Skip to content

Commit f387e30

Browse files
authored
Merge pull request #296393 from MicrosoftDocs/main
Merge main to live, 4 AM
2 parents 0f75edd + 717efc9 commit f387e30

22 files changed

+195
-263
lines changed

articles/api-center/enable-platform-api-catalog-vscode-extension.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -60,8 +60,8 @@ First, configure an app registration in your Microsoft Entra ID tenant. The app
6060
1. On the **Configure platforms** page, select **Mobile and desktop applications**.
6161
1. On the **Configure Desktop + devices** page, enter the following redirect URI and select **Configure**:
6262

63-
`https://vscode.dev/redirect`
64-
63+
`https://vscode.dev/redirect` , `http://localhost` and `ms-appx-web://Microsoft.AAD.BrokerPlugin/<application-client-id>`
64+
6565
1. In the left menu, under **Manage**, select **API permissions** > **+ Add a permission**.
6666
1. On the **Request API permissions** page, do the following:
6767
1. Select the **APIs my organization uses** tab.

articles/app-service/configure-language-java-deploy-run.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -549,7 +549,7 @@ See respective sections below for details as well as opportunities to customize
549549
- The Keystore of the Java runtime is updated with any public and private certificates defined in Azure portal.
550550
- Public certificates are provided by the platform in the */var/ssl/certs* directory, and they're loaded to *$JRE_HOME/lib/security/cacerts*.
551551
- Private certificates are provided by the platform in the */var/ssl/private* directory, and they're loaded to *$JRE_HOME/lib/security/client.jks*.
552-
- If any certificates are loaded in the Java keystore in this step, the properties `javax.net.ssl.keyStore`, `javax.net.ssl.keyStorePassword` and `javax.net.ssl.keyStoreType` are added to the `JAVA_TOOL_OPTIONS` environment variable.
552+
- If any certificates are loaded in the Java keystore in this step, the properties `javax.net.ssl.keyStore`, `javax.net.ssl.keyStorePassword` and `javax.net.ssl.keyStoreType` are added to the `JAVA_OPTS` environment variable.
553553
- Some initial JVM configuration is determined such as logging directories and Java memory heap parameters:
554554
- If you provide the `–Xms` or `–Xmx` flags for memory in the app setting `JAVA_OPTS`, these values override the ones provided by the platform.
555555
- If you configure the app setting `WEBSITES_CONTAINER_STOP_TIME_LIMIT`, the value is passed to the runtime property `org.wildfly.sigterm.suspend.timeout`, which controls the maximum shutdown wait time (in seconds) when JBoss is being stopped.

articles/azure-functions/functions-create-your-first-function-visual-studio.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -77,9 +77,9 @@ Your function definition should now look like the following code:
7777

7878
```csharp
7979
[Function("HttpExample")]
80-
public IActionResult Run([HttpTrigger(AuthorizationLevel.AuthLevelValue, "get", "post")] HttpRequest req)
80+
public IActionResult Run([HttpTrigger(AuthorizationLevel.Anonymous, "get", "post")] HttpRequest req)
8181
{
82-
return new OkObjectResult("Welcome to Azure Functions!");
82+
return new OkObjectResult("Hello, functions");
8383
}
8484
```
8585

articles/azure-functions/functions-infrastructure-as-code.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ This article shows you how to automate the creation of resources and deployment
2020

2121
The template code required depends on the desired hosting options for your function app. This article supports the following hosting options:
2222

23-
| Hosting option | Deployment type | To learn more, see... |
23+
| Hosting option | Deployment type | Sample template |
2424
| ----- | ----- | ----- |
2525
| [Azure Functions Consumption plan](functions-infrastructure-as-code.md?pivots=consumption-plan) | Code-only | [Consumption plan](./consumption-plan.md) |
2626
| [Azure Functions Flex Consumption plan](functions-infrastructure-as-code.md?pivots=consumption-plan) | Code-only | [Flex Consumption plan](./flex-consumption-plan.md) |

articles/azure-functions/supported-languages.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,7 @@ For more information on operating system and language support, see [Operating sy
3737

3838
When in-portal editing isn't available, you must instead [develop your functions locally](functions-develop-local.md#local-development-environments).
3939

40+
To learn more about how to maintain full-support coverage while running your functions in Azure, see our [language-support-policy](language-support-policy.md) article.
4041

4142
### Language major version support
4243

articles/azure-signalr/signalr-howto-authorize-application.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Authorize requests to Azure SignalR Service resources with Microsoft Entra applications
3-
description: This article provides information about authorizing requests to Azure SignalR Service resources by using Microsoft Entra applications.
3+
description: This article provides information about authorizing requests to Azure SignalR Service resources with Microsoft Entra applications.
44
author: terencefan
55
ms.author: tefa
66
ms.date: 03/14/2023
@@ -14,7 +14,7 @@ ms.custom: subject-rbac-steps
1414

1515
Azure SignalR Service supports Microsoft Entra ID for authorizing requests with [Microsoft Entra applications](/entra/identity-platform/app-objects-and-service-principals).
1616

17-
This article shows how to configure your Azure SignalR Service resource and codes to authorize requests to the resource from a Microsoft Entra application.
17+
This article explains how to set up your resource and code to authenticate requests to the resource using a Microsoft Entra application.
1818

1919
## Register an application in Microsoft Entra ID
2020

@@ -32,7 +32,6 @@ After registering an app, you can add **certificates, client secrets (a string),
3232
- [Add a client secret](/entra/identity-platform/quickstart-register-app?tabs=client-secret#add-credentials)
3333
- [Add a federated credential](/entra/identity-platform/quickstart-register-app?tabs=federated-credential#add-credentials)
3434

35-
3635
## Add role assignments in the Azure portal
3736

3837
[!INCLUDE [add role assignments](includes/signalr-add-role-assignments.md)]

articles/azure-signalr/signalr-howto-authorize-managed-identity.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,27 +1,28 @@
11
---
22
title: Authorize requests to Azure SignalR Service resources with Microsoft Entra managed identities
3-
description: This article provides information about authorizing requests to Azure SignalR Service resources by using Microsoft Entra managed identities.
3+
description: This article provides information about authorizing requests to Azure SignalR resources with Managed identities for Azure resources.
44
author: terencefan
55
ms.author: tefa
6-
ms.date: 03/14/2025
6+
ms.date: 03/11/2025
77
ms.service: azure-signalr-service
88
ms.topic: how-to
99
ms.devlang: csharp
1010
ms.custom: subject-rbac-steps
1111
---
1212

13-
# Authorize requests to Azure SignalR Service resources with Managed identities for Azure resources
13+
# Authorize requests to Azure SignalR resources with Managed identities for Azure resources
1414

1515
Azure SignalR Service supports Microsoft Entra ID for authorizing requests from [Managed identities for Azure resources](/entra/identity/managed-identities-azure-resources/overview).
1616

17-
This article shows how to configure your Azure SignalR Service resource and code to authorize requests to the resource from a managed identity.
17+
This article explains how to set up your resource and code to authorize requests to the resource using a managed identity.
1818

1919
## Configure managed identities
2020

2121
The first step is to configure managed identities on your app or virtual machine.
2222

2323
- [Configure managed identities for App Service and Azure Functions](/azure/app-service/overview-managed-identity)
24-
- [Configure managed identities for Azure resources on a virtual machine (VM)](/entra/identity/managed-identities-azure-resources/tutorial-windows-vm-access)
24+
- [Configure managed identities on Azure virtual machines (VMs)](/entra/identity/managed-identities-azure-resources/how-to-configure-managed-identities)
25+
- [Configure managed identities for Azure resources on a virtual machine scale set](/entra/identity/managed-identities-azure-resources/how-to-configure-managed-identities-scale-sets)
2526

2627
## Add role assignments in the Azure portal
2728

articles/azure-web-pubsub/concept-azure-ad-authorization.md

Lines changed: 17 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ _[1] security principal: a user/resource group, an application, or a service pri
2424

2525
Authentication is necessary to access a Web PubSub resource when using Microsoft Entra ID. This authentication involves two steps:
2626

27-
1. First, Azure authenticates the security principal and issues an OAuth 2.0 token.
27+
1. First, Azure authenticate the security principal and issues an OAuth 2.0 token.
2828
2. Second, the token is added to the request to the Web PubSub resource. The Web PubSub service uses the token to check if the service principal has the access to the resource.
2929

3030
### Client-side authentication while using Microsoft Entra ID
@@ -33,7 +33,7 @@ The negotiation server/Function App shares an access key with the Web PubSub res
3333

3434
However, access key is often disabled when using Microsoft Entra ID to improve security.
3535

36-
To address this issue, we have developed a REST API that generates a client token. This token can be used to connect to the Azure Web PubSub service.
36+
To address this issue, we developed a REST API that generates a client token. This token can be used to connect to the Azure Web PubSub service.
3737

3838
To use this API, the negotiation server must first obtain an **Microsoft Entra Token** from Azure to authenticate itself. The server can then call the Web PubSub Auth API with the **Microsoft Entra Token** to retrieve a **Client Token**. The **Client Token** is then returned to the client, who can use it to connect to the Azure Web PubSub service.
3939

@@ -45,7 +45,8 @@ Microsoft Entra authorizes access rights to secured resources through [Azure rol
4545

4646
### Resource scope
4747

48-
Before assigning an Azure RBAC role to a security principal, it's important to identify the appropriate level of access that the principal should have. It's recommended to grant the role with the narrowest possible scope. Resources located underneath inherit Azure RBAC roles with broader scopes.
48+
Before assigning an Azure RBAC role to a security principal, it's important to identify the appropriate level of access that the principal should have.
49+
It is recommended to grant the role to the most limited scope. Resources within it will inherit Azure RBAC roles assigned to the scope.
4950

5051
You can scope access to Azure Web PubSub resources at the following levels, beginning with the narrowest scope:
5152

@@ -67,36 +68,27 @@ You can scope access to Azure Web PubSub resources at the following levels, begi
6768

6869
## Azure built-in roles for Web PubSub resources
6970

70-
- `Web PubSub Service Owner`
71+
| Role | Description | Use case |
72+
| ------------------------------------------------------------------------------------------------- | --------------------------------------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------- |
73+
| [Web PubSub Service Owner](/azure/role-based-access-control/built-in-roles#web-pubsub-service-owner) | Full access to data-plane APIs, including read/write REST APIs and Auth APIs. | Most commonly used for building an upstream server that handles negotiation requests and client events. |
74+
| [Web PubSub Service Reader](/azure/role-based-access-control/built-in-roles#web-pubsub-service-reader) | Readonly access to data-plane APIs. | Use it when write a monitoring tool that calls readonly REST APIs.
7175

72-
Full access to data-plane permissions, including read/write REST APIs and Auth APIs.
7376

74-
This role is the most common used for building an upstream server.
77+
Learn how to create a custom role if the built-in roles do not meet your requirements.
7578

76-
- `Web PubSub Service Reader`
77-
78-
Use to grant read-only REST APIs permissions to Web PubSub resources.
79-
80-
It's used when you'd like to write a monitoring tool that calling **ONLY** Web PubSub data-plane **READONLY** REST APIs.
79+
[Azure custom roles: Steps to create a custom role](../role-based-access-control/custom-roles.md#steps-to-create-a-custom-role)
8180

8281
## Next steps
8382

84-
To learn how to create an Azure application and use Microsoft Entra authorization, see
85-
86-
- [Authorize request to Web PubSub resources with Microsoft Entra ID from applications](howto-authorize-from-application.md)
87-
88-
To learn how to configure a managed identity and use Microsoft Entra auth, see
89-
90-
- [Authorize request to Web PubSub resources with Microsoft Entra ID from managed identities](howto-authorize-from-managed-identity.md)
91-
92-
To learn more about roles and role assignments, see
83+
To learn how to use Microsoft Entra authentication with role-based access control, see
9384

94-
- [What is Azure role-based access control](../role-based-access-control/overview.md)
85+
- [Authorize requests to Azure Web PubSub resources with Microsoft Entra applications](howto-authorize-from-application.md)
86+
- [Authorize requests to Azure Web PubSub resources with Managed identities for Azure resources](howto-authorize-from-managed-identity.md)
9587

96-
To learn how to create custom roles, see
88+
To learn more about roles-based access control, see
9789

98-
- [Steps to create a custom role](../role-based-access-control/custom-roles.md#steps-to-create-a-custom-role)
90+
- [What is Azure role-based access control](../role-based-access-control/overview.md)
9991

100-
To learn how to use only Microsoft Entra authorization, see
92+
To learn how to disable the connection string and use only Microsoft Entra authentication, see
10193

102-
- [Disable local authentication](./howto-disable-local-auth.md)
94+
- [How to disable local authentication](./howto-disable-local-auth.md)

0 commit comments

Comments
 (0)