Skip to content

Commit edbde59

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into linFirst
2 parents dcb3003 + 5061e2d commit edbde59

File tree

117 files changed

+1521
-851
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

117 files changed

+1521
-851
lines changed

articles/active-directory/authentication/concept-authentication-passwordless.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -113,6 +113,7 @@ The following providers offer FIDO2 security keys of different form factors that
113113
|---------------------------|:-----------------:|:---:|:---:|:---:|:--------------:|-----------------------------------------------------------------------------------------------------|
114114
| AuthenTrend | ![y] | ![y]| ![y]| ![y]| ![n] | https://authentrend.com/about-us/#pg-35-3 |
115115
| Ciright | ![n] | ![n]| ![y]| ![n]| ![n] | https://www.cyberonecard.com/ |
116+
| Crayonic | ![y] | ![n]| ![y]| ![y]| ![n] | https://www.crayonic.com/keyvault |
116117
| Ensurity | ![y] | ![y]| ![n]| ![n]| ![n] | https://www.ensurity.com/contact |
117118
| Excelsecu | ![y] | ![y]| ![y]| ![y]| ![n] | https://www.excelsecu.com/productdetail/esecufido2secu.html |
118119
| Feitian | ![y] | ![y]| ![y]| ![y]| ![y] | https://shop.ftsafe.us/pages/microsoft |
@@ -121,9 +122,11 @@ The following providers offer FIDO2 security keys of different form factors that
121122
| GoTrustID Inc. | ![n] | ![y]| ![y]| ![y]| ![n] | https://www.gotrustid.com/idem-key |
122123
| HID | ![n] | ![y]| ![y]| ![n]| ![n] | https://www.hidglobal.com/contact-us |
123124
| Hypersecu | ![n] | ![y]| ![n]| ![n]| ![n] | https://www.hypersecu.com/hyperfido |
125+
| Identiv | ![n] | ![y]| ![y]| ![n]| ![n] | https://www.identiv.com/products/logical-access-control/utrust-fido2-security-keys/nfc |
124126
| IDmelon Technologies Inc. | ![y] | ![y]| ![y]| ![y]| ![n] | https://www.idmelon.com/#idmelon |
125127
| Kensington | ![y] | ![y]| ![n]| ![n]| ![n] | https://www.kensington.com/solutions/product-category/why-biometrics/ |
126128
| KONA I | ![y] | ![n]| ![y]| ![y]| ![n] | https://konai.com/business/security/fido |
129+
| Movenda | ![y] | ![n]| ![y]| ![y]| ![n] | https://www.movenda.com/en/authentication/fido2/overview |
127130
| NeoWave | ![n] | ![y]| ![y]| ![n]| ![n] | https://neowave.fr/en/products/fido-range/ |
128131
| Nymi | ![y] | ![n]| ![y]| ![n]| ![n] | https://www.nymi.com/nymi-band |
129132
| Octatco | ![y] | ![y]| ![n]| ![n]| ![n] | https://octatco.com/ |
@@ -137,7 +140,6 @@ The following providers offer FIDO2 security keys of different form factors that
137140
| Yubico | ![y] | ![y]| ![y]| ![n]| ![y] | https://www.yubico.com/solutions/passwordless/ |
138141

139142

140-
141143
<!--Image references-->
142144
[y]: ./media/fido2-compatibility/yes.png
143145
[n]: ./media/fido2-compatibility/no.png

articles/active-directory/develop/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -120,8 +120,6 @@
120120
href: support-fido2-authentication.md
121121
- name: Customize tokens and claims
122122
items:
123-
- name: Claims mapping policy type
124-
href: reference-claims-mapping-policy-type.md
125123
- name: Configure optional claims
126124
href: active-directory-optional-claims.md
127125
- name: Configure role claim

articles/active-directory/governance/trigger-custom-task.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -36,11 +36,11 @@ To use a custom task extension in your workflow, first a custom task extension m
3636

3737
1. In the left menu, select **Workflows (Preview)**.
3838

39-
1. On the workflows screen, select **custom task extension**.
39+
1. On the workflows screen, select **Custom task extension**.
4040
:::image type="content" source="media/trigger-custom-task/custom-task-extension-select.png" alt-text="Screenshot of selecting a custom task extension from a workflow overview page.":::
41-
1. On the custom task extensions page, select **create custom task extension**.
41+
1. On the custom task extensions page, select **Create custom task extension**.
4242
:::image type="content" source="media/trigger-custom-task/create-custom-task-extension.png" alt-text="Screenshot for creating a custom task extension selection.":::
43-
1. On the basics page you, give a display name and description for the custom task extension and select **Next**.
43+
1. On the basics page you, enter a unique display name and description for the custom task extension and select **Next**.
4444
:::image type="content" source="media/trigger-custom-task/custom-task-extension-basics.png" alt-text="Screenshot of the basics section for creating a custom task extension.":::
4545
1. On the **Task behavior** page, you specify how the custom task extension will behave after executing the Azure Logic App and select **Next**.
4646
:::image type="content" source="media/trigger-custom-task/custom-task-extension-behavior.png" alt-text="Screenshot for choose task behavior for custom task extension.":::

articles/active-directory/manage-apps/protect-against-consent-phishing.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -62,9 +62,9 @@ Administrators should be in control of application use by providing the right in
6262
- Block [consent phishing emails with Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/set-up-anti-phishing-policies#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365) by protecting against phishing campaigns where an attacker is impersonating a known user in the organization.
6363
- Configure Microsoft Defender for Cloud Apps policies to help manage abnormal application activity in the organization. For example, [activity policies](/cloud-app-security/user-activity-policies), [anomaly detection](/cloud-app-security/anomaly-detection-policy), and [OAuth app policies](/cloud-app-security/app-permission-policy).
6464
- Investigate and hunt for consent phishing attacks by following the guidance on [advanced hunting with Microsoft 365 Defender](/microsoft-365/security/defender/advanced-hunting-overview).
65-
- Allow access to trusted applications and protect against those applications that aren't:
66-
- Use applications that have been publisher verified. [Publisher verification](../develop/publisher-verification-overview.md) helps administrators and users understand the authenticity of application developers through a Microsoft supported vetting process.
67-
- [Configure user consent settings](./configure-user-consent.md?tabs=azure-portal) to allow users to only consent to specific trusted applications, such as applications developed by the organization or from verified publishers and only for low risk permissions you select.
65+
- Allow access to trusted applications that meet certain criteria and that protect against those applications that don't:
66+
- [Configure user consent settings](./configure-user-consent.md?tabs=azure-portal) to allow users to only consent to applications that meet certain criteria, such as applications developed by your organization or from verified publishers and only for low risk permissions you select.
67+
- Use applications that have been publisher verified. [Publisher verification](../develop/publisher-verification-overview.md) helps administrators and users understand the authenticity of application developers through a Microsoft supported vetting process. Even if an application does have a verified publisher, it is still important to review the consent prompt to understand and evaluate the request. For example, reviewing the permissions being requested to ensure they align with the scenario the app is requesting them to enable, additional app and publisher details on the consent prompt, etc.
6868
- Create proactive [application governance](/microsoft-365/compliance/app-governance-manage-app-governance) policies to monitor third-party application behavior on the Microsoft 365 platform to address common suspicious application behaviors.
6969

7070
## Next steps

articles/aks/azure-cni-overlay.md

Lines changed: 10 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -129,31 +129,15 @@ az provider register --namespace Microsoft.ContainerService
129129

130130
## Set up overlay clusters
131131

132-
The following steps create a new virtual network with a subnet for the cluster nodes and an AKS cluster that uses Azure CNI Overlay.
133-
134-
1. Create a virtual network with a subnet for the cluster nodes. Replace the values for the variables `resourceGroup`, `vnet` and `location`.
135-
136-
```azurecli-interactive
137-
resourceGroup="myResourceGroup"
138-
vnet="myVirtualNetwork"
139-
location="westcentralus"
140-
141-
# Create the resource group
142-
az group create --name $resourceGroup --location $location
143-
144-
# Create a VNet and a subnet for the cluster nodes
145-
az network vnet create -g $resourceGroup --location $location --name $vnet --address-prefixes 10.0.0.0/8 -o none
146-
az network vnet subnet create -g $resourceGroup --vnet-name $vnet --name nodesubnet --address-prefix 10.10.0.0/16 -o none
147-
```
148-
149-
2. Create a cluster with Azure CNI Overlay. Use the argument `--network-plugin-mode` to specify that this is an overlay cluster. If the pod CIDR is not specified then AKS assigns a default space, viz. 10.244.0.0/16. Replace the values for the variables `clusterName` and `subscription`.
150-
151-
```azurecli-interactive
152-
clusterName="myOverlayCluster"
153-
subscription="aaaaaaa-aaaaa-aaaaaa-aaaa"
154-
155-
az aks create -n $clusterName -g $resourceGroup --location $location --network-plugin azure --network-plugin-mode overlay --pod-cidr 192.168.0.0/16 --vnet-subnet-id /subscriptions/$subscription/resourceGroups/$resourceGroup/providers/Microsoft.Network/virtualNetworks/$vnet/subnets/nodesubnet
156-
```
132+
Create a cluster with Azure CNI Overlay. Use the argument `--network-plugin-mode` to specify that this is an overlay cluster. If the pod CIDR is not specified then AKS assigns a default space, viz. 10.244.0.0/16. Replace the values for the variables `clusterName`, `resourceGroup`, and `location`.
133+
134+
```azurecli-interactive
135+
clusterName="myOverlayCluster"
136+
resourceGroup="myResourceGroup"
137+
location="westcentralus"
138+
139+
az aks create -n $clusterName -g $resourceGroup --location $location --network-plugin azure --network-plugin-mode overlay --pod-cidr 192.168.0.0/16
140+
```
157141

158142
## Next steps
159143

@@ -162,4 +146,4 @@ To learn how to utilize AKS with your own Container Network Interface (CNI) plug
162146
<!-- LINKS - internal -->
163147
[az-provider-register]: /cli/azure/provider#az-provider-register
164148
[az-feature-register]: /cli/azure/feature#az-feature-register
165-
[az-feature-show]: /cli/azure/feature#az-feature-show
149+
[az-feature-show]: /cli/azure/feature#az-feature-show

articles/aks/azure-cni-powered-by-cilium.md

Lines changed: 1 addition & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -112,7 +112,6 @@ Create the cluster using `--enable-cilium-dataplane`:
112112
```azurecli-interactive
113113
az aks create -n <clusterName> -g <resourceGroupName> -l <location> \
114114
--max-pods 250 \
115-
--node-count 2 \
116115
--network-plugin azure \
117116
--vnet-subnet-id /subscriptions/<subscriptionId>/resourceGroups/<resourceGroupName>/providers/Microsoft.Network/virtualNetworks/<vnetName>/subnets/nodesubnet \
118117
--pod-subnet-id /subscriptions/<subscriptionId>/resourceGroups/<resourceGroupName>/providers/Microsoft.Network/virtualNetworks/<vnetName>/subnets/podsubnet \
@@ -121,29 +120,13 @@ az aks create -n <clusterName> -g <resourceGroupName> -l <location> \
121120

122121
### Option 2: Assign IP addresses from an overlay network
123122

124-
Run these commands to create a resource group and VNet with a single subnet:
125-
126-
```azurecli-interactive
127-
# Create the resource group
128-
az group create --name <resourceGroupName> --location <location>
129-
```
130-
131-
```azurecli-interactive
132-
# Create a VNet with a subnet for nodes and a subnet for pods
133-
az network vnet create -g <resourceGroupName> --location <location> --name <vnetName> --address-prefixes <address prefix, example: 10.0.0.0/8> -o none
134-
az network vnet subnet create -g <resourceGroupName> --vnet-name <vnetName> --name nodesubnet --address-prefixes <address prefix, example: 10.240.0.0/16> -o none
135-
```
136-
137-
Then create the cluster using `--enable-cilium-dataplane`:
123+
Run this commands to create a cluster with an overlay network and Cilium. Replace the values for `<clusterName>`, `<resourceGroupName>`, and `<location>`:
138124

139125
```azurecli-interactive
140126
az aks create -n <clusterName> -g <resourceGroupName> -l <location> \
141-
--max-pods 250 \
142-
--node-count 2 \
143127
--network-plugin azure \
144128
--network-plugin-mode overlay \
145129
--pod-cidr 192.168.0.0/16 \
146-
--vnet-subnet-id /subscriptions/<subscriptionId>/resourceGroups/<resourceGroupName>/providers/Microsoft.Network/virtualNetworks/<vnetName>/subnets/nodesubnet \
147130
--enable-cilium-dataplane
148131
```
149132

0 commit comments

Comments
 (0)