Skip to content

Commit c9fe580

Browse files
authored
Merge pull request #47744 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/Microsoft/azure-docs (branch master)
2 parents c2a4ef6 + ad9eb9b commit c9fe580

File tree

8 files changed

+39
-30
lines changed

8 files changed

+39
-30
lines changed

articles/active-directory/user-help/user-help-security-info-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ ms.author: lizross
2424
2525
Set up your two-step verification and password reset info in **Security info**. After you initially set up your security info, you won't have to do it again. However, you can edit your info and change the default method at any time.
2626

27-
You and add any of the following methods, including:
27+
You can add any of the following methods, including:
2828

2929
|Article |Description |
3030
|------|------------|
@@ -35,4 +35,4 @@ You and add any of the following methods, including:
3535
|[Set up security info to use pre-defined security questions](security-info-setup-questions.md)|Describes how to use security questions to help you reset your password.|
3636
|[Manage app passwords](security-info-app-passwords.md)|Describes how to set up app passwords using security info.|
3737
|[Manage your security info](security-info-manage-settings.md)|Describes how to update your security info and work with your app passwords.|
38-
|[How to sign in](user-help-sign-in.md)|Describes how to sign in using your specified method.|
38+
|[How to sign in](user-help-sign-in.md)|Describes how to sign in using your specified method.|

articles/firewall/tutorial-firewall-deploy-portal.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -85,6 +85,9 @@ First, create a resource group to contain the resources needed to deploy the fir
8585
11. For **Address range**, type **10.0.1.0/24**.
8686
12. Use the other default settings, and then click **Create**.
8787

88+
> [!NOTE]
89+
> The minimum size of the AzureFirewallSubnet subnet is /25.
90+
8891
### Create additional subnets
8992

9093
Next, create subnets for the jump server, and a subnet for the workload servers.
@@ -168,6 +171,9 @@ Use the information in the following table to configure the **Settings** for the
168171
4. After deployment completes, go to the **Test-FW-RG** resource group, and click the **Test-FW01** firewall.
169172
6. Note the private IP address. You'll use it later when you create the default route.
170173

174+
> [!NOTE]
175+
> The Public IP address must be the Standard SKU type.
176+
171177
[//]: # (Remember to note the private IP for the firewall.)
172178

173179
## Create a default route

articles/key-vault/about-keys-secrets-and-certificates.md

Lines changed: 24 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -114,46 +114,48 @@ Where:
114114

115115
Cryptographic keys in Azure Key Vault are represented as JSON Web Key [JWK] objects. The base JWK/JWA specifications are also extended to enable key types unique to the Azure Key Vault implementation, for example the import of keys to Azure Key Vault using the HSM vendor (Thales) specific packaging to enable secure transportation of keys such that they may only be used in the Azure Key Vault HSMs.
116116

117-
The initial Azure Key Vault release supports RSA keys only; future releases may support other key types such as symmetric and elliptic curve.
118-
119-
- **RSA**: A 2048-bit RSA key. This is a "soft" key, which is processed in software by Key Vault but is stored encrypted at rest using a system key that is in an HSM. Clients may import an existing RSA key or request that Azure Key Vault generate one.
120-
- **RSA-HSM**: An RSA key that is processed in an HSM. RSA-HSM keys are protected in one of the Azure Key Vault HSM Security Worlds (there is a Security World per geography to maintain isolation). Clients may import an RSA key, either in soft form or by exporting from a compatible HSM device, or request that Azure Key Vault generate one. This key type adds the T attribute to the JWK obtain to carry the HSM key material.
117+
- **"Soft" keys**: A key processed in software by Key Vault, but is encrypted at rest using a system key that is in an HSM. Clients may import an existing RSA or EC key, or request that Azure Key Vault generate one.
118+
- **"Hard" keys**: A key processed in an HSM (Hardware Security Module). These keys are protected in one of the Azure Key Vault HSM Security Worlds (there is a Security World per geography to maintain isolation). Clients may import an RSA or EC key, either in soft form or by exporting from a compatible HSM device, or request that Azure Key Vault generate one. This key type adds the T attribute to the JWK obtain to carry the HSM key material.
121119

122120
For more information on geographical boundaries, see [Microsoft Azure Trust Center](https://azure.microsoft.com/support/trust-center/privacy/)
123121

124-
### <a name="BKMK_RSAAlgorithms"></a> RSA algorithms
125-
The following algorithm identifiers are supported with RSA keys in Azure Key Vault.
122+
Azure Key Vault supports RSA and Elliptic Curve keys only; future releases may support other key types such as symmetric.
126123

127-
#### WRAPKEY/UNWRAPKEY, ENCRYPT/DECRYPT
124+
- **EC**: "Soft" Elliptic Curve key.
125+
- **EC-HSM**: "Hard" Elliptic Curve key.
126+
- **RSA**: "Soft" RSA key.
127+
- **RSA-HSM**: "Hard" RSA key.
128128

129-
- **RSA1_5** - RSAES-PKCS1-V1_5 [RFC3447] key encryption
130-
- **RSA-OAEP** - RSAES using Optimal Asymmetric Encryption Padding (OAEP) [RFC3447], with the default parameters specified by RFC 3447 in Section A.2.1. Those default parameters are using a hash function of SHA-1 and a mask generation function of MGF1 with SHA-1.
129+
Azure Key Vault supports RSA keys of sizes 2048, 3072 and 4096, and Elliptic Curve keys of type P-256, P-384, P-521 and P-256K.
131130

132-
#### SIGN/VERIFY
131+
### <a name="BKMK_Cryptographic"></a> Cryptographic protection
133132

134-
- **RS256** - RSASSA-PKCS-v1_5 using SHA-256. The application supplied digest value must be computed using SHA-256 and must be 32 bytes in length.
135-
- **RS384** - RSASSA-PKCS-v1_5 using SHA-384. The application supplied digest value must be computed using SHA-384 and must be 48 bytes in length.
136-
- **RS512** - RSASSA-PKCS-v1_5 using SHA-512. The application supplied digest value must be computed using SHA-512 and must be 64 bytes in length.
137-
- **RSNULL** - See [RFC2437], a specialized use-case to enable certain TLS scenarios.
133+
The cryptographic modules that Azure Key Vault uses, whether HSM or software, are FIPS validated. You don’t need to do anything special to run in FIPS mode. If you **create** or **import** keys as HSM-protected, they are guaranteed to be processed inside HSMs validated to FIPS 140-2 Level 2 or higher. If you **create** or **import** keys as software-protected then they are processed inside cryptographic modules validated to FIPS 140-2 Level 1 or higher. For more information, see [Keys and key types](about-keys-secrets-and-certificates.md#BKMK_KeyTypes).
138134

139-
### <a name="BKMK_RSA-HSMAlgorithms"></a> RSA-HSM algorithms
140-
The following algorithm identifiers are supported with RSA-HSM keys in Azure Key Vault.
135+
### <a name="BKMK_ECAlgorithms"></a> EC algorithms
136+
The following algorithm identifiers are supported with EC and EC-HSM keys in Azure Key Vault.
141137

142-
### <a name="BKMK_Cryptographic"></a> Cryptographic protection
138+
#### SIGN/VERIFY
143139

144-
The cryptographic modules that Azure Key Vault uses, whether HSM or software, are FIPS validated. You don’t need to do anything special to run in FIPS mode. If you **create** or **import** keys as HSM-protected, they are guaranteed to be processed inside HSMs validated to FIPS 140-2 Level 2 or higher. If you **create** or **import** keys as software-protected then they are processed inside cryptographic modules validated to FIPS 140-2 Level 1 or higher. For more information, see [Keys and key types](about-keys-secrets-and-certificates.md#BKMK_KeyTypes).
140+
- **ES256** - ECDSA for SHA-256 digests and keys created with curve P-256. This algorithm is described at [RFC7518].
141+
- **ES256K** - ECDSA for SHA-256 digests and keys created with curve P-256K. This algorithm is pending standardization.
142+
- **ES384** - ECDSA for SHA-384 digests and keys created with curve P-384. This algorithm is described at [RFC7518].
143+
- **ES512** - ECDSA for SHA-512 digests and keys created with curve P-521. This algorithm is described at [RFC7518].
144+
145+
### <a name="BKMK_RSAAlgorithms"></a> RSA algorithms
146+
The following algorithm identifiers are supported with RSA and RSA-HSM keys in Azure Key Vault.
145147

146-
#### WRAP/UNWRAP, ENCRYPT/DECRYPT
148+
#### WRAPKEY/UNWRAPKEY, ENCRYPT/DECRYPT
147149

148-
- **RSA1_5** - RSAES-PKCS1-V1_5 [RFC3447] key encryption.
150+
- **RSA1_5** - RSAES-PKCS1-V1_5 [RFC3447] key encryption
149151
- **RSA-OAEP** - RSAES using Optimal Asymmetric Encryption Padding (OAEP) [RFC3447], with the default parameters specified by RFC 3447 in Section A.2.1. Those default parameters are using a hash function of SHA-1 and a mask generation function of MGF1 with SHA-1.
150152

151-
#### SIGN/VERIFY
153+
#### SIGN/VERIFY
152154

153155
- **RS256** - RSASSA-PKCS-v1_5 using SHA-256. The application supplied digest value must be computed using SHA-256 and must be 32 bytes in length.
154156
- **RS384** - RSASSA-PKCS-v1_5 using SHA-384. The application supplied digest value must be computed using SHA-384 and must be 48 bytes in length.
155157
- **RS512** - RSASSA-PKCS-v1_5 using SHA-512. The application supplied digest value must be computed using SHA-512 and must be 64 bytes in length.
156-
- RSNULL: See [RFC2437], a specialized use-case to enable certain TLS scenarios.
158+
- **RSNULL** - See [RFC2437], a specialized use-case to enable certain TLS scenarios.
157159

158160
### <a name="BKMK_KeyOperations"></a> Key operations
159161

articles/log-analytics/log-analytics-containers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -176,7 +176,7 @@ For Docker Swarm, once the secret for Workspace ID and Primary Key is created, u
176176
3. Run the following command to mount the secrets to the containerized OMS Agent.
177177
178178
```
179-
sudo docker service create --name omsagent --mode global --mount type=bind,source=/var/run/docker.sock,destination=/var/run/docker.sock --secret source=WSID,target=WSID --secret source=KEY,target=KEY -p 25225:25225 -p 25224:25224/udp --restart-condition=on-failure microsoft/oms
179+
sudo docker service create --name omsagent --mode global --mount type=bind,source=/var/run/docker.sock,destination=/var/run/docker.sock --mount type=bind,source=/var/lib/docker/containers,destination=/var/lib/docker/containers --secret source=WSID,target=WSID --secret source=KEY,target=KEY -p 25225:25225 -p 25224:25224/udp --restart-condition=on-failure microsoft/oms
180180
```
181181
182182
#### Configure an OMS Agent for Red Hat OpenShift

articles/service-fabric-mesh/service-fabric-mesh-monitoring-diagnostics.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ az mesh code-package-log get --resource-group <nameOfRG> --app-name <nameOfApp>
3636
```
3737

3838
> [!NOTE]
39-
> You can use the "az mesh servicereplica" command to get the replica name. Replica names are incrementing numbers from 0.*
39+
> You can use the "az mesh service-replica" command to get the replica name. Replica names are incrementing numbers from 0.*
4040
4141
Here is what this looks like for seeing the logs from the VotingWeb.Code container from the voting application:
4242

articles/virtual-machines/linux/azure-dns.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ ms.author: rclaus
2020
# DNS Name Resolution options for Linux virtual machines in Azure
2121
Azure provides DNS name resolution by default for all virtual machines that are in a single virtual network. You can implement your own DNS name resolution solution by configuring your own DNS services on your virtual machines that Azure hosts. The following scenarios should help you choose the one that works for your situation.
2222

23-
* [Name resolution that Azure provides](#azure-provided-name-resolution)
23+
* [Name resolution that Azure provides](#name-resolution-that-azure-provides)
2424
* [Name resolution using your own DNS server](#name-resolution-using-your-own-dns-server)
2525

2626
The type of name resolution that you use depends on how your virtual machines and role instances need to communicate with each other.

articles/virtual-machines/workloads/sap/sap-hana-backup-storage-snapshots.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ Azure Backup has four major phases:
8585
For details on where to copy these scripts and details on how Azure Backup works exactly, check the following articles:
8686

8787
- [Plan your VM backup infrastructure in Azure](https://docs.microsoft.com/en-us/azure/backup/backup-azure-vms-introduction)
88-
- [Application consistent consistent backup of Azure Linux VMs](https://docs.microsoft.com/en-us/azure/backup/backup-azure-linux-app-consistent)
88+
- [Application-consistent backup of Azure Linux VMs](https://docs.microsoft.com/en-us/azure/backup/backup-azure-linux-app-consistent)
8989

9090

9191

includes/active-directory-protocols-getting-started.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,12 +19,13 @@ ms.author: priyamo
1919
First, you need to register your application with your Azure Active Directory (Azure AD) tenant. This will give you an Application ID for your application, as well as enable it to receive tokens.
2020

2121
* Sign in to the [Azure portal](https://portal.azure.com).
22-
* Choose your Azure AD tenant by clicking on your account in the top right corner of the page.
22+
* Choose your Azure AD tenant by clicking on your account in the top right corner of the page, followed by clicking on the **Switch Directory** navigation and then select the appropriate tenant.
23+
* Skip this step, if you've only one Azure AD tenant under your account or if you've already selected the appropriate Azure AD tenant.
2324
* In the left hand navigation pane, click on **Azure Active Directory**.
2425
* Click on **App Registrations** and click on **New application registration**.
2526
* Follow the prompts and create a new application. It doesn't matter if it is a web application or a native application for this tutorial, but if you'd like specific examples for web applications or native applications, check out our [quickstarts](../articles/active-directory/develop/active-directory-developers-guide.md).
2627
* For Web Applications, provide the **Sign-On URL**, which is the base URL of your app, where users can sign in e.g `http://localhost:12345`.
2728
<!--TODO: add once App ID URI is configurable: The **App ID URI** is a unique identifier for your application. The convention is to use `https://<tenant-domain>/<app-name>`, e.g. `https://contoso.onmicrosoft.com/my-first-aad-app`-->
2829
* For Native Applications provide a **Redirect URI**, which Azure AD will use to return token responses. Enter a value specific to your application, .e.g `http://MyFirstAADApp`
2930
* Once you've completed registration, Azure AD will assign your application a unique client identifier, the **Application ID**. You need this value in the next sections, so copy it from the application page.
30-
* To find your application in the Azure portal, click **App registrations**, and then click **View all applications**.
31+
* To find your application in the Azure portal, click **App registrations**, and then click **View all applications**.

0 commit comments

Comments
 (0)