Skip to content

Commit f353d02

Browse files
committed
Merge branch 'main' into release-msid-gtd-tutorial-web-app
2 parents ec70c79 + ce9dc40 commit f353d02

File tree

61 files changed

+570
-574
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

61 files changed

+570
-574
lines changed

articles/active-directory/app-provisioning/how-provisioning-works.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.topic: conceptual
1010
ms.workload: identity
11-
ms.date: 03/31/2023
11+
ms.date: 04/03/2023
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---
@@ -31,7 +31,7 @@ The **Azure AD Provisioning Service** provisions users to SaaS apps and other sy
3131

3232
## Provisioning using SCIM 2.0
3333

34-
The Azure AD provisioning service uses the [SCIM 2.0 protocol](https://techcommunity.microsoft.com/t5/Identity-Standards-Blog/bg-p/IdentityStandards) for automatic provisioning. The service connects to the SCIM endpoint for the application, and uses SCIM user object schema and REST APIs to automate the provisioning and de-provisioning of users and groups. A SCIM-based provisioning connector is provided for most applications in the Azure AD gallery. When building apps for Azure AD, developers can use the SCIM 2.0 user management API to build a SCIM endpoint that integrates Azure AD for provisioning. For details, see [Build a SCIM endpoint and configure user provisioning](../app-provisioning/use-scim-to-provision-users-and-groups.md).
34+
The Azure AD provisioning service uses the [SCIM 2.0 protocol](https://techcommunity.microsoft.com/t5/Identity-Standards-Blog/bg-p/IdentityStandards) for automatic provisioning. The service connects to the SCIM endpoint for the application, and uses SCIM user object schema and REST APIs to automate the provisioning and de-provisioning of users and groups. A SCIM-based provisioning connector is provided for most applications in the Azure AD gallery. Developers use the SCIM 2.0 user management API in Azure AD to build endpoints for their apps that integrate with the provisioning service. For details, see [Build a SCIM endpoint and configure user provisioning](../app-provisioning/use-scim-to-provision-users-and-groups.md).
3535

3636
To request an automatic Azure AD provisioning connector for an app that doesn't currently have one, see [Azure Active Directory Application Request](../manage-apps/v2-howto-app-gallery-listing.md).
3737

@@ -157,7 +157,7 @@ Content-type: application/json
157157
}
158158
```
159159
- A new initial cycle is triggered because of a change in attribute mappings or scoping filters. This action also clears any stored watermark and causes all source objects to be evaluated again.
160-
- The provisioning process goes into quarantine (see example) because of a high error rate, and stays in quarantine for more than four weeks. In this event, the service will be automatically disabled.
160+
- The provisioning process goes into quarantine (see example) because of a high error rate, and stays in quarantine for more than four weeks. In this event, the service is automatically disabled.
161161

162162
### Errors and retries
163163

@@ -191,40 +191,40 @@ The provisioning service supports both deleting and disabling (sometimes referre
191191

192192
**Configure your application to disable a user**
193193

194-
Confirm the checkobx for updates is selected.
194+
Confirm the checkbox for updates is selected.
195195

196-
Confirm the mapping for *active* for your application. If your using an application from the app gallery, the mapping may be slightly different. In this case, use the default mapping for gallery applications.
196+
Confirm the mapping for *active* for your application. If you're using an application from the app gallery, the mapping may be slightly different. In this case, use the default mapping for gallery applications.
197197

198198
:::image type="content" source="./media/how-provisioning-works/disable-user.png" alt-text="Disable a user" lightbox="./media/how-provisioning-works/disable-user.png":::
199199

200200

201201
**Configure your application to delete a user**
202202

203-
The scenarios will trigger a disable or a delete:
204-
* A user is soft deleted in Azure AD (sent to the recycle bin / AccountEnabled property set to false).
203+
The scenario triggers a disable or a delete:
204+
* A user is soft-deleted in Azure AD (sent to the recycle bin / AccountEnabled property set to false).
205205
30 days after a user is deleted in Azure AD, they're permanently deleted from the tenant. At this point, the provisioning service sends a DELETE request to permanently delete the user in the application. At any time during the 30-day window, you can [manually delete a user permanently](../fundamentals/active-directory-users-restore.md), which sends a delete request to the application.
206206
* A user is permanently deleted / removed from the recycle bin in Azure AD.
207207
* A user is unassigned from an app.
208208
* A user goes from in scope to out of scope (doesn't pass a scoping filter anymore).
209209

210210
:::image type="content" source="./media/how-provisioning-works/delete-user.png" alt-text="Delete a user" lightbox="./media/how-provisioning-works/delete-user.png":::
211211

212-
By default, the Azure AD provisioning service soft deletes or disables users that go out of scope. If you want to override this default behavior, you can set a flag to [skip out-of-scope deletions.](skip-out-of-scope-deletions.md)
212+
By default, the Azure AD provisioning service soft-deletes or disables users that go out of scope. If you want to override this default behavior, you can set a flag to [skip out-of-scope deletions.](skip-out-of-scope-deletions.md)
213213

214-
If one of the four events occurs and the target application doesn't support soft deletes, the provisioning service will send a DELETE request to permanently delete the user from the app.
214+
When one of the four events occurs and the target application doesn't support soft-deletes, the provisioning service sends a DELETE request to permanently delete the user from the app.
215215

216-
If you see an attribute IsSoftDeleted in your attribute mappings, it's used to determine the state of the user and whether to send an update request with active = false to soft delete the user.
216+
If you see `IsSoftDeleted` in your attribute mappings, it's used to determine the state of the user and whether to send an update request with `active = false` to soft-delete the user.
217217

218218
**Deprovisioning events**
219219

220-
The table describes how you can configure deprovisioning actions with the Azure AD provisioning service. These rules are written with the non-gallery / custom application in mind, but generally apply to applications in the gallery. However, the behavior for gallery applications can differ as they've been optimized to meet the needs of the application. For example, the Azure AD provisioning service may always sende a request to hard delete users in certain applications rather than soft deleting, if the target application doesn't support soft deleting users.
220+
The table describes how you can configure deprovisioning actions with the Azure AD provisioning service. These rules are written with the non-gallery / custom application in mind, but generally apply to applications in the gallery. However, the behavior for gallery applications can differ as they've been optimized to meet the needs of the application. For example, if the target application doesn't support soft-deleting then the Azure AD provisioning service might send a hard-delete request to delete users rather than send a soft-delete.
221221

222222
|Scenario|How to configure in Azure AD|
223223
|--|--|
224224
|If a user is unassigned from an app, soft-deleted in Azure AD, or blocked from sign-in, do nothing.|Remove isSoftDeleted from the attribute mappings and / or set the [skip out of scope deletions](skip-out-of-scope-deletions.md) property to true.|
225225
|If a user is unassigned from an app, soft-deleted in Azure AD, or blocked from sign-in, set a specific attribute to true / false.|Map isSoftDeleted to the attribute that you would like to set to false.|
226226
|When a user is disabled in Azure AD, unassigned from an app, soft-deleted in Azure AD, or blocked from sign-in, send a DELETE request to the target application.|This is currently supported for a limited set of gallery applications where the functionality is required. It's not configurable by customers.|
227-
|When a user is deleted in Azure AD, do nothing in the target application.|Ensure that "Delete" isn't selected as one of the target object actions in the [attriubte configuration experience](skip-out-of-scope-deletions.md).|
227+
|When a user is deleted in Azure AD, do nothing in the target application.|Ensure that "Delete" isn't selected as one of the target object actions in the [attribute configuration experience](skip-out-of-scope-deletions.md).|
228228
|When a user is deleted in Azure AD, set the value of an attribute in the target application.|Not supported.|
229229
|When a user is deleted in Azure AD, delete the user in the target application|This is supported. Ensure that Delete is selected as one of the target object actions in the [attribute configuration experience](skip-out-of-scope-deletions.md).|
230230

@@ -236,7 +236,7 @@ The table describes how you can configure deprovisioning actions with the Azure
236236

237237
**Recommendation**
238238

239-
When developing an application, always support both soft deletes and hard deletes. It allows customers to recover when a user is accidentally disabled.
239+
When developing an application, always support both soft-deletes and hard-deletes. It allows customers to recover when a user is accidentally disabled.
240240

241241

242242
## Next Steps

articles/active-directory/authentication/howto-authentication-temporary-access-pass.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -203,7 +203,7 @@ For more information about NIST standards for onboarding and recovery, see [NIST
203203
Keep these limitations in mind:
204204

205205
- When using a one-time Temporary Access Pass to register a Passwordless method such as FIDO2 or Phone sign-in, the user must complete the registration within 10 minutes of sign-in with the one-time Temporary Access Pass. This limitation doesn't apply to a Temporary Access Pass that can be used more than once.
206-
- Users in scope for Self Service Password Reset (SSPR) registration policy *or* [Identity Protection Multi-factor authentication registration policy](../identity-protection/howto-identity-protection-configure-mfa-policy.md) will be required to register authentication methods after they've signed in with a Temporary Access Pass.
206+
- Users in scope for Self Service Password Reset (SSPR) registration policy *or* [Identity Protection Multi-factor authentication registration policy](../identity-protection/howto-identity-protection-configure-mfa-policy.md) will be required to register authentication methods after they've signed in with a Temporary Access Pass using a browser.
207207
Users in scope for these policies will get redirected to the [Interrupt mode of the combined registration](concept-registration-mfa-sspr-combined.md#combined-registration-modes). This experience doesn't currently support FIDO2 and Phone Sign-in registration.
208208
- A Temporary Access Pass can't be used with the Network Policy Server (NPS) extension and Active Directory Federation Services (AD FS) adapter.
209209
- It can take a few minutes for changes to replicate. Because of this, after a Temporary Access Pass is added to an account it can take a while for the prompt to appear. For the same reason, after a Temporary Access Pass expires, users may still see a prompt for Temporary Access Pass.

articles/aks/enable-host-encryption.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ If you want to create clusters without host-based encryption, you can do so by o
4747
You can enable host-based encryption on existing clusters by adding a new node pool to your cluster. Configure a new node pool to use host-based encryption by using the `--enable-encryption-at-host` parameter.
4848

4949
```azurecli
50-
az aks nodepool add --name hostencrypt --cluster-name myAKSCluster --resource-group myResourceGroup -s Standard_DS2_v2 -l westus2 --enable-encryption-at-host
50+
az aks nodepool add --name hostencrypt --cluster-name myAKSCluster --resource-group myResourceGroup -s Standard_DS2_v2 --enable-encryption-at-host
5151
```
5252

5353
If you want to create new node pools without the host-based encryption feature, you can do so by omitting the `--enable-encryption-at-host` parameter.

articles/aks/use-pod-sandboxing.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -234,7 +234,7 @@ To demonstrate the deployment of an untrusted application into the pod sandbox o
234234
235235
```output
236236
root@untrusted:/# uname -r
237-
5.15.80.mshv2-hvl1.m2
237+
5.15.48.1-8.cm2
238238
```
239239
240240
3. Start a shell session to the container of the *trusted* pod to verify the kernel output:
@@ -252,7 +252,8 @@ To demonstrate the deployment of an untrusted application into the pod sandbox o
252252
The following example resembles output from the VM that is running the *trusted* pod, which is a different kernel than the *untrusted* pod running within the pod sandbox:
253253
254254
```output
255-
5.15.48.1-8.cm2
255+
5.15.80.mshv2-hvl1.m2
256+
```
256257
257258
## Cleanup
258259

articles/app-service/overview-disaster-recovery.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ For IT, business continuity plans are largely driven by two metrics:
1919
- Recovery Time Objective (RTO) – the time duration in which your application must come back online after an outage.
2020
- Recovery Point Objective (RPO) – the acceptable amount of data loss in a disaster, expressed as a unit of time (for example, 1 minute of transactional database records).
2121

22-
Normally, maintaining an SLA around RTO is impractical for regional disasters, and you would typically design your disaster recovery strategy around RPO alone (i.e. focus on recovering data and not on minimizing interruption). With Azure, however, it's not only practical but could even be straightforward to deploy App Service for automatic geo-failovers. This lets you disaster-proof your applications further by take care of both RTO and RPO.
22+
Normally, maintaining an SLA around RTO is impractical for regional disasters, and you would typically design your disaster recovery strategy around RPO alone (i.e. focus on recovering data and not on minimizing interruption). With Azure, however, it's not only practical but could even be straightforward to deploy App Service for automatic geo-failovers. This lets you disaster-proof your applications further by taking care of both RTO and RPO.
2323

2424
Depending on your desired RTO and RPO metrics, three disaster recovery architectures are commonly used, as shown in the following table:
2525

@@ -155,4 +155,4 @@ Steps to create a passive-cold region without GRS and GZRS are summarized as fol
155155
156156
## Next steps
157157
158-
[Tutorial: Create a highly available multi-region app in Azure App Service](tutorial-multi-region-app.md)
158+
[Tutorial: Create a highly available multi-region app in Azure App Service](tutorial-multi-region-app.md)

articles/app-service/tutorial-auth-aad.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -216,7 +216,7 @@ In this step, you **grant the frontend app access to the backend app** on the us
216216

217217
1. In the **Authentication** page for the frontend app, select your frontend app name under **Identity provider**. This app registration was automatically generated for you. Select **API permissions** in the left menu.
218218

219-
1. Select **Add a permission**, then select **My APIs** > **\<front-end-app-name>**.
219+
1. Select **Add a permission**, then select **My APIs** > **\<back-end-app-name>**.
220220

221221
1. In the **Request API permissions** page for the backend app, select **Delegated permissions** and **user_impersonation**, then select **Add permissions**.
222222

@@ -230,7 +230,7 @@ In the Cloud Shell, run the following commands on the frontend app to add the `s
230230

231231
```azurecli-interactive
232232
authSettings=$(az webapp auth show -g myAuthResourceGroup -n <front-end-app-name>)
233-
authSettings=$(echo "$authSettings" | jq '.properties' | jq '.identityProviders.azureActiveDirectory.login += {"loginParameters":["scope==openid offline_access api://<back-end-client-id>/user_impersonation"]}')
233+
authSettings=$(echo "$authSettings" | jq '.properties' | jq '.identityProviders.azureActiveDirectory.login += {"loginParameters":["scope=openid offline_access api://<back-end-client-id>/user_impersonation"]}')
234234
az webapp auth set --resource-group myAuthResourceGroup --name <front-end-app-name> --body "$authSettings"
235235
```
236236

@@ -405,4 +405,4 @@ What you learned:
405405
Advance to the next tutorial to learn how to use this user's identity to access an Azure service.
406406
407407
> [!div class="nextstepaction"]
408-
> [Create a secure n-tier app in Azure App Service](tutorial-secure-ntier-app.md)
408+
> [Create a secure n-tier app in Azure App Service](tutorial-secure-ntier-app.md)

articles/azure-functions/monitor-functions.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -100,10 +100,10 @@ The following table lists common and recommended alert rules for Functions.
100100
| Metric | Average connections| When number of connections exceed a set value|
101101
| Metric | HTTP 404| When HTTP 404 responses exceed a set value|
102102
| Metric | HTTP Server Errors| When HTTP 5xx errors exceed a set value|
103-
| Activity Log | Create or Update Web App | When app is created or updated|
104-
| Activity Log | Delete Web App | When app is deleted|
105-
| Activity Log | Restart Web App| When app is restarted|
106-
| Activity Log | Stop Web App| When app is stopped|
103+
| Activity Log | Create or update function app | When app is created or updated|
104+
| Activity Log | Delete function app | When app is deleted|
105+
| Activity Log | Restart function app| When app is restarted|
106+
| Activity Log | Stop function app| When app is stopped|
107107

108108
## Next steps
109109

0 commit comments

Comments
 (0)