Skip to content

Commit ece3ce9

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into sanAKS
2 parents 0c68d28 + f8a8e49 commit ece3ce9

File tree

10 files changed

+154
-73
lines changed

10 files changed

+154
-73
lines changed
Lines changed: 61 additions & 59 deletions
Original file line numberDiff line numberDiff line change
@@ -1,102 +1,104 @@
11
---
22
title: Tutorial to configure Azure Active Directory B2C with Azure Web Application Firewall
33
titleSuffix: Azure AD B2C
4-
description: Tutorial to configure Azure Active Directory B2C with Azure Web application firewall to protect your applications from malicious attacks
4+
description: Learn to configure Azure AD B2C with Azure Web Application Firewall to protect applications from malicious attacks
55
services: active-directory-b2c
66
author: gargi-sinha
7-
manager: CelesteDG
7+
manager: martinco
88
ms.reviewer: kengaderdus
9-
109
ms.service: active-directory
1110
ms.workload: identity
1211
ms.topic: how-to
13-
ms.date: 08/17/2021
12+
ms.date: 03/08/2023
1413
ms.author: gasinh
1514
ms.subservice: B2C
1615
---
1716

18-
# Tutorial: Configure Azure Web Application Firewall with Azure Active Directory B2C
17+
# Tutorial: Configure Azure Active Directory B2C with Azure Web Application Firewall
1918

20-
In this sample tutorial, learn how to enable [Azure Web Application Firewall (WAF)](https://azure.microsoft.com/services/web-application-firewall/#overview) solution for Azure Active Directory (AD) B2C tenant with custom domain. Azure WAF provides centralized protection of your web applications from common exploits and vulnerabilities.
19+
Learn how to enable the Azure Web Application Firewall (WAF) service for an Azure Active Directory B2C (Azure AD B2C) tenant, with a custom domain. WAF protects web applications from common exploits and vulnerabilities.
2120

22-
>[!NOTE]
23-
>This feature is in public preview.
21+
See, [What is Azure Web Application Firewall?](../web-application-firewall/overview.md)
2422

2523
## Prerequisites
2624

27-
To get started, you'll need:
28-
29-
- An Azure subscription – If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
30-
31-
- [An Azure AD B2C tenant](tutorial-create-tenant.md) – The authorization server, responsible for verifying the user’s credentials using the custom policies defined in the tenant. It's also known as the identity provider.
25+
To get started, you need:
3226

33-
- [Azure Front Door (AFD)](../frontdoor/index.yml) – Responsible for enabling custom domains for Azure AD B2C tenant.
27+
* An Azure subscription
28+
* If you don't have one, get an [Azure free account](https://azure.microsoft.com/free/)
29+
* **An Azure AD B2C tenant** – authorization server that verifies user credentials using custom policies defined in the tenant
30+
* Also known as the identity provider (IdP)
31+
* See, [Tutorial: Create an Azure Active Directory B2C tenant](tutorial-create-tenant.md)
32+
* **Azure Front Door (AFD)** – enables custom domains for the Azure AD B2C tenant
33+
* See, [Azure Front Door and CDN documentation](../frontdoor/index.yml)
34+
* **WAF** – manages traffic sent to the authorization server
35+
* [Azure Web Application Firewall](https://azure.microsoft.com/services/web-application-firewall/#overview)
3436

35-
- [Azure WAF](https://azure.microsoft.com/services/web-application-firewall/#overview) – Manages all traffic that is sent to the authorization server.
37+
## Custom domains in Azure AD B2C
3638

37-
## Azure AD B2C setup
39+
To use custom domains in Azure AD B2C, use the custom domain features in AFD. See, [Enable custom domains for Azure AD B2C](./custom-domain.md?pivots=b2c-user-flow).
3840

39-
To use custom domains in Azure AD B2C, it's required to use custom domain feature provided by AFD. Learn how to [enable Azure AD B2C custom domains](./custom-domain.md?pivots=b2c-user-flow).
41+
> [!IMPORTANT]
42+
> After you configure the custom domain, see [Test your custom domain](./custom-domain.md?pivots=b2c-custom-policy#test-your-custom-domain).
4043
41-
After custom domain for Azure AD B2C is successfully configured using AFD, [test the custom domain](./custom-domain.md?pivots=b2c-custom-policy#test-your-custom-domain) before proceeding further.
44+
## Enable WAF
4245

43-
## Onboard with Azure WAF
44-
45-
To enable Azure WAF, configure a WAF policy and associate that policy to the AFD for protection.
46+
To enable WAF, configure a WAF policy and associate it with the AFD for protection.
4647

4748
### Create a WAF policy
4849

49-
Create a basic WAF policy with managed Default Rule Set (DRS) in the [Azure portal](https://portal.azure.com).
50-
51-
1. Go to the [Azure portal](https://portal.azure.com). Select **Create a resource** and then search for Azure WAF. Select **Azure Web Application Firewall (WAF)** > **Create**.
50+
Create a WAF policy with Azure-managed default rule set (DRS). See, [Web Application Firewall DRS rule groups and rules](../web-application-firewall/afds/waf-front-door-drs.md).
5251

53-
2. Go to the **Create a WAF policy** page, select the **Basics** tab. Enter the following information, accept the defaults for the remaining settings.
52+
1. Go to the [Azure portal](https://portal.azure.com).
53+
2. Select **Create a resource**.
54+
3. Search for Azure WAF.
55+
4. Select **Azure Web Application Firewall (WAF)**.
56+
5. Select **Create**.
57+
6. Go to the **Create a WAF policy** page.
58+
7. Select the **Basics** tab.
59+
8. For **Policy for**, select **Global WAF (Front Door)**.
60+
9. For **Front Door SKU**, select between **Basic**, **Standard**, or **Premium** SKU.
61+
10. For **Subscription**, select your Front Door subscription name.
62+
11. For **Resource group**, select your Front Door resource group name.
63+
12. For **Policy name**, enter a unique name for your WAF policy.
64+
13. For **Policy state**, select **Enabled**.
65+
14. For **Policy mode**, select **Detection**.
66+
15. Select **Review + create**.
67+
16. Go to the **Association** tab of the Create a WAF policy page.
68+
17. Select **+ Associate a Front Door profile**.
69+
18. For **Front Door**, select your Front Door name associated with Azure AD B2C custom domain.
70+
19. For **Domains**, select the Azure AD B2C custom domains to associate the WAF policy to.
71+
20. Select **Add**.
72+
21. Select **Review + create**.
73+
22. Select **Create**.
5474

55-
| Value | Description |
56-
|:--------|:-------|
57-
| Policy for | Global WAF (Front Door)|
58-
| Front Door SKU | Select between Basic, Standard, or Premium SKU |
59-
|Subscription | Select your Front Door subscription name |
60-
| Resource group | Select your Front Door resource group name |
61-
| Policy name | Enter a unique name for your WAF policy |
62-
| Policy state | Set as Enabled |
63-
| Policy mode | Set as Detection |
75+
### Detection and Prevention modes
6476

65-
3. Select **Review + create**
77+
When you create WAF policy, the policy is in Detection mode. We recommend you don't disable Detection mode. In this mode, WAF doesn't block requests. Instead, requests that match the WAF rules are logged in the WAF logs.
6678

67-
4. Go to the **Association** tab of the Create a WAF policy page, select + **Associate a Front Door profile**, enter the following settings
79+
Learn more: [Azure Web Application Firewall monitoring and logging](../web-application-firewall/afds/waf-front-door-monitor.md)
6880

69-
| Value | Description |
70-
|:----|:------|
71-
| Front Door | Select your Front Door name associated with Azure AD B2C custom domain |
72-
| Domains | Select the Azure AD B2C custom domains you want to associate the WAF policy to|
81+
The following query shows the requests blocked by the WAF policy in the past 24 hours. The details include, rule name, request data, action taken by the policy, and the policy mode.
82+
83+
![Screenshot of blocked requests.](./media/partner-azure-web-application-firewall/blocked-requests-query.png)
7384

74-
5. Select **Add**.
85+
![Screenshot of blocked requests details, such as Rule ID, Action, Mode, etc.](./media/partner-azure-web-application-firewall/blocked-requests-details.png)
7586

76-
6. Select **Review + create**, then select **Create**.
87+
Review the WAF logs to determine if policy rules cause false positives. Then, exclude the WAF rules based on the WAF logs.
7788

78-
### Change policy mode from detection to prevention
89+
Learn more: [Define exclusion rules based on Web Application Firewall logs](../web-application-firewall/afds/waf-front-door-exclusion.md#define-exclusion-based-on-web-application-firewall-logs)
7990

80-
When a WAF policy is created, by default the policy is in Detection mode. In Detection mode, WAF doesn't block any requests, instead, requests matching the WAF rules are logged in the WAF logs. For more information about WAF logging, see [Azure WAF monitoring and logging](../web-application-firewall/afds/waf-front-door-monitor.md).
91+
#### Switching modes
8192

82-
The sample query shows all the requests that were blocked by the WAF policy in the past 24 hours. The details include, rule name, request data, action taken by the policy, and the policy mode.
93+
To see WAF operating, select **Switch to prevention mode**, which changes the mode from Detection to Prevention. Requests that match the rules in the DRS are blocked and logged in the WAF logs.
8394

84-
![Image shows the blocked requests](./media/partner-azure-web-application-firewall/blocked-requests-query.png)
95+
![Screenshot of options and selections for DefaultRuleSet under Web Application Firewall policies.](./media/partner-azure-web-application-firewall/switch-to-prevention-mode.png)
8596

86-
![Image shows the blocked requests details](./media/partner-azure-web-application-firewall/blocked-requests-details.png)
97+
To revert to Detection mode, select **Switch to detection mode**.
8798

88-
It's recommended that you let the WAF capture requests in Detection mode. Review the WAF logs to determine if there are any rules in the policy that are causing false positive results. Then after [exclude the WAF rules based on the WAF logs](../web-application-firewall/afds/waf-front-door-exclusion.md#define-exclusion-based-on-web-application-firewall-logs).
89-
90-
To see WAF in action, use Switch to prevention mode to change from Detection to Prevention mode. All requests that match the rules defined in the Default Rule Set (DRS) are blocked and logged in the WAF logs.
91-
92-
![Image shows the switch to prevention mode](./media/partner-azure-web-application-firewall/switch-to-prevention-mode.png)
93-
94-
In case you want to switch back to the detection mode, you can do so by using Switch to detection mode option.
95-
96-
![Image shows the switch to detection mode](./media/partner-azure-web-application-firewall/switch-to-detection-mode.png)
99+
![Screenshot of DefaultRuleSet with Switch to detection mode.](./media/partner-azure-web-application-firewall/switch-to-detection-mode.png)
97100

98101
## Next steps
99102

100-
- [Azure WAF monitoring and logging](../web-application-firewall/afds/waf-front-door-monitor.md)
101-
102-
- [WAF with Front Door service exclusion lists](../web-application-firewall/afds/waf-front-door-exclusion.md)
103+
* [Azure Web Application Firewall monitoring and logging](../web-application-firewall/afds/waf-front-door-monitor.md)
104+
* [Web Application Firewall (WAF) with Front Door exclusion lists](../web-application-firewall/afds/waf-front-door-exclusion.md)

articles/azure-monitor/autoscale/autoscale-multiprofile.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ The example below shows an autoscale setting with a default profile and recurrin
4141

4242
:::image type="content" source="./media/autoscale-multiple-profiles/autoscale-default-recurring-profiles.png" alt-text="A screenshot showing an autoscale setting with default and recurring profile or scale condition":::
4343

44-
In the above example, on Monday after 6 AM, the recurring profile will be used. If the instance count is less than 3, autoscale scales to the new minimum of three. Autoscale continues to use this profile and scales based on CPU% until Monday at 6 PM. At all other times scaling will be done according to the default profile, based on the number of requests. After 6 PM on Monday, autoscale switches to the default profile. If for example, the number of instances at the time is 12, autoscale scales in to 10, which the maximum allowed for the default profile.
44+
In the above example, on Monday after 3 AM, the recurring profile will cease to be used. If the instance count is less than 3, autoscale scales to the new minimum of three. Autoscale continues to use this profile and scales based on CPU% until Monday at 8 PM. At all other times scaling will be done according to the default profile, based on the number of requests. After 8 PM on Monday, autoscale switches to the default profile. If for example, the number of instances at the time is 12, autoscale scales in to 10, which the maximum allowed for the default profile.
4545

4646
## Multiple contiguous profiles
4747
Autoscale transitions between profiles based on their start times. The end time for a given profile is determined by the start time of the following profile.
31.8 KB
Loading

articles/internet-peering/policy.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: internet-peering
66
author: halkazwini
77
ms.service: internet-peering
88
ms.topic: conceptual
9-
ms.date: 02/23/2023
9+
ms.date: 03/08/2023
1010
ms.author: halkazwini
1111
ms.custom: template-concept, engagement-fy23
1212
---
@@ -22,7 +22,7 @@ Microsoft maintains a selective peering policy designed to ensure the best possi
2222
* MD5 isn't supported.
2323
* **ASN details:**
2424

25-
* Microsoft manages AS8075 along with the following ASNs: AS8068, AS8069, AS12076. For a complete list of ASNs with AS8075 peering, reference AS-SET MICROSOFT.
25+
* Microsoft manages AS8075 and other ASNs as described in AS-SET RADb:AS-MICROSOFT.
2626
* All parties peering with Microsoft agree not to accept routes from AS12076 (ExpressRoute) under any circumstances and should filter out AS12076 on all peers.
2727

2828
* **Routing policy:**
@@ -31,7 +31,8 @@ Microsoft maintains a selective peering policy designed to ensure the best possi
3131
* Microsoft prefers to receive BGP community tags from peers to indicate route origination.
3232
* We recommend peers set a max-prefix of 2000 (IPv4) and 500 (IPv6) routes on peering sessions with Microsoft.
3333
* Unless specifically agreed upon beforehand, peers are expected to announce consistent routes in all locations where they peer with Microsoft.
34-
* In general, peering sessions with AS8075 will advertise all AS-MICROSOFT routes. Microsoft may announce some regional specifics.
34+
* In general, Microsoft advertises all Microsoft routes, with some regional specifics as appropriate. All prefixes are properly registered within the RADb.
35+
* Microsoft also announces 3rd party address space under “Bring Your Own IP” and “Bring Your Own ASN” products. BYOIP prefixes are all properly registered as AS8075, and BYOASN ASNs will be included in AS-SET AS-MICROSOFT.
3536
* Neither party will establish a static route, a route of last resort, or otherwise send traffic to the other party for a route not announced via BGP.
3637
* Peers are required to register their routes in a public Internet Routing Registry (IRR) database, for the purposes of filtering, and keep this information up to date.
3738
* Peers adhere to MANRS industry standards for route security. At its sole discretion, Microsoft may choose:

articles/private-5g-core/azure-private-5g-core-release-notes-2301.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -42,12 +42,13 @@ The following table provides a summary of issues fixed in this release.
4242

4343
The following table provides a summary of known issues carried over from the previous releases.
4444

45-
|No. |Feature | Issue |
46-
|-----|-----|-----|
47-
| 1 | Policy configuration | Azure Private 5G Core may ignore non-default QoS and Policy configuration when handling 4G subscribers. |
48-
| 2 | Packet forwarding | Azure Private 5G Core may not forward buffered packets if NAT is enabled.  |
49-
| 3 | Local dashboards | In some scenarios, the local dashboards don't show session rejection under the **Device and Session Statistics** panel if Session Establishment requests are rejected due to invalid PDU type (e.g. IPv6 when only IPv4 supported).  |
50-
| 4 | Packet forwarding | When Azure Private 5G Core has NAT enabled on a data network, approximately one in every 65,536 downlink packets sent to a UE will be emitted with an incorrect IP checksum, which will likely cause it to be dropped. |
45+
|No. |Feature | Issue | Workaround/comments |
46+
|-----|-----|-----|-----|
47+
| 1 | Policy configuration | Azure Private 5G Core may ignore non-default QoS and Policy configuration when handling 4G subscribers. | Not applicable. |
48+
| 2 | Packet forwarding | Azure Private 5G Core may not forward buffered packets if NAT is enabled. | Not applicable. |
49+
| 3 | Local dashboards | In some scenarios, the local dashboards don't show session rejection under the **Device and Session Statistics** panel if Session Establishment requests are rejected due to invalid PDU type (e.g. IPv6 when only IPv4 supported). | Not applicable. |
50+
| 4 | Packet forwarding | When Azure Private 5G Core has NAT enabled on a data network, approximately one in every 65,536 downlink packets sent to a UE will be emitted with an incorrect IP checksum, which will likely cause it to be dropped. | Not applicable. |
51+
| 5 | Install/upgrade | Changing the technology type of a deployment from 4G (EPC) to 5G using upgrade or site delete and add is not supported. | Please contact support for the required steps to change the technology type. |
5152

5253
## Next steps
5354

0 commit comments

Comments
 (0)