Skip to content

Commit f37ac84

Browse files
authored
Merge branch 'master' into vnet
2 parents a65f291 + 1b1c8ff commit f37ac84

File tree

385 files changed

+5190
-2149
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

385 files changed

+5190
-2149
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -24605,6 +24605,16 @@
2460524605
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-java",
2460624606
"redirect_document_id": false
2460724607
},
24608+
{
24609+
"source_path": "articles/storage/blobs/storage-quickstart-blobs-nodejs-v10.md",
24610+
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-nodejs-legacy",
24611+
"redirect_document_id": false
24612+
},
24613+
{
24614+
"source_path": "articles/storage/blobs/storage-quickstart-blobs-javascript-client-libraries-v10.md",
24615+
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-javascript-client-libraries-legacy",
24616+
"redirect_document_id": false
24617+
},
2460824618
{
2460924619
"source_path": "articles/storage/blobs/storage-nodejs-how-to-use-blob-storage.md",
2461024620
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-nodejs",
@@ -40879,11 +40889,6 @@
4087940889
"redirect_url": "/azure/azure-monitor/platform/data-platform",
4088040890
"redirect_document_id": false
4088140891
},
40882-
{
40883-
"source_path": "articles/azure-monitor/platform/data-sources-reference.md",
40884-
"redirect_url": "/azure/azure-monitor/platform/data-sources",
40885-
"redirect_document_id": false
40886-
},
4088740892
{
4088840893
"source_path": "articles/azure-monitor/platform/collect-activity-logs-subscriptions.md",
4088940894
"redirect_url": "/azure/azure-monitor/platform/activity-log-collect-tenants",

CODEOWNERS

Lines changed: 5 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,17 @@
11
# Testing the new code owners feature in GitHub. Please contact Cory Fowler if you have questions.
2-
# articles/storage/ @tamram @robinsh
3-
# articles/virtual-machines/ @iainfoulds @cynthn
4-
# articles/virtual-machines/linux/ @iainfoulds @cynthn
5-
# articles/virtual-machines/windows/ @iainfoulds @cynthn
6-
# articles/application-insights/ @SergeyKanzhelev
7-
# articles/cosmos-db/ @mimig1
8-
9-
# All Articles
10-
articles/ @apex-docs-pr-reviewers
11-
122
# Cognitive Services
133
articles/cognitive-services/ @diberry @erhopf, @nitinme
144

155
# DevOps
16-
176
articles/ansible/ @TomArcherMsft
187
articles/chef/ @TomArcherMsft
198
articles/jenkins/ @TomArcherMsft
209
articles/terraform/ @TomArcherMsft
2110

2211
# Governance
23-
2412
articles/governance/ @DCtheGeek
13+
14+
# Configuration
15+
*.json @SyntaxC4 @snoviking @arob98
16+
.acrolinx-config.edn @MonicaRush @arob98
17+
articles/zone-pivot-groups.yml @SyntaxC4 @snoviking @arob98

articles/active-directory-b2c/active-directory-b2c-reference-oidc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ OpenID Connect is an authentication protocol, built on top of OAuth 2.0, that ca
2020

2121
[OpenID Connect](https://openid.net/specs/openid-connect-core-1_0.html) extends the OAuth 2.0 *authorization* protocol for use as an *authentication* protocol. This authentication protocol allows you to perform single sign-on. It introduces the concept of an *ID token*, which allows the client to verify the identity of the user and obtain basic profile information about the user.
2222

23-
Because it extends OAuth 2.0, it also enables applications to securely acquire *access tokens*. You can use access tokens to access resources that are secured by an [authorization server](active-directory-b2c-reference-protocols.md). OpenID Connect is recommended if you're building a web application that's hosted on a server and accessed through a browser. If you want to add identity management to your mobile or desktop applications using Azure AD B2C, you should use [OAuth 2.0](active-directory-b2c-reference-oauth-code.md) rather than OpenID Connect. For more information about tokens, see the [Overview of tokens in Azure Active Directory B2C](active-directory-b2c-reference-tokens.md)
23+
Because it extends OAuth 2.0, it also enables applications to securely acquire *access tokens*. You can use access tokens to access resources that are secured by an [authorization server](active-directory-b2c-reference-protocols.md). OpenID Connect is recommended if you're building a web application that's hosted on a server and accessed through a browser. For more information about tokens, see the [Overview of tokens in Azure Active Directory B2C](active-directory-b2c-reference-tokens.md)
2424

2525
Azure AD B2C extends the standard OpenID Connect protocol to do more than simple authentication and authorization. It introduces the [user flow parameter](active-directory-b2c-reference-policies.md), which enables you to use OpenID Connect to add user experiences to your application, such as sign-up, sign-in, and profile management.
2626

articles/active-directory/manage-apps/use-scim-to-provision-users-and-groups.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -59,15 +59,16 @@ Note that you don't need to support both users and groups or all the attributes
5959
| Azure Active Directory user | "urn:ietf:params:scim:schemas:extension:enterprise:2.0:User" |
6060
| --- | --- |
6161
| IsSoftDeleted |active |
62+
|department|urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:department|
6263
| displayName |displayName |
64+
|employeeId|urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:employeeNumber|
6365
| Facsimile-TelephoneNumber |phoneNumbers[type eq "fax"].value |
6466
| givenName |name.givenName |
6567
| jobTitle |title |
6668
| mail |emails[type eq "work"].value |
6769
| mailNickname |externalId |
68-
| manager |manager |
70+
| manager |urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:manager |
6971
| mobile |phoneNumbers[type eq "mobile"].value |
70-
| objectId |ID |
7172
| postalCode |addresses[type eq "work"].postalCode |
7273
| proxy-Addresses |emails[type eq "other"].Value |
7374
| physical-Delivery-OfficeName |addresses[type eq "other"].Formatted |
@@ -76,15 +77,16 @@ Note that you don't need to support both users and groups or all the attributes
7677
| telephone-Number |phoneNumbers[type eq "work"].value |
7778
| user-PrincipalName |userName |
7879

80+
7981
### Table 2: Default group attribute mapping
8082

8183
| Azure Active Directory group | urn:ietf:params:scim:schemas:core:2.0:Group |
8284
| --- | --- |
83-
| displayName |externalId |
85+
| displayName |displayName |
8486
| mail |emails[type eq "work"].value |
8587
| mailNickname |displayName |
8688
| members |members |
87-
| objectId |ID |
89+
| objectId |externalId |
8890
| proxyAddresses |emails[type eq "other"].Value |
8991

9092
## Step 2: Understand the Azure AD SCIM implementation

articles/active-directory/users-groups-roles/domains-admin-takeover.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -125,40 +125,40 @@ cmdlet | Usage
125125

126126
1. Connect to Azure AD using the credentials that were used to respond to the self-service offering:
127127
```powershell
128-
Install-Module -Name MSOnline
129-
$msolcred = get-credential
128+
Install-Module -Name MSOnline
129+
$msolcred = get-credential
130130
131-
connect-msolservice -credential $msolcred
131+
connect-msolservice -credential $msolcred
132132
```
133133
2. Get a list of domains:
134134

135135
```powershell
136-
Get-MsolDomain
136+
Get-MsolDomain
137137
```
138138
3. Run the Get-MsolDomainVerificationDns cmdlet to create a challenge:
139139
```powershell
140-
Get-MsolDomainVerificationDns –DomainName *your_domain_name* –Mode DnsTxtRecord
141-
140+
Get-MsolDomainVerificationDns –DomainName *your_domain_name* –Mode DnsTxtRecord
141+
```
142142
For example:
143-
144-
Get-MsolDomainVerificationDns –DomainName contoso.com –Mode DnsTxtRecord
143+
```
144+
Get-MsolDomainVerificationDns –DomainName contoso.com –Mode DnsTxtRecord
145145
```
146146

147147
4. Copy the value (the challenge) that is returned from this command. For example:
148148
```powershell
149-
MS=32DD01B82C05D27151EA9AE93C5890787F0E65D9
149+
MS=32DD01B82C05D27151EA9AE93C5890787F0E65D9
150150
```
151151
5. In your public DNS namespace, create a DNS txt record that contains the value that you copied in the previous step. The name for this record is the name of the parent domain, so if you create this resource record by using the DNS role from Windows Server, leave the Record name blank and just paste the value into the Text box.
152152
6. Run the Confirm-MsolDomain cmdlet to verify the challenge:
153153

154154
```powershell
155-
Confirm-MsolEmailVerifiedDomain -DomainName *your_domain_name*
155+
Confirm-MsolDomain –DomainName *your_domain_name* –ForceTakeover Force
156156
```
157157

158158
For example:
159159

160160
```powershell
161-
Confirm-MsolEmailVerifiedDomain -DomainName contoso.com
161+
Confirm-MsolDomain –DomainName contoso.com –ForceTakeover Force
162162
```
163163

164164
A successful challenge returns you to the prompt without an error.

articles/aks/private-clusters.md

Lines changed: 17 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -77,16 +77,16 @@ Where --enable-private-cluster is a mandatory flag for a private cluster
7777
#### Advanced Networking
7878

7979
```azurecli-interactive
80-
az aks create \
81-
--resource-group <private-cluster-resource-group>\
82-
--name <private-cluster-name> \
83-
--load-balancer-sku standard
84-
--enable-private-cluster
85-
--network-plugin azure \
86-
--vnet-subnet-id <subnet-id> \
87-
--docker-bridge-address 172.17.0.1/16 \
88-
--dns-service-ip 10.2.0.10 \
89-
--service-cidr 10.2.0.0/24 \
80+
az aks create \
81+
--resource-group <private-cluster-resource-group> \
82+
--name <private-cluster-name> \
83+
--load-balancer-sku standard \
84+
--enable-private-cluster \
85+
--network-plugin azure \
86+
--vnet-subnet-id <subnet-id> \
87+
--docker-bridge-address 172.17.0.1/16 \
88+
--dns-service-ip 10.2.0.10 \
89+
--service-cidr 10.2.0.0/24
9090
```
9191
Where --enable-private-cluster is a mandatory flag for a private cluster
9292

@@ -104,6 +104,11 @@ The API server end point has no public IP address. Consequently, users will need
104104
* click on the Private DNS Zone
105105
* select Virtual network link in the left pane
106106
* create a new link to add the VNET of the VM to the Private DNS Zone *(It takes a few minutes for the DNS zone link to become available)*
107+
* go back to the MC_* resource group in the portal
108+
* select the virtual network on the right pane. Virtual network name will be in the form aks-vnet-*.
109+
* select Peerings on the left pane
110+
* click on Add and add the Virtual network of the VM and create the peering.
111+
* Go to the Vnet where you have the VM and then click on peerings and select the AKS Virtual network and create the peering. If the address ranges on the AKS Virtual network and the VM's virtual network clashes, Then peering will fail. Refer to this [document][virtual-network-peering] for more information about virtual network peering.
107112
* SSH into the VM
108113
* Install Kubectl tool and run kubectl commands
109114

@@ -128,3 +133,5 @@ The API server end point has no public IP address. Consequently, users will need
128133
[az-extension-add]: /cli/azure/extension#az-extension-add
129134
[az-extension-update]: /cli/azure/extension#az-extension-update
130135
[private-link-service]: https://docs.microsoft.com/azure/private-link/private-link-service-overview
136+
[virtual-network-peering]: ../virtual-network/virtual-network-peering-overview.md
137+

articles/api-management/api-management-howto-mutual-certificates.md

Lines changed: 12 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.service: api-management
1212
ms.workload: mobile
1313
ms.tgt_pltfrm: na
1414
ms.topic: article
15-
ms.date: 06/20/2018
15+
ms.date: 01/08/2020
1616
ms.author: apimpm
1717
---
1818

@@ -26,19 +26,22 @@ For information about managing certificates using the API Management REST API, s
2626

2727
[!INCLUDE [updated-for-az](../../includes/updated-for-az.md)]
2828

29-
This guide shows you how to configure your API Management service instance to use client certificate authentication to access the back-end service for an API. Before following the steps in this article, you should have your back-end service configured for client certificate authentication ([to configure certificate authentication in Azure WebSites refer to this article][to configure certificate authentication in Azure WebSites refer to this article]). You need access to the certificate and the password for uploading it to the API Management service.
29+
This guide shows you how to configure your API Management service instance to use client certificate authentication to access the back-end service for an API. Before following the steps in this article, you should have your back-end service configured for client certificate authentication ([to configure certificate authentication in the Azure App Service refer to this article][to configure certificate authentication in Azure WebSites refer to this article]). You need access to the certificate and the password for uploading it to the API Management service.
3030

3131
## <a name="step1"> </a>Upload a Certificate
3232

33+
> [!NOTE]
34+
> Instead of an uploaded certificate you can use a certificate stored in the [Azure Key Vault](https://azure.microsoft.com/services/key-vault/) service as shown in this [example](https://github.com/galiniliev/api-management-policy-snippets/blob/galin/AkvCert/examples/Look%20up%20Key%20Vault%20certificate%20using%20Managed%20Service%20Identity%20and%20call%20backend.policy.xml).
35+
3336
![Add client certificates](media/api-management-howto-mutual-certificates/apim-client-cert-new.png)
3437

3538
Follow the steps below to upload a new client certificate. If you have not created an API Management service instance yet, see the tutorial [Create an API Management service instance][Create an API Management service instance].
3639

3740
1. Navigate to your Azure API Management service instance in the Azure portal.
3841
2. Select **Certificates** from the menu.
39-
3. Click the **+ Add** button.
40-
![Add client certificates](media/api-management-howto-mutual-certificates/apim-client-cert-add.png)
41-
4. Browse for the certificate, provide its ID and password.
42+
3. Click the **+ Add** button.
43+
![Add client certificates](media/api-management-howto-mutual-certificates/apim-client-cert-add.png)
44+
4. Browse for the certificate, provide its ID and password.
4245
5. Click **Create**.
4346

4447
> [!NOTE]
@@ -61,14 +64,14 @@ If the certificate is in use by an API, then a warning screen is displayed. To d
6164

6265
## <a name="step2"> </a>Configure an API to use a client certificate for gateway authentication
6366

64-
1. Click **APIs** from the **API Management** menu on the left and navigate to the API.
67+
1. Click **APIs** from the **API Management** menu on the left and navigate to the API.
6568
![Enable client certificates](media/api-management-howto-mutual-certificates/apim-client-cert-enable.png)
6669

67-
2. In the **Design** tab, click on a pencil icon of the **Backend** section.
68-
3. Change the **Gateway credentials** to **Client cert** and select your certificate from the dropdown.
70+
2. In the **Design** tab, click on a pencil icon of the **Backend** section.
71+
3. Change the **Gateway credentials** to **Client cert** and select your certificate from the dropdown.
6972
![Enable client certificates](media/api-management-howto-mutual-certificates/apim-client-cert-enable-select.png)
7073

71-
4. Click **Save**.
74+
4. Click **Save**.
7275

7376
> [!WARNING]
7477
> This change is effective immediately, and calls to operations of that API will use the certificate to authenticate on the back-end server.

articles/api-management/api-management-howto-properties.md

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -11,21 +11,21 @@ ms.service: api-management
1111
ms.workload: mobile
1212
ms.tgt_pltfrm: na
1313
ms.topic: article
14-
ms.date: 11/05/2019
14+
ms.date: 01/08/2020
1515
ms.author: apimpm
1616
---
1717

1818
# How to use named values in Azure API Management policies
1919

2020
API Management policies are a powerful capability of the system that allow the Azure portal to change the behavior of the API through configuration. Policies are a collection of statements that are executed sequentially on the request or response of an API. Policy statements can be constructed using literal text values, policy expressions, and named values.
2121

22-
Each API Management service instance has a properties collection of key/value pairs, which is called named values, that are global to the service instance. There is no imposed limit on the number of items in the collection. Named values can be used to manage constant string values across all API configuration and policies. Each named value may have the following attributes:
22+
Each API Management service instance has a collection of key/value pairs, which is called named values, that are global to the service instance. There is no imposed limit on the number of items in the collection. Named values can be used to manage constant string values across all API configuration and policies. Each named value may have the following attributes:
2323

24-
| Attribute | Type | Description |
25-
| -------------- | --------------- | ----------------------------------------------------------------------------------------------------------------------------------- |
24+
| Attribute | Type | Description |
25+
| -------------- | --------------- | -------------------------------------------------------------------------------------------------------------------------------------- |
2626
| `Display name` | string | Used for referencing the named value in policies. A string of one to 256 characters. Only letters, numbers, dot, and dash are allowed. |
27-
| `Value` | string | Actual value. Must not be empty or consist only of whitespace. Maximum of 4096 characters long. |
28-
| `Secret` | boolean | Determines whether the value is a secret and should be encrypted or not. |
27+
| `Value` | string | Actual value. Must not be empty or consist only of whitespace. Maximum of 4096 characters long. |
28+
| `Secret` | boolean | Determines whether the value is a secret and should be encrypted or not. |
2929
| `Tags` | array of string | Used to filter the named value list. Up to 32 tags. |
3030

3131
![Named values](./media/api-management-howto-properties/named-values.png)
@@ -38,6 +38,9 @@ Named values can contain literal strings and [policy expressions](/azure/api-man
3838
| Credential | •••••••••••••••••••••• | True | security |
3939
| Expression | @(DateTime.Now.ToString()) | False | |
4040

41+
> [!NOTE]
42+
> Instead of named values stored within an API Management service, you can use values stored in the [Azure Key Vault](https://azure.microsoft.com/services/key-vault/) service as demonstrated by this [example](https://github.com/Azure/api-management-policy-snippets/blob/master/examples/Look%20up%20Key%20Vault%20secret%20using%20Managed%20Service%20Identity.policy.xml).
43+
4144
## To add and edit a named value
4245

4346
![Add a named value](./media/api-management-howto-properties/add-property.png)
@@ -46,7 +49,7 @@ Named values can contain literal strings and [policy expressions](/azure/api-man
4649
2. Select **Named values**.
4750
3. Press **+Add**.
4851

49-
Name and Value are required values. If value is a secret, check the *This is a secret* checkbox. Enter one or more optional tags to help with organizing your named values, and click Save.
52+
Name and Value are required values. If value is a secret, check the _This is a secret_ checkbox. Enter one or more optional tags to help with organizing your named values, and click Save.
5053

5154
4. Click **Create**.
5255

articles/app-service/containers/configure-language-ruby.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.custom: seodec18
1111

1212
# Configure a Linux Ruby app for Azure App Service
1313

14-
This article describes how [Azure App Service](app-service-linux-intro.md) runs Ruby apps, and how you can customize the behavior of App Service when needed. Ruby apps must be deployed with all the required [pip](https://pypi.org/project/pip/) modules.
14+
This article describes how [Azure App Service](app-service-linux-intro.md) runs Ruby apps, and how you can customize the behavior of App Service when needed. Ruby apps must be deployed with all the required [gems](https://rubygems.org/gems).
1515

1616
This guide provides key concepts and instructions for Ruby developers who use a built-in Linux container in App Service. If you've never used Azure App Service, you should follow the [Ruby quickstart](quickstart-ruby.md) and [Ruby with PostgreSQL tutorial](tutorial-ruby-postgres-app.md) first.
1717

0 commit comments

Comments
 (0)