Skip to content

Commit 3ea862a

Browse files
authored
Merge pull request #16895 from sethmanheim/appsv
Fixes to app serv relnotes
2 parents 78b6512 + 3a235f7 commit 3ea862a

File tree

2 files changed

+51
-51
lines changed

2 files changed

+51
-51
lines changed

azure-stack/includes/app-service-hub-update-banner.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -3,16 +3,14 @@ author: apwestgarth
33
ms.author: anwestg
44
ms.service: azure-stack
55
ms.topic: include
6-
ms.date: 12/09/2024
6+
ms.date: 01/31/2025
77
ms.reviewer: sethm
88
ms.lastreviewed: 10/28/2020
99
---
1010
<!-- TODO - For each release: add AzS Hub build number, App Service RP version number, & corresponding App Service release notes text/link -->
1111
> [!IMPORTANT]
12-
> Update Azure Stack Hub to a supported version (or deploy the latest Azure Stack Development Kit) if necessary, before deploying or updating the App Service resource provider (RP). Be sure to read the RP release notes to learn about new functionality, fixes, and any known issues that could affect your deployment.
13-
14-
> | Supported Minimum Azure Stack Hub version | App Service RP version |
12+
> Update Azure Stack Hub to a supported version if necessary, before deploying or updating the App Service resource provider (RP). Be sure to read the RP release notes to learn about new functionality, fixes, and any known issues that can affect your deployment.
13+
>
14+
> | Supported minimum Azure Stack Hub version | App Service RP version |
1515
> |-----|---|
16-
> |
17-
> | 2311 and later | 24R1 [Installer](https://aka.ms/appsvcupdate24R1installer) ([release notes](../operator/app-service-release-notes-2024R1.md)) |
18-
16+
> | 2311 and later | 24R1 [Installer](https://aka.ms/appsvcupdate24R1installer) ([release notes](../operator/app-service-release-notes-2024R1.md)) |

azure-stack/operator/app-service-release-notes-2024R1.md

Lines changed: 46 additions & 44 deletions
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ Before you begin the upgrade of Azure App Service on Azure Stack to 24R1:
4545

4646
- Back up the Tenant App content file share.
4747

48-
> [!Important]
48+
> [!IMPORTANT]
4949
> Cloud operators are responsible for the maintenance and operation of the File Server and SQL Server. The resource provider does not manage these resources. The cloud operator is responsible for backing up the App Service databases and tenant content file share.
5050
5151
- Syndicate the **Custom Script Extension** version **1.9.3** from the Marketplace.
@@ -218,16 +218,16 @@ This script must be run under the following conditions:
218218
- By a user that has the system administrator privilege, for example the SQL SA (System Administrator) Account;
219219
- If using SQL Always on, ensure the script is run from the SQL instance that contains all App Service logins in the form:
220220

221-
- appservice_hosting_FileServer
222-
- appservice_hosting_HostingAdmin
223-
- appservice_hosting_LoadBalancer
224-
- appservice_hosting_Operations
225-
- appservice_hosting_Publisher
226-
- appservice_hosting_SecurePublisher
227-
- appservice_hosting_WebWorkerManager
228-
- appservice_metering_Common
229-
- appservice_metering_Operations
230-
- All WebWorker logins - which are in the form WebWorker_\<instance ip address\>
221+
- appservice_hosting_FileServer
222+
- appservice_hosting_HostingAdmin
223+
- appservice_hosting_LoadBalancer
224+
- appservice_hosting_Operations
225+
- appservice_hosting_Publisher
226+
- appservice_hosting_SecurePublisher
227+
- appservice_hosting_WebWorkerManager
228+
- appservice_metering_Common
229+
- appservice_metering_Operations
230+
- All WebWorker logins - which are in the form WebWorker_\<instance ip address\>
231231

232232
```sql
233233
USE appservice_hosting
@@ -283,50 +283,52 @@ This script must be run under the following conditions:
283283
GO
284284
```
285285

286-
- A new Redirect URL must be added to the Identity Application created in order to support Single Sign On(SSO) Scenarios (for example Kudu)
286+
- A new Redirect URL must be added to the identity application created in order to support Single Sign On(SSO) Scenarios (for example Kudu)
287287

288288
# [Entra ID](#tab/EntraID)
289289

290-
## Retrieve the Identity Application Client ID
291-
1. In the Azure Stack admin portal, navigate to the **ControllersNSG** Network Security Group.
292-
1. By default, remote desktop access is disabled to all App Service infrastructure roles. Modify the **Inbound_Rdp_3389** rule action to **Allow** access.
293-
1. Navigate to the resource group containing the App Service Resource Provider deployment. By default, the resource group is named with the format `AppService.<region>`, and connected to **CN0-VM**.
294-
1. Launch the **Web Cloud Management Console**.
295-
1. Check the **Web Cloud Management Console -> Web Cloud** screen and verify that both **Controllers** are **Ready**.
296-
1. Select **Settings**.
297-
1. Find the **ApplicationClientId** setting. Retrieve the value.
298-
1. In the Azure Stack admin portal, navigate back to the **ControllersNSG** Network Security Group.
299-
1. Modify the **Inbound_Rdp_3389** rule to deny access.
300-
301-
## Update the Entra ID Application with new Redirect URI
302-
303-
1. Sign into the **Azure** Portal to access the Entra ID tenant you connected your Azure Stack Hub to at deployment time.
304-
1. Using the **Azure** Portal and navigate to **Microsoft Entra ID**
305-
1. Search your tenant for the ApplicationClientId you retrieved earlier.
306-
1. Select the Application
307-
1. Select **Authentication**
308-
1. Add an additional Redirect URI to the existing list - **https://azsstamp.sso.appservice.\<region\>.\<DomainName\>.\<extension\>**
290+
## Retrieve the Identity Application Client ID
291+
292+
1. In the Azure Stack admin portal, navigate to the **ControllersNSG** Network Security Group.
293+
1. By default, remote desktop access is disabled to all App Service infrastructure roles. Modify the **Inbound_Rdp_3389** rule action to **Allow** access.
294+
1. Navigate to the resource group containing the App Service Resource Provider deployment. By default, the resource group is named with the format `AppService.<region>`, and connected to **CN0-VM**.
295+
1. Launch the **Web Cloud Management Console**.
296+
1. Check the **Web Cloud Management Console -> Web Cloud** screen and verify that both **Controllers** are **Ready**.
297+
1. Select **Settings**.
298+
1. Find the **ApplicationClientId** setting. Retrieve the value.
299+
1. In the Azure Stack admin portal, navigate back to the **ControllersNSG** Network Security Group.
300+
1. Modify the **Inbound_Rdp_3389** rule to deny access.
309301

302+
## Update the Entra ID Application with new Redirect URI
303+
304+
1. Sign into the Azure portal to access the Entra ID tenant you connected your Azure Stack Hub to at deployment time.
305+
1. Using the Azure portal and navigate to **Microsoft Entra ID**.
306+
1. Search your tenant for the `ApplicationClientId` you retrieved earlier.
307+
1. Select the application.
308+
1. Select **Authentication**.
309+
1. Add another **Redirect URI** to the existing list: `https://azsstamp.sso.appservice.<region>.<DomainName>.<extension>`.
310310

311311
# [ADFS](#tab/ADFS)
312312

313-
## Retrieve the Identity Application
314-
1. Open a [session to the Privileged Endpoint](azure-stack-privileged-endpoint.md)
315-
1. Run the following command to retrieve the ADFS Graph Applications
313+
## Retrieve the identity application
314+
315+
1. Open a [session to the Privileged Endpoint](azure-stack-privileged-endpoint.md).
316+
1. Run the following command to retrieve the AD FS Graph applications:
317+
318+
``` PowerShell
319+
Get-GraphApplication
320+
```
316321

317-
``` PowerShell
318-
Get-GraphApplication
319-
```
322+
1. Find the identifier for the **AzureStack-AppService** application.
323+
1. Update the `RedirectURIs` for the application:
320324

321-
1. Find the Identifier for the AzureStack-AppService application
322-
1. Update the RedirectURIs for the application:
325+
``` PowerShell
326+
$RedirectURIs = "@("https://appservice.sso.appservice.<region>.<DomainName>.<extension>", "https://azsstamp.sso.appservice.<region>.<DomainName>.<extension>", "https://api.appservice.<region>.<DomainName>.<extension>:44300/manage")
327+
Set-GraphApplication -ApplicationIdentifier <insert Identifier value> -ClientRedirectUris $RedirectURIs
328+
```
323329

324-
``` PowerShell
325-
$RedirectURIs = "@("https://appservice.sso.appservice.\<region\>.\<DomainName\>.\<extension\>", "https://azsstamp.sso.appservice.\<region\>.\<DomainName\>.\<extension\>", "https://api.appservice.\<region\>.\<DomainName\>.\<extension\>:44300/manage")
326-
Set-GraphApplication -ApplicationIdentifier <insert Identifier value> -ClientRedirectUris $RedirectURIs
327-
```
330+
1. Close the Privileged Endpoint session.
328331

329-
1. Close the session to the Privileged Endpoint
330332
---
331333

332334
## Known issues (post-installation)

0 commit comments

Comments
 (0)