Skip to content

Commit d92ca64

Browse files
committed
Merge remote-tracking branch 'origin' into pahealy/doc-updates
2 parents 82c3f20 + a70db9e commit d92ca64

File tree

134 files changed

+1257
-554
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

134 files changed

+1257
-554
lines changed

articles/active-directory/app-provisioning/sap-successfactors-integration-reference.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ For every user in SuccessFactors, Azure AD provisioning service retrieves the fo
7171
| 26 | Manager User | employmentNav/jobInfoNav/managerUserNav | Only if `managerUserNav` is mapped |
7272

7373
## How full sync works
74-
Based on the attribute-mapping, during full sync Azure AD provisioning service sends the following "GET" OData API query to fetch effective data of all active users.
74+
Based on the attribute-mapping, during full sync Azure AD provisioning service sends the following "GET" OData API query to fetch effective data of all active and terminated workers.
7575

7676
> [!div class="mx-tdCol2BreakAll"]
7777
>| Parameter | Description |
@@ -216,9 +216,11 @@ Extending this scenario:
216216

217217
### Mapping employment status to account status
218218

219-
By default, the Azure AD SuccessFactors connector uses the `activeEmploymentsCount` field of the `PersonEmpTerminationInfo` object to set account status. There is a known SAP SuccessFactors issue documented in [knowledge base article 3047486](https://launchpad.support.sap.com/#/notes/3047486) that at times this may disable the account of a terminated worker one day prior to the termination on the last day of work.
219+
By default, the Azure AD SuccessFactors connector uses the `activeEmploymentsCount` field of the `PersonEmpTerminationInfo` object to set account status. You may encounter one of the following issues with this attribute.
220+
1. There is a known SAP SuccessFactors issue documented in [knowledge base article 3047486](https://launchpad.support.sap.com/#/notes/3047486) that at times this may disable the account of a terminated worker one day prior to the termination on the last day of work.
221+
1. If the `PersonEmpTerminationInfo` object gets set to null, during termination, then AD account disabling will not work, as the provisioning engine filters out records where `personEmpTerminationInfoNav` object is set to null.
220222

221-
If you are running into this issue or prefer mapping employment status to account status, you can update the mapping to expand the `emplStatus` field and use the employment status code present in the field `emplStatus.externalCode`. Based on [SAP support note 2505526](https://launchpad.support.sap.com/#/notes/2505526), here is a list of employment status codes that you can retrieve in the provisioning app.
223+
If you are running into any of these issues or prefer mapping employment status to account status, you can update the mapping to expand the `emplStatus` field and use the employment status code present in the field `emplStatus.externalCode`. Based on [SAP support note 2505526](https://launchpad.support.sap.com/#/notes/2505526), here is a list of employment status codes that you can retrieve in the provisioning app.
222224
* A = Active
223225
* D = Dormant
224226
* U = Unpaid Leave

articles/active-directory/develop/permissions-consent-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ There are other ways in which applications can be granted authorization for app-
5252

5353
### Comparison of delegated and application permissions
5454

55-
| <!-- No header--> | Delegated permissions | Application permissions |
55+
| | Delegated permissions | Application permissions |
5656
|--|--|--|
5757
| Types of apps | Web / Mobile / single-page app (SPA) | Web / Daemon |
5858
| Access context | Get access on behalf of a user | Get access without a user |

articles/active-directory/develop/whats-new-docs.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: active-directory
55
author: henrymbuguakiarie
66
manager: CelesteDG
77

8-
ms.date: 01/05/2023
8+
ms.date: 01/11/2023
99
ms.service: active-directory
1010
ms.subservice: develop
1111
ms.topic: reference
@@ -27,14 +27,14 @@ Welcome to what's new in the Microsoft identity platform documentation. This art
2727

2828
### Updated articles
2929

30-
- [Quickstart: Protect an ASP.NET Core web API with the Microsoft identity platform](quickstart-v2-aspnet-core-web-api.md)
30+
- [A web API that calls web APIs: Code configuration](scenario-web-api-call-api-app-configuration.md)
3131
- [Quickstart: Get a token and call the Microsoft Graph API by using a console app's identity](quickstart-v2-netcore-daemon.md)
32+
- [Quickstart: Protect an ASP.NET Core web API with the Microsoft identity platform](quickstart-v2-aspnet-core-web-api.md)
33+
- [Tutorial: Create a Blazor Server app that uses the Microsoft identity platform for authentication](tutorial-blazor-server.md)
3234
- [Tutorial: Sign in users and call a protected API from a Blazor WebAssembly app](tutorial-blazor-webassembly.md)
33-
- [A web API that calls web APIs: Code configuration](scenario-web-api-call-api-app-configuration.md)
34-
- [Web app that signs in users: Code configuration](scenario-web-app-sign-user-app-configuration.md)
3535
- [Web app that signs in users: App registration](scenario-web-app-sign-user-app-registration.md)
36-
- [Microsoft identity platform docs: What's new](whats-new-docs.md)
37-
- [Tutorial: Create a Blazor Server app that uses the Microsoft identity platform for authentication](tutorial-blazor-server.md)
36+
- [Web app that signs in users: Code configuration](scenario-web-app-sign-user-app-configuration.md)
37+
3838
## November 2022
3939

4040
### New articles

articles/active-directory/fundamentals/whats-new.md

Lines changed: 11 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -223,31 +223,33 @@ For listing your application in the Azure AD app gallery, please read the detail
223223

224224
### ADAL End of Support Announcement
225225

226-
227-
228226
**Type:** N/A
229227
**Service category:** Other
230228
**Product capability:** Developer Experience
231229

232-
As part of our ongoing initiative to improve the developer experience, service reliability, and security of customer applications, we will end support for the Azure Active Directory Authentication Library (ADAL). The final deadline to migrate your applications to Microsoft Authentication Library (MSAL) has been extended to **June 1, 2023**.
230+
As part of our ongoing initiative to improve the developer experience, service reliability, and security of customer applications, we will end support for the Azure Active Directory Authentication Library (ADAL). The final deadline to migrate your applications to Microsoft Authentication Library (MSAL) has been extended to **June 30, 2023**.
231+
232+
### Why are we doing this?
233233

234-
### Why are we doing this?
235234
As we consolidate and evolve the Microsoft Identity platform, we are also investing in making significant improvements to the developer experience and service features that make it possible to build secure, robust and resilient applications. To make these features available to our customers we needed to update the architecture of our software development kits. As a result of this change, we’ve decided that the path forward requires us to sunset ADAL so that we can focus on developer experience investments with MSAL.
236235

237-
### What happens?
238-
We recognize that changing libraries is not an easy task, and cannot be accomplished quickly. We are committed to helping customers plan their migrations to MSAL as well as execute them with minimal disruption.
236+
### What happens?
237+
238+
We recognize that changing libraries is not an easy task, and cannot be accomplished quickly. We are committed to helping customers plan their migrations to MSAL as well as execute them with minimal disruption.
239+
239240
- In June 2020 we [announced the 2-year end of support timeline for ADAL](https://devblogs.microsoft.com/microsoft365dev/end-of-support-timelines-for-azure-ad-authentication-library-adal-and-azure-ad-graph/).
240241
- In December 2022 we’ve decided to extend the ADAL end of support to June 2023.
241242
- Through the next six months (January 2023 – June 2023) we will continue informing customers about the upcoming end of support along with providing guidance on migration.
242243
- On June 2023 we will officially sunset ADAL, removing library documentation and archiving all GitHub repositories related to the project.
243244

244-
### How to find out which applications in my tenant are using ADAL?
245+
### How to find out which applications in my tenant are using ADAL?
245246

246247
Refer to our post on [Microsoft Q&A](/answers/questions/360928/information-how-to-find-apps-using-adal-in-your-te.html) for details on identifying ADAL apps with the help of [Azure Workbooks](../../azure-monitor/visualize/workbooks-overview.md).
247248
### If I’m using ADAL, what can I expect after the deadline?
249+
248250
- There will be no new releases (security or otherwise) to the library after June 2023.
249-
- We will not be accepting any incident reports or support requests for ADAL. ADAL to MSAL Migration support would continue.
250-
- The underpinning services will continue working and applications that depend on ADAL should continue working; however, applications will be at increased security and reliability risk due to not having the latest updates, service configuration, and enhancements made available through the Microsoft Identity platform.
251+
- We will not be accepting any incident reports or support requests for ADAL. ADAL to MSAL migration support would continue.
252+
- The underpinning services will continue working and applications that depend on ADAL should continue working; however, applications and the resources they access will be at increased security and reliability risk due to not having the latest updates, service configuration, and enhancements made available through the Microsoft Identity platform.
251253

252254
### What features can I only access with MSAL?
253255

articles/active-directory/manage-apps/protect-against-consent-phishing.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ Administrators should be in control of application use by providing the right in
6262
- Block [consent phishing emails with Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/set-up-anti-phishing-policies#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365) by protecting against phishing campaigns where an attacker is impersonating a known user in the organization.
6363
- Configure Microsoft Defender for Cloud Apps policies to help manage abnormal application activity in the organization. For example, [activity policies](/cloud-app-security/user-activity-policies), [anomaly detection](/cloud-app-security/anomaly-detection-policy), and [OAuth app policies](/cloud-app-security/app-permission-policy).
6464
- Investigate and hunt for consent phishing attacks by following the guidance on [advanced hunting with Microsoft 365 Defender](/microsoft-365/security/defender/advanced-hunting-overview).
65-
- Allow access to trusted applications that meet certain criteria and that protect against those applications that don't:
65+
- Allow access to trusted applications that meet certain criteria and protect against those applications that don't:
6666
- [Configure user consent settings](./configure-user-consent.md?tabs=azure-portal) to allow users to only consent to applications that meet certain criteria, such as applications developed by your organization or from verified publishers and only for low risk permissions you select.
6767
- Use applications that have been publisher verified. [Publisher verification](../develop/publisher-verification-overview.md) helps administrators and users understand the authenticity of application developers through a Microsoft supported vetting process. Even if an application does have a verified publisher, it is still important to review the consent prompt to understand and evaluate the request. For example, reviewing the permissions being requested to ensure they align with the scenario the app is requesting them to enable, additional app and publisher details on the consent prompt, etc.
6868
- Create proactive [application governance](/microsoft-365/compliance/app-governance-manage-app-governance) policies to monitor third-party application behavior on the Microsoft 365 platform to address common suspicious application behaviors.
@@ -72,3 +72,4 @@ Administrators should be in control of application use by providing the right in
7272
- [Application consent grant investigation](/security/compass/incident-response-playbook-app-consent)
7373
- [Managing access to applications](./what-is-access-management.md)
7474
- [Restrict user consent operations in Azure AD](../../security/fundamentals/steps-secure-identity.md#restrict-user-consent-operations)
75+
- [Compromised and malicious applications investigation](/security/compass/incident-response-playbook-compromised-malicious-app)

articles/aks/azure-cni-overlay.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ Use the traditional VNet option when:
8484

8585
## Limitations with Azure CNI Overlay
8686

87-
The overlay solution has the following limitations today
87+
The overlay solution has the following limitations:
8888

8989
* Overlay can be enabled only for new clusters. Existing (already deployed) clusters can't be configured to use overlay.
9090
* You can't use Application Gateway as an Ingress Controller (AGIC) for an overlay cluster.

articles/aks/configure-kubenet.md

Lines changed: 15 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -138,10 +138,23 @@ You can create an AKS cluster using a system-assigned managed identity by runnin
138138
az aks create \
139139
--resource-group myResourceGroup \
140140
--name myAKSCluster \
141-
--node-count 3 \
142141
--network-plugin kubenet \
143-
--vnet-subnet-id $SUBNET_ID
142+
--service-cidr 10.0.0.0/16 \
143+
--dns-service-ip 10.0.0.10 \
144+
--pod-cidr 10.244.0.0/16 \
145+
--docker-bridge-address 172.17.0.1/16 \
146+
--vnet-subnet-id $SUBNET_ID
144147
```
148+
* The *--service-cidr* is optional. This address is used to assign internal services in the AKS cluster an IP address. This IP address range should be an address space that isn't in use elsewhere in your network environment, including any on-premises network ranges if you connect, or plan to connect, your Azure virtual networks using Express Route or a Site-to-Site VPN connection.
149+
150+
* The *--dns-service-ip* is optional. The address should be the *.10* address of your service IP address range.
151+
152+
* The *--pod-cidr* is optional. This address should be a large address space that isn't in use elsewhere in your network environment. This range includes any on-premises network ranges if you connect, or plan to connect, your Azure virtual networks using Express Route or a Site-to-Site VPN connection.
153+
* This address range must be large enough to accommodate the number of nodes that you expect to scale up to. You can't change this address range once the cluster is deployed if you need more addresses for additional nodes.
154+
* The pod IP address range is used to assign a */24* address space to each node in the cluster. In the following example, the *--pod-cidr* of *10.244.0.0/16* assigns the first node *10.244.0.0/24*, the second node *10.244.1.0/24*, and the third node *10.244.2.0/24*.
155+
* As the cluster scales or upgrades, the Azure platform continues to assign a pod IP address range to each new node.
156+
157+
* The *--docker-bridge-address* is optional. The address lets the AKS nodes communicate with the underlying management platform. This IP address must not be within the virtual network IP address range of your cluster, and shouldn't overlap with other address ranges in use on your network.
145158

146159
> [!Note]
147160
> If you wish to enable an AKS cluster to include a [Calico network policy][calico-network-policies] you can use the following command.

articles/aks/load-balancer-standard.md

Lines changed: 76 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,9 @@ titleSuffix: Azure Kubernetes Service
44
description: Learn how to use a public load balancer with a Standard SKU to expose your services with Azure Kubernetes Service (AKS).
55
services: container-service
66
ms.topic: article
7+
ms.author: pahealy
8+
author: phealy
79
ms.date: 12/19/2022
8-
ms.author: jpalma
9-
author: palma21
1010

1111
#Customer intent: As a cluster operator or developer, I want to learn how to create a service in AKS that uses an Azure Load Balancer with a Standard SKU.
1212
---
@@ -114,6 +114,80 @@ You can customize different settings for your standard public load balancer at c
114114
> [!IMPORTANT]
115115
> Only one outbound IP option (managed IPs, bring your own IP, or IP prefix) can be used at a given time.
116116

117+
### Change the inbound pool type (PREVIEW)
118+
119+
AKS nodes can be referenced in the load balancer backend pools by either their IP configuration (VMSS based membership) or by their IP address only. Utilizing the IP address based backend pool membership provides higher efficiencies when updating services and provisioning load balancers, especially at high node counts. Provisioning new clusters with IP based backend pools and converting existing clusters is now supported. When combined with NAT Gateway or user-defined routing egress types, provisioning of new nodes and services will be more performant.
120+
121+
Two different pool membership types are available:
122+
123+
- `nodeIPConfiguration` - legacy VMSS IP configuration based pool membership type
124+
- `nodeIP` - IP-based membership type
125+
126+
#### Requirements
127+
128+
* The `aks-preview` extension must be at least version 0.5.103.
129+
* The AKS cluster must be version 1.23 or newer.
130+
* The AKS cluster must be using standard load balancers and virtual machine scale sets.
131+
132+
#### Limitations
133+
134+
* Clusters using IP based backend pools are limited to 2500 nodes.
135+
136+
[!INCLUDE [preview features callout](./includes/preview/preview-callout.md)]
137+
138+
#### Install the aks-preview CLI extension
139+
140+
```azurecli-interactive
141+
# Install the aks-preview extension
142+
az extension add --name aks-preview
143+
144+
# Update the extension to make sure you have the latest version installed
145+
az extension update --name aks-preview
146+
```
147+
148+
#### Register the `IPBasedLoadBalancerPreview` preview feature
149+
150+
To create an AKS cluster with IP based backend pools, you must enable the `IPBasedLoadBalancerPreview` feature flag on your subscription.
151+
152+
Register the `IPBasedLoadBalancerPreview` feature flag by using the `az feature register` command, as shown in the following example:
153+
154+
```azurecli-interactive
155+
az feature register --namespace "Microsoft.ContainerService" --name "IPBasedLoadBalancerPreview"
156+
```
157+
158+
It takes a few minutes for the status to show *Registered*. Verify the registration status by using the `az feature list` command:
159+
160+
```azurecli-interactive
161+
az feature list -o table --query "[?contains(name, 'Microsoft.ContainerService/IPBasedLoadBalancerPreview')].{Name:name,State:properties.state}"
162+
```
163+
164+
When the feature has been registered, refresh the registration of the *Microsoft.ContainerService* resource provider by using the `az provider register` command:
165+
166+
```azurecli-interactive
167+
az provider register --namespace Microsoft.ContainerService
168+
```
169+
170+
#### Create a new AKS cluster with IP-based inbound pool membership
171+
172+
```azurecli-interactive
173+
az aks create \
174+
--resource-group myResourceGroup \
175+
--name myAKSCluster \
176+
--load-balancer-backend-pool-type=nodeIP
177+
```
178+
179+
#### Update an existing AKS cluster to use IP-based inbound pool membership
180+
181+
> [!WARNING]
182+
> This operation will cause a temporary disruption to incoming service traffic in the cluster. The impact time will increase with larger clusters that have many nodes.
183+
184+
```azurecli-interactive
185+
az aks update \
186+
--resource-group myResourceGroup \
187+
--name myAKSCluster \
188+
--load-balancer-backend-pool-type=nodeIP
189+
```
190+
117191
### Scale the number of managed outbound public IPs
118192

119193
Azure Load Balancer provides outbound and inbound connectivity from a virtual network. Outbound rules make it simple to configure network address translation for the public standard load balancer.

articles/api-management/api-management-howto-configure-custom-domain-gateway.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,8 @@ ms.author: danlep
1616

1717
When you provision a [self-hosted Azure API Management gateway](self-hosted-gateway-overview.md), it is not assigned a host name and has to be referenced by its IP address. This article shows how to map an existing custom DNS name (also referred to as hostname) to a self-hosted gateway.
1818

19+
[!INCLUDE [api-management-availability-premium-dev](../../includes/api-management-availability-premium-dev.md)]
20+
1921
## Prerequisites
2022

2123
To perform the steps described in this article, you must have:

articles/api-management/api-management-howto-provision-self-hosted-gateway.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,8 @@ ms.author: danlep
2020

2121
Provisioning a gateway resource in your Azure API Management instance is a prerequisite for deploying a self-hosted gateway. This article walks through the steps to provision a gateway resource in API Management.
2222

23+
[!INCLUDE [api-management-availability-premium-dev](../../includes/api-management-availability-premium-dev.md)]
24+
2325
## Prerequisites
2426

2527
Complete the following quickstart: [Create an Azure API Management instance](get-started-create-service-instance.md)

0 commit comments

Comments
 (0)