You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/partner-grit-iam.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ ms.subservice: B2C
16
16
17
17
# Tutorial: Configure the Grit IAM B2B2C solution with Azure Active Directory B2C
18
18
19
-
In this tutorial, you learn how to integrate Azure Active Directory B2C (Azure AD B2C) authentication with a [Grit IAM B2B2C](https://www.gritiam.com/b2b2c) solution. You can use the solution to provide secure, reliable, self-serviceable, and user-friendly identity and access management to your customers. Shared profile data such as first name, last name, home address, and email used in web and mobile applications are stored in a centralized manner with consideration to compliance and regulatory needs.
19
+
In this tutorial, you learn how to integrate Azure Active Directory B2C (Azure AD B2C) authentication with a [Grit IAM B2B2C](https://www.gritiam.com/b2b2c.html) solution. You can use the solution to provide secure, reliable, self-serviceable, and user-friendly identity and access management to your customers. Shared profile data such as first name, last name, home address, and email used in web and mobile applications are stored in a centralized manner with consideration to compliance and regulatory needs.
20
20
21
21
22
22
Use Grit's B2BB2C solution for:
@@ -28,7 +28,7 @@ Use Grit's B2BB2C solution for:
28
28
29
29
To get started, ensure the following prerequisites are met:
30
30
31
-
- A Grit IAM account. You can go to [Grit IAM B2B2C solution](https://www.gritiam.com/b2b2c) to get a demo.
31
+
- A Grit IAM account. You can go to [Grit IAM B2B2C solution](https://www.gritiam.com/b2b2c.html) to get a demo.
32
32
- A Microsoft Entra subscription. If you don't have one, you can create a [free Azure account](https://azure.microsoft.com/free/).
33
33
- An Azure AD B2C tenant linked to the Azure subscription. You can learn more at [Tutorial: Create an Azure Active Directory B2C tenant](tutorial-create-tenant.md).
Copy file name to clipboardExpand all lines: articles/ai-services/speech-service/includes/how-to/compressed-audio-input/gstreamer-android.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -73,7 +73,7 @@ APP_PLATFORM = android-21
73
73
APP_BUILD_SCRIPT = Android.mk
74
74
```
75
75
76
-
You can build `libgstreamer_android.so` by using the following command on Ubuntu 18.04 or 20.04. The following command lines have been tested for [GStreamer Android version 1.14.4](https://gstreamer.freedesktop.org/download/) with [Android NDK b16b.](https://dl.google.com/android/repository/android-ndk-r16b-linux-x86_64.zip)
76
+
You can build `libgstreamer_android.so` by using the following command on Ubuntu 18.04 or 20.04. The following command lines have been tested for [GStreamer Android version 1.14.4] with [Android NDK b16b.](https://dl.google.com/android/repository/android-ndk-r16b-linux-x86_64.zip)
77
77
78
78
```sh
79
79
# Assuming wget and unzip are already installed on the system
Copy file name to clipboardExpand all lines: articles/api-management/compute-infrastructure.md
+2-4Lines changed: 2 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn about the compute platform used to host your API Management s
4
4
author: dlepow
5
5
ms.service: api-management
6
6
ms.topic: conceptual
7
-
ms.date: 12/19/2023
7
+
ms.date: 03/26/2024
8
8
ms.author: danlep
9
9
ms.custom:
10
10
---
@@ -30,9 +30,7 @@ The following table summarizes the compute platforms currently used in the **Con
30
30
<sup>1</sup> Newly created instances in these tiers and some existing instances in Developer and Premium tiers configured with virtual networks or availability zones.
31
31
32
32
> [!NOTE]
33
-
> Currently, the `stv2` platform isn't available in the following Azure regions: China East, China East 2, China North, China North 2.
34
-
>
35
-
> Also, as Qatar Central is a recently established Azure region, only the `stv2` platform is supported for API Management services deployed in this region.
33
+
> In Qatar Central, only the `stv2` platform is supported for API Management services deployed in this region.
36
34
37
35
## How do I know which platform hosts my API Management instance?
Copy file name to clipboardExpand all lines: articles/automation/update-management/overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,7 +46,7 @@ The following table summarizes the supported connected sources with Update Manag
46
46
| Linux |Yes |Update Management collects information about system updates from Linux machines with the Log Analytics agent and installation of required updates on supported distributions.<br> Machines need to report to a local or remote repository. |
47
47
| Operations Manager management group |Yes |Update Management collects information about software updates from agents in a connected management group.<br/><br/>A direct connection from the Operations Manager agent to Azure Monitor logs isn't required. Log data is forwarded from the management group to the Log Analytics workspace. |
48
48
49
-
The machines assigned to Update Management report how up to date they are based on what source they are configured to synchronize with. Windows machines need to be configured to report to either [Windows Server Update Services](/windows-server/administration/windows-server-update-services/get-started/windows-server-update-services-wsus) or [Microsoft Update](https://support.microsoft.com/windows/update-windows-3c5ae7fc-9fb6-9af1-1984-b5e0412c556a), and Linux machines need to be configured to report to a local or public repository. You can also use Update Management with Microsoft Configuration Manager, and to learn more see [Integrate Update Management with Windows Configuration Manager](mecmintegration.md).
49
+
The machines assigned to Update Management report how up to date they are based on what source they are configured to synchronize with. Windows machines need to be configured to report to either [Windows Server Update Services](/windows-server/administration/windows-server-update-services/get-started/windows-server-update-services-wsus) or [Microsoft Update](https://www.catalog.update.microsoft.com/), and Linux machines need to be configured to report to a local or public repository. You can also use Update Management with Microsoft Configuration Manager, and to learn more see [Integrate Update Management with Windows Configuration Manager](mecmintegration.md).
50
50
51
51
If the Windows Update Agent (WUA) on the Windows machine is configured to report to WSUS, depending on when WSUS last synchronized with Microsoft Update, the results might differ from what Microsoft Update shows. This behavior is the same for Linux machines that are configured to report to a local repo instead of a public repo. On a Windows machine, the compliance scan is run every 12 hours by default. For a Linux machine, the compliance scan is performed every hour by default. If the Log Analytics agent is restarted, a compliance scan is started within 15 minutes. When a machine completes a scan for update compliance, the agent forwards the information in bulk to Azure Monitor Logs.
To keep your Azure Arc resource bridge deployment online and operational, you might need to perform maintenance operations such as updating credentials or monitoring upgrades.
10
+
To keep your Azure Arc resource bridge deployment online and operational, you need to perform maintenance operations such as updating credentials, monitoring upgrades and ensuring the appliance VM is online.
11
11
12
-
To maintain the on-premises appliance VM, the [appliance configuration files generated during deployment](deploy-cli.md#az-arcappliance-createconfig) need to be saved in a secure location and made available on the management machine. The management machine used to perform maintenance operations must meet all of [the Arc resource bridge requirements](system-requirements.md).
12
+
## Prerequisites
13
13
14
-
The following sections describe some of the most common maintenance tasks for Arc resource bridge.
14
+
To maintain the on-premises appliance VM, the [appliance configuration files generated during deployment](deploy-cli.md#az-arcappliance-createconfig) need to be saved in a secure location and made available on the management machine.
15
+
16
+
The management machine used to perform maintenance operations must meet all of [the Arc resource bridge requirements](system-requirements.md).
17
+
18
+
The following sections describe the maintenance tasks for Arc resource bridge.
15
19
16
20
## Update credentials in the appliance VM
17
21
18
-
Arc resource bridge consists of an on-premises appliance VM. The appliance VM [stores credentials](system-requirements.md#user-account-and-credentials) (for example, a user account for VMware vCenter) used to access the control center of the on-premises infrastructure to view and manage on-premises resources.
22
+
Arc resource bridge consists of an on-premises appliance VM. The appliance VM [stores credentials](system-requirements.md#user-account-and-credentials) (for example, a user account for VMware vCenter) used to access the control center of the on-premises infrastructure to view and manage on-premises resources. The credentials used by Arc resource bridge are the same ones provided during deployment of the resource bridge. This allows the resource bridge visibility to on-premises resources for guest management in Azure.
19
23
20
-
The credentials used by Arc resource bridge are the same ones provided during deployment of the bridge. This allows the bridge visibility to on-premises resources for guest management in Azure.
24
+
If the credentials change, the credentials stored in the Arc resource bridge need to be updated with the [`update-infracredentials` command](/cli/azure/arcappliance/update-infracredentials). This command must be run from the management machine, and it requires a [kubeconfig file](system-requirements.md#kubeconfig).
21
25
22
-
If the credentials change, the credentials stored in the Arc resource bridge need to be updated with the [`update-infracredentials` command](/cli/azure/arcappliance/update-infracredentials). This command must be run from the management machine, and it requires a [kubeconfig file](system-requirements.md#kubeconfig).
26
+
Reference: [Arc-enabled VMware - Update the credentials stored in Arc resource bridge](../vmware-vsphere/administer-arc-vmware.md#updating-the-vsphere-account-credentials-using-a-new-password-or-a-new-vsphere-account-after-onboarding)
Copy file name to clipboardExpand all lines: articles/azure-arc/resource-bridge/system-requirements.md
+22-24Lines changed: 22 additions & 24 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,17 +39,19 @@ These minimum requirements enable most scenarios. However, a partner product may
39
39
40
40
## IP address prefix (subnet) requirements
41
41
42
-
The IP address prefix (subnet) where Arc resource bridge will be deployed requires a minimum prefix of /29. The IP address prefix must have enough available IP addresses for the gateway IP, control plane IP, appliance VM IP, and reserved appliance VM IP. Please work with your network engineer to ensure that there is an available subnet with the required available IP addresses and IP address prefix for Arc resource bridge.
42
+
The IP address prefix (subnet) where Arc resource bridge will be deployed requires a minimum prefix of /29. The IP address prefix must have enough available IP addresses for the gateway IP, control plane IP, appliance VM IP, and reserved appliance VM IP. Arc resource bridge only uses the IP addresses assigned to the IP pool range (Start IP, End IP) and the Control Plane IP. We recommend that the End IP immediately follow the Start IP. Ex: Start IP =192.168.0.2, End IP = 192.168.0.3. Please work with your network engineer to ensure that there is an available subnet with the required available IP addresses and IP address prefix for Arc resource bridge.
43
43
44
-
The IP address prefix is the subnet's IP address range for the virtual network and subnet mask (IP Mask) in CIDR notation, for example `192.168.7.1/24`. You provide the IP address prefix (in CIDR notation) during the creation of the configuration files for Arc resource bridge.
44
+
The IP address prefix is the subnet's IP address range for the virtual network and subnet mask (IP Mask) in CIDR notation, for example `192.168.7.1/29`. You provide the IP address prefix (in CIDR notation) during the creation of the configuration files for Arc resource bridge.
45
45
46
46
Consult your network engineer to obtain the IP address prefix in CIDR notation. An IP Subnet CIDR calculator may be used to obtain this value.
47
47
48
48
## Static IP configuration
49
49
50
50
If deploying Arc resource bridge to a production environment, static configuration must be used when deploying Arc resource bridge. Static IP configuration is used to assign three static IPs (that are in the same subnet) to the Arc resource bridge control plane, appliance VM, and reserved appliance VM.
51
51
52
-
DHCP is only supported in a test environment for testing purposes only for VM management on Azure Stack HCI, and it should not be used in a production environment. DHCP isn't supported on any other Arc-enabled private cloud, including Arc-enabled VMware, Arc for AVS, or Arc-enabled SCVMM. If using DHCP, you must reserve the IP addresses used by the control plane and appliance VM. In addition, these IPs must be outside of the assignable DHCP range of IPs. Ex: The control plane IP should be treated as a reserved/static IP that no other machine on the network will use or receive from DHCP. If the control plane IP or appliance VM IP changes (ex: due to an outage, this impacts the resource bridge availability and functionality.
52
+
DHCP is only supported in a test environment for testing purposes only for VM management on Azure Stack HCI. It should not be used in a production environment. DHCP isn't supported on any other Arc-enabled private cloud, including Arc-enabled VMware, Arc for AVS, or Arc-enabled SCVMM.
53
+
54
+
If using DHCP, you must reserve the IP addresses used by the control plane and appliance VM. In addition, these IPs must be outside of the assignable DHCP range of IPs. Ex: The control plane IP should be treated as a reserved/static IP that no other machine on the network will use or receive from DHCP. If the control plane IP or appliance VM IP changes, this impacts the resource bridge availability and functionality.
53
55
54
56
## Management machine requirements
55
57
@@ -58,10 +60,14 @@ The machine used to run the commands to deploy and maintain Arc resource bridge
- Open communication to Control Plane IP (`controlplaneendpoint` parameter in `createconfig` command)
62
-
- Open communication to Appliance VM IP
63
-
- Open communication to the reserved Appliance VM IP
64
-
- if applicable, communication over port 443 to the private cloud management console (ex: VMware vCenter host machine)
63
+
- Open communication to Control Plane IP
64
+
65
+
- Communication to Appliance VM IP (SSH TCP port 22, Kubernetes API port 6443)
66
+
67
+
- Communication to the reserved Appliance VM IP ((SSH TCP port 22, Kubernetes API port 6443)
68
+
69
+
- communication over port 443 (if applicable) to the private cloud management console (ex: VMware vCenter host machine)
70
+
65
71
- Internal and external DNS resolution. The DNS server must resolve internal names, such as the vCenter endpoint for vSphere or cloud agent service endpoint for Azure Stack HCI. The DNS server must also be able to resolve external addresses that are [required URLs](network-requirements.md#outbound-connectivity) for deployment.
66
72
- Internet access
67
73
@@ -77,11 +83,8 @@ Appliance VM IP address requirements:
77
83
78
84
- Open communication with the management machine and management endpoint (such as vCenter for VMware or MOC cloud agent service endpoint for Azure Stack HCI).
79
85
- Internet connectivity to [required URLs](network-requirements.md#outbound-connectivity) enabled in proxy/firewall.
80
-
- Static IP assigned (strongly recommended)
86
+
- Static IP assigned and within the IP address prefix.
81
87
82
-
- If using DHCP, then the address must be reserved and outside of the assignable DHCP range of IPs. No other machine on the network will use or receive this IP from DHCP. DHCP is generally not recommended because a change in IP address (ex: due to an outage) impacts the resource bridge availability.
83
-
84
-
- Must be from within the IP address prefix.
85
88
- Internal and external DNS resolution.
86
89
- If using a proxy, the proxy server has to be reachable from this IP and all IPs within the VM IP pool.
87
90
@@ -99,15 +102,11 @@ Reserved appliance VM IP requirements:
99
102
100
103
- Internet connectivity to [required URLs](network-requirements.md#outbound-connectivity) enabled in proxy/firewall.
101
104
102
-
- Static IP assigned (strongly recommended)
103
-
104
-
- If using DHCP, then the address must be reserved and outside of the assignable DHCP range of IPs. No other machine on the network will use or receive this IP from DHCP. DHCP is generally not recommended because a change in IP address (ex: due to an outage) impacts the resource bridge availability.
105
-
106
-
- Must be from within the IP address prefix.
105
+
- Static IP assigned and within the IP address prefix.
107
106
108
-
- Internal and external DNS resolution.
107
+
- Internal and external DNS resolution.
109
108
110
-
- If using a proxy, the proxy server has to be reachable from this IP and all IPs within the VM IP pool.
109
+
- If using a proxy, the proxy server has to be reachable from this IP and all IPs within the VM IP pool.
111
110
112
111
## Control plane IP requirements
113
112
@@ -117,8 +116,7 @@ Control plane IP requirements:
117
116
118
117
- Open communication with the management machine.
119
118
120
-
- Static IP address assigned; the IP address should be outside the DHCP range but still available on the network segment. This IP address can't be assigned to any other machine on the network.
121
-
- If using DHCP, the control plane IP should be a single reserved IP that is outside of the assignable DHCP range of IPs. No other machine on the network will use or receive this IP from DHCP. DHCP is generally not recommended because a change in IP address (ex: due to an outage) impacts the resource bridge availability.
119
+
- Static IP address assigned and within the IP address prefix.
122
120
123
121
- If using a proxy, the proxy server has to be reachable from IPs within the IP address prefix, including the reserved appliance VM IP.
124
122
@@ -128,23 +126,23 @@ DNS server(s) must have internal and external endpoint resolution. The appliance
128
126
129
127
## Gateway
130
128
131
-
The gateway IP should be an IP from within the subnet designated in the IP address prefix.
129
+
The gateway IP is the IP of the gateway for the network where Arc resource bridge is deployed. The gateway IP should be an IP from within the subnet designated in the IP address prefix.
132
130
133
131
## Example minimum configuration for static IP deployment
134
132
135
-
The following example shows valid configuration values that can be passed during configuration file creation for Arc resource bridge. It is strongly recommended to use static IP addresses when deploying Arc resource bridge.
133
+
The following example shows valid configuration values that can be passed during configuration file creation for Arc resource bridge.
136
134
137
135
Notice that the IP addresses for the gateway, control plane, appliance VM and DNS server (for internal resolution) are within the IP address prefix. This key detail helps ensure successful deployment of the appliance VM.
138
136
139
137
IP Address Prefix (CIDR format): 192.168.0.0/29
140
138
141
-
Gateway (IP format): 192.168.0.1
139
+
Gateway IP: 192.168.0.1
142
140
143
141
VM IP Pool Start (IP format): 192.168.0.2
144
142
145
143
VM IP Pool End (IP format): 192.168.0.3
146
144
147
-
Control Plane IP (IP format): 192.168.0.4
145
+
Control Plane IP: 192.168.0.4
148
146
149
147
DNS servers (IP list format): 192.168.0.1, 10.0.0.5, 10.0.0.6
0 commit comments