Skip to content

Commit dd247f7

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into 304195
2 parents 3321740 + b7ca108 commit dd247f7

File tree

139 files changed

+1408
-728
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

139 files changed

+1408
-728
lines changed
Lines changed: 10 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "What's new in Azure Active Directory business-to-customer (B2C)"
33
description: "New and updated documentation for the Azure Active Directory business-to-customer (B2C)."
4-
ms.date: 07/31/2024
4+
ms.date: 09/11/2024
55
ms.service: active-directory
66
ms.subservice: B2C
77
ms.topic: whats-new
@@ -19,6 +19,14 @@ manager: CelesteDG
1919

2020
Welcome to what's new in Azure Active Directory B2C documentation. This article lists new docs that have been added and those that have had significant updates in the last three months. To learn what's new with the B2C service, see [What's new in Microsoft Entra ID](../active-directory/fundamentals/whats-new.md), [Azure AD B2C developer release notes](custom-policy-developer-notes.md) and [What's new in Microsoft Entra External ID](/entra/external-id/whats-new-docs).
2121

22+
## August 2024
23+
24+
This month, we changed Twitter to X in numerous articles and code samples.
25+
26+
### Updated articles
27+
28+
- [Tutorial: Configure Keyless with Azure Active Directory B2C](partner-keyless.md) - Editorial updates
29+
2230
## July 2024
2331

2432
### Updated articles
@@ -31,17 +39,4 @@ Welcome to what's new in Azure Active Directory B2C documentation. This article
3139
### Updated articles
3240

3341
- [Define an OAuth2 custom error technical profile in an Azure Active Directory B2C custom policy](oauth2-error-technical-profile.md) - Error code updates
34-
- [Configure authentication in a sample Python web app by using Azure AD B2C](configure-authentication-sample-python-web-app.md) - Python version update
35-
36-
37-
## May 2024
38-
39-
### New articles
40-
41-
- [Configure Transmit Security with Azure Active Directory B2C for risk detection and prevention](partner-transmit-security.md)
42-
43-
### Updated articles
44-
45-
- [Set up sign-up and sign-in with a LinkedIn account using Azure Active Directory B2C](identity-provider-linkedin.md) - Updated LinkedIn instructions
46-
- [Page layout versions](page-layout.md) - Updated page layout versions
47-
42+
- [Configure authentication in a sample Python web app by using Azure AD B2C](configure-authentication-sample-python-web-app.md) - Python version updates

articles/azure-app-configuration/howto-geo-replication.md

Lines changed: 27 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: azure-app-configuration
77
ms.devlang: csharp
88
# ms.devlang: csharp, java
99
ms.topic: how-to
10-
ms.date: 05/24/2024
10+
ms.date: 09/09/2024
1111
ms.author: mametcal
1212
ms.custom: devx-track-azurecli
1313

@@ -16,7 +16,7 @@ ms.custom: devx-track-azurecli
1616

1717
# Enable geo-replication
1818

19-
This article covers replication of Azure App Configuration stores. You'll learn about how to create, use and delete a replica in your configuration store.
19+
This article covers replication of Azure App Configuration stores. You learn about how to create, use, and delete a replica in your configuration store.
2020

2121
To learn more about the concept of geo-replication, see [Geo-replication in Azure App Configuration](./concept-geo-replication.md).
2222

@@ -90,7 +90,7 @@ To delete a replica in the portal, follow the steps below.
9090

9191
## Automatic replica discovery
9292

93-
The App Configuration providers can automatically discover any additional replicas from a given App Configuration endpoint and attempt to connect to them. This feature allows you to benefit from geo-replication without having to change your code or redeploy your application. This means you can enable geo-replication or add extra replicas even after your application has been deployed.
93+
The App Configuration providers can automatically discover any replicas from a given App Configuration endpoint and attempt to connect to them. This feature allows you to benefit from geo-replication without having to change your code or redeploy your application. This means you can enable geo-replication or add extra replicas even after your application has been deployed.
9494

9595
Automatic replica discovery is enabled by default, but you can refer to the following sample code to disable it (not recommended).
9696

@@ -147,13 +147,25 @@ spec:
147147
> [!NOTE]
148148
> The automatic replica discovery and failover support is available if you use version **1.3.0** or later of [Azure App Configuration Kubernetes Provider](./quickstart-azure-kubernetes-service.md).
149149
150+
### [Python](#tab/python)
151+
152+
Specify the `replica_discovery_enabled` property when loading the configuration store and set it to `False`.
153+
154+
155+
```python
156+
config = load(endpoint=endpoint, credential=credential, replica_discovery_enabled=False)
157+
```
158+
159+
> [!NOTE]
160+
> The automatic replica discovery support is available if you use version **1.3.0** or later.
161+
150162
---
151163

152164
## Scale and failover with replicas
153165

154166
Each replica you create has its dedicated endpoint. If your application resides in multiple geo-locations, you can update each deployment of your application in a location to connect to the replica closer to that location, which helps minimize the network latency between your application and App Configuration. Since each replica has its separate request quota, this setup also helps the scalability of your application while it grows to a multi-region distributed service.
155167

156-
When geo-replication is enabled, and if one replica isn't accessible, you can let your application failover to another replica for improved resiliency. App Configuration providers have built-in failover support through user provided replicas as well as additional automatically discovered replicas. You can provide a list of your replica endpoints in the order of the most preferred to the least preferred endpoint. When the current endpoint isn't accessible, the provider will fail over to a less preferred endpoint, but it will try to connect to the more preferred endpoints from time to time. If all user provided replicas are not accessible, the automatically discovered replicas will be randomly selected and used. When a more preferred endpoint becomes available, the provider will switch to it for future requests.
168+
When geo-replication is enabled, and if one replica isn't accessible, you can let your application failover to another replica for improved resiliency. App Configuration providers have built-in failover support through user provided replicas and/or additional automatically discovered replicas. You can provide a list of your replica endpoints in the order of the most preferred to the least preferred endpoint. When the current endpoint isn't accessible, the provider will fail over to a less preferred endpoint, but it tries to connect to the more preferred endpoints from time to time. If all user provided replicas aren't accessible, the automatically discovered replicas will be randomly selected and used. When a more preferred endpoint becomes available, the provider will switch to it for future requests.
157169

158170
Assuming you have an application using Azure App Configuration, you can update it as the following sample code to take advantage of the failover feature. You can either provide a list of endpoints for Microsoft Entra authentication or a list of connection strings for access key-based authentication.
159171

@@ -227,7 +239,11 @@ spring.cloud.azure.appconfiguration.stores[0].connection-strings[1]="${SECOND_RE
227239

228240
### [Kubernetes](#tab/kubernetes)
229241

230-
The Azure App Configuration Kubernetes Provider supports failover with automatically discovered replicas by default, as long as automatic replica discovery is not disabled. It does not support or require user-provided replicas.
242+
The Azure App Configuration Kubernetes Provider supports failover with automatically discovered replicas by default, as long as automatic replica discovery isn't disabled. It doesn't support or require user-provided replicas.
243+
244+
### [Python](#tab/python)
245+
246+
The Azure App Configuration Python Provider supports failover with automatically discovered replicas by default, as long as automatic replica discovery isn't disabled. It doesn't support or require user-provided replicas.
231247

232248
---
233249

@@ -266,11 +282,15 @@ configurationBuilder.AddAzureAppConfiguration(options =>
266282

267283
### [Java Spring](#tab/spring)
268284

269-
This feature is not yet supported in the Azure App Configuration Java Spring Provider.
285+
This feature isn't yet supported in the Azure App Configuration Java Spring Provider.
270286

271287
### [Kubernetes](#tab/kubernetes)
272288

273-
This feature is not yet supported in the Azure App Configuration Kubernetes Provider.
289+
This feature isn't yet supported in the Azure App Configuration Kubernetes Provider.
290+
291+
### [Python](#tab/python)
292+
293+
This feature isn't yet supported in the Azure App Configuration Python Provider.
274294

275295
---
276296

articles/azure-app-configuration/quickstart-azure-kubernetes-service.md

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -241,7 +241,7 @@ Add following key-values to the App Configuration store and leave **Label** and
241241
--namespace azappconfig-system \
242242
--create-namespace
243243
```
244-
244+
245245
> [!TIP]
246246
> The App Configuration Kubernetes Provider is also available as an AKS extension. This integration allows for seamless installation and management via the Azure CLI, ARM templates, or Bicep templates. Utilizing the AKS extension facilitates automatic minor/patch version updates, ensuring your system is always up-to-date. For detailed installation instructions, please refer to the [Azure App Configuration extension for Azure Kubernetes Service](/azure/aks/azure-app-configuration).
247247
@@ -261,10 +261,10 @@ Add following key-values to the App Configuration store and leave **Label** and
261261
key: mysettings.json
262262
auth:
263263
workloadIdentity:
264-
managedIdentityClientId: <your-managed-identity-client-id>
264+
serviceAccountName: <your-service-account-name>
265265
```
266266
267-
Replace the value of the `endpoint` field with the endpoint of your Azure App Configuration store. Follow the steps in [use workload identity](./reference-kubernetes-provider.md#use-workload-identity) and update the `auth` section with the client ID of the user-assigned managed identity you created.
267+
Replace the value of the `endpoint` field with the endpoint of your Azure App Configuration store. Proceed to the next step to update the `auth` section with your authentication information.
268268
269269
> [!NOTE]
270270
> `AzureAppConfigurationProvider` is a declarative API object. It defines the desired state of the ConfigMap created from the data in your App Configuration store with the following behavior:
@@ -273,6 +273,8 @@ Add following key-values to the App Configuration store and leave **Label** and
273273
> - The ConfigMap will be reset based on the present data in your App Configuration store if it's deleted or modified by any other means.
274274
> - The ConfigMap will be deleted if the App Configuration Kubernetes Provider is uninstalled.
275275
276+
1. Follow the [instructions to use the workload identity](./reference-kubernetes-provider.md#use-workload-identity) to authenticate with your App Configuration store. Update the *appConfigurationProvider.yaml* file by replacing the `serviceAccountName` field with the name of the service account you created. For more information on other authentication methods, refer to the examples in the [Authentication](./reference-kubernetes-provider.md#authentication) section.
277+
276278
1. Update the *deployment.yaml* file in the *Deployment* directory to use the ConfigMap `configmap-created-by-appconfig-provider` as a mounted data volume. It is important to ensure that the `volumeMounts.mountPath` matches the `WORKDIR` specified in your *Dockerfile* and the *config* directory created before.
277279
278280
```yaml
@@ -370,6 +372,10 @@ Ensure that you specify the correct key-value selectors to match the expected da
370372

371373
You can customize the installation by providing additional Helm values when installing the Azure App Configuration Kubernetes Provider. For example, you can set the log level, configure the provider to run on a specific node, or disable the workload identity. Refer to the [installation guide](./reference-kubernetes-provider.md#installation) for more information.
372374

375+
#### Why am I unable to authenticate with Azure App Configuration using workload identity after upgrading the provider to version 2.0.0?
376+
377+
Starting with version 2.0.0, a user-provided service account is required for authenticating with Azure App Configuration [using workload identity](./reference-kubernetes-provider.md#use-workload-identity). This change enhances security through namespace isolation. Previously, a Kubernetes provider’s service account was used for all namespaces. For updated instructions, see the documentation on using workload identity. If you need time to migrate when upgrading to version 2.0.0, you can temporarily set `workloadIdentity.globalServiceAccountEnabled=true` during provider installation. Please note that support for using the provider’s service account will be deprecated in a future release.
378+
373379
## Clean up resources
374380

375381
Uninstall the App Configuration Kubernetes Provider from your AKS cluster if you want to keep the AKS cluster.

0 commit comments

Comments
 (0)