Skip to content

Commit cd70273

Browse files
authored
Merge pull request #88957 from MicrosoftDocs/master
9/18 AM Publish
2 parents c79aa93 + 64ceb3d commit cd70273

File tree

69 files changed

+874
-712
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

69 files changed

+874
-712
lines changed

articles/active-directory/authentication/howto-password-ban-bad-on-premises-faq.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -134,6 +134,10 @@ No.
134134

135135
Audit mode is only supported in the on-premises Active Directory environment. Azure AD is implicitly always in "enforce" mode when it evaluates passwords.
136136

137+
**Q: My users see the traditional Windows error message when a password is rejected by Azure AD Password Protection. Is it possible to customize this error message so that users know what really happened?**
138+
139+
No. The error message seen by users when a password is rejected by a domain controller is controlled by the client machine, not by the domain controller. This behavior happens whether a password is rejected by the default Active Directory password policies or by a password-filter-based solution such as Azure AD Password Protection.
140+
137141
## Additional content
138142

139143
The following links are not part of the core Azure AD Password Protection documentation but may be a useful source of additional information on the feature.

articles/active-directory/authentication/howto-password-ban-bad-on-premises-operations.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,9 +52,12 @@ This message is only one example of several possible outcomes. The specific erro
5252

5353
Affected end users may need to work with their IT staff to understand the new requirements and be more able to choose secure passwords.
5454

55+
> [!NOTE]
56+
> Azure AD Password Protection has no control over the specific error message displayed by the client machine when a weak password is rejected.
57+
5558
## Enable Mode
5659

57-
This setting should normally be left in its default enabled (Yes) state. Configuring this setting to disabled (No) will cause all deployed Azure AD Password Protection DC agents to go into a quiescent mode where all passwords are accepted as-is, and no validation activities will be executed whatsoever (for example, not even audit events will be emitted).
60+
This setting should be left in its default enabled (Yes) state. Configuring this setting to disabled (No) will cause all deployed Azure AD Password Protection DC agents to go into a quiescent mode where all passwords are accepted as-is, and no validation activities will be executed whatsoever (for example, not even audit events will be emitted).
5861

5962
## Next steps
6063

articles/active-directory/develop/msal-b2c-overview.md

Lines changed: 23 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.devlang: na
1313
ms.topic: conceptual
1414
ms.tgt_pltfrm: na
1515
ms.workload: identity
16-
ms.date: 05/04/2019
16+
ms.date: 09/16/2019
1717
ms.author: negoe
1818
ms.reviewer: nacanuma
1919
ms.custom: aaddev
@@ -53,21 +53,30 @@ git clone https://github.com/Azure-Samples/active-directory-b2c-javascript-msal-
5353

5454
1. Open the **index.html** file in the sample.
5555

56-
1. Configure the sample with the application ID and key that you recorded earlier while registering your application. Change the following lines of code by replacing the values with the names of your directory and APIs:
56+
1. Configure the sample with the client ID and key that you recorded earlier while registering your application. Change the following lines of code by replacing the values with the names of your directory and APIs:
5757

5858
```javascript
59-
// The current application coordinates were pre-registered in a B2C directory.
60-
61-
const msalConfig = {
62-
auth:{
63-
clientId: "Enter_the_Application_Id_here",
64-
authority: "https://login.microsoftonline.com/tfp/<your-tenant-name>.onmicrosoft.com/<your-sign-in-sign-up-policy>",
65-
b2cScopes: ["https://<your-tenant-name>.onmicrosoft.com/hello/demo.read"],
66-
webApi: 'http://localhost:5000/hello',
67-
};
68-
69-
// create UserAgentApplication instance
70-
const myMSALObj = new UserAgentApplication(msalConfig);
59+
// The current application coordinates were pre-registered in a B2C tenant.
60+
61+
var appConfig = {
62+
b2cScopes: ["https://fabrikamb2c.onmicrosoft.com/helloapi/demo.read"],
63+
webApi: "https://fabrikamb2chello.azurewebsites.net/hello"
64+
};
65+
66+
const msalConfig = {
67+
auth: {
68+
clientId: "e760cab2-b9a1-4c0d-86fb-ff7084abd902" //This is your client/application ID
69+
authority: "https://fabrikamb2c.b2clogin.com/fabrikamb2c.onmicrosoft.com/b2c_1_susi", //This is your tenant info
70+
validateAuthority: false
71+
},
72+
cache: {
73+
cacheLocation: "localStorage",
74+
storeAuthStateInCookie: true
75+
}
76+
};
77+
// create UserAgentApplication instance
78+
const myMSALObj = new Msal.UserAgentApplication(msalConfig);
79+
7180
```
7281

7382
The name of the [user flow](https://docs.microsoft.com/azure/active-directory-b2c/active-directory-b2c-reference-policies) in this tutorial is **B2C_1_signupsignin1**. If you're using a different user flow name, set the **authority** value to that name.

articles/active-directory/hybrid/reference-connect-version-history.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,9 @@ Not all releases of Azure AD Connect will be made available for auto upgrade. Th
4040

4141
## 1.4.X.0
4242

43+
>[!IMPORTANT]
44+
>Previously, Windows down-level computers joined to on-prem AD were incorrectly getting synced to the cloud under some circumstances. As an example, the userCertificate attribute value for Windows down-level devices in AD is populated. But such devices in Azure AD always stayed in the “pending” state because these OS versions were not designed to be registered with Azure AD via AAD Sync. In this version of Azure AD Connect, AAD Sync will stop syncing Windows down-level computers to Azure AD and will also remove the previously incorrectly synced Windows down-level devices from Azure AD. Please note that this change will not delete any Windows down-level devices that were correctly registered with Azure AD by using the MSI package. Those devices will continue to work as expected for the purposes of device-based conditional access. Some customers may see some or all of their Windows down-level devices disappear from Azure AD. This is not a cause for concern, as these device identities were never actually used by Azure AD during conditional access authorization. Such customers may need to revisit https://docs.microsoft.com/azure/active-directory/devices/hybrid-azuread-join-plan and get their Windows down-level devices registered correctly to ensure that such devices can fully participate in device-based conditional access. Note that if you see these deletes of down-level Computer/Device objects in Azure AD exceeding the Export Deletion Threshold, it is advised that the customer allow these deletes to go through.
45+
4346
### Release status
4447
9/10/2019: Released for auto-upgrade only
4548

articles/active-directory/users-groups-roles/groups-self-service-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Groups created in | Security group default behavior | Office 365 group default b
3636
## Self-service group management scenarios
3737

3838
* **Delegated group management**
39-
An example is an administrator who is managing access to a SaaS application that the company is using. Managing these access rights is becoming cumbersome, so this administrator asks the business owner to create a new group. The administrator assigns access for the application to the new group, and adds to the group all people already accessing to the application. The business owner then can add more users, and those users are automatically provisioned to the application. The business owner doesn't need to wait for the administrator to manage access for users. If the administrator grants the same permission to a manager in a different business group, then that person can also manage access for their own group members. Neither the business owner nor the manager can view or manage each other’s group memberships. The administrator can still see all users who have access to the application and block access rights if needed.
39+
An example is an administrator who is managing access to a SaaS application that the company is using. Managing these access rights is becoming cumbersome, so this administrator asks the business owner to create a new group. The administrator assigns access for the application to the new group, and adds to the group all people already accessing the application. The business owner then can add more users, and those users are automatically provisioned to the application. The business owner doesn't need to wait for the administrator to manage access for users. If the administrator grants the same permission to a manager in a different business group, then that person can also manage access for their own group members. Neither the business owner nor the manager can view or manage each other’s group memberships. The administrator can still see all users who have access to the application and block access rights if needed.
4040
* **Self-service group management**
4141
An example of this scenario is two users who both have SharePoint Online sites that they set up independently. They want to give each other’s teams access to their sites. To accomplish this, they can create one group in Azure AD, and in SharePoint Online each of them selects that group to provide access to their sites. When someone wants access, they request it from the Access Panel, and after approval they get access to both SharePoint Online sites automatically. Later, one of them decides that all people accessing the site should also get access to a particular SaaS application. The administrator of the SaaS application can add access rights for the application to the SharePoint Online site. From then on, any requests that get approved gives access to the two SharePoint Online sites and also to this SaaS application.
4242

articles/aks/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -100,6 +100,8 @@
100100
href: acs-aks-migration.md
101101
- name: Supported Kubernetes version
102102
href: supported-kubernetes-versions.md
103+
- name: Security Hardening in host OS
104+
href: security-hardened-vm-host-image.md
103105
- name: How-to guides
104106
items:
105107
- name: Cluster operations
@@ -116,7 +118,7 @@
116118
- name: Delete an AKS cluster
117119
href: /cli/azure/aks#az-aks-delete
118120
maintainContext: true
119-
- name: Create an ACR with an AKS cluster (preview)
121+
- name: Create an ACR with an AKS cluster
120122
href: cluster-container-registry-integration.md
121123
- name: Create virtual nodes
122124
items:

articles/aks/acs-aks-migration.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -31,10 +31,9 @@ ACS and AKS differ in some key areas that affect migration. Before any migration
3131

3232
## Differences between Kubernetes versions
3333

34-
If you're migrating to a newer version of Kubernetes (for example, from 1.7.x to 1.9.x), review the following resources to understand a few changes to the Kubernetes API:
34+
If you're migrating to a newer version of Kubernetes, review the following resources to understand the Kubernetes versioning strategies:
3535

36-
* [Migrating a ThirdPartyResource to CustomResourceDefinition](https://kubernetes.io/docs/tasks/access-kubernetes-api/migrate-third-party-resource/)
37-
* [Workloads API changes in versions 1.8 and 1.9](https://kubernetes.io/docs/reference/workloads-18-19/)
36+
* [Kubernetes version and version skew support policy](https://kubernetes.io/docs/setup/release/version-skew-policy/#supported-versions)
3837

3938
## Migration considerations
4039

articles/aks/cluster-autoscaler.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.author: mlearned
1414

1515
To keep up with application demands in Azure Kubernetes Service (AKS), you may need to adjust the number of nodes that run your workloads. The cluster autoscaler component can watch for pods in your cluster that can't be scheduled because of resource constraints. When issues are detected, the number of nodes in a node pool is increased to meet the application demand. Nodes are also regularly checked for a lack of running pods, with the number of nodes then decreased as needed. This ability to automatically scale up or down the number of nodes in your AKS cluster lets you run an efficient, cost-effective cluster.
1616

17-
This article shows you how to enable and manage the cluster autoscaler in an AKS cluster. Cluster autoscaler should only be tested in preview on AKS clusters.
17+
This article shows you how to enable and manage the cluster autoscaler in an AKS cluster. The cluster autoscaler should only be tested in preview on AKS clusters.
1818

1919
> [!IMPORTANT]
2020
> AKS preview features are self-service opt-in. Previews are provided "as-is" and "as available" and are excluded from the service level agreements and limited warranty. AKS Previews are partially covered by customer support on best effort basis. As such, these features are not meant for production use. For additional infromation, please see the following support articles:
@@ -48,12 +48,12 @@ The following limitations apply when you create and manage AKS clusters that use
4848

4949
To adjust to changing application demands, such as between the workday and evening or on a weekend, clusters often need a way to automatically scale. AKS clusters can scale in one of two ways:
5050

51-
* The **cluster autoscaler** watches for pods that can't be scheduled on nodes because of resource constraints. The cluster automatically then increases the number of nodes.
52-
* The **horizontal pod autoscaler** uses the Metrics Server in a Kubernetes cluster to monitor the resource demand of pods. If a service needs more resources, the number of pods is automatically increased to meet the demand.
51+
* The **cluster autoscaler** watches for pods that can't be scheduled on nodes because of resource constraints. The cluster then automatically increases the number of nodes.
52+
* The **horizontal pod autoscaler** uses the Metrics Server in a Kubernetes cluster to monitor the resource demand of pods. If an application needs more resources, the number of pods is automatically increased to meet the demand.
5353

5454
![The cluster autoscaler and horizontal pod autoscaler often work together to support the required application demands](media/autoscaler/cluster-autoscaler.png)
5555

56-
Both the horizontal pod autoscaler and cluster autoscaler can also then decrease the number of pods and nodes as needed. The cluster autoscaler decreases the number of nodes when there has been unused capacity for a period of time. Pods on a node to be removed by the cluster autoscaler are safely scheduled elsewhere in the cluster. The cluster autoscaler may be unable to scale down if pods can't move, such as in the following situations:
56+
Both the horizontal pod autoscaler and cluster autoscaler can also decrease the number of pods and nodes as needed. The cluster autoscaler decreases the number of nodes when there has been unused capacity for a period of time. Pods on a node to be removed by the cluster autoscaler are safely scheduled elsewhere in the cluster. The cluster autoscaler may be unable to scale down if pods can't move, such as in the following situations:
5757

5858
* A pod directly created and isn't backed by a controller object, such a deployment or replica set.
5959
* A pod disruption budget (PDB) is too restrictive and doesn't allow the number of pods to be fall below a certain threshold.
@@ -63,7 +63,7 @@ For more information about how the cluster autoscaler may be unable to scale dow
6363

6464
The cluster autoscaler uses startup parameters for things like time intervals between scale events and resource thresholds. These parameters are defined by the Azure platform, and aren't currently exposed for you to adjust. For more information on what parameters the cluster autoscaler uses, see [What are the cluster autoscaler parameters?][autoscaler-parameters].
6565

66-
The cluster and horizontal pod autoscalers can work together, and are often both deployed together in a cluster. When combined, the horizontal pod autoscaler is focused on running the number of pods required to meet application demand. The cluster autoscaler is focused on running the number of nodes required to support the scheduled pods.
66+
The cluster and horizontal pod autoscalers can work together, and are often both deployed in a cluster. When combined, the horizontal pod autoscaler is focused on running the number of pods required to meet application demand. The cluster autoscaler is focused on running the number of nodes required to support the scheduled pods.
6767

6868
> [!NOTE]
6969
> Manual scaling is disabled when you use the cluster autoscaler. Let the cluster autoscaler determine the required number of nodes. If you want to manually scale your cluster, [disable the cluster autoscaler](#disable-the-cluster-autoscaler).

articles/aks/cluster-container-registry-integration.md

Lines changed: 4 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -7,39 +7,24 @@ manager: gwallace
77

88
ms.service: container-service
99
ms.topic: article
10-
ms.date: 08/15/2018
10+
ms.date: 09/17/2018
1111
ms.author: mlearned
1212
---
1313

14-
# Preview - Authenticate with Azure Container Registry from Azure Kubernetes Service
14+
# Authenticate with Azure Container Registry from Azure Kubernetes Service
1515

1616
When you're using Azure Container Registry (ACR) with Azure Kubernetes Service (AKS), an authentication mechanism needs to be established. This article details the recommended configurations for authentication between these two Azure services.
1717

1818
You can set up the AKS to ACR integration in a few simple commands with the Azure CLI.
1919

20-
> [!IMPORTANT]
21-
> AKS preview features are self-service opt-in. Previews are provided "as-is" and "as available" and are excluded from the service level agreements and limited warranty. AKS Previews are partially covered by customer support on best effort basis. As such, these features are not meant for production use. For additional infromation, please see the following support articles:
22-
>
23-
> * [AKS Support Policies](support-policies.md)
24-
> * [Azure Support FAQ](faq.md)
25-
2620
## Before you begin
2721

2822
You must have the following:
2923

3024
* **Owner** or **Azure account administrator** role on the **Azure subscription**
31-
* You also need the Azure CLI version 2.0.70 or later and the aks-preview 0.4.8 extension
25+
* You also need the Azure CLI version 2.0.73 or later
3226
* You need [Docker installed](https://docs.docker.com/install/) on your client, and you need access to [docker hub](https://hub.docker.com/)
3327

34-
## Install latest AKS CLI preview extension
35-
36-
You need the **aks-preview 0.4.13** extension or later.
37-
38-
```azurecli
39-
az extension remove --name aks-preview
40-
az extension add -y --name aks-preview
41-
```
42-
4328
## Create a new AKS cluster with ACR integration
4429

4530
You can set up AKS and ACR integration during the initial creation of your AKS cluster. To allow an AKS cluster to interact with ACR, an Azure Active Directory **service principal** is used. The following CLI command allows you to authorize an existing ACR in your subscription and configures the appropriate **ACRPull** role for the service principal. Supply valid values for your parameters below. The parameters in brackets are optional.
@@ -48,7 +33,7 @@ az login
4833
az acr create -n myContainerRegistry -g myContainerRegistryResourceGroup --sku basic [in case you do not have an existing ACR]
4934
az aks create -n myAKSCluster -g myResourceGroup --attach-acr <acr-name-or-resource-id>
5035
```
51-
**An ACR resource id has the following format:
36+
**An ACR resource ID has the following format:**
5237

5338
/subscriptions/<subscription-d>/resourceGroups/<resource-group-name>/providers/Microsoft.ContainerRegistry/registries/{name}
5439

0 commit comments

Comments
 (0)