535

@@ -53,6 +53,10 @@ You can use Azure Arc-enabled VMware vSphere (preview) in these supported region
5353

5454
- West Europe
5555

56+
- Australia East
57+
58+
- Canada Central
59+
5660
## Next steps
5761

5862
- [Connect VMware vCenter to Azure Arc using the helper script](quick-start-connect-vcenter-to-arc-using-script.md)

0 commit comments

Comments
 (0)