You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/float-tutorial.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,7 +34,7 @@ To learn more about SaaS app integration with Azure AD, see [What is application
34
34
To get started, you need the following items:
35
35
36
36
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
37
-
* Float single sign-on (SSO) enabled subscription.
37
+
*A Float subscription. If you don't have a subscription, you can get a [free account](https://app.float.com/join?).
38
38
39
39
## Scenario description
40
40
@@ -89,7 +89,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
89
89
In the **Sign-on URL** text box, type a URL in the pattern `https://<hostname>.float.com/login`.
90
90
91
91
> [!NOTE]
92
-
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign-on URL. Contact [Float Client support team](mailto:[email protected])to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
92
+
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign-on URL. Replace <hostname> with your Float hostname. Contact [Float Client support team](mailto:[email protected])if you are unsure. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
93
93
94
94
1. Float application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
95
95
@@ -140,11 +140,11 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
140
140
141
141
## Configure Float SSO
142
142
143
-
To configure single sign-on on **Float** side, you need to send the downloaded **Certificate (Base64)** and appropriate copied URLs from Azure portal to [Float support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
143
+
To configure single sign-on on **Float** side, visit the Float Team Settings section and select Configure from the Authentication module. Paste the Azure AD Login URL in the SAML 2.0 Endpoint URL field, paste the Azure AD Indentifier in the Identity Provider Issuer URL field, paste the full text from the downloaded **Certificate (Base64)** in the X.509 Certificate field, and Save.
144
144
145
145
### Create Float test user
146
146
147
-
In this section, you create a user called Britta Simon in Float. Work with [Float support team](mailto:[email protected]) to add the users in the Float platform. Users must be created and activated before you use single sign-on.
147
+
In this section, create a user called Britta Simon in Float. Add the user from the People section or Team Settings Guest section, and grant them an access right. Users must be created and accept the invitation before you use single sign-on.
Copy file name to clipboardExpand all lines: articles/active-directory/users-groups-roles/my-staff-configure.md
+21-9Lines changed: 21 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.topic: article
9
9
ms.service: active-directory
10
10
ms.subservice: user-help
11
11
ms.workload: identity
12
-
ms.date: 04/23/2020
12
+
ms.date: 05/01/2020
13
13
ms.author: curtand
14
14
ms.reviewer: sahenry
15
15
ms.custom: oldportal;it-pro;
@@ -21,10 +21,29 @@ My Staff enables you to delegate to a figure of authority, such as a store manag
21
21
22
22
Before you configure My Staff for your organization, we recommend that you review this documentation as well as the [user documentation](../user-help/my-staff-team-manager.md) to ensure you understand the functionality and impact of this feature on your users. You can leverage the user documentation to train and prepare your users for the new experience and help to ensure a successful rollout.
23
23
24
+
SMS-based authentication for users is a public preview feature of Azure Active Directory. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/)
25
+
24
26
## How My Staff works
25
27
26
28
My Staff is based on administrative units (AUs), which are a container of resources which can be used to restrict the scope of a role assignment's administrative control. In My Staff, AUs are used to define a subset of an organization's users such as a store or department. Then, for example, a team manager could be assigned to a role whose scope is one or more AUs. In the example below, the user has been granted the Authentication Administrative role, and the three AUs are the scope of the role. For more information about administrative units, see [Administrative units management in Azure Active Directory](directory-administrative-units.md).
27
29
30
+
## Before you begin
31
+
32
+
To complete this article, you need the following resources and privileges:
33
+
34
+
* An active Azure subscription.
35
+
36
+
* If you don't have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
37
+
* An Azure Active Directory tenant associated with your subscription.
38
+
39
+
* If needed, [create an Azure Active Directory tenant](../fundamentals/sign-up-organization.md) or [associate an Azure subscription with your account](../fundamentals/active-directory-how-subscriptions-associated-directory.md).
40
+
* You need *Global administrator* privileges in your Azure AD tenant to enable SMS-based authentication.
41
+
* Each user that's enabled in the text message authentication method policy must be licensed, even if they don't use it. Each enabled user must have one of the following Azure AD or Microsoft 365 licenses:
42
+
43
+
*[Azure AD Premium P1 or P2](https://azure.microsoft.com/pricing/details/active-directory/)
44
+
*[Microsoft 365 (M365) F1 or F3](https://www.microsoft.com/licensing/news/m365-firstline-workers)
45
+
*[Enterprise Mobility + Security (EMS) E3 or E5](https://www.microsoft.com/microsoft-365/enterprise-mobility-security/compare-plans-and-pricing) or [Microsoft 365 (M365) E3 or E5](https://www.microsoft.com/microsoft-365/compare-microsoft-365-enterprise-plans)
46
+
28
47
## How to enable My Staff
29
48
30
49
Once you have configured AUs, you can apply this scope to your users who access My Staff. Only users who are assigned an administrative role can access My Staff. To enable My Staff, complete the following steps:
@@ -42,7 +61,7 @@ You can protect the My Staff portal using Azure AD Conditional Access policy. Us
42
61
43
62
We strongly recommend that you protect My Staff using [Azure AD Conditional Access policies](https://docs.microsoft.com/azure/active-directory/conditional-access/). To apply a Conditional Access policy to My Staff, you must manually create the My Staff service principal using PowerShell.
44
63
45
-
### Apply a Conditional Access policy to My Staff
64
+
### Apply a Conditional Access policy to My Staff
46
65
47
66
1. Install the [Microsoft Graph Beta PowerShell cmdlets](https://github.com/microsoftgraph/msgraph-sdk-powershell/blob/dev/samples/0-InstallModule.ps1).
48
67
1. Run the following commands:
@@ -58,13 +77,6 @@ We strongly recommend that you protect My Staff using [Azure AD Conditional Acce
58
77
59
78
When a user goes to My Staff, they are shown the names of the [administrative units](directory-administrative-units.md) over which they have administrative permissions. In the [My Staff user documentation](../user-help/my-staff-team-manager.md), we use the term "location" to refer to administrative units. If an administrator's permissions do not have an AU scope, the permissions apply across the organization. After My Staff has been enabled, the users who are enabled and have been assigned an administrative role can access it through [https://mystaff.microsoft.com](https://mystaff.microsoft.com). They can select an AU to view the users in that AU, and select a user to open their profile.
60
79
61
-
## Licenses
62
-
63
-
Each user who's enabled in My Staff must be licensed, even if they don't use the My Staff portal. Each enabled user must have one of the following Azure AD or Microsoft 365 licenses:
64
-
65
-
- Azure AD Premium P1 or P2
66
-
- Microsoft 365 F1 or F3
67
-
68
80
## Reset a user's password
69
81
70
82
The following roles have permission to reset a user's password:
Copy file name to clipboardExpand all lines: articles/aks/egress-outboundtype.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -71,7 +71,7 @@ Below is a network topology deployed in AKS clusters by default, which use an `o
71
71
72
72
If `userDefinedRouting` is set, AKS will not automatically configure egress paths. The following is expected to be done by **the user**.
73
73
74
-
Cluster must be deployed into an existing virtual network with a subnet that has been configured. A valid user-defined route (UDR) must exist on the subnet with outbound connectivity.
74
+
The AKS cluster must be deployed into an existing virtual network with a subnet that has been configured. When using standard load balancer (SLB) architecture you must establish explicit egress. This requires sending egress requests to an appliance such as a firewall, gateway, on-prem or to allow the egress to be done by a public IP assigned to the standard load balancer or a given node.
75
75
76
76
The AKS resource provider will deploy a standard load balancer (SLB). The load balancer is not configured with any rules and [does not incur a charge until a rule is placed](https://azure.microsoft.com/pricing/details/load-balancer/). AKS will **not** automatically provision a public IP address for the SLB frontend. AKS will **not** automatically configure the load balancer backend pool.
Copy file name to clipboardExpand all lines: articles/aks/use-system-pools.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Use system node pools in Azure Kubernetes Service (AKS)
3
3
description: Learn how to create and manage system node pools in Azure Kubernetes Service (AKS)
4
4
services: container-service
5
5
ms.topic: article
6
-
ms.date: 04/06/2020
6
+
ms.date: 04/28/2020
7
7
8
8
---
9
9
@@ -25,6 +25,8 @@ The following limitations apply when you create and manage AKS clusters that sup
25
25
* See [Quotas, virtual machine size restrictions, and region availability in Azure Kubernetes Service (AKS)][quotas-skus-regions].
26
26
* The AKS cluster must be built with virtual machine scale sets as the VM type.
27
27
* The name of a node pool may only contain lowercase alphanumeric characters and must begin with a lowercase letter. For Linux node pools, the length must be between 1 and 12 characters. For Windows node pools, the length must be between 1 and 6 characters.
28
+
* An API version of 2020-03-01 or greater must be used to set a node pool mode.
29
+
* The mode of a node pool is a required property and must be explicitly set when using ARM templates or direct API calls.
Copy file name to clipboardExpand all lines: articles/azure-monitor/app/custom-operations-tracking.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,7 +34,7 @@ Let's see how such operations could be tracked.
34
34
On a high level, the task is to create `RequestTelemetry` and set known properties. After the operation is finished, you track the telemetry. The following example demonstrates this task.
35
35
36
36
### HTTP request in Owin self-hosted app
37
-
In this example, trace context is propagated according to the [HTTP Protocol for Correlation](https://github.com/dotnet/corefx/blob/master/src/System.Diagnostics.DiagnosticSource/src/HttpCorrelationProtocol.md). You should expect to receive headers that are described there.
37
+
In this example, trace context is propagated according to the [HTTP Protocol for Correlation](https://github.com/dotnet/runtime/blob/master/src/libraries/System.Diagnostics.DiagnosticSource/src/HttpCorrelationProtocol.md). You should expect to receive headers that are described there.
@@ -113,7 +113,7 @@ public class ApplicationInsightsMiddleware : OwinMiddleware
113
113
The HTTP Protocol for Correlation also declares the `Correlation-Context` header. However, it's omitted here for simplicity.
114
114
115
115
## Queue instrumentation
116
-
While there are [W3C Trace Context](https://www.w3.org/TR/trace-context/) and [HTTP Protocol for Correlation](https://github.com/dotnet/corefx/blob/master/src/System.Diagnostics.DiagnosticSource/src/HttpCorrelationProtocol.md) to pass correlation details with HTTP request, every queue protocol has to define how the same details are passed along the queue message. Some queue protocols (such as AMQP) allow passing additional metadata and some others (such Azure Storage Queue) require the context to be encoded into the message payload.
116
+
While there are [W3C Trace Context](https://www.w3.org/TR/trace-context/) and [HTTP Protocol for Correlation](https://github.com/dotnet/runtime/blob/master/src/libraries/System.Diagnostics.DiagnosticSource/src/HttpCorrelationProtocol.md) to pass correlation details with HTTP request, every queue protocol has to define how the same details are passed along the queue message. Some queue protocols (such as AMQP) allow passing additional metadata and some others (such Azure Storage Queue) require the context to be encoded into the message payload.
117
117
118
118
> [!NOTE]
119
119
> ***Cross-component tracing is not supported for queues yet** With HTTP, if your producer and consumer send telemetry to different Application Insights resources, Transaction Diagnostics Experience and Application Map show transactions and map end-to-end. In case of queues this is not supported yet.
@@ -343,7 +343,7 @@ When you instrument message deletion, make sure you set the operation (correlati
343
343
344
344
### Dependency Types
345
345
346
-
Application Insights uses dependency type to cusomize UI experiences. For queues it recognizes following types of `DependencyTelemetry` that improve [Transaction diagnostics experience](/azure/azure-monitor/app/transaction-diagnostics):
346
+
Application Insights uses dependency type to customize UI experiences. For queues it recognizes following types of `DependencyTelemetry` that improve [Transaction diagnostics experience](/azure/azure-monitor/app/transaction-diagnostics):
347
347
-`Azure queue` for Azure Storage Queues
348
348
-`Azure Event Hubs` for Azure Event Hubs
349
349
-`Azure Service Bus` for Azure Service Bus
@@ -479,4 +479,4 @@ Each Application Insights operation (request or dependency) involves `Activity`
479
479
- See the [data model](../../azure-monitor/app/data-model.md) for Application Insights types and data model.
480
480
- Report custom [events and metrics](../../azure-monitor/app/api-custom-events-metrics.md) to Application Insights.
481
481
- Check out standard [configuration](configuration-with-applicationinsights-config.md#telemetry-initializers-aspnet) for context properties collection.
482
-
- Check the [System.Diagnostics.Activity User Guide](https://github.com/dotnet/corefx/blob/master/src/System.Diagnostics.DiagnosticSource/src/ActivityUserGuide.md) to see how we correlate telemetry.
482
+
- Check the [System.Diagnostics.Activity User Guide](https://github.com/dotnet/runtime/blob/master/src/libraries/System.Diagnostics.DiagnosticSource/src/ActivityUserGuide.md) to see how we correlate telemetry.
0 commit comments