Skip to content

Commit e04e7d0

Browse files
author
Owen Duncan
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into aas-0415
2 parents 3e70c8b + 39c856b commit e04e7d0

File tree

129 files changed

+423
-567
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

129 files changed

+423
-567
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -51114,6 +51114,16 @@
5111451114
"source_path": "articles/security/fundamentals/database-best-practices.md",
5111551115
"redirect_url": "/azure/sql-database/sql-database-security-best-practice",
5111651116
"redirect_document_id": false
51117+
},
51118+
{
51119+
"source_path": "articles/healthcare-apis/configure-azure-rbac.md",
51120+
"redirect_url": "/azure/healthcare-apis/azure-api-for-fhir-additional-settings",
51121+
"redirect_document_id": false
51122+
},
51123+
{
51124+
"source_path": "articles/healthcare-apis/configure-local-rbac.md",
51125+
"redirect_url": "/azure/healthcare-apis/azure-api-for-fhir-additional-settings",
51126+
"redirect_document_id": false
5111751127
}
5111851128
]
5111951129
}

articles/active-directory-b2c/identity-provider-adfs2016-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -165,7 +165,7 @@ Now that you have a button in place, you need to link it to an action. The actio
165165
To use ADFS as an identity provider in Azure AD B2C, you need to create an ADFS Relying Party Trust with the Azure AD B2C SAML metadata. The following example shows a URL address to the SAML metadata of an Azure AD B2C technical profile:
166166

167167
```
168-
https://your-tenant-name.b2clogin.com/your-tenant-name/your-policy/samlp/metadata?idptp=your-technical-profile
168+
https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/your-policy/samlp/metadata?idptp=your-technical-profile
169169
```
170170
171171
Replace the following values:

articles/active-directory/fundamentals/active-directory-how-subscriptions-associated-directory.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ Changing the subscription directory is a service-level operation, so it doesn't
8181

8282
After you associate a subscription to a different directory, you might need to do the following tasks to resume operations:
8383

84-
- If you have any key vaults, you must change the key vault tenant ID. For more information, see [Change a key vault tenant ID after a subscription move](../../key-vault/key-vault-subscription-move-fix.md).
84+
- If you have any key vaults, you must change the key vault tenant ID. For more information, see [Change a key vault tenant ID after a subscription move](../../key-vault/general/subscription-move-fix.md).
8585

8686
- If you used system-assigned Managed Identities for resources, you must re-enable these identities. If you used user-assigned Managed Identities, you must re-create these identities. After re-enabling or recreating the Managed Identities, you must re-establish the permissions assigned to those identities. For more information, see [What is managed identities for Azure resources?](../managed-identities-azure-resources/overview.md).
8787

articles/app-service/app-service-key-vault-references.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,23 +12,23 @@ ms.custom: seodec18
1212

1313
# Use Key Vault references for App Service and Azure Functions
1414

15-
This topic shows you how to work with secrets from Azure Key Vault in your App Service or Azure Functions application without requiring any code changes. [Azure Key Vault](../key-vault/key-vault-overview.md) is a service that provides centralized secrets management, with full control over access policies and audit history.
15+
This topic shows you how to work with secrets from Azure Key Vault in your App Service or Azure Functions application without requiring any code changes. [Azure Key Vault](../key-vault/general/overview.md) is a service that provides centralized secrets management, with full control over access policies and audit history.
1616

1717
## Granting your app access to Key Vault
1818

1919
In order to read secrets from Key Vault, you need to have a vault created and give your app permission to access it.
2020

21-
1. Create a key vault by following the [Key Vault quickstart](../key-vault/quick-create-cli.md).
21+
1. Create a key vault by following the [Key Vault quickstart](../key-vault/secrets/quick-create-cli.md).
2222

2323
1. Create a [system-assigned managed identity](overview-managed-identity.md) for your application.
2424

2525
> [!NOTE]
2626
> Key Vault references currently only support system-assigned managed identities. User-assigned identities cannot be used.
2727
28-
1. Create an [access policy in Key Vault](../key-vault/key-vault-secure-your-key-vault.md#key-vault-access-policies) for the application identity you created earlier. Enable the "Get" secret permission on this policy. Do not configure the "authorized application" or `applicationId` settings, as this is not compatible with a managed identity.
28+
1. Create an [access policy in Key Vault](../key-vault/general/secure-your-key-vault.md#key-vault-access-policies) for the application identity you created earlier. Enable the "Get" secret permission on this policy. Do not configure the "authorized application" or `applicationId` settings, as this is not compatible with a managed identity.
2929

3030
> [!NOTE]
31-
> Key Vault references are not presently able to resolve secrets stored in a key vault with [network restrictions](../key-vault/key-vault-overview-vnet-service-endpoints.md).
31+
> Key Vault references are not presently able to resolve secrets stored in a key vault with [network restrictions](../key-vault/general/overview-vnet-service-endpoints.md).
3232
3333
## Reference syntax
3434

articles/app-service/app-service-web-tutorial-connect-msi.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ In *Web.config*, working from the top of the file and make the following changes
123123
- Find the connection string called `MyDbConnection` and replace its `connectionString` value with `"server=tcp:<server-name>.database.windows.net;database=<db-name>;UID=AnyString;Authentication=Active Directory Interactive"`. Replace _\<server-name>_ and _\<db-name>_ with your server name and database name.
124124

125125
> [!NOTE]
126-
> The SqlAuthenticationProvider you just registered is based on top of the AppAuthentication library you installed earlier. By default, it uses a system-assigned identity. To leverage a user-assigned identity, you will need to provide an additional configuration. Please see [connection string support](../key-vault/service-to-service-authentication.md#connection-string-support) for the AppAuthentication library.
126+
> The SqlAuthenticationProvider you just registered is based on top of the AppAuthentication library you installed earlier. By default, it uses a system-assigned identity. To leverage a user-assigned identity, you will need to provide an additional configuration. Please see [connection string support](../key-vault/general/service-to-service-authentication.md#connection-string-support) for the AppAuthentication library.
127127

128128
That's every thing you need to connect to SQL Database. When debugging in Visual Studio, your code uses the Azure AD user you configured in [Set up Visual Studio](#set-up-visual-studio). You'll set up the SQL Database server later to allow connection from the managed identity of your App Service app.
129129

articles/app-service/configure-language-java.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -183,7 +183,7 @@ Follow the instructions in the [Secure a custom DNS name with a TLS binding in A
183183
184184
### Use KeyVault References
185185
186-
[Azure KeyVault](../key-vault/key-vault-overview.md) provides centralized secret management with access policies and audit history. You can store secrets (such as passwords or connection strings) in KeyVault and access these secrets in your application through environment variables.
186+
[Azure KeyVault](../key-vault/general/overview.md) provides centralized secret management with access policies and audit history. You can store secrets (such as passwords or connection strings) in KeyVault and access these secrets in your application through environment variables.
187187
188188
First, follow the instructions for [granting your app access to Key Vault](app-service-key-vault-references.md#granting-your-app-access-to-key-vault) and [making a KeyVault reference to your secret in an Application Setting](app-service-key-vault-references.md#reference-syntax). You can validate that the reference resolves to the secret by printing the environment variable while remotely accessing the App Service terminal.
189189

articles/app-service/configure-ssl-certificate.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@ If you purchase an App Service Certificate from Azure, Azure manages the followi
8989

9090
- Takes care of the purchase process from GoDaddy.
9191
- Performs domain verification of the certificate.
92-
- Maintains the certificate in [Azure Key Vault](../key-vault/key-vault-overview.md).
92+
- Maintains the certificate in [Azure Key Vault](../key-vault/general/overview.md).
9393
- Manages certificate renewal (see [Renew certificate](#renew-certificate)).
9494
- Synchronize the certificate automatically with the imported copies in App Service apps.
9595

@@ -135,8 +135,8 @@ In the **Key Vault Status** page, click **Key Vault Repository** to create a new
135135
| Resource group | As a recommendation, select the same resource group as your App Service certificate. |
136136
| Location | Select the same location as your App Service app. |
137137
| Pricing tier | For information, see [Azure Key Vault pricing details](https://azure.microsoft.com/pricing/details/key-vault/). |
138-
| Access policies| Defines the applications and the allowed access to the vault resources. You can configure it later, following the steps at [Grant several applications access to a key vault](../key-vault/key-vault-group-permissions-for-apps.md). |
139-
| Virtual Network Access | Restrict vault access to certain Azure virtual networks. You can configure it later, following the steps at [Configure Azure Key Vault Firewalls and Virtual Networks](../key-vault/key-vault-network-security.md) |
138+
| Access policies| Defines the applications and the allowed access to the vault resources. You can configure it later, following the steps at [Grant several applications access to a key vault](../key-vault/general/group-permissions-for-apps.md). |
139+
| Virtual Network Access | Restrict vault access to certain Azure virtual networks. You can configure it later, following the steps at [Configure Azure Key Vault Firewalls and Virtual Networks](../key-vault/general/network-security.md) |
140140

141141
Once you've selected the vault, close the **Key Vault Repository** page. The **Step 1: Store** option should show a green check mark for success. Keep the page open for the next step.
142142

articles/app-service/containers/configure-language-java.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -226,7 +226,7 @@ Follow the instructions in the [Secure a custom DNS name with an SSL binding in
226226
227227
### Use KeyVault References
228228
229-
[Azure KeyVault](../../key-vault/key-vault-overview.md) provides centralized secret management with access policies and audit history. You can store secrets (such as passwords or connection strings) in KeyVault and access these secrets in your application through environment variables.
229+
[Azure KeyVault](../../key-vault/general/overview.md) provides centralized secret management with access policies and audit history. You can store secrets (such as passwords or connection strings) in KeyVault and access these secrets in your application through environment variables.
230230
231231
First, follow the instructions for [granting your app access to Key Vault](../app-service-key-vault-references.md#granting-your-app-access-to-key-vault) and [making a KeyVault reference to your secret in an Application Setting](../app-service-key-vault-references.md#reference-syntax). You can validate that the reference resolves to the secret by printing the environment variable while remotely accessing the App Service terminal.
232232

articles/app-service/overview-authentication-authorization.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,12 @@ title: Authentication and authorization
33
description: Find out about the built-in authentication and authorization support in Azure App Service and Azure Functions, and how it can help secure your app against unauthorized access.
44
ms.assetid: b7151b57-09e5-4c77-a10c-375a262f17e5
55
ms.topic: article
6-
ms.date: 08/12/2019
6+
ms.date: 04/15/2020
77
ms.reviewer: mahender
88
ms.custom: [seodec18, fasttrack-edit]
99
---
1010
# Authentication and authorization in Azure App Service and Azure Functions
1111

12-
> [!NOTE]
13-
> At this time, [Azure Active Directory v2.0](../active-directory/develop/v2-overview.md) (including [MSAL](../active-directory/develop/msal-overview.md)) is not supported for Azure App Service and Azure Functions. Please check back for updates.
14-
>
1512
> [!NOTE]
1613
> At this time, ASP.NET Core does not currently support populating the current user with the Authentication/Authorization feature.
1714
>

articles/application-gateway/configure-keyvault-ps.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.author: victorh
1212

1313
# Configure TLS termination with Key Vault certificates by using Azure PowerShell
1414

15-
[Azure Key Vault](../key-vault/key-vault-overview.md) is a platform-managed secret store that you can use to safeguard secrets, keys, and TLS/SSL certificates. Azure Application Gateway supports integration with Key Vault for server certificates that are attached to HTTPS-enabled listeners. This support is limited to the Application Gateway v2 SKU.
15+
[Azure Key Vault](../key-vault/general/overview.md) is a platform-managed secret store that you can use to safeguard secrets, keys, and TLS/SSL certificates. Azure Application Gateway supports integration with Key Vault for server certificates that are attached to HTTPS-enabled listeners. This support is limited to the Application Gateway v2 SKU.
1616

1717
For more information, see [TLS termination with Key Vault certificates](key-vault-certs.md).
1818

@@ -66,7 +66,7 @@ $certificate = Get-AzKeyVaultCertificate -VaultName $kv -Name "cert1"
6666
$secretId = $certificate.SecretId.Replace($certificate.Version, "")
6767
```
6868
> [!NOTE]
69-
> The -EnableSoftDelete flag must be used for TLS termination to function properly. If you're configuring [Key Vault soft-delete through the Portal](../key-vault/key-vault-ovw-soft-delete.md#soft-delete-behavior), the retention period must be kept at 90 days, the default value. Application Gateway doesn't support a different retention period yet.
69+
> The -EnableSoftDelete flag must be used for TLS termination to function properly. If you're configuring [Key Vault soft-delete through the Portal](../key-vault/general/overview-soft-delete.md#soft-delete-behavior), the retention period must be kept at 90 days, the default value. Application Gateway doesn't support a different retention period yet.
7070
7171
### Create a virtual network
7272

0 commit comments

Comments
 (0)