Skip to content

Commit d3d4be4

Browse files
authored
Merge pull request #216568 from MicrosoftDocs/main
10/31 AM Publish
2 parents 454066a + 4e15fd1 commit d3d4be4

File tree

279 files changed

+4350
-5883
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

279 files changed

+4350
-5883
lines changed

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -744,6 +744,16 @@
744744
"source_path_from_root": "/articles/defender-for-cloud/detect-credential-leaks.md",
745745
"redirect_url": "/azure/defender-for-cloud/detect-exposed-secrets",
746746
"redirect_document_id": true
747+
},
748+
{
749+
"source_path_from_root": "/articles/defender-for-cloud/defender-for-containers-va-ecr.md",
750+
"redirect_url": "/azure/defender-for-cloud/defender-for-containers-vulnerability-assessment-elastic",
751+
"redirect_document_id": true
752+
},
753+
{
754+
"source_path_from_root": "/articles/defender-for-cloud/defender-for-containers-va-acr.md",
755+
"redirect_url": "/azure/defender-for-cloud/defender-for-containers-vulnerability-assessment-azure",
756+
"redirect_document_id": true
747757
}
748758

749759
]

.openpublishing.redirection.json

Lines changed: 95 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10183,6 +10183,101 @@
1018310183
"redirect_url": "https://azure.microsoft.com/solutions/blockchain",
1018410184
"redirect_document_id": false
1018510185
},
10186+
{
10187+
"source_path_from_root": "/articles/blockchain/workbench/architecture.md",
10188+
"redirect_url": "https://azure.microsoft.com/solutions/blockchain",
10189+
"redirect_document_id": false
10190+
},
10191+
{
10192+
"source_path_from_root": "/articles/blockchain/workbench/configuration.md",
10193+
"redirect_url": "https://azure.microsoft.com/solutions/blockchain",
10194+
"redirect_document_id": false
10195+
},
10196+
{
10197+
"source_path_from_root": "/articles/blockchain/workbench/create-app.md",
10198+
"redirect_url": "https://azure.microsoft.com/solutions/blockchain",
10199+
"redirect_document_id": false
10200+
},
10201+
{
10202+
"source_path_from_root": "/articles/blockchain/workbench/data-excel.md",
10203+
"redirect_url": "https://azure.microsoft.com/solutions/blockchain",
10204+
"redirect_document_id": false
10205+
},
10206+
{
10207+
"source_path_from_root": "/articles/blockchain/workbench/data-powerbi.md",
10208+
"redirect_url": "https://azure.microsoft.com/solutions/blockchain",
10209+
"redirect_document_id": false
10210+
},
10211+
{
10212+
"source_path_from_root": "/articles/blockchain/workbench/data-sql-management-studio.md",
10213+
"redirect_url": "https://azure.microsoft.com/solutions/blockchain",
10214+
"redirect_document_id": false
10215+
},
10216+
{
10217+
"source_path_from_root": "/articles/blockchain/workbench/database-firewall.md",
10218+
"redirect_url": "https://azure.microsoft.com/solutions/blockchain",
10219+
"redirect_document_id": false
10220+
},
10221+
{
10222+
"source_path_from_root": "/articles/blockchain/workbench/database-views.md",
10223+
"redirect_url": "https://azure.microsoft.com/solutions/blockchain",
10224+
"redirect_document_id": false
10225+
},
10226+
{
10227+
"source_path_from_root": "/articles/blockchain/workbench/deploy.md",
10228+
"redirect_url": "https://azure.microsoft.com/solutions/blockchain",
10229+
"redirect_document_id": false
10230+
},
10231+
{
10232+
"source_path_from_root": "/articles/blockchain/workbench/getdb-details.md",
10233+
"redirect_url": "https://azure.microsoft.com/solutions/blockchain",
10234+
"redirect_document_id": false
10235+
},
10236+
{
10237+
"source_path_from_root": "/articles/blockchain/workbench/index.yml",
10238+
"redirect_url": "https://azure.microsoft.com/solutions/blockchain",
10239+
"redirect_document_id": false
10240+
},
10241+
{
10242+
"source_path_from_root": "/articles/blockchain/workbench/integration-patterns.md",
10243+
"redirect_url": "https://azure.microsoft.com/solutions/blockchain",
10244+
"redirect_document_id": false
10245+
},
10246+
{
10247+
"source_path_from_root": "/articles/blockchain/workbench/manage-users.md",
10248+
"redirect_url": "https://azure.microsoft.com/solutions/blockchain",
10249+
"redirect_document_id": false
10250+
},
10251+
{
10252+
"source_path_from_root": "/articles/blockchain/workbench/messages-overview.md",
10253+
"redirect_url": "https://azure.microsoft.com/solutions/blockchain",
10254+
"redirect_document_id": false
10255+
},
10256+
{
10257+
"source_path_from_root": "/articles/blockchain/workbench/overview.md",
10258+
"redirect_url": "https://azure.microsoft.com/solutions/blockchain",
10259+
"redirect_document_id": false
10260+
},
10261+
{
10262+
"source_path_from_root": "/articles/blockchain/workbench/troubleshooting.md",
10263+
"redirect_url": "https://azure.microsoft.com/solutions/blockchain",
10264+
"redirect_document_id": false
10265+
},
10266+
{
10267+
"source_path_from_root": "/articles/blockchain/workbench/use-api.md",
10268+
"redirect_url": "https://azure.microsoft.com/solutions/blockchain",
10269+
"redirect_document_id": false
10270+
},
10271+
{
10272+
"source_path_from_root": "/articles/blockchain/workbench/use.md",
10273+
"redirect_url": "https://azure.microsoft.com/solutions/blockchain",
10274+
"redirect_document_id": false
10275+
},
10276+
{
10277+
"source_path_from_root": "/articles/blockchain/workbench/version-app.md",
10278+
"redirect_url": "https://azure.microsoft.com/solutions/blockchain",
10279+
"redirect_document_id": false
10280+
},
1018610281
{
1018710282
"source_path_from_root": "/articles/app-service/app-service-web-tutorial-content-delivery-network.md",
1018810283
"redirect_url": "/azure/cdn/cdn-add-to-web-app",

articles/active-directory-b2c/whats-new-docs.md

Lines changed: 17 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "What's new in Azure Active Directory business-to-customer (B2C)"
33
description: "New and updated documentation for the Azure Active Directory business-to-customer (B2C)."
4-
ms.date: 10/04/2022
4+
ms.date: 10/31/2022
55
ms.service: active-directory
66
ms.subservice: B2C
77
ms.topic: reference
@@ -15,6 +15,22 @@ manager: CelesteDG
1515

1616
Welcome to what's new in Azure Active Directory B2C documentation. This article lists new docs that have been added and those that have had significant updates in the last three months. To learn what's new with the B2C service, see [What's new in Azure Active Directory](../active-directory/fundamentals/whats-new.md) and [Azure AD B2C developer release notes](custom-policy-developer-notes.md)
1717

18+
19+
## October 2022
20+
21+
### New articles
22+
23+
- [Edit Azure Active Directory B2C Identity Experience Framework (IEF) XML with Grit Visual IEF Editor](partner-grit-editor.md)
24+
- [Register apps in Azure Active Directory B2C](register-apps.md)
25+
26+
### Updated articles
27+
28+
- [Set up sign-in for a specific Azure Active Directory organization in Azure Active Directory B2C](identity-provider-azure-ad-single-tenant.md)
29+
- [Set up a password reset flow in Azure Active Directory B2C](add-password-reset-policy.md)
30+
- [Azure Active Directory B2C documentation landing page](index.yml)
31+
- [Publish your Azure Active Directory B2C app to the Azure Active Directory app gallery](publish-app-to-azure-ad-app-gallery.md)
32+
- [JSON claims transformations](json-transformations.md)
33+
1834
## September
1935

2036
### New articles

articles/active-directory/authentication/howto-authentication-temporary-access-pass.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ To configure the Temporary Access Pass authentication method policy:
6363
|---|---|---|---|
6464
| Minimum lifetime | 1 hour | 10 – 43,200 Minutes (30 days) | Minimum number of minutes that the Temporary Access Pass is valid. |
6565
| Maximum lifetime | 8 hours | 10 – 43,200 Minutes (30 days) | Maximum number of minutes that the Temporary Access Pass is valid. |
66-
| Default lifetime | 1 hour | 10 – 43,200 Minutes (30 days) | Default values can be override by the individual passes, within the minimum and maximum lifetime configured by the policy. |
66+
| Default lifetime | 1 hour | 10 – 43,200 Minutes (30 days) | Default values can be overridden by the individual passes, within the minimum and maximum lifetime configured by the policy. |
6767
| One-time use | False | True / False | When the policy is set to false, passes in the tenant can be used either once or more than once during its validity (maximum lifetime). By enforcing one-time use in the Temporary Access Pass policy, all passes created in the tenant will be created as one-time use. |
6868
| Length | 8 | 8-48 characters | Defines the length of the passcode. |
6969

Loading
70.4 KB
Loading

articles/active-directory/develop/workload-identity-federation-create-trust-user-assigned-managed-identity.md

Lines changed: 24 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ zone_pivot_groups: identity-wif-mi-methods
1919

2020
# Configure a user-assigned managed identity to trust an external identity provider (preview)
2121

22-
This article describes how to manage a federated identity credential on a user-assigned managed identity in Azure Active Directory (Azure AD). The federated identity credential creates a trust relationship between a user-assigned managed identity and an external identity provider (IdP). Configuring a federated identity credential on a system-assigned managed identity is not supported.
22+
This article describes how to manage a federated identity credential on a user-assigned managed identity in Azure Active Directory (Azure AD). The federated identity credential creates a trust relationship between a user-assigned managed identity and an external identity provider (IdP). Configuring a federated identity credential on a system-assigned managed identity isn't supported.
2323

2424
After you configure your user-assigned managed identity to trust an external IdP, configure your external software workload to exchange a token from the external IdP for an access token from Microsoft identity platform. The external workload uses the access token to access Azure AD protected resources without needing to manage secrets (in supported scenarios). To learn more about the token exchange workflow, read about [workload identity federation](workload-identity-federation.md).
2525

@@ -50,13 +50,27 @@ In the **Federated credential scenario** dropdown box, select your scenario.
5050

5151
### GitHub Actions deploying Azure resources
5252

53-
For **Entity type**, select **Environment**, **Branch**, **Pull request**, or **Tag** and specify the value. The values must exactly match the configuration in the [GitHub workflow](https://docs.github.com/actions/using-workflows/workflow-syntax-for-github-actions#on). For more info, read the [examples](#entity-type-examples).
53+
To add a federated identity for GitHub actions, follow these steps:
5454

55-
Add a **Name** for the federated credential.
55+
1. For **Entity type**, select **Environment**, **Branch**, **Pull request**, or **Tag** and specify the value. The values must exactly match the configuration in the [GitHub workflow](https://docs.github.com/actions/using-workflows/workflow-syntax-for-github-actions#on). For more info, read the [examples](#entity-type-examples).
5656

57-
The **Issuer**, **Audiences**, and **Subject identifier** fields autopopulate based on the values you entered.
57+
1. Add a **Name** for the federated credential.
5858

59-
Click **Add** to configure the federated credential.
59+
1. The **Issuer**, **Audiences**, and **Subject identifier** fields autopopulate based on the values you entered.
60+
61+
1. Select **Add** to configure the federated credential.
62+
63+
Use the following values from your Azure AD Managed Identity for your GitHub workflow:
64+
65+
- `AZURE_CLIENT_ID` the managed identity **Client ID**
66+
67+
- `AZURE_SUBSCRIPTION_ID` the **Subscription ID**.
68+
69+
The following screenshot demonstrates how to copy the managed identity ID and subscription ID.
70+
71+
[![Screenshot that demonstrates how to copy the managed identity ID and subscription ID from Azure portal.](./media/workload-identity-federation-create-trust-user-assigned-managed-identity/copy-managed-identity-id.png)](./media/workload-identity-federation-create-trust-user-assigned-managed-identity/copy-managed-identity-id.png#lightbox)
72+
73+
- `AZURE_TENANT_ID` the **Directory (tenant) ID**. Learn [how to find your Azure Active Directory tenant ID](../fundamentals/active-directory-how-to-find-tenant.md).
6074

6175
#### Entity type examples
6276

@@ -128,7 +142,7 @@ Fill in the **Cluster issuer URL**, **Namespace**, **Service account name**, and
128142
- **Namespace** is the service account namespace.
129143
- **Name** is the name of the federated credential, which can't be changed later.
130144
131-
Click **Add** to configure the federated credential.
145+
Select **Add** to configure the federated credential.
132146
133147
### Other
134148
@@ -140,7 +154,7 @@ Specify the following fields (using a software workload running in Google Cloud
140154
- **Subject identifier**: must match the `sub` claim in the token issued by the external identity provider. In this example using Google Cloud, *subject* is the Unique ID of the service account you plan to use.
141155
- **Issuer**: must match the `iss` claim in the token issued by the external identity provider. A URL that complies with the OIDC Discovery spec. Azure AD uses this issuer URL to fetch the keys that are necessary to validate the token. For Google Cloud, the *issuer* is "https://accounts.google.com".
142156

143-
Click **Add** to configure the federated credential.
157+
Select **Add** to configure the federated credential.
144158

145159
## List federated identity credentials on a user-assigned managed identity
146160

@@ -356,11 +370,11 @@ Federated identity credential and parent user assigned identity can be created o
356370

357371
All of the template parameters are mandatory.
358372

359-
There is a limit of 3-120 characters for a federated identity credential name length. It must be alphanumeric, dash, underscore. First symbol is alphanumeric only.
373+
There's a limit of 3-120 characters for a federated identity credential name length. It must be alphanumeric, dash, underscore. First symbol is alphanumeric only.
360374

361-
You must add exactly 1 audience to a federated identity credential. The audience is verified during token exchange. Use “api://AzureADTokenExchange” as the default value.
375+
You must add exactly one audience to a federated identity credential. The audience is verified during token exchange. Use “api://AzureADTokenExchange” as the default value.
362376

363-
List, Get, and Delete operations are not available with template. Refer to Azure CLI for these operations. By default, all child federated identity credentials are created in parallel, which triggers concurrency detection logic and causes the deployment to fail with a 409-conflict HTTP status code. To create them sequentially, specify a chain of dependencies using the *dependsOn* property.
377+
List, Get, and Delete operations aren't available with template. Refer to Azure CLI for these operations. By default, all child federated identity credentials are created in parallel, which triggers concurrency detection logic and causes the deployment to fail with a 409-conflict HTTP status code. To create them sequentially, specify a chain of dependencies using the *dependsOn* property.
364378

365379
Make sure that any kind of automation creates federated identity credentials under the same parent identity sequentially. Federated identity credentials under different managed identities can be created in parallel without any restrictions.
366380

articles/active-directory/develop/workload-identity-federation-create-trust.md

Lines changed: 26 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: how-to
1111
ms.workload: identity
12-
ms.date: 07/27/2022
12+
ms.date: 10/31/2022
1313
ms.author: ryanwi
1414
ms.custom: aaddev
1515
ms.reviewer: shkhalid, udayh, vakarand
@@ -43,21 +43,37 @@ Get the *subject* and *issuer* information for your external IdP and software wo
4343
## Configure a federated identity credential on an app
4444

4545
### GitHub Actions
46-
Find your app registration in the [App Registrations](https://aka.ms/appregistrations) experience of the Azure portal. Select **Certificates & secrets** in the left nav pane, select the **Federated credentials** tab, and select **Add credential**.
4746

48-
In the **Federated credential scenario** drop-down box, select **GitHub actions deploying Azure resources**.
47+
To add a federated identity for GitHub actions, follow these steps:
48+
49+
1. Find your app registration in the [App Registrations](https://aka.ms/appregistrations) experience of the Azure portal. Select **Certificates & secrets** in the left nav pane, select the **Federated credentials** tab, and select **Add credential**.
50+
51+
1. In the **Federated credential scenario** drop-down box, select **GitHub actions deploying Azure resources**.
52+
53+
1. Specify the **Organization** and **Repository** for your GitHub Actions workflow.
54+
55+
1. For **Entity type**, select **Environment**, **Branch**, **Pull request**, or **Tag** and specify the value. The values must exactly match the configuration in the [GitHub workflow](https://docs.github.com/actions/using-workflows/workflow-syntax-for-github-actions#on). Pattern matching isn't supported for branches and tags. Specify an environment if your on-push workflow runs against many branches or tags. For more info, read the [examples](#entity-type-examples).
56+
57+
1. Add a **Name** for the federated credential.
58+
59+
1. The **Issuer**, **Audiences**, and **Subject identifier** fields autopopulate based on the values you entered.
60+
61+
1. Select **Add** to configure the federated credential.
62+
63+
:::image type="content" source="media/workload-identity-federation-create-trust/add-credential.png" alt-text="Screenshot of the Add a credential window, showing sample values." :::
4964

50-
Specify the **Organization** and **Repository** for your GitHub Actions workflow.
5165

52-
For **Entity type**, select **Environment**, **Branch**, **Pull request**, or **Tag** and specify the value. The values must exactly match the configuration in the [GitHub workflow](https://docs.github.com/actions/using-workflows/workflow-syntax-for-github-actions#on). Pattern matching is not supported for branches and tags. Specify an environment if your on-push workflow runs against many branches or tags. For more info, read the [examples](#entity-type-examples).
66+
Use the following values from your Azure AD application registration for your GitHub workflow:
5367

54-
Add a **Name** for the federated credential.
68+
- `AZURE_CLIENT_ID` the **Application (client) ID**
5569

56-
The **Issuer**, **Audiences**, and **Subject identifier** fields autopopulate based on the values you entered.
70+
- `AZURE_TENANT_ID` the **Directory (tenant) ID**
71+
72+
The following screenshot demonstrates how to copy the application ID and tenant ID.
5773

58-
Click **Add** to configure the federated credential.
74+
![Screenshot that demonstrates how to copy the application ID and tenant ID from Microsoft Entra portal.](./media/workload-identity-federation-create-trust/copy-client-id.png)
5975

60-
:::image type="content" source="media/workload-identity-federation-create-trust/add-credential.png" alt-text="Screenshot of the Add a credential window, showing sample values." :::
76+
- `AZURE_SUBSCRIPTION_ID` your subscription ID. To get the subscription ID, open **Subscriptions** in Azure portal and find your subscription. Then, copy the **Subscription ID**.
6177

6278
#### Entity type examples
6379

@@ -173,7 +189,7 @@ To delete a federated identity credential, select the **Delete** icon for the cr
173189

174190
Run the [az ad app federated-credential create](/cli/azure/ad/app/federated-credential) command to create a new federated identity credential on your app.
175191

176-
The *id* parameter specifies the identifier URI, application ID, or object ID of the application. *parameters* specifies the parameters, in JSON format, for creating the federated identity credential.
192+
The `id` parameter specifies the identifier URI, application ID, or object ID of the application. The `parameters` parameter specifies the parameters, in JSON format, for creating the federated identity credential.
177193

178194
### GitHub Actions example
179195

articles/active-directory/fundamentals/multi-tenant-user-management-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ These terms are used throughout this content:
5858

5959
* **Home tenant**: The Azure AD tenant containing users requiring access to the resources in the resource tenant.
6060

61-
* **User lifecycle management**: the process of provisioning, managing, and deprovisioning user access to resources.
61+
* **User lifecycle management**: The process of provisioning, managing, and deprovisioning user access to resources.
6262

6363
* **Unified GAL**: Each user in each tenant can see users from each organization in their Global Address List (GAL).
6464

0 commit comments

Comments
 (0)