Skip to content

Commit d8770fb

Browse files
committed
Merge remote-tracking branch 'refs/remotes/MicrosoftDocs/master'
2 parents 473e202 + 8f412a4 commit d8770fb

File tree

112 files changed

+1703
-341
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

112 files changed

+1703
-341
lines changed

articles/active-directory/manage-apps/methods-for-assigning-users-and-groups.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -30,10 +30,11 @@ This article shows you how to assign users or groups to an application in Azure
3030

3131
The availability of group-based assignment is determined by your license agreement. Group-based assignment is supported for Security groups only. Nested group memberships and O365 groups are not currently supported.
3232

33-
## Prerequisites
34-
Before you can assign users and groups to an application, you must require user assignment. To require user assignment:
33+
## Configure the application to require assignment
3534

36-
1. Log in to the Azure portal with an administrator account.
35+
An application can be configured to require assignment before it can be accessed. To require assignment:
36+
37+
1. Log in to the Azure portal with an administrator account, or as an owner of the app under **Enterprise apps**.
3738
2. Click on the **All services** item in the main menu.
3839
3. Choose the directory you are using for the application.
3940
4. Click on the **Enterprise applications** tab.
12.6 KB
Loading

articles/advisor/advisor-cost-recommendations.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ Advisor helps you optimize and reduce your overall Azure spend by identifying id
1616

1717
## Optimize virtual machine spend by resizing or shutting down underutilized instances
1818

19-
Although certain application scenarios can result in low utilization by design, you can often save money by managing the size and number of your virtual machines. Advisor advanced evaluation models considers a virtual machines for shut-down when P95th of the max of max value of CPU utilization is less than 3% and network utilization is less than 2% over a 7 day period. Virtual machines are considered for right size when it is possible to fit the current load in a smaller SKU (within the same SKU family) or a smaller number # of instance such that the current load doesn’t go over 80% utilization when non-user facing workloads and not above 40% when user-facing workload. Here, the type of workload is determined by analyzing the CPU utilization characteristics of the workload.
19+
Although certain application scenarios can result in low utilization by design, you can often save money by managing the size and number of your virtual machines. Advisor advanced evaluation models considers virtual machines for shut-down when P95th of the max of max value of CPU utilization is less than 3% and network utilization is less than 2% over a 7 day period. Virtual machines are considered for right size when it is possible to fit the current load in a smaller SKU (within the same SKU family) or a smaller number # of instance such that the current load doesn’t go over 80% utilization when non-user facing workloads and not above 40% when user-facing workload. Here, the type of workload is determined by analyzing the CPU utilization characteristics of the workload.
2020

2121
The recommended actions are shut-down or resize, specific to resource being recommended for. Advisor shows you the estimated cost savings for either recommended actions - resize or shut-down. Also, for resize recommended action, Advisor provides current and target SKU information.
2222

@@ -45,13 +45,15 @@ Advisor identifies public IP addresses that are not currently associated to Azur
4545
Azure Advisor will detect Azure Data Factory pipelines that repeatedly fail and recommend that you resolve the issues or delete the failing pipelines if they are no longer needed. You will be billed for these pipelines even if though they are not serving you while they are failing.
4646

4747
## Use Standard Snapshots for Managed Disks
48-
To save 60% of cost, we recommend storing your snapshots in Standard Storage, regardless of the storage type of the parent disk. This is the default option for Managed Disks snapshots. Azure Advisor will identify snapshots that are stored Premium Storage and recommend migrating your snapshot from Premium to Standard Storage. [Learn more about Managed Disk pricing](https://aka.ms/aa_manageddisksnapshot_learnmore)
48+
To save 60% of cost, we recommend storing your snapshots in Standard Storage, regardless of the storage type of the parent disk. This option is the default option for Managed Disks snapshots. Azure Advisor will identify snapshots that are stored Premium Storage and recommend migrating your snapshot from Premium to Standard Storage. [Learn more about Managed Disk pricing](https://aka.ms/aa_manageddisksnapshot_learnmore)
4949

5050
## How to access Cost recommendations in Azure Advisor
5151

52-
1. Sign in to the [Azure portal](https://portal.azure.com), and then open [Advisor](https://aka.ms/azureadvisordashboard).
52+
1. Sign in to the [Azure portal](https://portal.azure.com).
5353

54-
2. On the Advisor dashboard, click the **Cost** tab.
54+
1. Search for and select [**Advisor**](https://aka.ms/azureadvisordashboard) from any page.
55+
56+
1. On the **Advisor** dashboard, select the **Cost** tab.
5557

5658
## Next steps
5759

articles/api-management/api-management-howto-protect-backend-with-aad.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -57,9 +57,7 @@ To protect an API with Azure AD, the first step is to register an application in
5757

5858
1. On the app **Overview** page, find the **Application (client) ID** value and record it for later.
5959

60-
When the application is created, make a note of the **Application ID**, for use in a subsequent step.
61-
62-
1. Select **Expose an API** and click on **Save and continue** to create an Application ID URI.
60+
1. Select **Expose an API** and set the **Application ID URI** with the default value. Record this value for later.
6361

6462
1. In the **Add a scope** page, create a new scope supported by the API. (e.g., Read) then click on *Add scope* to create the scope. Repeat this step to add all scopes supported by your API.
6563

@@ -200,7 +198,7 @@ You can use the [Validate JWT](api-management-access-restriction-policies.md#Val
200198
<openid-config url="https://login.microsoftonline.com/{aad-tenant}/.well-known/openid-configuration" />
201199
<required-claims>
202200
<claim name="aud">
203-
<value>{Application ID of backend-app}</value>
201+
<value>{Application ID URI of backend-app}</value>
204202
</claim>
205203
</required-claims>
206204
</validate-jwt>

articles/api-management/api-management-role-based-access-control.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -24,17 +24,17 @@ Azure API Management relies on Azure Role-Based Access Control (RBAC) to enable
2424

2525
## Built-in roles
2626

27-
API Management currently provides three built-in roles and will add two more roles in the near future. These roles can be assigned at different scopes, including subscription, resource group, and individual API Management instance. For instance, if you assign the "Azure API Management Service Reader" role to a user at the resource-group level, then the user has read access to all API Management instances inside the resource group.
27+
API Management currently provides three built-in roles and will add two more roles in the near future. These roles can be assigned at different scopes, including subscription, resource group, and individual API Management instance. For instance, if you assign the "API Management Service Reader" role to a user at the resource-group level, then the user has read access to all API Management instances inside the resource group.
2828

2929
The following table provides brief descriptions of the built-in roles. You can assign these roles by using the Azure portal or other tools, including Azure [PowerShell](https://docs.microsoft.com/azure/role-based-access-control/role-assignments-powershell), [Azure CLI](https://docs.microsoft.com/azure/role-based-access-control/role-assignments-cli), and [REST API](https://docs.microsoft.com/azure/role-based-access-control/role-assignments-rest). For details about how to assign built-in roles, see [Use role assignments to manage access to your Azure subscription resources](https://docs.microsoft.com/azure/role-based-access-control/role-assignments-portal).
3030

3131
| Role | Read access<sup>[1]</sup> | Write access<sup>[2]</sup> | Service creation, deletion, scaling, VPN, and custom domain configuration | Access to the legacy publisher portal | Description
3232
| ------------- | ---- | ---- | ---- | ---- | ----
33-
| Azure API Management Service Contributor ||||| Super user. Has full CRUD access to API Management services and entities (for example, APIs and policies). Has access to the legacy publisher portal. |
34-
| Azure API Management Service Reader || | || Has read-only access to API Management services and entities. |
35-
| Azure API Management Service Operator || || | Can manage API Management services, but not entities.|
36-
| Azure API Management Service Editor<sup>*</sup> ||| | | Can manage API Management entities, but not services.|
37-
| Azure API Management Content Manager<sup>*</sup> || | || Can manage the developer portal. Read-only access to services and entities.|
33+
| API Management Service Contributor ||||| Super user. Has full CRUD access to API Management services and entities (for example, APIs and policies). Has access to the legacy publisher portal. |
34+
| API Management Service Reader || | || Has read-only access to API Management services and entities. |
35+
| API Management Service Operator || || | Can manage API Management services, but not entities.|
36+
| API Management Service Editor<sup>*</sup> ||| | | Can manage API Management entities, but not services.|
37+
| API Management Content Manager<sup>*</sup> || | || Can manage the developer portal. Read-only access to services and entities.|
3838

3939
<sup>[1] Read access to API Management services and entities (for example, APIs and policies).</sup>
4040

@@ -49,7 +49,7 @@ If none of the built-in roles meet your specific needs, custom roles can be crea
4949
> [!NOTE]
5050
> To be able to see an API Management instance in the Azure portal, a custom role must include the ```Microsoft.ApiManagement/service/read``` action.
5151
52-
When you create a custom role, it's easier to start with one of the built-in roles. Edit the attributes to add **Actions**, **NotActions**, or **AssignableScopes**, and then save the changes as a new role. The following example begins with the "Azure API Management Service Reader" role and creates a custom role called "Calculator API Editor." You can assign the custom role to a specific API. Consequently, this role only has access to that API.
52+
When you create a custom role, it's easier to start with one of the built-in roles. Edit the attributes to add **Actions**, **NotActions**, or **AssignableScopes**, and then save the changes as a new role. The following example begins with the "API Management Service Reader" role and creates a custom role called "Calculator API Editor." You can assign the custom role to a specific API. Consequently, this role only has access to that API.
5353

5454
```powershell
5555
$role = Get-AzRoleDefinition "API Management Service Reader Role"
@@ -79,4 +79,4 @@ To learn more about Role-Based Access Control in Azure, see the following articl
7979
* [Get started with access management in the Azure portal](../role-based-access-control/overview.md)
8080
* [Use role assignments to manage access to your Azure subscription resources](../role-based-access-control/role-assignments-portal.md)
8181
* [Custom roles in Azure RBAC](../role-based-access-control/custom-roles.md)
82-
* [Azure Resource Manager resource provider operations](../role-based-access-control/resource-provider-operations.md#microsoftapimanagement)
82+
* [Azure Resource Manager resource provider operations](../role-based-access-control/resource-provider-operations.md#microsoftapimanagement)

articles/app-service/app-service-ip-restrictions.md

Lines changed: 40 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Restrict access for IP addresses
3-
description: Learn how to secure your app in Azure App Service by explicitly whitelisting client IP addresses or address ranges.
2+
title: Azure App Service access restrictions
3+
description: Learn how to secure your app in Azure App Service by specifying access restrictions.
44
author: ccompy
55

66
ms.assetid: 3be1f4bd-8a81-4565-8a56-528c037b24bd
@@ -12,19 +12,19 @@ ms.custom: seodec18
1212
---
1313
# Azure App Service Access Restrictions #
1414

15-
Access Restrictions enable you to define a priority ordered allow/deny list that controls network access to your app. The list can include IP addresses or Azure Virtual Network subnets. When there are one or more entries, there is then an implicit "deny all" that exists at the end of the list.
15+
Access restrictions enable you to define a priority ordered allow/deny list that controls network access to your app. The list can include IP addresses or Azure Virtual Network subnets. When there are one or more entries, there is then an implicit "deny all" that exists at the end of the list.
1616

17-
The Access Restrictions capability works with all App Service hosted work loads including; web apps, API apps, Linux apps, Linux container apps, and Functions.
17+
The access restrictions capability works with all App Service hosted work loads including; web apps, API apps, Linux apps, Linux container apps, and Functions.
1818

1919
When a request is made to your app, the FROM address is evaluated against the IP address rules in your access restrictions list. If the FROM address is in a subnet that is configured with service endpoints to Microsoft.Web, then the source subnet is compared against the virtual network rules in your access restrictions list. If the address is not allowed access based on the rules in the list, the service replies with an [HTTP 403](https://en.wikipedia.org/wiki/HTTP_403) status code.
2020

2121
The access restrictions capability is implemented in the App Service front-end roles, which are upstream of the worker hosts where your code runs. Therefore, access restrictions are effectively network ACLs.
2222

23-
The ability to restrict access to your web app from an Azure Virtual Network (VNet) is called [service endpoints][serviceendpoints]. Service endpoints enable you to restrict access to a multi-tenant service from selected subnets. It must be enabled on both the networking side as well as the service that it is being enabled with. It does not work to restrict traffic to apps that are hosted in an App Service Environment. If you are in an App Service Environment, you can control access to your app with IP address rules.
23+
The ability to restrict access to your web app from an Azure Virtual Network (VNet) is called [service endpoints][serviceendpoints]. Service endpoints enable you to restrict access to a multi-tenant service from selected subnets. It must be enabled on both the networking side as well as the service that it is being enabled with. It does not work to restrict traffic to apps that are hosted in an App Service Environment. If you are in an App Service Environment, you can control access to your app with IP address rules.
2424

2525
![access restrictions flow](media/app-service-ip-restrictions/access-restrictions-flow.png)
2626

27-
## Adding and editing Access Restriction rules in the portal ##
27+
## Adding and editing access restriction rules in the portal ##
2828

2929
To add an access restriction rule to your app, use the menu to open **Network**>**Access Restrictions** and click on **Configure Access Restrictions**
3030

@@ -54,7 +54,7 @@ Service endpoints enables you to restrict access to selected Azure virtual netwo
5454

5555
Service endpoints cannot be used to restrict access to apps that run in an App Service Environment. When your app is in an App Service Environment, you can control access to your app with IP access rules.
5656

57-
With service endpoints, you can configure your app with Application Gateways or other WAF devices. You can also configure multi-tier applications with secure backends. For more details on some of the possibilities, read [Networking features and App Service](networking-features.md).
57+
With service endpoints, you can configure your app with Application Gateways or other WAF devices. You can also configure multi-tier applications with secure backends. For more details on some of the possibilities, read [Networking features and App Service](networking-features.md) and [Application Gateway integration with service endpoints](networking/app-gateway-with-service-endpoints.md).
5858

5959
## Managing access restriction rules
6060

@@ -86,34 +86,50 @@ In addition to being able to control access to your app, you can also restrict a
8686

8787
## Programmatic manipulation of access restriction rules ##
8888

89-
There currently is no CLI or PowerShell for the new Access Restrictions capability but the values can be set manually with an [Azure REST API](https://docs.microsoft.com/rest/api/azure/) PUT operation on the app configuration in Resource Manager. As an example, you can use resources.azure.com and edit the ipSecurityRestrictions block to add the required JSON.
89+
[Azure CLI](https://docs.microsoft.com/cli/azure/webapp/config/access-restriction?view=azure-cli-latest) and [Azure PowerShell](https://docs.microsoft.com/powershell/module/Az.Websites/Add-AzWebAppAccessRestrictionRule?view=azps-3.1.0) has support for editing access restrictions.
90+
Example of adding an access restriction using Azure CLI:
91+
92+
```azurecli-interactive
93+
az webapp config access-restriction add --resource-group ResourceGroup --name AppName \
94+
--rule-name 'IP example rule' --action Allow --ip-address 122.133.144.0/24 --priority 100
95+
```
96+
Example of adding an access restriction using Azure PowerShell:
97+
98+
```azurepowershell-interactive
99+
Add-AzWebAppAccessRestrictionRule -ResourceGroupName "ResourceGroup" -WebAppName "AppName"
100+
-Name "Ip example rule" -Priority 100 -Action Allow -IpAddress 122.133.144.0/24
101+
```
102+
103+
Values can also be set manually with an [Azure REST API](https://docs.microsoft.com/rest/api/azure/) PUT operation on the app configuration in Resource Manager or using an Azure Resource Manager template. As an example, you can use resources.azure.com and edit the ipSecurityRestrictions block to add the required JSON.
90104

91105
The location for this information in Resource Manager is:
92106

93107
management.azure.com/subscriptions/**subscription ID**/resourceGroups/**resource groups**/providers/Microsoft.Web/sites/**web app name**/config/web?api-version=2018-02-01
94108

95109
The JSON syntax for the earlier example is:
96-
97-
{
98-
"properties": {
99-
"ipSecurityRestrictions": [
100-
{
101-
"ipAddress": "122.133.144.0/24",
102-
"action": "Allow",
103-
"tag": "Default",
104-
"priority": 100,
105-
"name": "IP example rule"
106-
}
107-
]
110+
```json
111+
{
112+
"properties": {
113+
"ipSecurityRestrictions": [
114+
{
115+
"ipAddress": "122.133.144.0/24",
116+
"action": "Allow",
117+
"priority": 100,
118+
"name": "IP example rule"
108119
}
109-
}
120+
]
121+
}
122+
}
123+
```
110124

111-
## Function App IP Restrictions
125+
## Azure Function App Access Restrictions
112126

113-
IP restrictions are available for both Function Apps with the same functionality as App Service plans. Enabling IP restrictions will disable the portal code editor for any disallowed IPs.
127+
Access restrictions are available for both Function Apps with the same functionality as App Service plans. Enabling access restrictions will disable the portal code editor for any disallowed IPs.
114128

115-
[Learn more here](../azure-functions/functions-networking-options.md#inbound-ip-restrictions)
129+
## Next steps
130+
[Access restrictions for Azure Function Apps](../azure-functions/functions-networking-options.md#inbound-ip-restrictions)
116131

132+
[Application Gateway integration with service endpoints](networking/app-gateway-with-service-endpoints.md)
117133

118134
<!--Links-->
119135
[serviceendpoints]: https://docs.microsoft.com/azure/virtual-network/virtual-network-service-endpoints-overview

0 commit comments

Comments
 (0)