You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Create or update a dynamic group in Azure Active Directory
21
21
22
-
In Azure Active Directory (Azure AD), you can use rules to determine group membership based on user or device properties. This article tells how to set up a rule for a dynamic group in the Azure portal.
23
-
Dynamic membership is supported for security groups or Microsoft 365 Groups. When a group membership rule is applied, user and device attributes are evaluated for matches with the membership rule. When an attribute changes for a user or device, all dynamic group rules in the organization are processed for membership changes. Users and devices are added or removed if they meet the conditions for a group. Security groups can be used for either devices or users, but Microsoft 365 Groups can be only user groups. Using Dynamic groups requires Azure AD premium P1 license or Intune for Education license. See [Dynamic membership rules for groups](./groups-dynamic-membership.md) for more details.
22
+
In Azure Active Directory (Azure AD), you can use rules to determine group membership based on user or device properties. This article tells how to set up a rule for a dynamic group in the Azure portal. Dynamic membership is supported for security groups and Microsoft 365 Groups. When a group membership rule is applied, user and device attributes are evaluated for matches with the membership rule. When an attribute changes for a user or device, all dynamic group rules in the organization are processed for membership changes. Users and devices are added or removed if they meet the conditions for a group. Security groups can be used for either devices or users, but Microsoft 365 Groups can be only user groups. Using Dynamic groups requires Azure AD premium P1 license or Intune for Education license. See [Dynamic membership rules for groups](./groups-dynamic-membership.md) for more details.
24
23
25
24
## Rule builder in the Azure portal
26
25
@@ -46,7 +45,7 @@ For examples of syntax, supported properties, operators, and values for a member
46
45
1. Search for and select **Groups**.
47
46
1. Select **All groups**, and select **New group**.
48
47
49
-

48
+

50
49
51
50
1. On the **Group** page, enter a name and description for the new group. Select a **Membership type** for either users or devices, and then select **Add dynamic query**. The rule builder supports up to five expressions. To add more than five expressions, you must use the text box.
52
51
@@ -67,7 +66,7 @@ If the rule you entered isn't valid, an explanation of why the rule couldn't be
67
66
1. Select a group to open its profile.
68
67
1. On the profile page for the group, select **Dynamic membership rules**. The rule builder supports up to five expressions. To add more than five expressions, you must use the text box.
69
68
70
-

69
+

71
70
72
71
1. To see the custom extension properties available for your membership rule:
73
72
1. Select **Get custom extension properties**
@@ -80,29 +79,31 @@ When a new Microsoft 365 group is created, a welcome email notification is sent
80
79
81
80
## Check processing status for a rule
82
81
83
-
You can see the membership processing status and the last updated date on the **Overview** page for the group.
82
+
You can see the dynamic rule processing status and the last membership change date on the **Overview** page for the group.
84
83
85
-

84
+

86
85
87
-
The following status messages can be shown for **Membership processing** status:
86
+
The following status messages can be shown for **Dynamic rule processing** status:
88
87
89
88
-**Evaluating**: The group change has been received and the updates are being evaluated.
90
89
-**Processing**: Updates are being processed.
91
90
-**Update complete**: Processing has completed and all applicable updates have been made.
92
91
-**Processing error**: Processing couldn't be completed because of an error evaluating the membership rule.
93
92
-**Update paused**: Dynamic membership rule updates have been paused by the administrator. MembershipRuleProcessingState is set to “Paused”.
94
93
95
-
The following status messages can be shown for **Membership last updated** status:
94
+
The following status messages can be shown for **Last membership change** status:
96
95
97
96
-<**Date and time**>: The last time the membership was updated.
98
97
-**In Progress**: Updates are currently in progress.
99
98
-**Unknown**: The last update time can't be retrieved. The group might be new.
100
99
101
100
If an error occurs while processing the membership rule for a specific group, an alert is shown on the top of the **Overview page** for the group. If no pending dynamic membership updates can be processed for all the groups within the organization for more than 24 hours, an alert is shown on the top of **All groups**.
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/faq.yml
+3-4Lines changed: 3 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ metadata:
7
7
ms.service: active-directory
8
8
ms.subservice: B2B
9
9
ms.topic: faq
10
-
ms.date: 03/31/2022
10
+
ms.date: 05/06/2022
11
11
ms.author: mimart
12
12
author: msmimart
13
13
manager: celestedg
@@ -56,10 +56,9 @@ sections:
56
56
The inviting organization performs multifactor authentication. The inviting organization must make sure that the organization has enough licenses for their B2B users who are using multifactor authentication.
57
57
58
58
- question: |
59
-
What if a partner organization already has multifactor authentication set up? Can we trust their multifactor authentication, and not use our own multifactor authentication?
59
+
What if a partner organization already has multifactor authentication set up? Can we trust their multifactor authentication?
60
60
answer: |
61
-
This feature is currently not supported. If access to your organization's resources requires multifactor authentication, the partner organization will need to register for multifactor authentication in your (the inviting) organization.
62
-
61
+
[Cross-tenant access settings](cross-tenant-access-overview.md) (preview) let you trust multifactor authentication and device claims ([compliant claims and hybrid Azure AD joined claims](../conditional-access/howto-conditional-access-policy-compliant-device.md)) from other Azure AD organizations.
Copy file name to clipboardExpand all lines: articles/api-management/api-management-howto-disaster-recovery-backup-restore.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -77,6 +77,9 @@ All of the tasks that you do on resources using the Azure Resource Manager must
77
77
78
78
Before calling the APIs that generate the backup and restore, you need to get a token. The following example uses the [Microsoft.IdentityModel.Clients.ActiveDirectory](https://www.nuget.org/packages/Microsoft.IdentityModel.Clients.ActiveDirectory) NuGet package to retrieve the token.
79
79
80
+
> [!IMPORTANT]
81
+
> The [Microsoft.IdentityModel.Clients.ActiveDirectory](https://www.nuget.org/packages/Microsoft.IdentityModel.Clients.ActiveDirectory) NuGet package and Azure AD Authentication Library (ADAL) have been deprecated. No new features have been added since June 30, 2020. We strongly encourage you to upgrade, see the [migration guide](/azure/active-directory/develop/msal-migration) for more details.
Copy file name to clipboardExpand all lines: articles/container-apps/billing.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,7 @@ The following resources are free during each calendar month, per subscription:
25
25
This article describes how to calculate the cost of running your container app. For pricing details in your account's currency, see [Azure Container Apps Pricing](https://azure.microsoft.com/pricing/details/container-apps/).
26
26
27
27
> [!NOTE]
28
-
> If you use Container Apps with [your own virtual network](vnet-custom.md#managed-resources) or your apps utilize other Azure resources, additional charges may apply.
28
+
> If you use Container Apps with [your own virtual network](networking.md#managed-resources) or your apps utilize other Azure resources, additional charges may apply.
title: Securing a custom VNET in Azure Container Apps Preview
3
+
description: Firewall settings to secure a custom VNET in Azure Container Apps Preview
4
+
services: container-apps
5
+
author: JennyLawrance
6
+
ms.service: container-apps
7
+
ms.topic: reference
8
+
ms.date: 4/15/2022
9
+
ms.author: jennylaw
10
+
---
11
+
12
+
# Securing a custom VNET in Azure Container Apps
13
+
14
+
Firewall settings Network Security Groups (NSGs) needed to configure virtual networks closely resemble the settings required by Kubernetes.
15
+
16
+
Some outbound dependencies of Azure Kubernetes Service (AKS) clusters rely exclusively on fully qualified domain names (FQDN), therefore securing an AKS cluster purely with NSGs isn't possible. Refer to [Control egress traffic for cluster nodes in Azure Kubernetes Service](/azure/aks/limit-egress-traffic) for details.
17
+
18
+
* You can lock down a network via NSGs with more restrictive rules than the default NSG rules.
19
+
* To fully secure a cluster, use a combination of NSGs and a firewall.
20
+
21
+
## NSG allow rules
22
+
23
+
The following tables describe how to configure a collection of NSG allow rules.
24
+
25
+
### Inbound
26
+
27
+
| Protocol | Port | ServiceTag | Description |
28
+
|--|--|--|--|
29
+
| Any |\*| Control plane subnet address space | Allow communication between IPs in the control plane subnet. This address is passed to as a parameter when you create an environment. For example, `10.0.0.0/21`. |
30
+
| Any |\*| App subnet address space | Allow communication between nodes in the app subnet. This address is passed as a parameter when you create an environment. For example, `10.0.8.0/21`. |
31
+
32
+
### Outbound with ServiceTags
33
+
34
+
| Protocol | Port | ServiceTag | Description
35
+
|--|--|--|--|
36
+
| UDP |`1194`|`AzureCloud.<REGION>`| Required for internal AKS secure connection between underlying nodes and control plane. Replace `<REGION>` with the region where your container app is deployed. |
37
+
| TCP |`9000`|`AzureCloud.<REGION>`| Required for internal AKS secure connection between underlying nodes and control plane. Replace `<REGION>` with the region where your container app is deployed. |
38
+
| TCP |`443`|`AzureMonitor`| Allows outbound calls to Azure Monitor. |
39
+
40
+
### Outbound with wild card IP rules
41
+
42
+
As the following rules require allowing all IPs, use a Firewall solution to lock down to specific FQDNs.
43
+
44
+
| Protocol | Port | IP | Description |
45
+
|--|--|--|--|
46
+
| TCP |`443`|\*| Allow all outbound on port `443` provides a way to allow all FQDN based outbound dependencies that don't have a static IP. |
47
+
| UDP |`123`|\*| NTP server. If using firewall, allowlist `ntp.ubuntu.com:123`. |
48
+
| Any |\*| Control plane subnet address space | Allow communication between IPs in the control plane subnet. This address is passed as a parameter when you create an environment. For example, `10.0.0.0/21`. |
49
+
| Any |\*| App subnet address space | Allow communication between nodes in the App subnet. This address is passed as a parameter when you create an environment. For example, `10.0.8.0/21`. |
50
+
51
+
## Firewall configuration
52
+
53
+
### Outbound FQDN dependencies
54
+
55
+
| FQDN | Protocol | Port | Description |
56
+
|--|--|--|--|
57
+
|`*.hcp.<REGION>.azmk8s.io`| HTTPS |`443`| Required for internal AKS secure connection between nodes and control plane. |
58
+
|`mcr.microsoft.com`| HTTPS |`443`| Required to access images in Microsoft Container Registry (MCR). This registry contains first-party images and charts (for example, coreDNS). These images are required for the correct creation and functioning of the cluster, including scale and upgrade operations. |
59
+
|`*.data.mcr.microsoft.com`| HTTPS |`443`| Required for MCR storage backed by the Azure content delivery network (CDN). |
60
+
|`management.azure.com`| HTTPS |`443`| Required for Kubernetes operations against the Azure API. |
61
+
|`login.microsoftonline.com`| HTTPS |`443`| Required for Azure Active Directory authentication. |
62
+
|`packages.microsoft.com`| HTTPS |`443`| This address is the Microsoft packages repository used for cached apt-get operations. Example packages include Moby, PowerShell, and Azure CLI. |
63
+
|`acs-mirror.azureedge.net`| HTTPS |`443`| This address is for the repository required to download and install required binaries like `kubenet` and Azure Container Networking Interface. |
64
+
|`dc.services.visualstudio.com`| HTTPS |`443`| This endpoint is used for metrics and monitoring using Azure Monitor. |
65
+
|`*.ods.opinsights.azure.com`| HTTPS |`443`| This endpoint is used by Azure Monitor for ingesting log analytics data. |
66
+
|`*.oms.opinsights.azure.com`| HTTPS |`443`| This endpoint is used by `omsagent`, which is used to authenticate the log analytics service. |
67
+
|`*.monitoring.azure.com`| HTTPS |`443`| This endpoint is used to send metrics data to Azure Monitor. |
0 commit comments