Skip to content

Commit eb7e352

Browse files
committed
Merge branch 'main' into release-functions-bindings-refactor
2 parents 9037deb + 3bf973f commit eb7e352

File tree

228 files changed

+1835
-1211
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

228 files changed

+1835
-1211
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -683,6 +683,11 @@
683683
"redirect_url": "/azure/frontdoor/troubleshoot-issues",
684684
"redirect_document_id": false
685685
},
686+
{
687+
"source_path_from_root": "/articles/frontdoor/concept-rules-set-action.md",
688+
"redirect_url": "/azure/frontdoor/front-door-rules-engine-actions",
689+
"redirect_document_id": false
690+
},
686691
{
687692
"source_path_from_root": "/articles/app-service-web/web-sites-dotnet-deploy-aspnet-mvc-app-membership-oauth-sql-database.md",
688693
"redirect_url": "/aspnet/core/security/authorization/secure-data",

articles/active-directory-b2c/partner-bindid.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ zone_pivot_groups: b2c-policy-type
2020
[!INCLUDE [active-directory-b2c-choose-user-flow-or-custom-policy](../../includes/active-directory-b2c-choose-user-flow-or-custom-policy.md)]
2121

2222

23-
In this sample tutorial, learn how to integrate Azure Active Directory (AD) B2C authentication with [Transmit Security](https://www.transmitsecurity.com/bindid) passwordless authentication solution **BindID**. BindID is a passwordless authentication service that uses strong Fast Identity Online (FIDO2) biometric authentication for a reliable omni-channel authentication experience. The solution ensures a smooth login experience for all customers across every device and channel eliminating fraud, phishing, and credential reuse.
23+
In this sample tutorial, learn how to integrate Azure Active Directory B2C (Azure AD B2C) authentication with [Transmit Security](https://www.transmitsecurity.com/bindid) passwordless authentication solution **BindID**. BindID is a passwordless authentication service that uses strong Fast Identity Online (FIDO2) biometric authentication for a reliable omni-channel authentication experience. The solution ensures a smooth login experience for all customers across every device and channel eliminating fraud, phishing, and credential reuse.
2424

2525
## Scenario description
2626

@@ -30,8 +30,8 @@ The following architecture diagram shows the implementation.
3030

3131
|Step | Description |
3232
|:-----| :-----------|
33-
| 1. | User arrives at a login page. Users select sign-in/sign-up and enter username into the page.
34-
| 2. | Azure AD B2C redirects the user to BindID using an OpenID Connect (OIDC) request.
33+
| 1. | User attempts to log in to an Azure AD B2C application and is forwarded to Azure AD B2C’s combined sign-in and sign-up policy.
34+
| 2. | Azure AD B2C redirects the user to BindID using the OpenID Connect (OIDC) authorization code flow.
3535
| 3. | BindID authenticates the user using appless FIDO2 biometrics, such as fingerprint.
3636
| 4. | A decentralized authentication response is returned to BindID.
3737
| 5. | The OIDC response is passed on to Azure AD B2C.
@@ -62,7 +62,7 @@ To get started, you'll need:
6262

6363
### Step 1 - Create an application registration in BindID
6464

65-
From [Applications](https://admin.bindid-sandbox.io/console/#/applications) to configure your tenant application in BindID, the following information is needed
65+
For [Applications](https://admin.bindid-sandbox.io/console/#/applications) to configure your tenant application in BindID, the following information is needed
6666

6767
| Property | Description |
6868
|:---------|:---------------------|
@@ -318,7 +318,7 @@ The relying party policy, for example [SignUpSignIn.xml](https://github.com/Azur
318318

319319
1. Open the Azure AD B2C tenant and under Policies select **Identity Experience Framework**.
320320

321-
2. Click on your previously created **CustomSignUpSignIn** and select the settings:
321+
2. Select your previously created **CustomSignUpSignIn** and select the settings:
322322

323323
a. **Application**: select the registered app (sample is JWT)
324324

articles/active-directory/devices/howto-vm-sign-in-azure-ad-windows.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ ms.collection: M365-identity-device-management
2020
Organizations can now improve the security of Windows virtual machines (VMs) in Azure by integrating with Azure Active Directory (AD) authentication. You can now use Azure AD as a core authentication platform to RDP into a **Windows Server 2019 Datacenter edition** and later or **Windows 10 1809** and later. Additionally, you will be able to centrally control and enforce Azure RBAC and Conditional Access policies that allow or deny access to the VMs. This article shows you how to create and configure a Windows VM and login with Azure AD based authentication.
2121

2222
There are many security benefits of using Azure AD based authentication to login to Windows VMs in Azure, including:
23-
- Use your corporate AD credentials to login to Windows VMs in Azure.
23+
- Use your corporate Azure AD credentials to login to Windows VMs in Azure.
2424
- Reduce your reliance on local administrator accounts, you do not need to worry about credential loss/theft, users configuring weak credentials etc.
2525
- Password complexity and password lifetime policies configured for your Azure AD directory help secure Windows VMs as well.
2626
- With Azure role-based access control (Azure RBAC), specify who can login to a VM as a regular user or with administrator privileges. When users join or leave your team, you can update the Azure RBAC policy for the VM to grant access as appropriate. When employees leave your organization and their user account is disabled or removed from Azure AD, they no longer have access to your resources.

articles/aks/limit-egress-traffic.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn what ports and addresses are required to control egress traff
44
services: container-service
55
ms.topic: article
66
ms.author: jpalma
7-
ms.date: 01/12/2021
7+
ms.date: 03/7/2022
88
author: palma21
99

1010
#Customer intent: As an cluster operator, I want to restrict egress traffic for nodes to only access defined ports and addresses and improve cluster security.
@@ -393,6 +393,10 @@ See [virtual network route table documentation](../virtual-network/virtual-netwo
393393

394394
### Adding firewall rules
395395

396+
> [!NOTE]
397+
> For applications outside of the kube-system or gatekeeper-system namespaces that needs to talk to the API server, an additional network rule to allow TCP communication to port 443 for the API server IP in addition to adding application rule for fqdn-tag AzureKubernetesService is required.
398+
399+
396400
Below are three network rules you can use to configure on your firewall, you may need to adapt these rules based on your deployment. The first rule allows access to port 9000 via TCP. The second rule allows access to port 1194 and 123 via UDP (if you're deploying to Azure China 21Vianet, you might require [more](#azure-china-21vianet-required-network-rules)). Both these rules will only allow traffic destined to the Azure Region CIDR that we're using, in this case East US.
397401
Finally, we'll add a third network rule opening port 123 to `ntp.ubuntu.com` FQDN via UDP (adding an FQDN as a network rule is one of the specific features of Azure Firewall, and you'll need to adapt it when using your own options).
398402

0 commit comments

Comments
 (0)