You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/configure-language-java-deploy-run.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -549,7 +549,7 @@ See respective sections below for details as well as opportunities to customize
549
549
- The Keystore of the Java runtime is updated with any public and private certificates defined in Azure portal.
550
550
- Public certificates are provided by the platform in the */var/ssl/certs* directory, and they're loaded to *$JRE_HOME/lib/security/cacerts*.
551
551
- Private certificates are provided by the platform in the */var/ssl/private* directory, and they're loaded to *$JRE_HOME/lib/security/client.jks*.
552
-
- If any certificates are loaded in the Java keystore in this step, the properties `javax.net.ssl.keyStore`, `javax.net.ssl.keyStorePassword` and `javax.net.ssl.keyStoreType` are added to the `JAVA_TOOL_OPTIONS` environment variable.
552
+
- If any certificates are loaded in the Java keystore in this step, the properties `javax.net.ssl.keyStore`, `javax.net.ssl.keyStorePassword` and `javax.net.ssl.keyStoreType` are added to the `JAVA_OPTS` environment variable.
553
553
- Some initial JVM configuration is determined such as logging directories and Java memory heap parameters:
554
554
- If you provide the `–Xms` or `–Xmx` flags for memory in the app setting `JAVA_OPTS`, these values override the ones provided by the platform.
555
555
- If you configure the app setting `WEBSITES_CONTAINER_STOP_TIME_LIMIT`, the value is passed to the runtime property `org.wildfly.sigterm.suspend.timeout`, which controls the maximum shutdown wait time (in seconds) when JBoss is being stopped.
Copy file name to clipboardExpand all lines: articles/azure-functions/supported-languages.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,6 +37,7 @@ For more information on operating system and language support, see [Operating sy
37
37
38
38
When in-portal editing isn't available, you must instead [develop your functions locally](functions-develop-local.md#local-development-environments).
39
39
40
+
To learn more about how to maintain full-support coverage while running your functions in Azure, see our [language-support-policy](language-support-policy.md) article.
Copy file name to clipboardExpand all lines: articles/azure-signalr/signalr-howto-authorize-application.md
+2-3Lines changed: 2 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Authorize requests to Azure SignalR Service resources with Microsoft Entra applications
3
-
description: This article provides information about authorizing requests to Azure SignalR Service resources by using Microsoft Entra applications.
3
+
description: This article provides information about authorizing requests to Azure SignalR Service resources with Microsoft Entra applications.
4
4
author: terencefan
5
5
ms.author: tefa
6
6
ms.date: 03/14/2023
@@ -14,7 +14,7 @@ ms.custom: subject-rbac-steps
14
14
15
15
Azure SignalR Service supports Microsoft Entra ID for authorizing requests with [Microsoft Entra applications](/entra/identity-platform/app-objects-and-service-principals).
16
16
17
-
This article shows how to configure your Azure SignalR Service resource and codes to authorize requests to the resource from a Microsoft Entra application.
17
+
This article explains how to set up your resource and code to authenticate requests to the resource using a Microsoft Entra application.
18
18
19
19
## Register an application in Microsoft Entra ID
20
20
@@ -32,7 +32,6 @@ After registering an app, you can add **certificates, client secrets (a string),
32
32
-[Add a client secret](/entra/identity-platform/quickstart-register-app?tabs=client-secret#add-credentials)
33
33
-[Add a federated credential](/entra/identity-platform/quickstart-register-app?tabs=federated-credential#add-credentials)
34
34
35
-
36
35
## Add role assignments in the Azure portal
37
36
38
37
[!INCLUDE [add role assignments](includes/signalr-add-role-assignments.md)]
Copy file name to clipboardExpand all lines: articles/azure-signalr/signalr-howto-authorize-managed-identity.md
+6-5Lines changed: 6 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,27 +1,28 @@
1
1
---
2
2
title: Authorize requests to Azure SignalR Service resources with Microsoft Entra managed identities
3
-
description: This article provides information about authorizing requests to Azure SignalR Service resources by using Microsoft Entra managed identities.
3
+
description: This article provides information about authorizing requests to Azure SignalR resources with Managed identities for Azure resources.
4
4
author: terencefan
5
5
ms.author: tefa
6
-
ms.date: 03/14/2025
6
+
ms.date: 03/11/2025
7
7
ms.service: azure-signalr-service
8
8
ms.topic: how-to
9
9
ms.devlang: csharp
10
10
ms.custom: subject-rbac-steps
11
11
---
12
12
13
-
# Authorize requests to Azure SignalR Service resources with Managed identities for Azure resources
13
+
# Authorize requests to Azure SignalR resources with Managed identities for Azure resources
14
14
15
15
Azure SignalR Service supports Microsoft Entra ID for authorizing requests from [Managed identities for Azure resources](/entra/identity/managed-identities-azure-resources/overview).
16
16
17
-
This article shows how to configure your Azure SignalR Service resource and code to authorize requests to the resource from a managed identity.
17
+
This article explains how to set up your resource and code to authorize requests to the resource using a managed identity.
18
18
19
19
## Configure managed identities
20
20
21
21
The first step is to configure managed identities on your app or virtual machine.
22
22
23
23
-[Configure managed identities for App Service and Azure Functions](/azure/app-service/overview-managed-identity)
24
-
-[Configure managed identities for Azure resources on a virtual machine (VM)](/entra/identity/managed-identities-azure-resources/tutorial-windows-vm-access)
24
+
-[Configure managed identities on Azure virtual machines (VMs)](/entra/identity/managed-identities-azure-resources/how-to-configure-managed-identities)
25
+
-[Configure managed identities for Azure resources on a virtual machine scale set](/entra/identity/managed-identities-azure-resources/how-to-configure-managed-identities-scale-sets)
Copy file name to clipboardExpand all lines: articles/azure-web-pubsub/concept-azure-ad-authorization.md
+17-25Lines changed: 17 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,7 @@ _[1] security principal: a user/resource group, an application, or a service pri
24
24
25
25
Authentication is necessary to access a Web PubSub resource when using Microsoft Entra ID. This authentication involves two steps:
26
26
27
-
1. First, Azure authenticates the security principal and issues an OAuth 2.0 token.
27
+
1. First, Azure authenticate the security principal and issues an OAuth 2.0 token.
28
28
2. Second, the token is added to the request to the Web PubSub resource. The Web PubSub service uses the token to check if the service principal has the access to the resource.
29
29
30
30
### Client-side authentication while using Microsoft Entra ID
@@ -33,7 +33,7 @@ The negotiation server/Function App shares an access key with the Web PubSub res
33
33
34
34
However, access key is often disabled when using Microsoft Entra ID to improve security.
35
35
36
-
To address this issue, we have developed a REST API that generates a client token. This token can be used to connect to the Azure Web PubSub service.
36
+
To address this issue, we developed a REST API that generates a client token. This token can be used to connect to the Azure Web PubSub service.
37
37
38
38
To use this API, the negotiation server must first obtain an **Microsoft Entra Token** from Azure to authenticate itself. The server can then call the Web PubSub Auth API with the **Microsoft Entra Token** to retrieve a **Client Token**. The **Client Token** is then returned to the client, who can use it to connect to the Azure Web PubSub service.
39
39
@@ -45,7 +45,8 @@ Microsoft Entra authorizes access rights to secured resources through [Azure rol
45
45
46
46
### Resource scope
47
47
48
-
Before assigning an Azure RBAC role to a security principal, it's important to identify the appropriate level of access that the principal should have. It's recommended to grant the role with the narrowest possible scope. Resources located underneath inherit Azure RBAC roles with broader scopes.
48
+
Before assigning an Azure RBAC role to a security principal, it's important to identify the appropriate level of access that the principal should have.
49
+
It is recommended to grant the role to the most limited scope. Resources within it will inherit Azure RBAC roles assigned to the scope.
49
50
50
51
You can scope access to Azure Web PubSub resources at the following levels, beginning with the narrowest scope:
51
52
@@ -67,36 +68,27 @@ You can scope access to Azure Web PubSub resources at the following levels, begi
|[Web PubSub Service Owner](/azure/role-based-access-control/built-in-roles#web-pubsub-service-owner)| Full access to data-plane APIs, including read/write REST APIs and Auth APIs. | Most commonly used for building an upstream server that handles negotiation requests and client events. |
74
+
| [Web PubSub Service Reader](/azure/role-based-access-control/built-in-roles#web-pubsub-service-reader) | Readonly access to data-plane APIs. | Use it when write a monitoring tool that calls readonly REST APIs.
71
75
72
-
Full access to data-plane permissions, including read/write REST APIs and Auth APIs.
73
76
74
-
This role is the most common used for building an upstream server.
77
+
Learn how to create a custom role if the built-in roles do not meet your requirements.
75
78
76
-
-`Web PubSub Service Reader`
77
-
78
-
Use to grant read-only REST APIs permissions to Web PubSub resources.
79
-
80
-
It's used when you'd like to write a monitoring tool that calling **ONLY** Web PubSub data-plane **READONLY** REST APIs.
79
+
[Azure custom roles: Steps to create a custom role](../role-based-access-control/custom-roles.md#steps-to-create-a-custom-role)
81
80
82
81
## Next steps
83
82
84
-
To learn how to create an Azure application and use Microsoft Entra authorization, see
85
-
86
-
-[Authorize request to Web PubSub resources with Microsoft Entra ID from applications](howto-authorize-from-application.md)
87
-
88
-
To learn how to configure a managed identity and use Microsoft Entra auth, see
89
-
90
-
-[Authorize request to Web PubSub resources with Microsoft Entra ID from managed identities](howto-authorize-from-managed-identity.md)
91
-
92
-
To learn more about roles and role assignments, see
83
+
To learn how to use Microsoft Entra authentication with role-based access control, see
93
84
94
-
-[What is Azure role-based access control](../role-based-access-control/overview.md)
85
+
-[Authorize requests to Azure Web PubSub resources with Microsoft Entra applications](howto-authorize-from-application.md)
86
+
-[Authorize requests to Azure Web PubSub resources with Managed identities for Azure resources](howto-authorize-from-managed-identity.md)
95
87
96
-
To learn how to create custom roles, see
88
+
To learn more about roles-based access control, see
97
89
98
-
-[Steps to create a custom role](../role-based-access-control/custom-roles.md#steps-to-create-a-custom-role)
90
+
-[What is Azure role-based access control](../role-based-access-control/overview.md)
99
91
100
-
To learn how to use only Microsoft Entra authorization, see
92
+
To learn how to disable the connection string and use only Microsoft Entra authentication, see
101
93
102
-
-[Disable local authentication](./howto-disable-local-auth.md)
94
+
-[How to disable local authentication](./howto-disable-local-auth.md)
0 commit comments