Skip to content

Commit ff38a72

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 22cf552 + 7e117cf commit ff38a72

File tree

69 files changed

+1116
-437
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

69 files changed

+1116
-437
lines changed

articles/active-directory/app-provisioning/how-provisioning-works.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ To request an automatic Azure AD provisioning connector for an app that doesn't
3838

3939
## Authorization
4040

41-
Credentials are required for Azure AD to connect to the application's user management API. While you're configuring automatic user provisioning for an application, you'll need to enter valid credentials. For gallery applications, you can find credential types and requirements for the application by referring to the app tutorial. For non-gallery applications, you can refer to the [SCIM](./use-scim-to-provision-users-and-groups.md#authorization-for-provisioning-connectors-in-the-application-gallery) documentation to understand the credential types and requirements. In the Azure portal, you'll be able to test the credentials by having Azure AD attempt to connect to the app's provisioning app using the supplied credentials.
41+
Credentials are required for Azure AD to connect to the application's user management API. While you're configuring automatic user provisioning for an application, you'll need to enter valid credentials. For gallery applications, you can find credential types and requirements for the application by referring to the app tutorial. For non-gallery applications, you can refer to the [SCIM](./use-scim-to-provision-users-and-groups.md#authorization-to-provisioning-connectors-in-the-application-gallery) documentation to understand the credential types and requirements. In the Azure portal, you'll be able to test the credentials by having Azure AD attempt to connect to the app's provisioning app using the supplied credentials.
4242

4343
## Mapping attributes
4444

@@ -213,4 +213,4 @@ When developing an application, always support both soft deletes and hard delete
213213

214214
[Build a SCIM endpoint and configure provisioning when creating your own app](../app-provisioning/use-scim-to-provision-users-and-groups.md)
215215

216-
[Troubleshoot problems with configuring and provisioning users to an application](./application-provisioning-config-problem.md).
216+
[Troubleshoot problems with configuring and provisioning users to an application](./application-provisioning-config-problem.md).

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 281 additions & 231 deletions
Large diffs are not rendered by default.

articles/active-directory/develop/v2-howto-app-gallery-listing.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -181,7 +181,7 @@ You will need an Azure AD tenant in order to test your app. To set up your devel
181181

182182
Alternatively, an Azure AD tenant comes with every Microsoft 365 subscription. To set up a free Microsoft 365 development environment, see [Join the Microsoft 365 Developer Program](/office/developer-program/microsoft-365-developer-program).
183183

184-
Once you have a tenant, test single-sign on and [provisioning](../app-provisioning/use-scim-to-provision-users-and-groups.md#step-4-integrate-your-scim-endpoint-with-the-azure-ad-scim-client).
184+
Once you have a tenant, test single-sign on and [provisioning](../app-provisioning/use-scim-to-provision-users-and-groups.md#integrate-your-scim-endpoint-with-the-aad-scim-client).
185185

186186
**For OIDC or Oath applications**, [Register your application](quickstart-register-app.md) as a multi-tenant application. ‎Select the Accounts in any organizational directory and personal Microsoft accounts option in Supported Account types.
187187

@@ -314,4 +314,4 @@ The Microsoft Partner Network provides instant access to exclusive resources, pr
314314

315315
## Next steps
316316
* [Build a SCIM endpoint and configure user provisioning](../app-provisioning/use-scim-to-provision-users-and-groups.md)
317-
* [Authentication scenarios for Azure AD](authentication-flows-app-scenarios.md)
317+
* [Authentication scenarios for Azure AD](authentication-flows-app-scenarios.md)

articles/active-directory/fundamentals/whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ This page is updated monthly, so revisit it regularly. If you're looking for ite
4444

4545
In the past, the secret token field could be kept empty when setting up provisioning on the custom / BYOA application. This function was intended to solely be used for testing. We'll update the UI to make the field required.
4646

47-
Customers can work around this requirement for testing purposes by using a feature flag in the browser URL. [Learn more](../app-provisioning/use-scim-to-provision-users-and-groups.md#authorization-for-provisioning-connectors-in-the-application-gallery).
47+
Customers can work around this requirement for testing purposes by using a feature flag in the browser URL. [Learn more](../app-provisioning/use-scim-to-provision-users-and-groups.md#authorization-to-provisioning-connectors-in-the-application-gallery).
4848

4949
---
5050

articles/api-management/api-management-howto-mutual-certificates-for-clients.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -91,6 +91,18 @@ The following example shows how to check the thumbprint of a client certificate
9191
> Client certificate deadlock issue described in this [article](https://techcommunity.microsoft.com/t5/Networking-Blog/HTTPS-Client-Certificate-Request-freezes-when-the-Server-is/ba-p/339672) can manifest itself in several ways, e.g. requests freeze, requests result in `403 Forbidden` status code after timing out, `context.Request.Certificate` is `null`. This problem usually affects `POST` and `PUT` requests with content length of approximately 60KB or larger.
9292
> To prevent this issue from occurring turn on "Negotiate client certificate" setting for desired hostnames on the "Custom domains" blade as shown in the first image of this document. This feature is not available in the Consumption tier.
9393
94+
## Certificate validation in self-hosted gateway
95+
96+
The default API Management [self-hosted gateway](self-hosted-gateway-overview.md) image doesn't support validating server and client certificates using [CA root certificates](api-management-howto-ca-certificates.md) uploaded to an API Management instance. Clients presenting a custom certificate to the self-hosted gateway may experience slow responses, because certificate revocation list (CRL) validation can take a long time to time out on the gateway.
97+
98+
As a workaround when running the gateway, you may configure the PKI IP address to point to the localhost address (127.0.0.1) instead of the API Management instance. This causes the CRL validation to fail quickly when the gateway attempts to validate the client certificate. To configure the gateway, add a DNS entry for the API Management instance to resolve to the localhost in the `/etc/hosts` file in the container. You can add this entry during gateway deployment:
99+
100+
* For Docker deployment - add the `--add-host <hostname>:127.0.0.1` parameter to the `docker run` command. For more information, see [Add entries to container hosts file](https://docs.docker.com/engine/reference/commandline/run/#add-entries-to-container-hosts-file---add-host)
101+
102+
* For Kubernetes deployment - Add a `hostAliases` specification to the `myGateway.yaml` configuration file. For more information, see [Adding entries to Pod /etc/hosts with Host Aliases](https://kubernetes.io/docs/concepts/services-networking/add-entries-to-pod-etc-hosts-with-host-aliases/).
103+
104+
105+
94106

95107
## Next steps
96108

articles/api-management/self-hosted-gateway-overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ editor: ''
99

1010
ms.service: api-management
1111
ms.topic: article
12-
ms.date: 04/26/2020
12+
ms.date: 01/25/2021
1313
ms.author: apimpm
1414
---
1515

@@ -39,13 +39,13 @@ Deploying self-hosted gateways into the same environments where the backend API
3939

4040
## Packaging and features
4141

42-
The self-hosted gateway is a containerized, functionally-equivalent version of the managed gateway deployed to Azure as part of every API Management service. The self-hosted gateway is available as a Linux-based Docker [container](https://aka.ms/apim/sputnik/dhub) from the Microsoft Container Registry. It can be deployed to Docker, Kubernetes, or any other container orchestration solution running on a server cluster on premises, cloud infrastructure, or for evaluation and development purposes, on a personal computer.
42+
The self-hosted gateway is a containerized, functionally equivalent version of the managed gateway deployed to Azure as part of every API Management service. The self-hosted gateway is available as a Linux-based Docker [container](https://aka.ms/apim/sputnik/dhub) from the Microsoft Container Registry. It can be deployed to Docker, Kubernetes, or any other container orchestration solution running on a server cluster on premises, cloud infrastructure, or for evaluation and development purposes, on a personal computer.
4343

4444
The following functionality found in the managed gateways is **not available** in the self-hosted gateways:
4545

4646
- Azure Monitor logs
4747
- Upstream (backend side) TLS version and cipher management
48-
- Validation of server and client certificates using [CA root certificates](api-management-howto-ca-certificates.md) uploaded to API Management service. To add support for custom CA, add a layer to the self-hosted gateway container image that installs the CA's root certificate.
48+
- Validation of server and client certificates using [CA root certificates](api-management-howto-ca-certificates.md) uploaded to API Management service. For more information, see [Certificate validation in self-hosted gateway](api-management-howto-mutual-certificates-for-clients.md#certificate-validation-in-self-hosted-gateway).
4949
- Integration with the [Service Fabric](../service-fabric/service-fabric-api-management-overview.md)
5050
- TLS session resumption
5151
- Client certificate renegotiation. This means that for [client certificate authentication](api-management-howto-mutual-certificates-for-clients.md) to work API consumers must present their certificates as part of the initial TLS handshake. To ensure that, enable the negotiate client certificate setting when configuring a self-hosted gateway custom hostname.

articles/app-service/app-service-key-vault-references.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to set up Azure App Service and Azure Functions to use Az
44
author: mattchenderson
55

66
ms.topic: article
7-
ms.date: 10/09/2019
7+
ms.date: 02/05/2021
88
ms.author: mahender
99
ms.custom: seodec18
1010

@@ -37,24 +37,24 @@ A Key Vault reference is of the form `@Microsoft.KeyVault({referenceString})`, w
3737
> [!div class="mx-tdBreakAll"]
3838
> | Reference string | Description |
3939
> |-----------------------------------------------------------------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
40-
> | SecretUri=_secretUri_ | The **SecretUri** should be the full data-plane URI of a secret in Key Vault, including a version, e.g., https://myvault.vault.azure.net/secrets/mysecret/ec96f02080254f109c51a1f14cdb1931 |
41-
> | VaultName=_vaultName_;SecretName=_secretName_;SecretVersion=_secretVersion_ | The **VaultName** should the name of your Key Vault resource. The **SecretName** should be the name of the target secret. The **SecretVersion** should be the version of the secret to use. |
40+
> | SecretUri=_secretUri_ | The **SecretUri** should be the full data-plane URI of a secret in Key Vault, optionally including a version, e.g., `https://myvault.vault.azure.net/secrets/mysecret/` or `https://myvault.vault.azure.net/secrets/mysecret/ec96f02080254f109c51a1f14cdb1931` |
41+
> | VaultName=_vaultName_;SecretName=_secretName_;SecretVersion=_secretVersion_ | The **VaultName** is required and should the name of your Key Vault resource. The **SecretName** is required and should be the name of the target secret. The **SecretVersion** is optional but if present indicates the version of the secret to use. |
4242
43-
> [!NOTE]
44-
> Versions are currently required. When rotating secrets, you will need to update the version in your application configuration.
4543
For example, a complete reference would look like the following:
4644

47-
4845
```
49-
@Microsoft.KeyVault(SecretUri=https://myvault.vault.azure.net/secrets/mysecret/ec96f02080254f109c51a1f14cdb1931)
46+
@Microsoft.KeyVault(SecretUri=https://myvault.vault.azure.net/secrets/mysecret)
5047
```
5148

5249
Alternatively:
5350

5451
```
55-
@Microsoft.KeyVault(VaultName=myvault;SecretName=mysecret;SecretVersion=ec96f02080254f109c51a1f14cdb1931)
52+
@Microsoft.KeyVault(VaultName=myvault;SecretName=mysecret)
5653
```
5754

55+
## Rotation
56+
57+
If a version is not specified in the reference, then the app will use the latest version that exists in Key Vault. When newer versions become available, such as with a rotation event, the app will automatically update and begin using the latest version within one day. Any configuration changes made to the app will cause an immediate update to the latest versions of all referenced secrets.
5858

5959
## Source Application Settings from Key Vault
6060

articles/azure-arc/kubernetes/use-gitops-connected-cluster.md

Lines changed: 9 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -144,17 +144,17 @@ To customize the configuration, here are more parameters you can use:
144144

145145
`--helm-operator-params` : *Optional* chart values for Helm operator (if enabled). For example, '--set helm.versions=v3'.
146146

147-
`--helm-operator-chart-version` : *Optional* chart version for Helm operator (if enabled). Default: '1.2.0'.
147+
`--helm-operator-version` : *Optional* chart version for Helm operator (if enabled). Use '1.2.0' or greater. Default: '1.2.0'.
148148

149149
`--operator-namespace` : *Optional* name for the operator namespace. Default: 'default'. Max 23 characters.
150150

151-
`--operator-params` : *Optional* parameters for operator. Must be given within single quotes. For example, ```--operator-params='--git-readonly --git-path=releases --sync-garbage-collection' ```
151+
`--operator-params` : *Optional* parameters for operator. Must be given within single quotes. For example, ```--operator-params='--git-readonly --sync-garbage-collection --git-branch=main' ```
152152

153153
Options supported in --operator-params
154154

155155
| Option | Description |
156156
| ------------- | ------------- |
157-
| --git-branch | Branch of Git repo to use for Kubernetes manifests. Default is 'master'. |
157+
| --git-branch | Branch of Git repo to use for Kubernetes manifests. Default is 'master'. Newer repositories have root branch named 'main', in which case you need to set --git-branch=main. |
158158
| --git-path | Relative path within the Git repo for Flux to locate Kubernetes manifests. |
159159
| --git-readonly | Git repo will be considered read-only; Flux will not attempt to write to it. |
160160
| --manifest-generation | If enabled, Flux will look for .flux.yaml and run Kustomize or other manifest generators. |
@@ -222,16 +222,13 @@ Command group 'k8sconfiguration' is in preview. It may be changed/removed in a f
222222
}
223223
```
224224

225-
When the `sourceControlConfiguration` is created, a few things happen under the hood:
225+
When a `sourceControlConfiguration` is created or updated, a few things happen under the hood:
226226

227-
1. The Azure Arc `config-agent` monitors Azure Resource Manager for new or updated configurations (`Microsoft.KubernetesConfiguration/sourceControlConfigurations`)
228-
1. `config-agent` notices the new `Pending` configuration
229-
1. `config-agent` reads the configuration properties and prepares to deploy a managed instance of `flux`
230-
* `config-agent` creates the destination namespace
231-
* `config-agent` prepares a Kubernetes Service Account with the appropriate permission (`cluster` or `namespace` scope)
232-
* `config-agent` deploys an instance of `flux`
233-
* `flux` generates an SSH key and logs the public key (if using the option of SSH with Flux-generated keys)
234-
1. `config-agent` reports status back to the `sourceControlConfiguration` resource in Azure
227+
1. The Azure Arc `config-agent` is monitoring Azure Resource Manager for new or updated configurations (`Microsoft.KubernetesConfiguration/sourceControlConfigurations`) and notices the new `Pending` configuration.
228+
1. The `config-agent` reads the configuration properties and creates the destination namespace.
229+
1. The Azure Arc `controller-manager` prepares a Kubernetes Service Account with the appropriate permission (`cluster` or `namespace` scope) and then deploys an instance of `flux`.
230+
1. If using the option of SSH with Flux-generated keys, `flux` generates an SSH key and logs the public key.
231+
1. The `config-agent` reports status back to the `sourceControlConfiguration` resource in Azure.
235232

236233
While the provisioning process happens, the `sourceControlConfiguration` will move through a few state changes. Monitor progress with the `az k8sconfiguration show ...` command above:
237234

134 KB
Loading
2.28 MB
Loading

0 commit comments

Comments
 (0)