Skip to content

Commit ea441d1

Browse files
authored
Merge pull request #212811 from MicrosoftDocs/main
Publish to Live, Wednesday 4AM PST, 9/28
2 parents 1d67659 + 2fbdc12 commit ea441d1

File tree

133 files changed

+1760
-723
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

133 files changed

+1760
-723
lines changed

articles/active-directory/enterprise-users/directory-delete-howto.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,8 @@ You can't delete a organization in Azure AD until it passes several checks. Thes
3030
* There can be no multifactor authentication providers linked to the organization.
3131
* There can be no subscriptions for any Microsoft Online Services such as Microsoft Azure, Microsoft 365, or Azure AD Premium associated with the organization. For example, if a default Azure AD tenant was created for you in Azure, you can't delete this organization if your Azure subscription still relies on it for authentication. You also can't delete a tenant if another user has associated an Azure subscription with it.
3232

33+
[!NOTE] Microsoft is aware that customers with certain tenant configurations may be unable to successfully delete their Azure AD organization. We are working to address this problem. In the meantime, if needed, you can contact Microsoft support for details about the issue.
34+
3335
## Delete the organization
3436

3537
1. Sign in to the [Azure AD admin center](https://aad.portal.azure.com) with an account that is the Global Administrator for your organization.

articles/active-directory/standards/memo-22-09-enterprise-wide-identity-management-system.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -33,18 +33,20 @@ Memorandum 22-09 requires agencies to develop a plan to consolidate their identi
3333

3434
## Why Azure Active Directory?
3535

36-
Azure Active Directory (Azure AD) provides the capabilities necessary to implement the recommendations from memorandum 22-09. It also provides broad identity controls that support Zero Trust initiatives. If your agency uses Microsoft Office 365, you already have an Azure AD back end to which you can consolidate.
36+
Azure Active Directory (Azure AD) provides the capabilities necessary to implement the recommendations from memorandum 22-09. It also provides broad identity controls that support Zero Trust initiatives. Today, If your agency uses Microsoft Office 365 or Azure, you already have Azure AD as an identity provider (IdP) and you can connect your applications and resources to Azure AD as your enterprise-wide identity system.
3737

3838
## Single sign-on requirements
3939

4040
The memo requires that users sign in once and then directly access applications. Microsoft's robust single sign-on (SSO) capabilities enable users to sign in once and then access cloud and other applications. For more information, see [Azure Active Directory single sign-on](../hybrid/how-to-connect-sso.md).
4141

4242
## Integration across agencies
4343

44-
[Azure AD B2B collaboration](../external-identities/what-is-b2b.md) helps you meet the requirement to facilitate integration among agencies. It does this by:
44+
[Azure AD B2B collaboration](../external-identities/what-is-b2b.md) helps you meet the requirement to facilitate integration/collaboration among agencies. Whether the users reside in different Microsoft tenant in the same cloud, [tenant on another microsoft cloud](../external-identities/b2b-government-national-clouds.md), or a [non Azure AD tenant (SAML/WS-Fed identity provider)](..//external-identities/direct-federation.md).
45+
46+
Azure AD cross-tenant access settings allow agencies to manage how they collaborate with other Azure AD organizations and other Microsoft Azure clouds. It does this by:
4547

4648
- Limiting what other Microsoft tenants your users can access.
47-
- Enabling you to allow access to users whom you don't have to manage in your own tenant, but whom you can subject to your multifactor authentication (MFA) and other access requirements.
49+
- Granular settings to control access for external users including enforcement of multifactor authentication (MFA) and device signal.
4850

4951
## Connecting applications
5052

@@ -119,6 +121,8 @@ Devices integrated with Azure AD can be either [hybrid joined devices](../device
119121

120122
* [Azure Linux virtual machines](../devices/howto-vm-sign-in-azure-ad-linux.md)
121123

124+
* [Azure Virtual Desktop](https://learn.microsoft.com/azure/architecture/example-scenario/wvd/azure-virtual-desktop-azure-active-directory-join)
125+
122126
* [Virtual desktop infrastructure](../devices/howto-device-identity-virtual-desktop-infrastructure.md)
123127

124128
## Next steps

articles/analysis-services/analysis-services-manage-users.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,9 +71,13 @@ Roles at this level apply to users or accounts that need to perform tasks that c
7171

7272
By default, when you create a new tabular model project, the model project does not have any roles. Roles can be defined by using the Role Manager dialog box in Visual Studio. When roles are defined during model project design, they are applied only to the model workspace database. When the model is deployed, the same roles are applied to the deployed model. After a model has been deployed, server and database administrators can manage roles and members by using SSMS. To learn more, see [Manage database roles and users](analysis-services-database-users.md).
7373

74+
## Considerations and limitations
75+
76+
* Azure Analysis Services does not support the use of One-Time Password for B2B users
77+
7478
## Next steps
7579

7680
[Manage access to resources with Azure Active Directory groups](../active-directory/fundamentals/active-directory-manage-groups.md)
7781
[Manage database roles and users](analysis-services-database-users.md)
7882
[Manage server administrators](analysis-services-server-admins.md)
79-
[Azure role-based access control (Azure RBAC)](../role-based-access-control/overview.md)
83+
[Azure role-based access control (Azure RBAC)](../role-based-access-control/overview.md)

articles/api-management/api-management-gateways-overview.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -38,22 +38,22 @@ API Management offers both managed and self-hosted gateways:
3838
>
3939
4040

41-
* **Self-hosted** - The [self-hosted gateway](self-hosted-gateway-overview.md) is an optional, containerized version of the default managed gateway. It's useful for hybrid and multi-cloud scenarios where there is a requirement to run the gateways off Azure in the same environments where API backends are hosted. The self-hosted gateway enables customers with hybrid IT infrastructure to manage APIs hosted on-premises and across clouds from a single API Management service in Azure.
41+
* **Self-hosted** - The [self-hosted gateway](self-hosted-gateway-overview.md) is an optional, containerized version of the default managed gateway. It's useful for hybrid and multicloud scenarios where there's a requirement to run the gateways off of Azure in the same environments where API backends are hosted. The self-hosted gateway enables customers with hybrid IT infrastructure to manage APIs hosted on-premises and across clouds from a single API Management service in Azure.
4242

4343
* The self-hosted gateway is [packaged](self-hosted-gateway-overview.md#packaging) as a Linux-based Docker container and is commonly deployed to Kubernetes, including to [Azure Kubernetes Service](how-to-deploy-self-hosted-gateway-azure-kubernetes-service.md) and [Azure Arc-enabled Kubernetes](how-to-deploy-self-hosted-gateway-azure-arc.md).
4444

4545
* Each self-hosted gateway is associated with a **Gateway** resource in a cloud-based API Management instance from which it receives configuration updates and communicates status.
4646

47+
[!INCLUDE [preview](./includes/preview/preview-callout-self-hosted-gateway-deprecation.md)]
4748

4849
## Feature comparison: Managed versus self-hosted gateways
4950

50-
The following table compares features available in the managed gateway versus those in the self-hosted gateway. Differences are also shown between the managed gateway for dedicated service tiers (Developer, Basic, Standard, Premium) and for the Consumption tier.
51+
The following table compares features available in the managed gateway versus the features in the self-hosted gateway. Differences are also shown between the managed gateway for dedicated service tiers (Developer, Basic, Standard, Premium) and for the Consumption tier.
5152

5253
> [!NOTE]
5354
> * Some features of managed and self-hosted gateways are supported only in certain [service tiers](api-management-features.md) or with certain [deployment environments](self-hosted-gateway-overview.md#packaging) for self-hosted gateways.
5455
> * See also self-hosted gateway [limitations](self-hosted-gateway-overview.md#limitations).
5556
56-
5757
### Infrastructure
5858

5959
| Feature support | Managed (Dedicated) | Managed (Consumption) | Self-hosted |
@@ -154,6 +154,6 @@ For estimated maximum gateway throughput in the API Management service tiers, se
154154

155155
## Next steps
156156

157-
- Learn more about [API Management in a Hybrid and Multi-Cloud World](https://aka.ms/hybrid-and-multi-cloud-api-management)
157+
- Learn more about [API Management in a Hybrid and multicloud World](https://aka.ms/hybrid-and-multi-cloud-api-management)
158158
- Learn more about using the [capacity metric](api-management-capacity.md) for scaling decisions
159159
- Learn about [observability capabilities](observability.md) in API Management

articles/api-management/how-to-deploy-self-hosted-gateway-azure-kubernetes-service.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,8 @@ ms.author: danlep
1313

1414
This article provides the steps for deploying self-hosted gateway component of Azure API Management to [Azure Kubernetes Service](https://azure.microsoft.com/services/kubernetes-service/). For deploying self-hosted gateway to a Kubernetes cluster, see the how-to article for deployment by using a [deployment YAML file](how-to-deploy-self-hosted-gateway-kubernetes.md) or [with Helm](how-to-deploy-self-hosted-gateway-kubernetes-helm.md).
1515

16+
[!INCLUDE [preview](./includes/preview/preview-callout-self-hosted-gateway-deprecation.md)]
17+
1618
> [!NOTE]
1719
> You can also deploy self-hosted gateway to an [Azure Arc-enabled Kubernetes cluster](how-to-deploy-self-hosted-gateway-azure-arc.md) as a [cluster extension](../azure-arc/kubernetes/extensions.md).
1820

articles/api-management/how-to-deploy-self-hosted-gateway-docker.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,8 @@ ms.author: danlep
1313

1414
This article provides the steps for deploying self-hosted gateway component of Azure API Management to a Docker environment.
1515

16+
[!INCLUDE [preview](./includes/preview/preview-callout-self-hosted-gateway-deprecation.md)]
17+
1618
> [!NOTE]
1719
> Hosting self-hosted gateway in Docker is best suited for evaluation and development use cases. Kubernetes is recommended for production use. Learn how to [deploy with Helm](how-to-deploy-self-hosted-gateway-kubernetes-helm.md) or using [deployment YAML file](how-to-deploy-self-hosted-gateway-kubernetes.md) to learn how to deploy self-hosted gateway to Kubernetes.
1820

articles/api-management/how-to-deploy-self-hosted-gateway-kubernetes-helm.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,8 @@ ms.author: tomkerkhove
1515

1616
This article provides the steps for deploying self-hosted gateway component of Azure API Management to a Kubernetes cluster by using Helm.
1717

18+
[!INCLUDE [preview](./includes/preview/preview-callout-self-hosted-gateway-deprecation.md)]
19+
1820
> [!NOTE]
1921
> You can also deploy self-hosted gateway to an [Azure Arc-enabled Kubernetes cluster](how-to-deploy-self-hosted-gateway-azure-arc.md) as a [cluster extension](../azure-arc/kubernetes/extensions.md).
2022

articles/api-management/how-to-deploy-self-hosted-gateway-kubernetes.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,8 @@ ms.date: 05/25/2021
1313

1414
This article describes the steps for deploying the self-hosted gateway component of Azure API Management to a Kubernetes cluster.
1515

16+
[!INCLUDE [preview](./includes/preview/preview-callout-self-hosted-gateway-deprecation.md)]
17+
1618
> [!NOTE]
1719
> You can also deploy self-hosted gateway to an [Azure Arc-enabled Kubernetes cluster](how-to-deploy-self-hosted-gateway-azure-arc.md) as a [cluster extension](../azure-arc/kubernetes/extensions.md).
1820

articles/api-management/how-to-self-hosted-gateway-on-kubernetes-in-production.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,10 +12,12 @@ ms.date: 12/17/2021
1212

1313
# Guidance for running self-hosted gateway on Kubernetes in production
1414

15-
In order to run the self-hosted gateway in production, there are various aspects to take in to mind. For example, it should be deployed in a highly-available manner, use configuration backups to handle temporary disconnects and many more.
15+
In order to run the self-hosted gateway in production, there are various aspects to take in to mind. For example, it should be deployed in a highly available manner, use configuration backups to handle temporary disconnects and many more.
1616

1717
This article provides guidance on how to run [self-hosted gateway](./self-hosted-gateway-overview.md) on Kubernetes for production workloads to ensure that it will run smoothly and reliably.
1818

19+
[!INCLUDE [preview](./includes/preview/preview-callout-self-hosted-gateway-deprecation.md)]
20+
1921
## Access token
2022
Without a valid access token, a self-hosted gateway can't access and download configuration data from the endpoint of the associated API Management service. The access token can be valid for a maximum of 30 days. It must be regenerated, and the cluster configured with a fresh token, either manually or via automation before it expires.
2123

@@ -57,11 +59,11 @@ An alternative is to use Kubernetes Event-driven Autoscaling (KEDA) allowing you
5759
5860
### Traffic-based autoscaling
5961

60-
Kubernetes does not provide an out-of-the-box mechanism for traffic-based autoscaling.
62+
Kubernetes doesn't provide an out-of-the-box mechanism for traffic-based autoscaling.
6163

6264
Kubernetes Event-driven Autoscaling (KEDA) provides a few ways that can help with traffic-based autoscaling:
6365

64-
- You can scale based on metrics from a Kubernetes ingress if they are available in [Prometheus](https://keda.sh/docs/latest/scalers/prometheus/) or [Azure Monitor](https://keda.sh/docs/latest/scalers/azure-monitor/) by using an out-of-the-box scaler
66+
- You can scale based on metrics from a Kubernetes ingress if they're available in [Prometheus](https://keda.sh/docs/latest/scalers/prometheus/) or [Azure Monitor](https://keda.sh/docs/latest/scalers/azure-monitor/) by using an out-of-the-box scaler
6567
- You can install [HTTP add-on](https://github.com/kedacore/http-add-on), which is available in beta, and scales based on the number of requests per second.
6668

6769
## Container resources
@@ -153,7 +155,7 @@ Consider using [Pod Disruption Budgets](https://kubernetes.io/docs/concepts/work
153155
## Security
154156
The self-hosted gateway is able to run as non-root in Kubernetes allowing customers to run the gateway securely.
155157

156-
Here is an example of the security context for the self-hosted gateway:
158+
Here's an example of the security context for the self-hosted gateway:
157159
```yml
158160
securityContext:
159161
allowPrivilegeEscalation: false

articles/api-management/import-container-app-with-oas.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Import Azure Container App to Azure API Management | Microsoft Docs
2+
title: Import Azure Container App to Azure API Management | Microsoft Docs
33
description: This article shows you how to use Azure API Management to import a web API hosted in Azure Container Apps.
44
services: api-management
55
documentationcenter: ''

0 commit comments

Comments
 (0)