Skip to content

Commit cf8abd6

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into rolyon-rbac-custom-roles-format
2 parents e78f248 + 74acaa3 commit cf8abd6

File tree

93 files changed

+3267
-1538
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

93 files changed

+3267
-1538
lines changed
4 KB
Loading

articles/active-directory/develop/reference-v2-libraries.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -84,6 +84,7 @@ See also [Scenarios by supported platforms and languages](authentication-flows-a
8484
| Platform | Library name | Tested version | Source code | Sample |
8585
|:---:|:---:|:---:|:---:|:---:|
8686
|![JavaScript](media/sample-v2-code/logo_js.png)|[Hello.js](https://adodson.com/hello.js/) | Version 1.13.5 |[Hello.js](https://github.com/MrSwitch/hello.js) |[SPA](https://github.com/Azure-Samples/active-directory-javascript-graphapi-v2) |
87+
|![Vue](media/sample-v2-code/logo_vue.png)|[Vue MSAL](https://github.com/mvertopoulos/vue-msal) | Version 3.0.3 |[vue-msal](https://github.com/mvertopoulos/vue-msal) | |
8788
| ![Java](media/sample-v2-code/logo_java.png) | [Scribe Java](https://github.com/scribejava/scribejava) | [Version 3.2.0](https://github.com/scribejava/scribejava/releases/tag/scribejava-3.2.0) | [ScribeJava](https://github.com/scribejava/scribejava/) | |
8889
| ![Java](media/sample-v2-code/logo_java.png) | [Gluu OpenID Connect library](https://github.com/GluuFederation/oxAuth) | [Version 3.0.2](https://github.com/GluuFederation/oxAuth/releases/tag/3.0.2) | [Gluu OpenID Connect library](https://github.com/GluuFederation/oxAuth) | |
8990
| ![Python](media/sample-v2-code/logo_python.png) | [Requests-OAuthlib](https://github.com/requests/requests-oauthlib) | [Version 1.2.0](https://github.com/requests/requests-oauthlib/releases/tag/v1.2.0) | [Requests-OAuthlib](https://github.com/requests/requests-oauthlib) | |

articles/active-directory/hybrid/reference-connect-adsyncconfig.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -54,25 +54,24 @@ Searches in AD starting from the SearchBase parameter and returns all objects, f
5454
### EXAMPLES
5555

5656
#### EXAMPLE 1
57-
```
5857
Find objects with disabled inheritance in 'Contoso' domain (by default returns 'organizationalUnit' objects only)
5958
```
60-
6159
Get-ADSyncObjectsWithInheritanceDisabled -SearchBase 'Contoso'
60+
```
6261

6362
#### EXAMPLE 2
64-
```
6563
Find 'user' objects with disabled inheritance in 'Contoso' domain
6664
```
67-
6865
Get-ADSyncObjectsWithInheritanceDisabled -SearchBase 'Contoso' -ObjectClass 'user'
66+
```
6967

7068
#### EXAMPLE 3
71-
```
7269
Find all types of objects with disabled inheritance in a OU
7370
```
74-
7571
Get-ADSyncObjectsWithInheritanceDisabled -SearchBase OU=AzureAD,DC=Contoso,DC=com -ObjectClass '*'
72+
```
73+
74+
7675

7776
### PARAMETERS
7877

articles/active-directory/hybrid/reference-connect-version-history.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,17 @@ Not all releases of Azure AD Connect will be made available for auto upgrade. Th
4343
>
4444
>Please refer to [this article](https://docs.microsoft.com/azure/active-directory/hybrid/how-to-upgrade-previous-version) to learn more about how to upgrade Azure AD Connect to the latest version.
4545
46+
## 1.5.30.0
47+
48+
### Release status
49+
05/07/2020: Released for download
50+
51+
### Fixed issues
52+
- Fixed an issue where unselected domains were getting incorrectly selected from the wizard UI.
53+
- Fixed an issue in the ADSyncConfig PowerShell module, where invoking DSACLS command used in all the Set-ADSync* Permissions cmdlets would cause one of the following errors:
54+
- `GrantAclsNoInheritance : The parameter is incorrect. The command failed to complete successfully.`
55+
- `GrantAcls : No GUID Found for computer …`
56+
4657
## 1.5.29.0
4758

4859
### Release status
@@ -100,6 +111,7 @@ This hotfix build fixes an issue with build 1.5.18.0 if you have the Group Filte
100111
- Fixed an issue with the creation of the Azure Active Directory synchronization account where enabling Directory Extensions or PHS may fail because the account has not propagated across all service replicas before attempted use.
101112
- Fixed a bug in the sync errors compression utility that was not handling surrogate characters correctly.
102113
- Fixed a bug in the auto upgrade which left the server in the scheduler suspended state.
114+
- Fixed a bug in the Domain/OU filtering page that would remove the Run Profiles of a domain by just partially expanding the domain tree, without making any changes.
103115

104116
## 1.4.38.0
105117
### Release status

articles/active-directory/saas-apps/smarteru-tutorial.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,12 +18,11 @@ ms.date: 03/19/2019
1818
ms.author: jeedes
1919

2020
---
21+
# Tutorial: Azure Active Directory integration with SmarterU
2122

2223
> [!NOTE]
2324
> The process for integrating SmarterU with Azure Active Directory is also documented and maintained in the [SmarterU help system](https://help.smarteru.com/ID2053086).
2425
25-
# Tutorial: Azure Active Directory integration with SmarterU
26-
2726
In this tutorial, you learn how to integrate SmarterU with Azure Active Directory (Azure AD).
2827
Integrating SmarterU with Azure AD provides you with the following benefits:
2928

articles/aks/concepts-security.md

Lines changed: 11 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Concepts - Security in Azure Kubernetes Services (AKS)
33
description: Learn about security in Azure Kubernetes Service (AKS), including master and node communication, network policies, and Kubernetes secrets.
44
services: container-service
55
ms.topic: conceptual
6-
ms.date: 03/01/2019
6+
ms.date: 05/08/2020
77

88
---
99

@@ -23,7 +23,9 @@ This article introduces the core concepts that secure your applications in AKS:
2323

2424
In AKS, the Kubernetes master components are part of the managed service provided by Microsoft. Each AKS cluster has its own single-tenanted, dedicated Kubernetes master to provide the API Server, Scheduler, etc. This master is managed and maintained by Microsoft.
2525

26-
By default, the Kubernetes API server uses a public IP address and a fully qualified domain name (FQDN). You can control access to the API server using Kubernetes role-based access controls and Azure Active Directory. For more information, see [Azure AD integration with AKS][aks-aad].
26+
By default, the Kubernetes API server uses a public IP address and a fully qualified domain name (FQDN). You can limit access to the API server endpoint using [authorized IP ranges][authorized-ip-ranges]. You can also create a fully [private cluster][private-clusters] to limit API server access to your virtual network.
27+
28+
You can control access to the API server using Kubernetes role-based access controls and Azure Active Directory. For more information, see [Azure AD integration with AKS][aks-aad].
2729

2830
## Node security
2931

@@ -62,6 +64,10 @@ For connectivity and security with on-premises networks, you can deploy your AKS
6264

6365
To filter the flow of traffic in virtual networks, Azure uses network security group rules. These rules define the source and destination IP ranges, ports, and protocols that are allowed or denied access to resources. Default rules are created to allow TLS traffic to the Kubernetes API server. As you create services with load balancers, port mappings, or ingress routes, AKS automatically modifies the network security group for traffic to flow appropriately.
6466

67+
### Kubernetes network policy
68+
69+
To limit network traffic between pods in your cluster, AKS offers support for [Kubernetes network policies][network-policy]. With network policies, you can choose to allow or deny specific network paths within the cluster based on namespaces and label selectors.
70+
6571
## Kubernetes Secrets
6672

6773
A Kubernetes *Secret* is used to inject sensitive data into pods, such as access credentials or keys. You first create a Secret using the Kubernetes API. When you define your pod or deployment, a specific Secret can be requested. Secrets are only provided to nodes that have a scheduled pod that requires it, and the Secret is stored in *tmpfs*, not written to disk. When the last pod on a node that requires a Secret is deleted, the Secret is deleted from the node's tmpfs. Secrets are stored within a given namespace and can only be accessed by pods within the same namespace.
@@ -100,3 +106,6 @@ For additional information on core Kubernetes and AKS concepts, see the followin
100106
[operator-best-practices-cluster-security]: operator-best-practices-cluster-security.md
101107
[developer-best-practices-pod-security]:developer-best-practices-pod-security.md
102108
[nodepool-upgrade]: use-multiple-node-pools.md#upgrade-a-node-pool
109+
[authorized-ip-ranges]: api-server-authorized-ip-ranges.md
110+
[private-clusters]: private-clusters.md
111+
[network-policy]: use-network-policies.md

articles/azure-app-configuration/overview-managed-identity.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,10 @@
11
---
22
title: Configure managed identities with Azure App Configuration
33
description: Learn how managed identities work in Azure App Configuration and how to configure a managed identity
4-
author: jpconnock
5-
4+
author: barbkess
65
ms.topic: article
76
ms.date: 02/25/2020
8-
ms.author: jeconnoc
7+
ms.author: barbkess
98
ms.reviewer: lcozzens
109
ms.service: azure-app-configuration
1110

articles/azure-app-configuration/quickstart-feature-flag-spring-boot.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ Use the [Spring Initializr](https://start.spring.io/) to create a new Spring Boo
5959
```xml
6060
<dependency>
6161
<groupId>com.microsoft.azure</groupId>
62-
<artifactId>spring-cloud-azure-appconfiguration-config</artifactId>
62+
<artifactId>spring-cloud-azure-appconfiguration-config-web</artifactId>
6363
<version>1.1.2</version>
6464
</dependency>
6565
<dependency>
@@ -78,7 +78,7 @@ Use the [Spring Initializr](https://start.spring.io/) to create a new Spring Boo
7878
```xml
7979
<dependency>
8080
<groupId>com.microsoft.azure</groupId>
81-
<artifactId>spring-cloud-azure-appconfiguration-config</artifactId>
81+
<artifactId>spring-cloud-azure-appconfiguration-config-web</artifactId>
8282
<version>1.2.2</version>
8383
</dependency>
8484
<dependency>

articles/azure-arc/servers/onboard-portal.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ For example, run the installation program with the `/?` parameter to review the
6868
msiexec.exe /i AzureConnectedMachineAgent.msi /?
6969
```
7070

71-
To install the agent silently and create a setup log file in the `C:\Support\Logs` folder, run the following command.
71+
To install the agent silently and create a setup log file in the `C:\Support\Logs` folder that exist, run the following command.
7272

7373
```dos
7474
msiexec.exe /i AzureConnectedMachineAgent.msi /qn /l*v "C:\Support\Logs\Azcmagentsetup.log"
@@ -104,7 +104,7 @@ Restart-Service -Name himds
104104

105105
After installing the agent, you need to configure the agent to communicate with the Azure Arc service by running the following command:
106106

107-
`%ProgramFiles%\AzureConnectedMachineAgent\azcmagent.exe" connect --resource-group "<resourceGroupName>" --tenant-id "<tenantID>" --location "<regionName>" --subscription-id "<subscriptionID>"`
107+
`"%ProgramFiles%\AzureConnectedMachineAgent\azcmagent.exe" connect --resource-group "<resourceGroupName>" --tenant-id "<tenantID>" --location "<regionName>" --subscription-id "<subscriptionID>"`
108108

109109
## Install and validate the agent on Linux
110110

@@ -141,7 +141,7 @@ bash ~/Install_linux_azcmagent.sh --proxy "{proxy-url}:{proxy-port}"
141141

142142
After you install the agent, configure it to communicate with the Azure Arc service by running the following command:
143143

144-
`/opt/azcmagent/bin/azcmagent.exe" connect --resource-group "<resourceGroupName>" --tenant-id "<tenantID>" --location "<regionName>" --subscription-id "<subscriptionID>"`
144+
`azcmagent connect --resource-group "<resourceGroupName>" --tenant-id "<tenantID>" --location "<regionName>" --subscription-id "<subscriptionID>"`
145145

146146
## Verify the connection with Azure Arc
147147

articles/azure-monitor/app/asp-net-dependencies.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -88,14 +88,14 @@ For SQL calls, the name of the server and database is always collected and store
8888

8989
For ASP.NET Core applications, there's no additional step required to get the full SQL Query.
9090

91-
For ASP.NET applications, full SQL query is collected with the help of byte code instrumentation, which requires instrumentation engine. Additional platform-specific steps, as described below, are required.
91+
For ASP.NET applications, full SQL query is collected with the help of byte code instrumentation, which requires instrumentation engine or by using the [Microsoft.Data.SqlClient](https://www.nuget.org/packages/Microsoft.Data.SqlClient) NuGet package instead of the System.Data.SqlClient library. Additional platform-specific steps, as described below, are required.
9292

9393
| Platform | Step(s) Needed to get full SQL Query |
9494
| --- | --- |
9595
| Azure Web App |In your web app control panel, [open the Application Insights blade](../../azure-monitor/app/azure-web-apps.md) and enable SQL Commands under .NET |
96-
| IIS Server (Azure VM, on-prem, and so on.) | Use the Status Monitor PowerShell Module to [install the Instrumentation Engine](../../azure-monitor/app/status-monitor-v2-api-reference.md) and restart IIS. |
96+
| IIS Server (Azure VM, on-prem, and so on.) | Either use the [Microsoft.Data.SqlClient](https://www.nuget.org/packages/Microsoft.Data.SqlClient) NuGet package or use the Status Monitor PowerShell Module to [install the Instrumentation Engine](../../azure-monitor/app/status-monitor-v2-api-reference.md) and restart IIS. |
9797
| Azure Cloud Service | Add [startup task to install StatusMonitor](../../azure-monitor/app/cloudservices.md#set-up-status-monitor-to-collect-full-sql-queries-optional) <br> Your app should be onboarded to ApplicationInsights SDK at build time by installing NuGet packages for [ASP.NET](https://docs.microsoft.com/azure/azure-monitor/app/asp-net) or [ASP.NET Core applications](https://docs.microsoft.com/azure/azure-monitor/app/asp-net-core) |
98-
| IIS Express | Not supported
98+
| IIS Express | Use the [Microsoft.Data.SqlClient](https://www.nuget.org/packages/Microsoft.Data.SqlClient) NuGet package
9999

100100
In the above cases, the correct way of validating that instrumentation engine is correctly installed is by validating that the SDK version of collected `DependencyTelemetry` is 'rddp'. 'rdddsd' or 'rddf' indicates dependencies are collected via DiagnosticSource or EventSource callbacks, and hence full SQL query won't be captured.
101101

0 commit comments

Comments
 (0)