Skip to content

Commit eeb9ed0

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into ehubkafkamigratelatest
2 parents c0ff53a + 0595d20 commit eeb9ed0

File tree

168 files changed

+535
-1598
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

168 files changed

+535
-1598
lines changed

.openpublishing.redirection.json

Lines changed: 70 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43796,6 +43796,76 @@
4379643796
"redirect_url": "/azure/cognitive-services/acoustics/what-is-acoustics",
4379743797
"redirect_document_id": false
4379843798
},
43799+
{
43800+
"source_path": "articles/cognitive-services/Acoustics/what-is-acoustics.md",
43801+
"redirect_url": "https://docs.microsoft.com/gaming/acoustics/what-is-acoustics",
43802+
"redirect_document_id": false
43803+
},
43804+
{
43805+
"source_path": "articles/cognitive-services/Acoustics/unity-quickstart.md",
43806+
"redirect_url": "https://docs.microsoft.com/gaming/acoustics/unity-quickstart",
43807+
"redirect_document_id": false
43808+
},
43809+
{
43810+
"source_path": "articles/cognitive-services/Acoustics/unreal-quickstart.md",
43811+
"redirect_url": "https://docs.microsoft.com/gaming/acoustics/unreal-quickstart",
43812+
"redirect_document_id": false
43813+
},
43814+
{
43815+
"source_path": "articles/cognitive-services/Acoustics/unity-baking.md",
43816+
"redirect_url": "https://docs.microsoft.com/gaming/acoustics/unity-baking",
43817+
"redirect_document_id": false
43818+
},
43819+
{
43820+
"source_path": "articles/cognitive-services/Acoustics/unity-workflow.md",
43821+
"redirect_url": "https://docs.microsoft.com/gaming/acoustics/unity-workflow",
43822+
"redirect_document_id": false
43823+
},
43824+
{
43825+
"source_path": "articles/cognitive-services/Acoustics/unreal-baking.md",
43826+
"redirect_url": "https://docs.microsoft.com/gaming/acoustics/unreal-baking",
43827+
"redirect_document_id": false
43828+
},
43829+
{
43830+
"source_path": "articles/cognitive-services/Acoustics/unreal-workflow.md",
43831+
"redirect_url": "https://docs.microsoft.com/gaming/acoustics/unreal-workflow",
43832+
"redirect_document_id": false
43833+
},
43834+
{
43835+
"source_path": "articles/cognitive-services/Acoustics/design-process.md",
43836+
"redirect_url": "https://docs.microsoft.com/gaming/acoustics/design-process",
43837+
"redirect_document_id": false
43838+
},
43839+
{
43840+
"source_path": "articles/cognitive-services/Acoustics/bake-resolution.md",
43841+
"redirect_url": "https://docs.microsoft.com/gaming/acoustics/bake-resolution",
43842+
"redirect_document_id": false
43843+
},
43844+
{
43845+
"source_path": "articles/cognitive-services/Acoustics/create-azure-account.md",
43846+
"redirect_url": "https://docs.microsoft.com/gaming/acoustics/create-azure-account",
43847+
"redirect_document_id": false
43848+
},
43849+
{
43850+
"source_path": "articles/cognitive-services/Acoustics/unity-integration.md",
43851+
"redirect_url": "https://docs.microsoft.com/gaming/acoustics/unity-integration",
43852+
"redirect_document_id": false
43853+
},
43854+
{
43855+
"source_path": "articles/cognitive-services/Acoustics/unreal-integration.md",
43856+
"redirect_url": "https://docs.microsoft.com/gaming/acoustics/unreal-integration",
43857+
"redirect_document_id": false
43858+
},
43859+
{
43860+
"source_path": "articles/cognitive-services/Acoustics/faq.md",
43861+
"redirect_url": "https://docs.microsoft.com/gaming/acoustics/faq",
43862+
"redirect_document_id": false
43863+
},
43864+
{
43865+
"source_path": "articles/cognitive-services/Acoustics/known-issues.md",
43866+
"redirect_url": "https://docs.microsoft.com/gaming/acoustics/known-issues",
43867+
"redirect_document_id": false
43868+
},
4379943869
{
4380043870
"source_path": "articles/iot-central/howto-export-data.md",
4380143871
"redirect_url": "/azure/iot-central/core/howto-export-data-event-hubs-service-bus",

articles/active-directory-b2c/custom-policy-get-started.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -112,7 +112,7 @@ Next, expose the API by adding a scope:
112112
1. In **App registrations (Legacy)**, select **New application registration**.
113113
1. For **Name**, enter `ProxyIdentityExperienceFramework`.
114114
1. For **Application type**, choose **Native**.
115-
1. For **Redirect URI**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant.
115+
1. For **Redirect URI**, enter `myapp://auth`.
116116
1. Select **Create**. After it's created, copy the application ID and save it to use later.
117117
1. Select **Settings**, then select **Required permissions**, and then select **Add**.
118118
1. Choose **Select an API**, search for and select **IdentityExperienceFramework**, and then click **Select**.
@@ -125,7 +125,7 @@ Next, expose the API by adding a scope:
125125
1. For **Name**, enter `ProxyIdentityExperienceFramework`.
126126
1. Under **Supported account types**, select **Accounts in this organizational directory only**.
127127
1. Under **Redirect URI**, use the drop-down to select **Public client/native (mobile & desktop)**.
128-
1. For **Redirect URI**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant.
128+
1. For **Redirect URI**, enter `myapp://auth`.
129129
1. Under **Permissions**, select the *Grant admin consent to openid and offline_access permissions* check box.
130130
1. Select **Register**.
131131
1. Record the **Application (client) ID** for use in a later step.

articles/active-directory/manage-apps/application-proxy-connector-installation-problem.md

Lines changed: 52 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -47,21 +47,70 @@ When the installation of a connector fails, the root cause is usually one of the
4747

4848
3. Open a browser (separate tab) and go to the following web page: `https://login.microsoftonline.com`, make sure that you can login to that page.
4949

50-
## Verify Machine and backend components support for Application Proxy trust cert
50+
## Verify Machine and backend components support for Application Proxy trust certificate
5151

52-
**Objective:** Verify that the connector machine, backend proxy and firewall can support the certificate created by the connector for future trust.
52+
**Objective:** Verify that the connector machine, backend proxy and firewall can support the certificate created by the connector for future trust and that the certificate is valid.
5353

5454
>[!NOTE]
5555
>The connector tries to create a SHA512 cert that is supported by TLS1.2. If the machine or the backend firewall and proxy does not support TLS1.2, the installation fails.
5656
>
5757
>
5858
59-
**To resolve the issue:**
59+
**Review the pre-requisites required:**
6060

6161
1. Verify the machine supports TLS1.2 – All Windows versions after 2012 R2 should support TLS 1.2. If your connector machine is from a version of 2012 R2 or prior, make sure that the following KBs are installed on the machine: <https://support.microsoft.com/help/2973337/sha512-is-disabled-in-windows-when-you-use-tls-1.2>
6262

6363
2. Contact your network admin and ask to verify that the backend proxy and firewall do not block SHA512 for outgoing traffic.
6464

65+
**To verify the client certificate:**
66+
67+
Verify the thumbprint of the current client certificate. The certificate store can be found in %ProgramData%\microsoft\Microsoft AAD Application Proxy Connector\Config\TrustSettings.xml
68+
69+
```
70+
<?xml version="1.0" encoding="utf-8"?>
71+
<ConnectorTrustSettingsFile xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
72+
<CloudProxyTrust>
73+
<Thumbprint>4905CC64B2D81BBED60962ECC5DCF63F643CCD55</Thumbprint>
74+
<IsInUserStore>false</IsInUserStore>
75+
</CloudProxyTrust>
76+
</ConnectorTrustSettingsFile>
77+
```
78+
79+
Here are the possible **IsInUserStore** values and meanings:
80+
81+
- **false** - The client certificate was created during the installation or registration initiated by Register-AppProxyConnector command. It is stored in the personal container in the certificate store of the local machine.
82+
83+
Follow the steps to verify the certificate:
84+
85+
1. Run **certlm.msc**
86+
2. In the management console expand the Personal container and click on Certificates
87+
3. Locate the certificate issued by **connectorregistrationca.msappproxy.net**
88+
89+
- **true** - The automatically renewed certificate is stored in the personal container in the user certificate store of the Network Service.
90+
91+
Follow the steps to verify the certificate:
92+
93+
1. Download [PsTools.zip](https://docs.microsoft.com/sysinternals/downloads/pstools)
94+
2. Extract [PsExec](https://docs.microsoft.com/sysinternals/downloads/psexec) from the package and run **psexec -i -u "nt authority\network service" cmd.exe** from an elevated command prompt.
95+
3. Run **certmgr.msc** in the newly appeared command prompt
96+
2. In the management console expand the Personal container and click on Certificates
97+
3. Locate the certificate issued by **connectorregistrationca.msappproxy.ne
98+
99+
**To renew the client certificate:**
100+
101+
If a connector is not connected to the service for several months, its certificates may be outdated. The failure of the certificate renewal leads to an expired certificate. This makes the connector service to stop working. The event 1000 is recorded in the admin log of the connector:
102+
103+
"Connector re-registration failed: The Connector trust certificate expired. Run the PowerShell cmdlet Register-AppProxyConnector on the computer on which the Connector is running to re-register your Connector."
104+
105+
In this case, uninstall and reinstall the connector to trigger registration or you can run the following PowerShell commands:
106+
107+
```
108+
Import-module AppProxyPSModule
109+
Register-AppProxyConnector
110+
```
111+
112+
To learn more about the Register-AppProxyConnector command, please see [Create an unattended installation script for the Azure AD Application Proxy connector](https://docs.microsoft.com/azure/active-directory/manage-apps/application-proxy-register-connector-powershell)
113+
65114
## Verify admin is used to install the connector
66115

67116
**Objective:** Verify that the user who tries to install the connector is an administrator with correct credentials. Currently, the user must be at least an application administrator for the installation to succeed.

articles/aks/internal-lb.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ This article assumes that you have an existing AKS cluster. If you need an AKS c
2323

2424
You also need the Azure CLI version 2.0.59 or later installed and configured. Run `az --version` to find the version. If you need to install or upgrade, see [Install Azure CLI][install-azure-cli].
2525

26-
The AKS cluster service principal needs permission to manage network resources if you use an existing subnet or resource group. In general, assign the *Network contributor* role to your service principal on the delegated resources. For more information on permissions, see [Delegate AKS access to other Azure resources][aks-sp].
26+
The AKS cluster service principal needs permission to manage network resources if you use an existing subnet or resource group. In general, assign the *Network contributor* role to your service principal on the delegated resources. Instead of a service principal, you can use the system assigned managed identity for permissions. For more information, see [Use managed identities](use-managed-identity.md). For more information on permissions, see [Delegate AKS access to other Azure resources][aks-sp].
2727

2828
## Create an internal load balancer
2929

articles/aks/kubernetes-draft.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -301,7 +301,7 @@ az group delete --name MyResourceGroup --yes --no-wait
301301
```
302302

303303
> [!NOTE]
304-
> When you delete the cluster, the Azure Active Directory service principal used by the AKS cluster is not removed. For steps on how to remove the service principal, see [AKS service principal considerations and deletion][sp-delete].
304+
> When you delete the cluster, the Azure Active Directory service principal used by the AKS cluster is not removed. For steps on how to remove the service principal, see [AKS service principal considerations and deletion][sp-delete]. If you used a managed identity, the identity is managed by the platform and does not require removal.
305305
306306
## Next steps
307307

articles/aks/kubernetes-service-principal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,15 @@ title: Service principals for Azure Kubernetes Services (AKS)
33
description: Create and manage an Azure Active Directory service principal for a cluster in Azure Kubernetes Service (AKS)
44
services: container-service
55
ms.topic: conceptual
6-
ms.date: 04/25/2019
6+
ms.date: 04/02/2020
77

88

99
#Customer intent: As a cluster operator, I want to understand how to create a service principal and delegate permissions for AKS to access required resources. In large enterprise environments, the user that deploys the cluster (or CI/CD system), may not have permissions to create this service principal automatically when the cluster is created.
1010
---
1111

1212
# Service principals with Azure Kubernetes Service (AKS)
1313

14-
To interact with Azure APIs, an AKS cluster requires an [Azure Active Directory (AD) service principal][aad-service-principal]. The service principal is needed to dynamically create and manage other Azure resources such as an Azure load balancer or container registry (ACR).
14+
To interact with Azure APIs, an AKS cluster requires either an [Azure Active Directory (AD) service principal][aad-service-principal] or a [managed identity](use-managed-identity.md). A service principal or managed identity is needed to dynamically create and manage other Azure resources such as an Azure load balancer or container registry (ACR).
1515

1616
This article shows how to create and use a service principal for your AKS clusters.
1717

articles/aks/kubernetes-walkthrough-portal.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,6 +51,8 @@ To create an AKS cluster, complete the following steps:
5151
- Create a new service principal by leaving the **Service Principal** field with **(new) default service principal**. Or you can choose *Configure service principal* to use an existing one. If you use an existing one, you will need to provide the SPN client ID and secret.
5252
- Enable the option for Kubernetes role-based access controls (RBAC). This will provide more fine-grained control over access to the Kubernetes resources deployed in your AKS cluster.
5353

54+
Alternatively, you can use a managed identity instead of a service principal. See [use managed identities](use-managed-identity.md) for more information.
55+
5456
By default, *Basic* networking is used, and Azure Monitor for containers is enabled. Click **Review + create** and then **Create** when validation completes.
5557

5658
It takes a few minutes to create the AKS cluster. When your deployment is complete, click **Go to resource**, or browse to the AKS cluster resource group, such as *myResourceGroup*, and select the AKS resource, such as *myAKSCluster*. The AKS cluster dashboard is shown, as in this example:
@@ -248,7 +250,7 @@ az aks delete --resource-group myResourceGroup --name myAKSCluster --no-wait
248250
```
249251

250252
> [!NOTE]
251-
> When you delete the cluster, the Azure Active Directory service principal used by the AKS cluster is not removed. For steps on how to remove the service principal, see [AKS service principal considerations and deletion][sp-delete].
253+
> When you delete the cluster, the Azure Active Directory service principal used by the AKS cluster is not removed. For steps on how to remove the service principal, see [AKS service principal considerations and deletion][sp-delete]. If you used a managed identity, the identity is managed by the platform and does not require removal.
252254
253255
## Get the code
254256

articles/aks/kubernetes-walkthrough-rm-template.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ If you choose to install and use the CLI locally, this quickstart requires that
2828

2929
## Prerequisites
3030

31-
To create an AKS cluster using a Resource Manager template, you provide an SSH public key and Azure Active Directory service principal. If you need either of these resources, see the following section; otherwise skip to the [Create an AKS cluster](#create-an-aks-cluster) section.
31+
To create an AKS cluster using a Resource Manager template, you provide an SSH public key and Azure Active Directory service principal. Alternatively, you can use a [managed identity](use-managed-identity.md) instead of a service principal for permissions. If you need either of these resources, see the following section; otherwise skip to the [Create an AKS cluster](#create-an-aks-cluster) section.
3232

3333
### Create an SSH key pair
3434

@@ -46,7 +46,7 @@ For more information about creating SSH keys, see [Create and manage SSH keys fo
4646

4747
### Create a service principal
4848

49-
To allow an AKS cluster to interact with other Azure resources, an Azure Active Directory service principal is used. Create a service principal using the [az ad sp create-for-rbac][az-ad-sp-create-for-rbac] command. The `--skip-assignment` parameter limits any additional permissions from being assigned. By default, this service principal is valid for one year.
49+
To allow an AKS cluster to interact with other Azure resources, an Azure Active Directory service principal is used. Create a service principal using the [az ad sp create-for-rbac][az-ad-sp-create-for-rbac] command. The `--skip-assignment` parameter limits any additional permissions from being assigned. By default, this service principal is valid for one year. Note that you can use a managed identity instead of a service principal. For more information, see [Use managed identities](use-managed-identity.md).
5050

5151
```azurecli-interactive
5252
az ad sp create-for-rbac --skip-assignment
@@ -279,7 +279,7 @@ az group delete --name myResourceGroup --yes --no-wait
279279
```
280280

281281
> [!NOTE]
282-
> When you delete the cluster, the Azure Active Directory service principal used by the AKS cluster is not removed. For steps on how to remove the service principal, see [AKS service principal considerations and deletion][sp-delete].
282+
> When you delete the cluster, the Azure Active Directory service principal used by the AKS cluster is not removed. For steps on how to remove the service principal, see [AKS service principal considerations and deletion][sp-delete]. If you used a managed identity, the identity is managed by the platform and does not require removal.
283283
284284
## Get the code
285285

articles/aks/kubernetes-walkthrough.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -241,7 +241,7 @@ az group delete --name myResourceGroup --yes --no-wait
241241
```
242242

243243
> [!NOTE]
244-
> When you delete the cluster, the Azure Active Directory service principal used by the AKS cluster is not removed. For steps on how to remove the service principal, see [AKS service principal considerations and deletion][sp-delete].
244+
> When you delete the cluster, the Azure Active Directory service principal used by the AKS cluster is not removed. For steps on how to remove the service principal, see [AKS service principal considerations and deletion][sp-delete]. If you used a managed identity, the identity is managed by the platform and does not require removal.
245245
246246
## Get the code
247247

articles/aks/load-balancer-standard.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ If you choose to install and use the CLI locally, this article requires that you
2929

3030
This article assumes you have an AKS cluster with the *Standard* SKU Azure Load Balancer. If you need an AKS cluster, see the AKS quickstart [using the Azure CLI][aks-quickstart-cli] or [using the Azure portal][aks-quickstart-portal].
3131

32-
The AKS cluster service principal needs also permission to manage network resources if you use an existing subnet or resource group. In general, assign the *Network contributor* role to your service principal on the delegated resources. For more information on permissions, see [Delegate AKS access to other Azure resources][aks-sp].
32+
The AKS cluster service principal needs also permission to manage network resources if you use an existing subnet or resource group. In general, assign the *Network contributor* role to your service principal on the delegated resources. Instead of a service principal, you can also use the system assigned managed identity for permissions. For more information, see [Use managed identities](use-managed-identity.md). For more information on permissions, see [Delegate AKS access to other Azure resources][aks-sp].
3333

3434
### Moving from a Basic SKU Load Balancer to Standard SKU
3535

0 commit comments

Comments
 (0)