Skip to content

Commit e34f156

Browse files
authored
Merge branch 'MicrosoftDocs:main' into EmailResourceManagement-AzureCLI-PowerShell
2 parents 856b866 + 610d420 commit e34f156

File tree

762 files changed

+2380
-21047
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

762 files changed

+2380
-21047
lines changed

.openpublishing.redirection.json

Lines changed: 605 additions & 5 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/identity-provider-generic-saml-options.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -422,7 +422,7 @@ Upon an application sign-out request, Azure AD B2C attempts to sign out from you
422422

423423
## Debug SAML protocol
424424

425-
To help configure and debug federation with a SAML identity provider, you can use a browser extension for the SAML protocol, such as [SAML DevTools extension](https://chrome.google.com/webstore/detail/saml-devtools-extension/jndllhgbinhiiddokbeoeepbppdnhhio) for Chrome, [SAML-tracer](https://addons.mozilla.org/es/firefox/addon/saml-tracer/) for FireFox, or [Microsoft Edge or Internet Explorer developer tools](https://techcommunity.microsoft.com/t5/microsoft-sharepoint-blog/gathering-a-saml-token-using-edge-or-ie-developer-tools/ba-p/320957).
425+
To help configure and debug federation with a SAML identity provider, you can use a browser extension for the SAML protocol, such as [SAML DevTools extension](https://chrome.google.com/webstore/detail/saml-devtools-extension/jndllhgbinhiiddokbeoeepbppdnhhio) for Chrome, [SAML-tracer](https://addons.mozilla.org/es/firefox/addon/saml-tracer/) for Firefox, or [Microsoft Edge or Internet Explorer developer tools](https://techcommunity.microsoft.com/t5/microsoft-sharepoint-blog/gathering-a-saml-token-using-edge-or-ie-developer-tools/ba-p/320957).
426426

427427
Using these tools, you can check the integration between Azure AD B2C and your SAML identity provider. For example:
428428

articles/active-directory-b2c/troubleshoot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -165,7 +165,7 @@ Use **Run now** and `https://jwt.ms` to test your policies independently of your
165165

166166
## Troubleshoot SAML protocol
167167

168-
To help configure and debug the integration with your service provider, you can use a browser extension for the SAML protocol, for example, [SAML DevTools extension](https://chrome.google.com/webstore/detail/saml-devtools-extension/jndllhgbinhiiddokbeoeepbppdnhhio) for Chrome, [SAML-tracer](https://addons.mozilla.org/es/firefox/addon/saml-tracer/) for FireFox, or [Edge or Internet Explorer developer tools](https://techcommunity.microsoft.com/t5/microsoft-sharepoint-blog/gathering-a-saml-token-using-edge-or-ie-developer-tools/ba-p/320957).
168+
To help configure and debug the integration with your service provider, you can use a browser extension for the SAML protocol, for example, [SAML DevTools extension](https://chrome.google.com/webstore/detail/saml-devtools-extension/jndllhgbinhiiddokbeoeepbppdnhhio) for Chrome, [SAML-tracer](https://addons.mozilla.org/es/firefox/addon/saml-tracer/) for Firefox, or [Edge or Internet Explorer developer tools](https://techcommunity.microsoft.com/t5/microsoft-sharepoint-blog/gathering-a-saml-token-using-edge-or-ie-developer-tools/ba-p/320957).
169169

170170
The following screenshot demonstrates how the SAML DevTools extension presents the SAML request Azure AD B2C sends to the identity provider, and the SAML response.
171171

articles/app-service/environment/networking.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -141,7 +141,7 @@ For more information about Private Endpoint and Web App, see [Azure Web App Priv
141141

142142
## DNS
143143

144-
The following sections describe the DNS considerations and configuration that apply inbound to and outbound from your App Service Environment. The examples use the domain suffix `appserviceenvironment.net` from Azure Public Cloud. If you're using other clouds like Azure Government, you need to use their respective domain suffix. For App Service Environment domains, the site name is truncated at 40 characters because of DNS limits. If you have a slot, the slot name is truncated at 19 characters.
144+
The following sections describe the DNS considerations and configuration that apply inbound to and outbound from your App Service Environment. The examples use the domain suffix `appserviceenvironment.net` from Azure Public Cloud. If you're using other clouds like Azure Government, you need to use their respective domain suffix. For App Service Environment domains, the site name is truncated at 59 characters because of DNS limits. For App Service Environment domains with slots, the site name is truncated at 40 characters and the slot name is truncated at 19 characters because of DNS limits.
145145

146146
### DNS configuration to your App Service Environment
147147

articles/app-service/environment/overview.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -152,6 +152,7 @@ App Service Environment v3 is available in the following regions:
152152
| Korea Central |||
153153
| Korea South || |
154154
| Mexico Central ||** |
155+
| New Zealand North |||
155156
| North Central US || |
156157
| North Europe |||
157158
| Norway East |||
@@ -243,6 +244,7 @@ The following sections list the regional pricing tiers (SKUs) availability for A
243244
| Korea Central ||| |
244245
| Korea South ||||
245246
| Mexico Central ||| |
247+
| New Zealand North ||| |
246248
| North Central US ||||
247249
| North Europe ||||
248250
| Norway East ||||

articles/app-service/wordpress-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ Key tools for debugging and monitoring WordPress sites include:
9090
- **[SSH Access](configure-linux-open-ssh-session.md?pivots=container-linux)**
9191

9292
### PhpMyAdmin
93-
WordPress on App Service utilizes an Azure Database for MySQL flexible server, which is integrated into a VNET. This setup restricts database access to within the VNET. WordPress on App Service includes phpMyAdmin by default. You can access it at: https://`<your-site-link>`/phpmyadmin.
93+
WordPress on App Service utilizes an Azure Database for MySQL Flexible Server, which is integrated into a VNET. This setup restricts database access to within the VNET. WordPress on App Service includes phpMyAdmin by default. You can access it at: https://`<your-site-link>`/phpmyadmin.
9494

9595
If you are using Managed Identities, you can log in to phpMyAdmin by using the value from DATABASE_USERNAME environment variable as the username and the token as the password. To find the token use your Kudu SSH to run the following command:
9696

articles/azure-netapp-files/whats-new.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,10 +14,6 @@ ms.author: anfdocs
1414

1515
Azure NetApp Files is updated regularly. This article provides a summary about the latest new features and enhancements.
1616

17-
## January 2025
18-
19-
* [Application volume group for Oracle](application-volume-group-oracle-introduction.md) and [application volume group for SAP HANA extension one](application-volume-group-introduction.md) now support customer-managed keys.
20-
2117
## December 2024
2218

2319
* [Volume enhancement: Azure NetApp Files 50 GiB minimum volume sizes](azure-netapp-files-create-volumes.md) is now generally available (GA)

articles/azure-resource-manager/managed-applications/publish-managed-identity.md

Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -359,6 +359,70 @@ The response contains an array of tokens under the `value` property:
359359
| `resourceId` | The Azure resource ID for the issued token. This value is either the managed application ID or the user-assigned managed identity ID. |
360360
| `token_type` | The type of the token. |
361361

362+
## Create a managed identity and role assignment for managed applications
363+
364+
This section describes how to create a managed identity and assign a role as part of a managed application using publisher access mode.
365+
366+
1. Create a managed identity using an Azure Resource Manager template.
367+
368+
```json
369+
{
370+
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
371+
"contentVersion": "1.0.0.0",
372+
"resources": [
373+
{
374+
"type": "Microsoft.ManagedIdentity/userAssignedIdentities",
375+
"apiVersion": "2018-11-30",
376+
"name": "myManagedIdentity",
377+
"location": "[resourceGroup().location]"
378+
}
379+
]
380+
}
381+
```
382+
383+
1. To allow for managed identity propagation, create a sleep time of 30 seconds.
384+
385+
Since the managed identity is not in the home tenant of the target scope, you must apply a delay between creating the managed identity and assigning the role to allow the managed identity to propagate between tenants. Without this delay, Azure Resource Manager might not recognize this identity when used in the template and fail within a future deployment script.
386+
387+
```json
388+
{
389+
"type": "Microsoft.Resources/deploymentScripts",
390+
"apiVersion": "2020-10-01",
391+
"name": "sleepScript",
392+
"location": "[resourceGroup().location]",
393+
"properties": {
394+
"azPowerShellVersion": "2.0",
395+
"scriptContent": "Start-Sleep -Seconds 30",
396+
"timeout": "PT1H",
397+
"cleanupPreference": "OnSuccess",
398+
"retentionInterval": "P1D"
399+
},
400+
"dependsOn": [
401+
"myManagedIdentity"
402+
]
403+
}
404+
```
405+
406+
1. Assign the Contributor role to the managed identity at the scope of the managed resource group.
407+
408+
```json
409+
{
410+
"type": "Microsoft.Authorization/roleAssignments",
411+
"apiVersion": "2020-04-01-preview",
412+
"name": "[guid(resourceGroup().id, 'Contributor')]",
413+
"properties": {
414+
"roleDefinitionId": "[subscriptionResourceId('Microsoft.Authorization/roleDefinitions', 'b24988ac-6180-42a0-ab88-20f7382dd24c')]",
415+
"principalId": "[reference(resourceId('Microsoft.ManagedIdentity/userAssignedIdentities', 'myManagedIdentity'), '2018-11-30').principalId]",
416+
"scope": "[resourceGroup().id]",
417+
"delegatedManagedIdentityResourceId": "[resourceId('Microsoft.ManagedIdentity/userAssignedIdentities','myManagedIdentity')]"
418+
},
419+
"dependsOn": [
420+
"myManagedIdentity",
421+
"sleepScript"
422+
]
423+
}
424+
```
425+
362426
## Next steps
363427

364428
> [!div class="nextstepaction"]

articles/azure-resource-manager/management/create-private-link-access-commands.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ To create the private link association, use:
7777

7878
# [Azure CLI](#tab/azure-cli)
7979

80-
### Example
80+
### Example
8181

8282
```azurecli
8383
# Login first with az login if not using Cloud Shell

0 commit comments

Comments
 (0)