Skip to content

Commit e1989a1

Browse files
authored
Merge branch 'main' into 6-azure-purview-to-microsoft-purview
2 parents 8594abd + 7887e02 commit e1989a1

File tree

291 files changed

+4139
-1992
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

291 files changed

+4139
-1992
lines changed

articles/active-directory/conditional-access/concept-conditional-access-users-groups.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ By default the policy will provide an option to exclude the current user from th
7474

7575
![Warning, don't lock yourself out!](./media/concept-conditional-access-users-groups/conditional-access-users-and-groups-lockout-warning.png)
7676

77-
If you do find yourself locked out[What to do if you are locked out of the Azure portal?](troubleshoot-conditional-access.md#what-to-do-if-youre-locked-out-of-the-azure-portal)
77+
If you do find yourself locked out, see [What to do if you are locked out of the Azure portal?](troubleshoot-conditional-access.md#what-to-do-if-youre-locked-out-of-the-azure-portal)
7878

7979
## Next steps
8080

articles/active-directory/devices/howto-vm-sign-in-azure-ad-linux.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -56,6 +56,9 @@ It's not supported to use this extension on Azure Kubernetes Service (AKS) clust
5656

5757
If you choose to install and use the CLI locally, you must be running the Azure CLI version 2.22.1 or later. Run `az --version` to find the version. If you need to install or upgrade, see [Install Azure CLI](/cli/azure/install-azure-cli).
5858

59+
> [!NOTE]
60+
> This is functionality is also available for [Azure Arc-enabled servers](../../azure-arc/servers/ssh-arc-overview.md).
61+
5962
## Requirements for login with Azure AD using openSSH certificate-based authentication
6063

6164
To enable Azure AD login using SSH certificate-based authentication for Linux VMs in Azure, ensure the following network, virtual machine, and client (ssh client) requirements are met.
@@ -365,8 +368,8 @@ For customers who are using previous version of Azure AD login for Linux that wa
365368
```azurecli
366369
az vm extension delete -g MyResourceGroup --vm-name MyVm -n AADLoginForLinux
367370
```
368-
> [!NOTE]
369-
> The extension uninstall can fail if there are any Azure AD users currently logged in on the VM. Make sure all users are logged off first.
371+
> [!NOTE]
372+
> The extension uninstall can fail if there are any Azure AD users currently logged in on the VM. Make sure all users are logged off first.
370373
371374
1. Enable system-assigned managed identity on your VM.
372375

@@ -448,7 +451,7 @@ Solution 1: Upgrade the Azure CLI client to version 2.21.0 or higher.
448451
449452
After the user has successfully signed in using az login, connection to the VM using `az ssh vm -ip <addres>` or `az ssh vm --name <vm_name> -g <resource_group>` fails with *Connection closed by <ip_address> port 22*.
450453
451-
Cause 1: The user isn’t assigned to the either the Virtual Machine Administrator/User Login Azure RBAC roles within the scope of this VM.
454+
Cause 1: The user isn’t assigned to either of the Virtual Machine Administrator/User Login Azure RBAC roles within the scope of this VM.
452455
453456
Solution 1: Add the user to the either of the Virtual Machine Administrator/User Login Azure RBAC roles within the scope of this VM.
454457

articles/active-directory/enterprise-users/domains-verify-custom-subdomain.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -25,11 +25,9 @@ After a root domain is added to Azure Active Directory (Azure AD), all subsequen
2525

2626
In the Azure AD portal, when the parent domain is federated and the admin tries to verify a managed subdomain on the **Custom domain names** page, you'll get a 'Failed to add domain' error with the reason "One or more properties contains invalid values." If you try to add this subdomain from the Microsoft 365 admin center, you will receive a similar error. For more information about the error, see [A child domain doesn't inherit parent domain changes in Office 365, Azure, or Intune](/office365/troubleshoot/administration/child-domain-fails-inherit-parent-domain-changes).
2727

28-
## How to verify a custom subdomain
29-
3028
Because subdomains inherit the authentication type of the root domain by default, you must promote the subdomain to a root domain in Azure AD using the Microsoft Graph so you can set the authentication type to your desired type.
3129

32-
### Add the subdomain and view its authentication type
30+
## Add the subdomain
3331

3432
1. Use PowerShell to add the new subdomain, which has its root domain's default authentication type. The Azure AD and Microsoft 365 admin centers don't yet support this operation.
3533

@@ -61,15 +59,15 @@ Because subdomains inherit the authentication type of the root domain by default
6159
},
6260
```
6361

64-
### Use Microsoft Graph API to make this a root domain
62+
## Change subdomain to a root domain
6563

6664
Use the following command to promote the subdomain:
6765

6866
```http
6967
POST https://graph.microsoft.com/v1.0/domains/foo.contoso.com/promote
7068
```
7169

72-
#### Promote command error conditions
70+
### Promote command error conditions
7371

7472
Scenario | Method | Code | Message
7573
-------- | ------ | ---- | -------

articles/active-directory/managed-identities-azure-resources/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -125,6 +125,8 @@
125125
href: how-to-assign-app-role-managed-identity-cli.md
126126
- name: View managed identity activity
127127
href: how-to-view-managed-identity-activity.md
128+
- name: Move a managed identity to a new region
129+
href: how-to-managed-identity-regional-move.md
128130

129131
- name: Reference
130132
items:
Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
---
2+
title: Move managed identities to another region - Azure AD
3+
description: Steps involved in getting a managed identity recreated in another region
4+
services: active-directory
5+
documentationcenter:
6+
author: barclayn
7+
manager: karenhoran
8+
editor:
9+
10+
ms.service: active-directory
11+
ms.subservice: msi
12+
ms.topic: how-to
13+
ms.tgt_pltfrm: na
14+
ms.workload: identity
15+
ms.date: 04/13/2022
16+
ms.author: barclayn
17+
ms.custom: subject-moving-resources
18+
19+
---
20+
21+
# Move managed identity for Azure resources across regions
22+
23+
There are situations in which you'd want to move your existing user-assigned managed identities from one region to another. For example, you may need to move a solution that uses user-assigned managed identities to another region. You may also want to move an existing identity to another region as part of disaster recovery planning, and testing.
24+
25+
Moving User-assigned managed identities across Azure regions is not supported. You can however, recreate a user-assigned managed identity in the target region.
26+
27+
## Prerequisites
28+
29+
- Permissions to list permissions granted to existing user-assigned managed identity.
30+
- Permissions to grant a new user-assigned managed identity the required permissions.
31+
- Permissions to assign a new user-assigned identity to the Azure resources.
32+
- Permissions to edit Group membership, if your user-assigned managed identity is a member of one or more groups.
33+
34+
## Prepare and move
35+
36+
1. Copy user-assigned managed identity assigned permissions. You can list [Azure role assignments](../../role-based-access-control/role-assignments-list-powershell.md) but that may not be enough depending on how permissions were granted to the user-assigned managed identity. You should confirm that your solution doesn't depend on permissions granted using a service specific option.
37+
1. Create a [new user-assigned managed identity](how-manage-user-assigned-managed-identities.md?pivots=identity-mi-methods-powershell#create-a-user-assigned-managed-identity-2) at the target region.
38+
1. Grant the managed identity the same permissions as the original identity that it's replacing, including Group membership. You can review [Assign Azure roles to a managed identity](../../role-based-access-control/role-assignments-portal-managed-identity.md), and [Group membership](../../active-directory/fundamentals/active-directory-groups-view-azure-portal.md).
39+
1. Specify the new identity in the properties of the resource instance that uses the newly created user assigned managed identity.
40+
41+
## Verify
42+
43+
After reconfiguring your service to use your new managed identities in the target region, you need to confirm that all operations have been restored.
44+
45+
## Clean up
46+
47+
Once that you confirm your service is back online, you can proceed to delete any resources in the source region that you no longer use.
48+
49+
## Next steps
50+
51+
In this tutorial, you took the steps needed to recreate a user-assigned managed identity in a new region.
52+
53+
- [Manage user-assigned managed identities](how-manage-user-assigned-managed-identities.md?pivots=identity-mi-methods-powershell#delete-a-user-assigned-managed-identity-2)

articles/active-directory/managed-identities-azure-resources/managed-identities-status.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ The following Azure services support managed identities for Azure resources:
5757
| Azure Media services | [Managed identities](/azure/media-services/latest/concept-managed-identities) |
5858
| Azure Monitor | [Azure Monitor customer-managed key](../../azure-monitor/logs/customer-managed-keys.md?tabs=portal) |
5959
| Azure Policy | [Remediate non-compliant resources with Azure Policy](../../governance/policy/how-to/remediate-resources.md) |
60-
| Azure Purview | [Credentials for source authentication in Azure Purview](../../purview/manage-credentials.md) |
60+
| Microsoft Purview | [Credentials for source authentication in Microsoft Purview](../../purview/manage-credentials.md) |
6161
| Azure Resource Mover | [Move resources across regions (from resource group)](../../resource-mover/move-region-within-resource-group.md)
6262
| Azure Site Recovery | [Replicate machines with private endpoints](../../site-recovery/azure-to-azure-how-to-enable-replication-private-endpoints.md#enable-the-managed-identity-for-the-vault) |
6363
| Azure Search | [Set up an indexer connection to a data source using a managed identity](../../search/search-howto-managed-identities-data-sources.md) |

articles/api-management/api-management-api-import-restrictions.md

Lines changed: 38 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -15,23 +15,27 @@ ms.author: danlep
1515
# API import restrictions and known issues
1616

1717
When importing an API, you might encounter some restrictions or need to identify and rectify issues before you can successfully import. In this article, you'll learn:
18+
1819
* API Management's behavior during OpenAPI import.
1920
* OpenAPI import limitations and how OpenAPI export works.
2021
* Requirements and limitations for WSDL and WADL import.
2122

2223
## API Management during OpenAPI import
2324

2425
During OpenAPI import, API Management:
26+
2527
* Checks specifically for query string parameters marked as required.
2628
* Converts the query string parameters to template parameters.
2729

2830
If you prefer a different behavior, you can either:
31+
2932
* Manually change via form-based editor, or
3033
* Remove the "required" attribute from the OpenAPI definition, thus not converting them to template parameters.
3134

3235
## <a name="open-api"> </a>OpenAPI/Swagger import limitations
3336

3437
If you receive errors while importing your OpenAPI document, make sure you've validated it beforehand by either:
38+
3539
* Using the designer in the Azure portal (Design > Front End > OpenAPI Specification Editor), or
3640
* With a third-party tool, such as <a href="https://editor.swagger.io">Swagger Editor</a>.
3741

@@ -52,10 +56,10 @@ If you receive errors while importing your OpenAPI document, make sure you've va
5256
**Supported versions**
5357

5458
API Management only supports:
59+
5560
* OpenAPI version 2.
5661
* OpenAPI version 3.0.x (up to version 3.0.3).
57-
58-
OpenAPI version 3.1 is currently not supported in API Management.
62+
* OpenAPI version 3.1 (import only)
5963

6064
**Size limitations**
6165

@@ -65,6 +69,7 @@ OpenAPI version 3.1 is currently not supported in API Management.
6569
| **Size limit doesn't apply** | When an OpenAPI document is provided via a URL to a location accessible from your API Management service. |
6670

6771
#### Supported extensions
72+
6873
The only supported extensions are:
6974

7075
| Extension | Description |
@@ -73,40 +78,62 @@ The only supported extensions are:
7378
| **`x-servers`** | A backport of the [OpenAPI 3 `servers` object](https://swagger.io/docs/specification/api-host-and-base-path/) for OpenAPI 2. |
7479

7580
#### Unsupported extensions
81+
7682
| Extension | Description |
7783
| ----------- | ----------- |
7884
| **`Recursion`** | API Management doesn't support definitions defined recursively.<br />For example, schemas referring to themselves. |
7985
| **`Server` object** | Not supported on the API operation level. |
8086
| **`Produces` keyword** | Describes MIME types returned by an API. <br />Not supported. |
8187

8288
#### Custom extensions
83-
- Are ignored on import.
84-
- Aren't saved or preserved for export.
89+
90+
* Are ignored on import.
91+
* Aren't saved or preserved for export.
8592

8693
#### Unsupported definitions
94+
8795
Inline schema definitions for API operations aren't supported. Schema definitions:
88-
- Are defined in the API scope.
89-
- Can be referenced in API operations request or response scopes.
96+
97+
* Are defined in the API scope.
98+
* Can be referenced in API operations request or response scopes.
9099

91100
#### Ignored definitions
101+
92102
Security definitions are ignored.
93103

104+
#### Definition restrictions
105+
106+
<!-- Ref: 1851786 Query parameter handling -->
107+
When importing query parameters, only the default array serialization method (`style: form`, `explode: true`) is supported. For more details on query parameters in OpenAPI specifications, refer to [the serialization specification](https://swagger.io/docs/specification/serialization/).
108+
109+
<!-- Ref: 1795433 Parameter limitations -->
110+
Parameters [defined in cookies](https://swagger.io/docs/specification/describing-parameters/#cookie-parameters) are not supported. You can still use policy to decode and validate the contents of cookies.
111+
94112
### <a name="open-api-v2"> </a>OpenAPI version 2
95113

96114
OpenAPI version 2 support is limited to JSON format only.
97115

98-
### <a name="open-api-v3"> </a>OpenAPI version 3.0.x
116+
<!-- Ref: 1795433 Parameter limitations -->
117+
["Form" type parameters](https://swagger.io/specification/v2/#parameter-object) are not supported. You can still use policy to decode and validate `application/x-www-form-urlencoded` and `application/form-data` payloads.
118+
119+
### <a name="open-api-v3"> </a>OpenAPI version 3.x
99120

100-
The latest supported OpenAPI version 3.0 is 3.0.3.
121+
API Management supports the following specification versions:
122+
123+
* [OpenAPI 3.0.3](https://swagger.io/specification/)
124+
* [OpenAPI 3.1.0](https://spec.openapis.org/oas/v3.1.0) (import only)
101125

102126
#### HTTPS URLs
103-
- If multiple `servers` are specified, API Management will use the first HTTPS URL it finds.
104-
- If there aren't any HTTPS URLs, the server URL will be empty.
127+
128+
* If multiple `servers` are specified, API Management will use the first HTTPS URL it finds.
129+
* If there aren't any HTTPS URLs, the server URL will be empty.
105130

106131
#### Supported
132+
107133
- `example`
108134

109135
#### Unsupported
136+
110137
The following fields are included in [OpenAPI version 3.0.x](https://swagger.io/specification/), but are not supported:
111138

112139
| Object | Field |
@@ -122,6 +149,7 @@ The following fields are included in [OpenAPI version 3.0.x](https://swagger.io/
122149
### <a name="open-import-export-general"> </a>General
123150

124151
API definitions exported from an API Management service are:
152+
125153
* Primarily intended for external applications that need to call the API hosted in API Management service.
126154
* Not intended to be imported into the same or different API Management service.
127155

articles/api-management/api-management-using-with-internal-vnet.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ After successful deployment, you should see your API Management service's **priv
6666
6767
### Enable connectivity using a Resource Manager template (`stv2` platform)
6868

69-
* Azure Resource Manager [template](https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.apimanagement/api-management-create-with-internal-vnet-publicip) (API version 2021-01-01-preview )
69+
* Azure Resource Manager [template](https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.apimanagement/api-management-create-with-internal-vnet-publicip) (API version 2021-08-01 )
7070

7171
[![Deploy to Azure](../media/template-deployments/deploy-to-azure.svg)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2Fazure-quickstart-templates%2Fmaster%2Fquickstarts%2Fmicrosoft.apimanagement%2Fapi-management-create-with-internal-vnet-publicip%2Fazuredeploy.json)
7272

articles/api-management/api-management-using-with-vnet.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ It can take 15 to 45 minutes to update the API Management instance. The Develope
5353

5454
### Enable connectivity using a Resource Manager template (`stv2` compute platform)
5555

56-
* Azure Resource Manager [template](https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.apimanagement/api-management-create-with-external-vnet-publicip) (API version 2021-01-01-preview)
56+
* Azure Resource Manager [template](https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.apimanagement/api-management-create-with-external-vnet-publicip) (API version 2021-08-01)
5757

5858
[![Deploy to Azure](../media/template-deployments/deploy-to-azure.svg)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2Fazure-quickstart-templates%2Fmaster%2Fquickstarts%2Fmicrosoft.apimanagement%2Fapi-management-create-with-external-vnet-publicip%2Fazuredeploy.json)
5959

0 commit comments

Comments
 (0)