Skip to content

Commit d5279ac

Browse files
authored
Merge pull request #226088 from MicrosoftDocs/main
2/02 AM Publish
2 parents a37c9a4 + b79df1f commit d5279ac

File tree

166 files changed

+562
-354
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

166 files changed

+562
-354
lines changed

.openpublishing.redirection.json

Lines changed: 0 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -13444,16 +13444,6 @@
1344413444
"redirect_url": "/azure/logic-apps/logic-apps-exception-handling",
1344513445
"redirect_document_id": false
1344613446
},
13447-
{
13448-
"source_path_from_root": "/articles/machine-learning/tutorial-power-bi-automated-model.md",
13449-
"redirect_url": "/azure/machine-learning/tutorial-power-bi-custom-model",
13450-
"redirect_document_id": false
13451-
},
13452-
{
13453-
"source_path_from_root": "/articles/machine-learning/tutorial-power-bi-designer-model.md",
13454-
"redirect_url": "/azure/machine-learning/tutorial-power-bi-custom-model",
13455-
"redirect_document_id": false
13456-
},
1345713447
{
1345813448
"source_path_from_root": "/articles/event-grid/cli-samples.md",
1345913449
"redirect_url": "/azure/event-grid/scripts/event-grid-cli-subscribe-custom-topic",

articles/active-directory/authentication/certificate-based-authentication-faq.yml

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -120,9 +120,10 @@ sections:
120120
The browser caches the certificate after the certificate picker appears. If the user retries, the cached certificate is used automatically. The user should close the browser, and reopen a new session to try CBA again.
121121
122122
- question: |
123-
Why can't single-factor certificates be used to complete MFA?
123+
How can I use single-factor certificates to complete MFA?
124124
answer: |
125-
There's no support for a second factor when the first factor is a single-factor certificate. We're working to add support for second factors.
125+
We have support for single factor CBA to get MFA. CBA SF + PSI (passwordless phone sign in) and CBA SF + FIDO2 are the two supported combinations to get MFA using single factor certificates.
126+
[MFA with single factor certificates](../authentication/concept-certificate-based-authentication-technical-deep-dive.md#single-factor-certificate-based-authentication)
126127
127128
- question: |
128129
Will the changes to the Authentication methods policy take effect immediately?

articles/active-directory/authentication/concept-authentication-phone-options.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ To work properly, phone numbers must be in the format *+CountryCode PhoneNumber*
3030
> [!NOTE]
3131
> There needs to be a space between the country/region code and the phone number.
3232
>
33-
> Password reset doesn't support phone extensions. Even in the *+1 4251234567X12345* format, extensions are removed before the call is placed.
33+
> Password reset and Azure AD Multi-Factor Authentication don't support phone extensions. Even in the *+1 4251234567X12345* format, extensions are removed before the call is placed.
3434
3535
## Mobile phone verification
3636

articles/active-directory/authentication/concept-certificate-based-authentication-technical-deep-dive.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ Now we'll walk through each step:
7272
1. Azure AD completes the sign-in process by sending a primary refresh token back to indicate successful sign-in.
7373
1. If the user sign-in is successful, the user can access the application.
7474

75-
## Single-factor certificate-based authentication
75+
## MFA with Single-factor certificate-based authentication
7676

7777
Azure AD CBA supports second factors to meet MFA requirements with single-factor certificates. Users can use either passwordless sign-in or FIDO2 security keys as second factors when the first factor is single-factor CBA. Users need to register passwordless sign-in or FIDO2 in advance to signing in with Azure AD CBA.
7878

articles/active-directory/cloud-sync/how-to-prerequisites.md

Lines changed: 5 additions & 42 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ You need the following to use Azure AD Connect cloud sync:
2626
- On-premises firewall configurations.
2727

2828
## Group Managed Service Accounts
29-
A group Managed Service Account is a managed domain account that provides automatic password management, simplified service principal name (SPN) management,the ability to delegate the management to other administrators, and also extends this functionality over multiple servers. Azure AD Connect Cloud Sync supports and uses a gMSA for running the agent. You will be prompted for administrative credentials during setup, in order to create this account. The account will appear as (domain\provAgentgMSA$). For more information on a gMSA, see [Group Managed Service Accounts](/windows-server/security/group-managed-service-accounts/group-managed-service-accounts-overview)
29+
A group Managed Service Account is a managed domain account that provides automatic password management, simplified service principal name (SPN) management, the ability to delegate the management to other administrators, and also extends this functionality over multiple servers. Azure AD Connect Cloud Sync supports and uses a gMSA for running the agent. You will be prompted for administrative credentials during setup, in order to create this account. The account will appear as (domain\provAgentgMSA$). For more information on a gMSA, see [group Managed Service Accounts](/windows-server/security/group-managed-service-accounts/group-managed-service-accounts-overview)
3030

3131
### Prerequisites for gMSA:
3232
1. The Active Directory schema in the gMSA domain's forest needs to be updated to Windows Server 2012 or later.
@@ -48,46 +48,9 @@ If you are creating a custom gMSA account, you need to ensure that the account h
4848
|Allow |gMSA Account |Read all properties |Descendant Contact objects|
4949
|Allow |gMSA Account |Create/delete User objects|This object and all descendant objects|
5050

51-
For steps on how to upgrade an existing agent to use a gMSA account see [Group Managed Service Accounts](how-to-install.md#group-managed-service-accounts).
52-
53-
#### Create gMSA account with PowerShell
54-
You can use the following PowerShell script to create a custom gMSA account. Then you can use the [cloud sync gMSA cmdlets](how-to-gmsa-cmdlets.md) to apply more granular permissions.
55-
56-
```powershell
57-
# Filename: 1_SetupgMSA.ps1
58-
# Description: Creates and installs a custom gMSA account for use with Azure AD Connect cloud sync.
59-
#
60-
# DISCLAIMER:
61-
# Copyright (c) Microsoft Corporation. All rights reserved. This
62-
# script is made available to you without any express, implied or
63-
# statutory warranty, not even the implied warranty of
64-
# merchantability or fitness for a particular purpose, or the
65-
# warranty of title or non-infringement. The entire risk of the
66-
# use or the results from the use of this script remains with you.
67-
#
68-
#
69-
#
70-
#
71-
# Declare variables
72-
$Name = 'provAPP1gMSA'
73-
$Description = "Azure AD Cloud Sync service account for APP1 server"
74-
$Server = "APP1.contoso.com"
75-
$Principal = Get-ADGroup 'Domain Computers'
76-
77-
# Create service account in Active Directory
78-
New-ADServiceAccount -Name $Name `
79-
-Description $Description `
80-
-DNSHostName $Server `
81-
-ManagedPasswordIntervalInDays 30 `
82-
-PrincipalsAllowedToRetrieveManagedPassword $Principal `
83-
-Enabled $True `
84-
-PassThru
85-
86-
# Install the new service account on Azure AD Cloud Sync server
87-
Install-ADServiceAccount -Identity $Name
88-
```
89-
90-
For additional information on the cmdlets above, see [Getting Started with Group Managed Service Accounts](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/jj128431(v=ws.11)?redirectedfrom=MSDN).
51+
For steps on how to upgrade an existing agent to use a gMSA account see [group Managed Service Accounts](how-to-install.md#group-managed-service-accounts).
52+
53+
For more information on how to prepare your Active Directory for group Managed Service Account, see [group Managed Service Accounts Overview](/windows-server/security/group-managed-service-accounts/group-managed-service-accounts-overview).
9154

9255
### In the Azure Active Directory admin center
9356

@@ -104,7 +67,7 @@ Run the [IdFix tool](/office365/enterprise/prepare-directory-attributes-for-sync
10467

10568
2. The PowerShell execution policy on the local server must be set to Undefined or RemoteSigned.
10669

107-
3. If there's a firewall between your servers and Azure AD, configure see [Firewall and proxy requirements](#firewall-and-proxy-requirements) below.
70+
3. If there's a firewall between your servers and Azure AD, see [Firewall and proxy requirements](#firewall-and-proxy-requirements) below.
10871

10972
>[!NOTE]
11073
> Installing the cloud provisioning agent on Windows Server Core is not supported.

articles/active-directory/multi-tenant-organizations/cross-tenant-synchronization-overview.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.workload: identity
99
ms.subservice: multi-tenant-organizations
1010
ms.topic: overview
11-
ms.date: 01/23/2023
11+
ms.date: 02/02/2023
1212
ms.author: rolyon
1313
ms.custom: it-pro
1414

@@ -121,7 +121,9 @@ For anyone that has used Azure AD to [provision identities into a SaaS applicati
121121

122122
## License requirements
123123

124-
Using this feature requires Azure AD Premium P1 licenses. Each user who is synchronized with cross-tenant synchronization must have a P1 license in their home/source tenant. To find the right license for your requirements, see [Compare generally available features of Azure AD](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing).
124+
In the source tenant: Using this feature requires Azure AD Premium P1 licenses. Each user who is synchronized with cross-tenant synchronization must have a P1 license in their home/source tenant. To find the right license for your requirements, see [Compare generally available features of Azure AD](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing).
125+
126+
In the target tenant: Cross-tenant sync relies on the Azure AD External Identities billing model. To understand the external identities licensing model, see [MAU billing model for Azure AD External Identities](../external-identities/external-identities-pricing.md)
125127

126128
## Frequently asked questions
127129

articles/app-service/deploy-staging-slots.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ The app must be running in the **Standard**, **Premium**, or **Isolated** tier i
6262

6363
6. Select the app URL on the slot's resource page. The deployment slot has its own host name and is also a live app. To limit public access to the deployment slot, see [Azure App Service IP restrictions](app-service-ip-restrictions.md).
6464

65-
The new deployment slot has no content, even if you clone the settings from a different slot. For example, you can [publish to this slot with Git](./deploy-local-git.md). You can deploy to the slot from a different repository branch or a different repository.
65+
The new deployment slot has no content, even if you clone the settings from a different slot. For example, you can [publish to this slot with Git](./deploy-local-git.md). You can deploy to the slot from a different repository branch or a different repository. Get publish profile [from Azure App Service](/visualstudio/azure/how-to-get-publish-profile-from-azure-app-service) can provide required information to deploy to the slot. The profile can be imported by Visual Studio to deploy contents to the slot.
6666

6767
The slot's URL will be of the format `http://sitename-slotname.azurewebsites.net`. To keep the URL length within necessary DNS limits, the site name will be truncated at 40 characters, the slot name will be truncated at 19 characters, and an additional 4 random characters will be appended to ensure the resulting domain name is unique.
6868

@@ -283,7 +283,7 @@ By default, new slots are given a routing rule of `0%`, shown in grey. When you
283283

284284
## Delete a slot
285285

286-
Search for and select your app. Select **Deployment slots** > *\<slot to delete>* > **Overview**. The app type is shown as **App Service (Slot)** to remind you that you're viewing a deployment slot. Select **Delete** on the command bar.
286+
Search for and select your app. Select **Deployment slots** > *\<slot to delete>* > **Overview**. The app type is shown as **App Service (Slot)** to remind you that you're viewing a deployment slot. Before deleting a slot, make sure to stop the slot and set the traffic in the slot to zero. Select **Delete** on the command bar.
287287

288288
![Delete a deployment slot](./media/web-sites-staged-publishing/DeleteStagingSiteButton.png)
289289

Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
---
2+
title: Language Support Policy
3+
description: App Service language runtime support policies
4+
author: jeffmartinez
5+
6+
ms.topic: article
7+
ms.date: 01/23/2023
8+
ms.author: jefmarti
9+
ms.custom: seodec18
10+
11+
---
12+
# App Service language runtime support policy
13+
14+
This document describes the App Service language runtime support policy for updating existing stacks and retiring process for upcoming end-of-life stacks. This policy is to clarify existing practices and doesn't represent a change to customer commitments.
15+
16+
## Updates to existing stacks
17+
App Service will update existing stacks after they become available from each community. App Service will update major versions of stacks but can't guarantee any specific patch versions. Patch versions are controlled by the platform, and it is not possible for App Service to pin a specific patch version. For example, Python 3.10 will be updated by App Service, but a specific Python 3.10.x version won't be guaranteed. If you need a specific patch version, use a [custom container](quickstart-custom-container.md).
18+
19+
## Retirements
20+
App Service follows community support timelines for the lifecycle of the runtime. Once community support for a given language reaches end-of-life, your applications will continue to run unchanged. However, App Service cannot provide security patches or related customer support for that runtime version past its end-of-life date. If your application has any issues past the end-of-life date for that version, you should move up to a supported version to receive the latest security patches and features.
21+
22+
> [!IMPORTANT]
23+
> You're encouraged to upgrade the language version of your affected apps to a supported version. If you're running apps using an unsupported language version, you'll be required to upgrade before receiving support for your app.
24+
>
25+
26+
## Notifications
27+
End-of-life dates for runtime versions are determined independently by their respective stacks and are outside the control of App Service. App Service will send reminder notifications to subscription owners for upcoming end-of-life runtime versions 12 months prior to the end-of-life date.
28+
29+
Those who receive notifications include account administrators, service administrators, and co-administrators. Contributors, readers, or other roles won't directly receive notifications, unless they opt-in to receive notification emails, using [Service Health Alerts](/service-health/alerts-activity-log-service-notifications-portal.md).
30+
31+
## Language runtime version support timelines
32+
To learn more about specific language support policy timelines, visit the following resources:
33+
34+
- [ASP.NET](https://aka.ms/aspnetrelease)
35+
- [.NET](https://aka.ms/dotnetrelease)
36+
- [Node](https://aka.ms/noderelease)
37+
- [Java](https://aka.ms/javarelease)
38+
- [Python](https://aka.ms/pythonrelease)
39+
- [PHP](https://aka.ms/phprelease)
40+
- [Go](https://aka.ms/gorelease)
41+
42+
43+
44+
## Configure language versions
45+
To learn more about how to update your App Service application language versions, see the following resources:
46+
47+
- [.NET](https://github.com/Azure/app-service-linux-docs/blob/master/Runtime_Support/dot_net_core.md#how-to-update-your-app-to-target-a-different-version-of-net-or-net-core)
48+
- [Node](https://github.com/Azure/app-service-linux-docs/blob/master/Runtime_Support/node_support.md#node-on-linux-app-service)
49+
- [Java](https://github.com/Azure/app-service-linux-docs/blob/master/Runtime_Support/java_support.md#java-on-app-service)
50+
- [Python](https://github.com/Azure/app-service-linux-docs/blob/master/Runtime_Support/python_support.md#how-to-update-your-app-to-target-a-different-version-of-python)
51+
- [PHP](https://github.com/Azure/app-service-linux-docs/blob/master/Runtime_Support/php_support.md#how-to-update-your-app-to-target-a-different-version-of-php)
52+

articles/app-service/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -470,6 +470,8 @@
470470
href: ../azure-resource-manager/management/azure-subscription-service-limits.md#app-service-limits
471471
- name: Service Updates
472472
href: https://azure.microsoft.com/updates/?product=app-service
473+
- name: Language support policy
474+
href: language-support-policy.md
473475
- name: Kudu service
474476
href: resources-kudu.md
475477
- name: Best practices

articles/azure-arc/data/faq.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,9 +20,10 @@ sections:
2020
- question: Is there a cost to enable Microsoft Defender via Policy?
2121
answer: No. Azure Arc server is an Azure resource. There is no cost to use Azure Policy with Azure resources. For details, see [Azure Pricing policy](https://azure.microsoft.com/pricing/details/azure-policy/).
2222

23-
- question: Can we customize ir modify policies?
23+
- question: Can we customize or modify policies?
2424
answer: |
2525
Yes, you can copy policies that we provide in Azure and customize them. The only policy we provide at this time is the at-scale onboarding one.
26+
2627
- name: Reporting
2728
questions:
2829
- question: Can we get a roll-up report that indicates how many instances fall into the high priority category instead of one machine at a time?

0 commit comments

Comments
 (0)