Skip to content

Commit d5d9174

Browse files
authored
Merge branch 'MicrosoftDocs:main' into main
2 parents 23bd3ba + 6aab19d commit d5d9174

26 files changed

+771
-89
lines changed

articles/active-directory/enterprise-users/groups-create-rule.md

Lines changed: 12 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: enterprise-users
1111
ms.workload: identity
1212
ms.topic: how-to
13-
ms.date: 09/02/2021
13+
ms.date: 05/05/2022
1414
ms.author: curtand
1515
ms.reviewer: krbain
1616
ms.custom: it-pro
@@ -19,8 +19,7 @@ ms.collection: M365-identity-device-management
1919

2020
# Create or update a dynamic group in Azure Active Directory
2121

22-
In Azure Active Directory (Azure AD), you can use rules to determine group membership based on user or device properties. This article tells how to set up a rule for a dynamic group in the Azure portal.
23-
Dynamic membership is supported for security groups or Microsoft 365 Groups. When a group membership rule is applied, user and device attributes are evaluated for matches with the membership rule. When an attribute changes for a user or device, all dynamic group rules in the organization are processed for membership changes. Users and devices are added or removed if they meet the conditions for a group. Security groups can be used for either devices or users, but Microsoft 365 Groups can be only user groups. Using Dynamic groups requires Azure AD premium P1 license or Intune for Education license. See [Dynamic membership rules for groups](./groups-dynamic-membership.md) for more details.
22+
In Azure Active Directory (Azure AD), you can use rules to determine group membership based on user or device properties. This article tells how to set up a rule for a dynamic group in the Azure portal. Dynamic membership is supported for security groups and Microsoft 365 Groups. When a group membership rule is applied, user and device attributes are evaluated for matches with the membership rule. When an attribute changes for a user or device, all dynamic group rules in the organization are processed for membership changes. Users and devices are added or removed if they meet the conditions for a group. Security groups can be used for either devices or users, but Microsoft 365 Groups can be only user groups. Using Dynamic groups requires Azure AD premium P1 license or Intune for Education license. See [Dynamic membership rules for groups](./groups-dynamic-membership.md) for more details.
2423

2524
## Rule builder in the Azure portal
2625

@@ -46,7 +45,7 @@ For examples of syntax, supported properties, operators, and values for a member
4645
1. Search for and select **Groups**.
4746
1. Select **All groups**, and select **New group**.
4847

49-
![Select the command to add new group](./media/groups-create-rule/create-new-group-azure-active-directory.png)
48+
![Screenshot showing how to select the "add new group" action](./media/groups-create-rule/create-new-group-azure-active-directory.png)
5049

5150
1. On the **Group** page, enter a name and description for the new group. Select a **Membership type** for either users or devices, and then select **Add dynamic query**. The rule builder supports up to five expressions. To add more than five expressions, you must use the text box.
5251

@@ -67,7 +66,7 @@ If the rule you entered isn't valid, an explanation of why the rule couldn't be
6766
1. Select a group to open its profile.
6867
1. On the profile page for the group, select **Dynamic membership rules**. The rule builder supports up to five expressions. To add more than five expressions, you must use the text box.
6968

70-
![Add membership rule for a dynamic group](./media/groups-create-rule/update-dynamic-group-rule.png)
69+
![Screenshot showing how to add a membership rule for a dynamic group](./media/groups-create-rule/update-dynamic-group-rule.png)
7170

7271
1. To see the custom extension properties available for your membership rule:
7372
1. Select **Get custom extension properties**
@@ -80,29 +79,31 @@ When a new Microsoft 365 group is created, a welcome email notification is sent
8079

8180
## Check processing status for a rule
8281

83-
You can see the membership processing status and the last updated date on the **Overview** page for the group.
82+
You can see the dynamic rule processing status and the last membership change date on the **Overview** page for the group.
8483

85-
![display of dynamic group status](./media/groups-create-rule/group-status.png)
84+
![Diagram of dynamic group status](./media/groups-create-rule/group-status.png)
8685

87-
The following status messages can be shown for **Membership processing** status:
86+
The following status messages can be shown for **Dynamic rule processing** status:
8887

8988
- **Evaluating**: The group change has been received and the updates are being evaluated.
9089
- **Processing**: Updates are being processed.
9190
- **Update complete**: Processing has completed and all applicable updates have been made.
9291
- **Processing error**: Processing couldn't be completed because of an error evaluating the membership rule.
9392
- **Update paused**: Dynamic membership rule updates have been paused by the administrator. MembershipRuleProcessingState is set to “Paused”.
9493

95-
The following status messages can be shown for **Membership last updated** status:
94+
The following status messages can be shown for **Last membership change** status:
9695

9796
- <**Date and time**>: The last time the membership was updated.
9897
- **In Progress**: Updates are currently in progress.
9998
- **Unknown**: The last update time can't be retrieved. The group might be new.
10099

101100
If an error occurs while processing the membership rule for a specific group, an alert is shown on the top of the **Overview page** for the group. If no pending dynamic membership updates can be processed for all the groups within the organization for more than 24 hours, an alert is shown on the top of **All groups**.
102101

103-
![processing error message alerts](./media/groups-create-rule/processing-error.png)
102+
![Screenshot showing how to process error message alerts](./media/groups-create-rule/processing-error.png)
104103

105-
These articles provide additional information on groups in Azure Active Directory.
104+
## Next steps
105+
106+
The following articles provide additional information on how to use groups in Azure Active Directory.
106107

107108
- [See existing groups](../fundamentals/active-directory-groups-view-azure-portal.md)
108109
- [Create a new group and adding members](../fundamentals/active-directory-groups-create-azure-portal.md)
74.7 KB
Loading

articles/active-directory/external-identities/faq.yml

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ metadata:
77
ms.service: active-directory
88
ms.subservice: B2B
99
ms.topic: faq
10-
ms.date: 03/31/2022
10+
ms.date: 05/06/2022
1111
ms.author: mimart
1212
author: msmimart
1313
manager: celestedg
@@ -56,10 +56,9 @@ sections:
5656
The inviting organization performs multifactor authentication. The inviting organization must make sure that the organization has enough licenses for their B2B users who are using multifactor authentication.
5757
5858
- question: |
59-
What if a partner organization already has multifactor authentication set up? Can we trust their multifactor authentication, and not use our own multifactor authentication?
59+
What if a partner organization already has multifactor authentication set up? Can we trust their multifactor authentication?
6060
answer: |
61-
This feature is currently not supported. If access to your organization's resources requires multifactor authentication, the partner organization will need to register for multifactor authentication in your (the inviting) organization.
62-
61+
[Cross-tenant access settings](cross-tenant-access-overview.md) (preview) let you trust multifactor authentication and device claims ([compliant claims and hybrid Azure AD joined claims](../conditional-access/howto-conditional-access-policy-compliant-device.md)) from other Azure AD organizations.
6362
- question: |
6463
How can I use delayed invitations?
6564
answer: |

articles/api-management/api-management-howto-disaster-recovery-backup-restore.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -77,6 +77,9 @@ All of the tasks that you do on resources using the Azure Resource Manager must
7777

7878
Before calling the APIs that generate the backup and restore, you need to get a token. The following example uses the [Microsoft.IdentityModel.Clients.ActiveDirectory](https://www.nuget.org/packages/Microsoft.IdentityModel.Clients.ActiveDirectory) NuGet package to retrieve the token.
7979

80+
> [!IMPORTANT]
81+
> The [Microsoft.IdentityModel.Clients.ActiveDirectory](https://www.nuget.org/packages/Microsoft.IdentityModel.Clients.ActiveDirectory) NuGet package and Azure AD Authentication Library (ADAL) have been deprecated. No new features have been added since June 30, 2020. We strongly encourage you to upgrade, see the [migration guide](/azure/active-directory/develop/msal-migration) for more details.
82+
8083
```csharp
8184
using Microsoft.IdentityModel.Clients.ActiveDirectory;
8285
using System;

articles/container-apps/TOC.yml

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,16 @@
4242
href: application-lifecycle-management.md
4343
- name: Microservices
4444
href: microservices.md
45+
- name: Networking
46+
items:
47+
- name: Architecture overview
48+
href: networking.md
49+
- name: Deploy with an external environment
50+
href: vnet-custom.md
51+
- name: Deploy with an internal environment
52+
href: vnet-custom-internal.md
53+
- name: Firewall integration
54+
href: firewall-integration.md
4555
- name: Observability
4656
href: observability.md
4757
- name: Health probes

articles/container-apps/billing.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ The following resources are free during each calendar month, per subscription:
2525
This article describes how to calculate the cost of running your container app. For pricing details in your account's currency, see [Azure Container Apps Pricing](https://azure.microsoft.com/pricing/details/container-apps/).
2626

2727
> [!NOTE]
28-
> If you use Container Apps with [your own virtual network](vnet-custom.md#managed-resources) or your apps utilize other Azure resources, additional charges may apply.
28+
> If you use Container Apps with [your own virtual network](networking.md#managed-resources) or your apps utilize other Azure resources, additional charges may apply.
2929
3030
## Resource consumption charges
3131

Lines changed: 67 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,67 @@
1+
---
2+
title: Securing a custom VNET in Azure Container Apps Preview
3+
description: Firewall settings to secure a custom VNET in Azure Container Apps Preview
4+
services: container-apps
5+
author: JennyLawrance
6+
ms.service: container-apps
7+
ms.topic: reference
8+
ms.date: 4/15/2022
9+
ms.author: jennylaw
10+
---
11+
12+
# Securing a custom VNET in Azure Container Apps
13+
14+
Firewall settings Network Security Groups (NSGs) needed to configure virtual networks closely resemble the settings required by Kubernetes.
15+
16+
Some outbound dependencies of Azure Kubernetes Service (AKS) clusters rely exclusively on fully qualified domain names (FQDN), therefore securing an AKS cluster purely with NSGs isn't possible. Refer to [Control egress traffic for cluster nodes in Azure Kubernetes Service](/azure/aks/limit-egress-traffic) for details.
17+
18+
* You can lock down a network via NSGs with more restrictive rules than the default NSG rules.
19+
* To fully secure a cluster, use a combination of NSGs and a firewall.
20+
21+
## NSG allow rules
22+
23+
The following tables describe how to configure a collection of NSG allow rules.
24+
25+
### Inbound
26+
27+
| Protocol | Port | ServiceTag | Description |
28+
|--|--|--|--|
29+
| Any | \* | Control plane subnet address space | Allow communication between IPs in the control plane subnet. This address is passed to as a parameter when you create an environment. For example, `10.0.0.0/21`. |
30+
| Any | \* | App subnet address space | Allow communication between nodes in the app subnet. This address is passed as a parameter when you create an environment. For example, `10.0.8.0/21`. |
31+
32+
### Outbound with ServiceTags
33+
34+
| Protocol | Port | ServiceTag | Description
35+
|--|--|--|--|
36+
| UDP | `1194` | `AzureCloud.<REGION>` | Required for internal AKS secure connection between underlying nodes and control plane. Replace `<REGION>` with the region where your container app is deployed. |
37+
| TCP | `9000` | `AzureCloud.<REGION>` | Required for internal AKS secure connection between underlying nodes and control plane. Replace `<REGION>` with the region where your container app is deployed. |
38+
| TCP | `443` | `AzureMonitor` | Allows outbound calls to Azure Monitor. |
39+
40+
### Outbound with wild card IP rules
41+
42+
As the following rules require allowing all IPs, use a Firewall solution to lock down to specific FQDNs.
43+
44+
| Protocol | Port | IP | Description |
45+
|--|--|--|--|
46+
| TCP | `443` | \* | Allow all outbound on port `443` provides a way to allow all FQDN based outbound dependencies that don't have a static IP. |
47+
| UDP | `123` | \* | NTP server. If using firewall, allowlist `ntp.ubuntu.com:123`. |
48+
| Any | \* | Control plane subnet address space | Allow communication between IPs in the control plane subnet. This address is passed as a parameter when you create an environment. For example, `10.0.0.0/21`. |
49+
| Any | \* | App subnet address space | Allow communication between nodes in the App subnet. This address is passed as a parameter when you create an environment. For example, `10.0.8.0/21`. |
50+
51+
## Firewall configuration
52+
53+
### Outbound FQDN dependencies
54+
55+
| FQDN | Protocol | Port | Description |
56+
|--|--|--|--|
57+
| `*.hcp.<REGION>.azmk8s.io` | HTTPS | `443` | Required for internal AKS secure connection between nodes and control plane. |
58+
| `mcr.microsoft.com` | HTTPS | `443` | Required to access images in Microsoft Container Registry (MCR). This registry contains first-party images and charts (for example, coreDNS). These images are required for the correct creation and functioning of the cluster, including scale and upgrade operations. |
59+
| `*.data.mcr.microsoft.com` | HTTPS | `443` | Required for MCR storage backed by the Azure content delivery network (CDN). |
60+
| `management.azure.com` | HTTPS | `443` | Required for Kubernetes operations against the Azure API. |
61+
| `login.microsoftonline.com` | HTTPS | `443` | Required for Azure Active Directory authentication. |
62+
| `packages.microsoft.com` | HTTPS | `443` | This address is the Microsoft packages repository used for cached apt-get operations. Example packages include Moby, PowerShell, and Azure CLI. |
63+
| `acs-mirror.azureedge.net` | HTTPS | `443` | This address is for the repository required to download and install required binaries like `kubenet` and Azure Container Networking Interface. |
64+
| `dc.services.visualstudio.com` | HTTPS | `443` | This endpoint is used for metrics and monitoring using Azure Monitor. |
65+
| `*.ods.opinsights.azure.com` | HTTPS | `443` | This endpoint is used by Azure Monitor for ingesting log analytics data. |
66+
| `*.oms.opinsights.azure.com` | HTTPS | `443` | This endpoint is used by `omsagent`, which is used to authenticate the log analytics service. |
67+
| `*.monitoring.azure.com` | HTTPS | `443` | This endpoint is used to send metrics data to Azure Monitor. |
0 Bytes
Loading

0 commit comments

Comments
 (0)