You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/page-layout.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ manager: celestedg
9
9
ms.service: active-directory
10
10
ms.workload: identity
11
11
ms.topic: reference
12
-
ms.date: 08/03/2021
12
+
ms.date: 08/25/2021
13
13
ms.author: mimart
14
14
ms.subservice: B2C
15
15
---
@@ -151,6 +151,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
151
151
152
152
- Added support for multiple sign-up links.
153
153
- Added support for user input validation according to the predicate rules defined in the policy.
154
+
- When the [sign-in option](sign-in-options.md) is set to Email, the sign-in header presents "Sign in with your sign in name". The username field presents "Sign in name". For more information, see [localization](localization-string-ids.md#sign-up-or-sign-in-page-elements).
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/concept-conditional-access-cloud-apps.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,7 +37,7 @@ Administrators can assign a Conditional Access policy to the following cloud app
37
37
- Azure Event Hubs
38
38
- Azure Service Bus
39
39
-[Azure SQL Database and Azure Synapse Analytics](../../azure-sql/database/conditional-access-configure.md)
40
-
-Dynamics CRM Online
40
+
-Common Data Service
41
41
- Microsoft Application Insights Analytics
42
42
-[Microsoft Azure Information Protection](/azure/information-protection/faqs#i-see-azure-information-protection-is-listed-as-an-available-cloud-app-for-conditional-accesshow-does-this-work)
Copy file name to clipboardExpand all lines: articles/app-service/configure-ssl-certificate.md
+3-4Lines changed: 3 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -292,7 +292,9 @@ When the operation completes, you see the certificate in the **Private Key Certi
292
292
293
293
> [!IMPORTANT]
294
294
> To secure a custom domain with this certificate, you still need to create a certificate binding. Follow the steps in [Create binding](configure-ssl-bindings.md#create-binding).
295
-
>
295
+
296
+
> [!NOTE]
297
+
> To renew a [certificate you uploaded](#upload-a-private-certificate), see [Export certificate binding](configure-ssl-bindings.md#renew-certificate-binding). App Service will not automatically sync your newly uploaded certificate with the bindings. The automated certificate syncing feature is only available for [imported Key Vault certificates](#import-a-certificate-from-key-vault) and [imported App Service Certificates](#import-an-app-service-certificate).
296
298
297
299
## Upload a public certificate
298
300
@@ -336,9 +338,6 @@ Once the rekey operation is complete, click **Sync**. The sync operation automat
336
338
337
339
### Renew certificate
338
340
339
-
> [!NOTE]
340
-
> To renew a [certificate you uploaded](#upload-a-private-certificate), see [Export certificate binding](configure-ssl-bindings.md#renew-certificate-binding).
341
-
342
341
> [!NOTE]
343
342
> The renewal process requires that [the well-known service principal for App Service has the required permissions on your key vault](deploy-resource-manager-template.md#deploy-web-app-certificate-from-key-vault). This permission is configured for you when you import an App Service Certificate through the portal, and should not be removed from your key vault.
|`WEBSITE_CONTENTAZUREFILECONNECTIONSTRING`| By default, App Service creates a shared storage for you at app creation. To use a custom storage account instead, set to the connection string of your storage account. For functions, see [App settings reference for Functions](../azure-functions/functions-app-settings.md#website_contentazurefileconnectionstring). |`DefaultEndpointsProtocol=https;AccountName=<name>;AccountKey=<key>`|
43
43
|`WEBSITE_CONTENTSHARE`| When you use specify a custom storage account with `WEBSITE_CONTENTAZUREFILECONNECTIONSTRING`, App Service creates a file share in that storage account for your app. To use a custom name, set this variable to the name you want. If a file share with the specified name doesn't exist, App Service creates it for you. |`myapp123`|
44
-
|`WEBSITE_AUTH_ENCRYPTION_KEY`| By default, the automatically generated key is used as the encryption key. To override, set to a desired key. This is recommended if you want to share tokens or sessions across multiple apps. ||
45
-
|`WEBSITE_AUTH_SIGNING_KEY`| By default, the automatically generated key is used as the signing key. To override, set to a desired key. This is recommended if you want to share tokens or sessions across multiple apps. ||
46
44
|`WEBSITE_SCM_ALWAYS_ON_ENABLED`| Read-only. Shows whether Always On is enabled (`1`) or not (`0`). ||
47
45
|`WEBSITE_SCM_SEPARATE_STATUS`| Read-only. Shows whether the Kudu app is running in a separate process (`1`) or not (`0`). ||
48
46
@@ -141,6 +139,10 @@ This section shows the configurable runtime settings for each supported language
141
139
|`HOME`| Read-only. Directory that points to shared storage (`/home`). |
142
140
|`DUMP_DIR`| Read-only. Directory for the crash dumps (`/home/logs/dumps`). |
143
141
|`APP_SVC_RUN_FROM_COPY`| Linux apps only. By default, the app is run from `/home/site/wwwroot`, a shared directory for all scaled-out instances. Set this variable to `true` to copy the app to a local directory in your container and run it from there. When using this option, be sure not to hard-code any reference to `/home/site/wwwroot`. Instead, use a path relative to `/home/site/wwwroot`. |
142
+
|`MACHINEKEY_Decryption`| For Windows native apps or Windows container apps, this variable is injected into app environment or container to enable ASP.NET cryptographic routines (see [machineKey Element](/previous-versions/dotnet/netframework-4.0/w8h3skw9(v=vs.100)). To override the default `decryption` value, configure it as an App Service app setting, or set it directly in the `machineKey` element of the *Web.config* file. |
143
+
|`MACHINEKEY_DecryptionKey`| For Windows native apps or Windows container apps, this variable is injected into the app environment or container to enable ASP.NET cryptographic routines (see [machineKey Element](/previous-versions/dotnet/netframework-4.0/w8h3skw9(v=vs.100)). To override the automatically generated `decryptionKey` value, configure it as an App Service app setting, or set it directly in the `machineKey` element of the *Web.config* file.|
144
+
|`MACHINEKEY_Validation`| For Windows native apps or Windows container apps, this variable is injected into the app environment or container to enable ASP.NET cryptographic routines (see [machineKey Element](/previous-versions/dotnet/netframework-4.0/w8h3skw9(v=vs.100)). To override the default `validation` value, configure it as an App Service app setting, or set it directly in the `machineKey` element of the *Web.config* file.|
145
+
|`MACHINEKEY_ValidationKey`| For Windows native apps or Windows container apps, this variable is injected into the app environment or container to enable ASP.NET cryptographic routines (see [machineKey Element](/previous-versions/dotnet/netframework-4.0/w8h3skw9(v=vs.100)). To override the automatically generated `validationKey` value, configure it as an App Service app setting, or set it directly in the `machineKey` element of the *Web.config* file.|
144
146
<!-- | `USE_DOTNET_MONITOR` | if =true then /opt/dotnetcore-tools/dotnet-monitor collect --urls "http://0.0.0.0:50051" --metrics true --metricUrls "http://0.0.0.0:50050" > /dev/null 2>&1 & -->
145
147
146
148
# [Java](#tab/java)
@@ -307,13 +309,9 @@ For more information on custom containers, see [Run a custom container in Azure]
307
309
|`DOCKER_REGISTRY_SERVER_USERNAME`| Username to authenticate with the registry server at `DOCKER_REGISTRY_SERVER_URL`. For security, this variable is not passed on to the container. ||
308
310
|`DOCKER_REGISTRY_SERVER_PASSWORD`| Password to authenticate with the registry server at `DOCKER_REGISTRY_SERVER_URL`. For security, this variable is not passed on to the container. ||
309
311
|`WEBSITES_WEB_CONTAINER_NAME`| In a Docker Compose app, only one of the containers can be internet accessible. Set to the name of the container defined in the configuration file to override the default container selection. By default, the internet accessible container is the first container to define port 80 or 8080, or, when no such container is found, the first container defined in the configuration file. ||
310
-
|`WEBSITES_PORT`| For a custom container, the custom port number on the container to route requests to. By default, App Service attempts automatic port detection of ports 80 and 8080. ||
312
+
|`WEBSITES_PORT`| For a custom container, the custom port number on the container for App Service to route requests to. By default, App Service attempts automatic port detection of ports 80 and 8080. This setting is *not* injected into the container as an environment variable. ||
311
313
|`WEBSITE_CPU_CORES_LIMIT`| By default, a Windows container runs with all available cores for your chosen pricing tier. To reduce the number of cores, set to the number of desired cores limit. For more information, see [Customize the number of compute cores](configure-custom-container.md?pivots=container-windows#customize-the-number-of-compute-cores).||
312
314
|`WEBSITE_MEMORY_LIMIT_MB`| By default all Windows Containers deployed in Azure App Service are limited to 1 GB RAM. Set to the desired memory limit in MB. The cumulative total of this setting across apps in the same plan must not exceed the amount allowed by the chosen pricing tier. For more information, see [Customize container memory](configure-custom-container.md?pivots=container-windows#customize-container-memory). ||
313
-
|`MACHINEKEY_Decryption`| For Windows containers, this variable is injected into the container to enable ASP.NET cryptographic routines (see [machineKey Element](/previous-versions/dotnet/netframework-4.0/w8h3skw9(v=vs.100)). To override the default `decryption` value, set it as an app setting. ||
314
-
|`MACHINEKEY_DecryptionKey`| For Windows containers, this variable is injected into the container to enable ASP.NET cryptographic routines (see [machineKey Element](/previous-versions/dotnet/netframework-4.0/w8h3skw9(v=vs.100)). To override the automatically generated `decryptionKey` value, set it as an app setting. ||
315
-
|`MACHINEKEY_Validation`| For Windows containers, this variable is injected into the container to enable ASP.NET cryptographic routines (see [machineKey Element](/previous-versions/dotnet/netframework-4.0/w8h3skw9(v=vs.100)). To override the default `validation` value, set it as an app setting. ||
316
-
|`MACHINEKEY_ValidationKey`| For Windows containers, this variable is injected into the container to enable ASP.NET cryptographic routines (see [machineKey Element](/previous-versions/dotnet/netframework-4.0/w8h3skw9(v=vs.100)). To override the automatically generated `validationKey` value, set it as an app setting. ||
317
315
|`CONTAINER_WINRM_ENABLED`| For a Windows container app, set to `1` to enable Windows Remote Management (WIN-RM). ||
318
316
319
317
<!--
@@ -483,6 +481,8 @@ The following environment variables are related to [App Service authentication](
483
481
|`WEBSITE_AUTH_VALIDATE_NONCE`|`true` or `false`. The default value is `true`. This value should never be set to `false` except when temporarily debugging [cryptographic nonce](https://en.wikipedia.org/wiki/Cryptographic_nonce) validation failures that occur during interactive logins. This application setting is intended for use with the V1 (classic) configuration experience. If using the V2 authentication configuration schema, you should instead use the `login.nonce.validateNonce` configuration value. |
484
482
|`WEBSITE_AUTH_V2_CONFIG_JSON`| This environment variable is populated automatically by the Azure App Service platform and is used to configure the integrated authentication module. The value of this environment variable corresponds to the V2 (non-classic) authentication configuration for the current app in Azure Resource Manager. It's not intended to be configured explicitly. |
485
483
|`WEBSITE_AUTH_ENABLED`| Read-only. Injected into a Windows or Linux app to indicate whether App Service authentication is enabled. |
484
+
|`WEBSITE_AUTH_ENCRYPTION_KEY`| By default, the automatically generated key is used as the encryption key. To override, set to a desired key. This is recommended if you want to share tokens or sessions across multiple apps. If specified, it supercedes the `MACHINEKEY_DecryptionKey` setting. ||
485
+
|`WEBSITE_AUTH_SIGNING_KEY`| By default, the automatically generated key is used as the signing key. To override, set to a desired key. This is recommended if you want to share tokens or sessions across multiple apps. If specified, it supercedes the `MACHINEKEY_ValidationKey` setting. ||
0 commit comments