Skip to content

Commit f1d439c

Browse files
authored
Merge pull request #244488 from MicrosoftDocs/main
7/10 OOB publishing
2 parents a48e17d + 46c8a93 commit f1d439c

26 files changed

+505
-173
lines changed

articles/active-directory/saas-apps/citrix-cloud-saml-sso-tutorial.md

Lines changed: 9 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 11/21/2022
12+
ms.date: 07/10/2023
1313
ms.author: jeedes
1414

1515
---
@@ -53,7 +53,7 @@ To configure the integration of Citrix Cloud SAML SSO into Azure AD, you need to
5353

5454
## Configure and test Azure AD SSO for Citrix Cloud SAML SSO
5555

56-
Configure and test Azure AD SSO with Citrix Cloud SAML SSO using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in Citrix Cloud SAML SSO.This user must also exist in your Active Directory that is synced with Azure AD Connect to your Azure AD subscription.
56+
Configure and test Azure AD SSO with Citrix Cloud SAML SSO using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in Citrix Cloud SAML SSO. This user must also exist in your Active Directory that is synced with Azure AD Connect to your Azure AD subscription.
5757

5858
To configure and test Azure AD SSO with Citrix Cloud SAML SSO, perform the following steps:
5959

@@ -85,13 +85,13 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8585

8686
![image](common/default-attributes.png)
8787

88-
1. In addition to above, Citrix Cloud SAML SSO application expects few more attributes to be passed back in SAML response which are shown below. These attributes are also pre-populated but you can review them as per your requirements.The values passed in the SAML response should map to the Active Directory attributes of the user.
88+
1. In addition to above, Citrix Cloud SAML SSO application expects few more attributes to be passed back in SAML response which are shown below. These attributes are also pre-populated but you can review them as per your requirements. The values passed in the SAML response should map to the Active Directory attributes of the user.
8989

9090
| Name | Source Attribute |
9191
| -----|-----|
9292
| cip_sid | user.onpremisesecurityidentifier |
9393
| cip_upn | user.userprincipalname |
94-
| cip_oid | ObjectGUID (Extension Attribute ) |
94+
| cip_oid | ObjectGUID (Extension Attribute) |
9595
| cip_email | user.mail |
9696
| displayName | user.displayname |
9797

@@ -135,30 +135,27 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
135135

136136
## Configure Citrix Cloud SAML SSO
137137

138-
139-
140-
141138
1. In a different web browser window, sign in to your up Citrix Cloud SAML SSO company site as an administrator
142139

143140
1. Navigate to the Citrix Cloud menu and select **Identity and Access Management**.
144141

145-
![Account](./media/citrix-cloud-saml-sso-tutorial/menu.png "Account")
142+
![Screenshot shows Account page.](./media/citrix-cloud-saml-sso-tutorial/menu.png "Account")
146143

147144
1. Under **Authentication**, locate **SAML 2.0** and select **Connect** from the ellipsis menu.
148145

149-
![SAML 2.0](./media/citrix-cloud-saml-sso-tutorial/access.png "SAML 2.0")
146+
![Screenshot shows SAML 2.0.](./media/citrix-cloud-saml-sso-tutorial/access.png "SAML 2.0")
150147

151148
1. In the **Configure SAML** page, perform the following steps.
152149

153-
![Configuration](./media/citrix-cloud-saml-sso-tutorial/connect.png "Configuration")
150+
![Screenshot shows Configuration.](./media/citrix-cloud-saml-sso-tutorial/connect.png "Configuration")
154151

155152
a. In the **Entity ID** textbox, paste the **Azure AD Identifier** value which you have copied from the Azure portal.
156153

157-
b. In the **Sign Authentication Request**, select **No**.
154+
b. In the **Sign Authentication Request**, select **Yes**, if you want to use `SAML Request signing`, else select **No**.
158155

159156
c. In the **SSO Service URL** textbox, paste the **Login URL** value which you have copied from the Azure portal.
160157

161-
d. Select **Binding Mechanism** from the drop down, you can select either **HTTP-POST** or **HTTP-Redirect** binding.
158+
d. Select **Binding Mechanism** from the drop-down, you can select either **HTTP-POST** or **HTTP-Redirect** binding.
162159

163160
e. Under **SAML Response**, select **Sign Either Response or Assertion** from the dropdown.
164161

-1.23 KB
Loading

articles/azure-arc/resource-bridge/includes/network-requirements.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,7 @@ The firewall and proxy URLs below must be allowlisted in order to enable communi
1717
|SFS API endpoint | 443 | `msk8s.api.cdp.microsoft.com` | Management machine & Appliance VM IPs need outbound connection. | Used when downloading product catalog, product bits, and OS images from SFS. |
1818
|Resource bridge (appliance) Dataplane service| 443 | `https://*.dp.prod.appliances.azure.com`| Appliance VMs IP need outbound connection. | Communicate with resource provider in Azure.|
1919
|Resource bridge (appliance) container image download| 443 | `*.blob.core.windows.net, https://ecpacr.azurecr.io`| Appliance VM IPs need outbound connection. | Required to pull container images. |
20+
|Managed Identity| 443 | `*.his.arc.azure.com`| Appliance VM IPs need outbound connection. | Required to pull system-assigned Managed Identity certificates. |
2021
|Resource bridge (appliance) image download| 80 | `msk8s.b.tlu.dl.delivery.mp.microsoft.com`| Management machine & Appliance VM IPs need outbound connection. | Download the Arc Resource Bridge OS images. |
2122
|Resource bridge (appliance) image download| 443 | `msk8s.sb.tlu.dl.delivery.mp.microsoft.com`| Management machine & Appliance VM IPs need outbound connection. | Download the Arc Resource Bridge OS images. |
2223
|Azure Arc for Kubernetes container image download| 443 | `https://azurearcfork8s.azurecr.io`| Appliance VM IPs need outbound connection. | Required to pull container images. |

articles/azure-arc/servers/deploy-ama-policy.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,8 +21,6 @@ In order for Azure Monitor to work on a machine, it needs to be associated with
2121

2222
## Select a Data Collection Rule
2323

24-
Data Collection Rules (DCRs) define specify what data should be collected, how to transform that data, and where to send that data. You need to select (or create) a DCR and specify it within the ARM template used for deploying AMA.
25-
2624
Data Collection Rules define the data collection process in Azure Monitor. They specify what data should be collected and where that data should be sent. You'll need to select or create a DCR to be associated with your Policy definition.
2725

2826
1. From your browser, go to the [Azure portal](https://portal.azure.com).
Lines changed: 76 additions & 55 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
2-
title: (Preview) SSH access to Azure Arc-enabled servers
3-
description: Leverage SSH remoting to access and manage Azure Arc-enabled servers.
4-
ms.date: 04/12/2023
2+
title: SSH access to Azure Arc-enabled servers
3+
description: Use SSH remoting to access and manage Azure Arc-enabled servers.
4+
ms.date: 07/01/2023
55
ms.topic: conceptual
66
ms.custom: references_regions
77
---
@@ -11,10 +11,6 @@ SSH for Arc-enabled servers enables SSH based connections to Arc-enabled servers
1111
This functionality can be used interactively, automated, or with existing SSH based tooling,
1212
allowing existing management tools to have a greater impact on Azure Arc-enabled servers.
1313

14-
> [!IMPORTANT]
15-
> SSH for Arc-enabled servers is currently in PREVIEW.
16-
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
17-
1814
## Key benefits
1915
SSH access to Arc-enabled servers provides the following key benefits:
2016
- No public IP address or open SSH ports required
@@ -23,14 +19,13 @@ SSH access to Arc-enabled servers provides the following key benefits:
2319
- Support for other OpenSSH based tooling with config file support
2420

2521
## Prerequisites
26-
To leverage this functionality, please ensure the following:
27-
- Ensure the Arc-enabled server has a hybrid agent version of "1.13.21320.014" or higher.
28-
- Run: ```azcmagent show``` on your Arc-enabled Server.
29-
- [Ensure the Arc-enabled server has the "sshd" service enabled](/windows-server/administration/openssh/openssh_install_firstuse).
30-
- Ensure you have the Virtual Machine Local User Login role assigned (role ID: 602da2baa5c241dab01d5360126ab525)
22+
To enable this functionality, ensure the following:
23+
- Ensure the Arc-enabled server has a hybrid agent version of "1.31.xxxx" or higher. Run: ```azcmagent show``` on your Arc-enabled Server.
24+
- Ensure the Arc-enabled server has the "sshd" service enabled. For Linux machines `openssh-server` can be installed via a package manager and needs to be enabled. SSHD needs to be [enabled on Windows](/windows-server/administration/openssh/openssh_install_firstuse).
25+
- Ensure you have the Owner or Contributer role assigned.
3126

3227
Authenticating with Azure AD credentials has additional requirements:
33-
- `aadsshlogin` and `aadsshlogin-selinux` (as appropriate) must be installed on the Arc-enabled server. These packages are installed with the AADSSHLoginForLinux VM extension.
28+
- `aadsshlogin` and `aadsshlogin-selinux` (as appropriate) must be installed on the Arc-enabled server. These packages are installed with the `Azure AD based SSH Login – Azure Arc` VM extension.
3429
- Configure role assignments for the VM. Two Azure roles are used to authorize VM login:
3530
- **Virtual Machine Administrator Login**: Users who have this role assigned can log in to an Azure virtual machine with administrator privileges.
3631
- **Virtual Machine User Login**: Users who have this role assigned can log in to an Azure virtual machine with regular user privileges.
@@ -46,72 +41,98 @@ SSH access to Arc-enabled servers is currently supported in all regions supporte
4641

4742
## Getting started
4843

49-
### Install local command line tool
50-
This functionality is currently packaged in an Azure CLI extension and an Azure PowerShell module.
51-
#### [Install Azure CLI extension](#tab/azure-cli)
44+
### Register the HybridConnectivity resource provider
45+
> [!NOTE]
46+
> This is a one-time operation that needs to be performed on each subscription.
5247
53-
```az extension add --name ssh```
48+
Check if the HybridConnectivity resource provider (RP) has been registered:
5449

55-
> [!NOTE]
56-
> The Azure CLI extension version must be greater than 1.1.0.
50+
```az provider show -n Microsoft.HybridConnectivity```
5751

58-
#### [Install Azure PowerShell module](#tab/azure-powershell)
52+
If the RP hasn't been registered, run the following:
5953

60-
```Install-Module -Name AzPreview -Scope CurrentUser -Repository PSGallery -Force```
54+
```az provider register -n Microsoft.HybridConnectivity```
6155

62-
---
56+
This operation can take 2-5 minutes to complete. Before moving on, check that the RP has been registered.
6357

64-
### Enable functionality on your Arc-enabled server
65-
In order to use the SSH connect feature, you must enable connections on the hybrid agent.
58+
### Create default connectivity endpoint
59+
> [!NOTE]
60+
> The following step will not need to be run for most users as it should complete automatically at first connection.
61+
> This step must be completed for each Arc-enabled server.
6662
63+
#### [Create the default endpoint with Azure CLI:](#tab/azure-cli)
64+
```bash
65+
az rest --method put --uri https://management.azure.com/subscriptions/<subscription>/resourceGroups/<resourcegroup>/providers/Microsoft.HybridCompute/machines/<arc enabled server name>/providers/Microsoft.HybridConnectivity/endpoints/default?api-version=2023-03-15 --body '{"properties": {"type": "default"}}'
66+
```
6767
> [!NOTE]
68-
> The following actions must be completed in an elevated terminal session.
68+
> If using Azure CLI from PowerShell, the following should be used.
69+
```powershell
70+
az rest --method put --uri https://management.azure.com/subscriptions/<subscription>/resourceGroups/<resourcegroup>/providers/Microsoft.HybridCompute/machines/<arc enabled server name>/providers/Microsoft.HybridConnectivity/endpoints/default?api-version=2023-03-15 --body '{\"properties\":{\"type\":\"default\"}}'
71+
```
6972

70-
View your current incoming connections:
73+
Validate endpoint creation:
74+
```bash
75+
az rest --method get --uri https://management.azure.com/subscriptions/<subscription>/resourceGroups/<resourcegroup>/providers/Microsoft.HybridCompute/machines/<arc enabled server name>/providers/Microsoft.HybridConnectivity/endpoints/default?api-version=2023-03-15
76+
```
77+
78+
#### [Create the default endpoint with Azure PowerShell:](#tab/azure-powershell)
79+
```powershell
80+
Invoke-AzRestMethod -Method put -Path /subscriptions/<subscription>/resourceGroups/<resourcegroup>/providers/Microsoft.HybridCompute/machines/<arc enabled server name>/providers/Microsoft.HybridConnectivity/endpoints/default?api-version=2023-03-15 -Payload '{"properties": {"type": "default"}}'
81+
```
7182

72-
```azcmagent config list```
83+
Validate endpoint creation:
84+
```powershell
85+
Invoke-AzRestMethod -Method get -Path /subscriptions/<subscription>/resourceGroups/<resourcegroup>/providers/Microsoft.HybridCompute/machines/<arc enabled server name>/providers/Microsoft.HybridConnectivity/endpoints/default?api-version=2023-03-15
86+
```
87+
---
88+
89+
### Install local command line tool
90+
This functionality is currently packaged in an Azure CLI extension and an Azure PowerShell module.
91+
#### [Install Azure CLI extension](#tab/azure-cli)
7392

74-
If you have existing ports, you'll need to include them in the following command.
93+
```az extension add --name ssh```
7594

76-
To add access to SSH connections, run the following:
95+
> [!NOTE]
96+
> The Azure CLI extension version must be greater than 2.0.0.
7797
78-
```azcmagent config set incomingconnections.ports 22<,other open ports,...>```
98+
#### [Install Azure PowerShell module](#tab/azure-powershell)
7999

80-
If you're using a non-default port for your SSH connection, replace port 22 with your desired port in the previous command.
100+
```powershell
101+
Install-Module -Name Az.Ssh -Scope CurrentUser -Repository PSGallery
102+
Install-Module -Name Az.Ssh.ArcProxy -Scope CurrentUser -Repository PSGallery
103+
```
81104

82-
> [!NOTE]
83-
> The following steps will not need to be run for most users.
105+
---
106+
107+
### Enable functionality on your Arc-enabled server
108+
In order to use the SSH connect feature, you must update the Service Configuration in the Connectivity Endpoint on the Arc-Enabled Server to allow SSH connection to a specific port. You may only allow connection to a single port. The CLI tools attempt to update the allowed port at runtime, but the port can be manually configured with the following:
84109

85-
### Register the HybridConnectivity resource provider
86110
> [!NOTE]
87-
> This is a one-time operation that needs to be performed on each subscription.
111+
> There may be a delay after updating the Service Configuration until you are able to connect.
88112
89-
Check if the HybridConnectivity resource provider (RP) has been registered:
113+
#### [Azure CLI](#tab/azure-cli)
90114

91-
```az provider show -n Microsoft.HybridConnectivity```
115+
```az rest --method put --uri https://management.azure.com/subscriptions/<subscription>/resourceGroups/<resourcegroup>/providers/Microsoft.HybridCompute/machines/<arc enabled server name>/providers/Microsoft.HybridConnectivity/endpoints/default/serviceconfigurations/SSH?api-version=2023-03-15 --body '{\"properties\": {\"serviceName\": \"SSH\", \"port\": \"22\"}}'```
92116

93-
If the RP hasn't been registered, run the following:
117+
#### [Azure PowerShell](#tab/azure-powershell)
94118

95-
```az provider register -n Microsoft.HybridConnectivity```
119+
```Invoke-AzRestMethod -Method put -Path /subscriptions/<subscription>/resourceGroups/<resourcegroup>/providers/Microsoft.HybridCompute/machines/<arc enabled server name>/providers/Microsoft.HybridConnectivity/endpoints/default/serviceconfigurations/SSH?api-version=2023-03-15 -Payload '{"properties": {"serviceName": "SSH", "port": 22}}'```
96120

97-
This operation can take 2-5 minutes to complete. Before moving on, check that the RP has been registered.
121+
---
98122

99-
### Create default connectivity endpoint
100-
> [!NOTE]
101-
> The following actions must be completed for each Arc-enabled server.
123+
If you're using a nondefault port for your SSH connection, replace port 22 with your desired port in the previous command.
124+
125+
### Optional: Install Azure AD login extension
126+
The `Azure AD based SSH Login – Azure Arc` VM extension can be added from the extensions menu of the Arc server. The Azure AD login extension can also be installed locally via a package manager via: `apt-get install aadsshlogin` or the following command.
127+
128+
```az connectedmachine extension create --machine-name <arc enabled server name> --resource-group <resourcegroup> --publisher Microsoft.Azure.ActiveDirectory --name AADSSHLogin --type AADSSHLoginForLinux --location <location>```
102129

103-
Create the default endpoint in PowerShell:
104-
```powershell
105-
az rest --method put --uri https://management.azure.com/subscriptions/<subscription>/resourceGroups/<resourcegroup>/providers/Microsoft.HybridCompute/machines/<arc enabled server name>/providers/Microsoft.HybridConnectivity/endpoints/default?api-version=2021-10-06-preview --body '{"properties": {"type": "default"}}'
106-
```
107-
Create the default endpoint in Bash:
108-
```bash
109-
az rest --method put --uri https://management.azure.com/subscriptions/<subscription>/resourceGroups/<resourcegroup>/providers/Microsoft.HybridCompute/machines/<arc enabled server name>/providers/Microsoft.HybridConnectivity/endpoints/default?api-version=2021-10-06-preview --body '{"properties": {"type": "default"}}'
110-
```
111-
Validate endpoint creation:
112-
```
113-
az rest --method get --uri https://management.azure.com/subscriptions/<subscription>/resourceGroups/<resourcegroup>/providers/Microsoft.HybridCompute/machines/<arc enabled server name>/providers/Microsoft.HybridConnectivity/endpoints/default?api-version=2021-10-06-preview
114-
```
115130

116131
## Examples
117132
To view examples, view the Az CLI documentation page for [az ssh](/cli/azure/ssh) or the Azure PowerShell documentation page for [Az.Ssh](/powershell/module/az.ssh).
133+
134+
## Next steps
135+
136+
- Learn about [OpenSSH for Windows](/windows-server/administration/openssh/openssh_overview)
137+
- Learn about troubleshooting [SSH access to Azure Arc-enabled servers](ssh-arc-troubleshoot.md).
138+
- Learn about troubleshooting [agent connection issues](troubleshoot-agent-onboard.md).

0 commit comments

Comments
 (0)