Skip to content

Commit 795ddd2

Browse files
Merge pull request #18668 from MicrosoftDocs/main
Auto Publish – main to live - 2025-08-12 22:00 UTC
2 parents 89fc3df + 3f63f00 commit 795ddd2

19 files changed

+523
-27
lines changed

AKS-Arc/network-system-requirements.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,11 @@
22
title: AKS enabled by Azure Arc network requirements
33
description: Learn about AKS network prerequisites.
44
ms.topic: overview
5-
ms.date: 07/17/2025
5+
ms.date: 08/12/2025
66
author: sethmanheim
77
ms.author: sethm
88
ms.reviewer: srikantsarwa
9-
ms.lastreviewed: 07/17/2025
9+
ms.lastreviewed: 08/12/2025
1010
---
1111

1212
# AKS enabled by Azure Arc network requirements
@@ -81,10 +81,10 @@ When you deploy Azure Local, you allocate a contiguous block of at least [six st
8181

8282
| Destination Port | Destination | Source | Description | Bi-directional cross VLAN networking notes |
8383
|------------------|-------------|--------|-------------|----------------|
84-
| 22 | Logical network used for AKS Arc VMs | IP addresses in management network | Required to collect logs for troubleshooting. | If you use separate VLANs, IP addresses in management network used for Azure Local and Arc Resource Bridge need to access the AKS Arc cluster VMs on this port and vice-versa.|
85-
| 6443 | Logical network used for AKS Arc VMs | IP addresses in management network | Required to communicate with Kubernetes APIs. | If you use separate VLANs, IP addresses in management network used for Azure Local and Arc Resource Bridge need to access the AKS Arc cluster VMs on this port and vice-versa.|
86-
| 55000 | IP addresses in management network | Logical network used for AKS Arc VMs | Cloud Agent gRPC server | If you use separate VLANs, the AKS Arc VMs need to access the IP addresses in management network used for cloud agent IP and cluster IP on this port and vice-versa. |
87-
| 65000 | IP addresses in management network | Logical network used for AKS Arc VMs | Cloud Agent gRPC authentication | If you use separate VLANs, the AKS Arc VMs need to access the IP addresses in management network used for cloud agent IP and cluster IP on this port and vice-versa. |
84+
| 22 | Logical network used for AKS Arc VMs | IP addresses in management network | Required to collect logs for troubleshooting. | If you use separate VLANs, IP addresses in management network used for Azure Local and Arc Resource Bridge need to access the AKS Arc cluster VMs on this port, and vice-versa.|
85+
| 6443 | Logical network used for AKS Arc VMs | IP addresses in management network | Required to communicate with Kubernetes APIs. | If you use separate VLANs, IP addresses in management network used for Azure Local and Arc Resource Bridge need to access the AKS Arc cluster VMs on this port, and vice-versa.|
86+
| 55000 | Cluster IP address | Logical network used for AKS Arc VMs | Cloud Agent gRPC server | If you use separate VLANs, the AKS Arc VMs need to access the IP addresses in management network used for cloud agent IP and cluster IP on this port, and vice-versa. |
87+
| 65000 | Cluster IP address | Logical network used for AKS Arc VMs | Cloud Agent gRPC authentication | If you use separate VLANs, the AKS Arc VMs need to access the IP addresses in management network used for cloud agent IP and cluster IP on this port, and vice-versa. |
8888

8989
## Use Azure Arc gateway (preview) with Azure Local
9090

azure-local/TOC.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -101,13 +101,13 @@ items:
101101
items:
102102
- name: About security features
103103
href: concepts/security-features.md
104-
- name: Download Azure Local security book
105-
href: https://github.com/Azure-Samples/AzureLocal/blob/main/SecurityBook/Azure%20Local%20Security%20Book_04302025.pdf
104+
- name: Azure Local security book
105+
href: security-book/overview.md
106106
- name: Assess environment readiness
107107
href: manage/use-environment-checker.md
108108
- name: Configure advanced Active Directory settings
109109
href: plan/configure-custom-settings-active-directory.md
110-
110+
111111
- name: Deploy
112112
items:
113113
- name: Read overview

azure-local/manage/disconnected-operations-deploy.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -237,8 +237,7 @@ To prepare the first machine for the disconnected operations appliance, follow t
237237
1. Import the **Operations module**. Run the command as an administrator using PowerShell. Modify the path to match your folder structure.
238238
239239
```powershell
240-
Import-Module "$applianceConfigBasePath\OperationsModule\Azure.Local.DisconnectedOperations.psd1" -Force
241-
Import-Module "$applianceConfigBasePath\OperationsModule\ExternalIdentityConfigurationModule.psm1" -Force
240+
Import-Module "$applianceConfigBasePath\OperationsModule\Azure.Local.DisconnectedOperations.psd1" -Force
242241
243242
$mgmntCertFolderPath = "$certspath\ManagementEndpointCerts"
244243
$ingressCertFolderPath = "$certspath\IngressEndpointsCerts"
@@ -290,25 +289,27 @@ Populate the required parameters based on your deployment planning. Modify the e
290289
1. Populate the identity configuration object.
291290
292291
```powershell
293-
$oidcCertChain = Get-CertificateChainFromEndpoint -requestUri 'https://adfs.azurestack.local/adfs'
294-
# Omit ldapsCertChain in this preview release
292+
$oidcCertChain = Get-CertificateChainFromEndpoint -requestUri 'https://adfs.azurestack.local/adfs'
295293
# $ldapsCertChain = Get-CertificateChainFromEndpoint -requestUri 'https://dc01.azurestack.local'
294+
296295
$ldapPassword = 'RETRACTED'|ConvertTo-SecureString -AsPlainText -Force
297296
298297
$identityParams = @{
299298
Authority = "https://adfs.azurestack.local/adfs"
300-
ClientId = "7e7655c5-9bc4-45af-8345-afdf6bbe2ec1"
299+
ClientId = "<ClientId>"
301300
RootOperatorUserPrincipalName = "[email protected]"
302301
LdapServer = "adfs.azurestack.local"
303302
LdapCredential = New-Object PSCredential -ArgumentList @("ldap", $ldapPassword)
304-
SyncGroupIdentifier = "7d67fcd5-c2f4-4948-916c-b77ea7c2712f"
305-
OidcCertChainInfo=$oidcCertChainInfo
303+
OidcCertChain = $oidcCertChain
304+
SyncGroupIdentifier = "<SynGroupIdentifier>"
306305
}
307306
$identityConfiguration = New-ApplianceExternalIdentityConfiguration @identityParams
308307
```
309308
310309
> [!NOTE]
311-
> `LdapsCertChainInfo` and `OidcCertChain` can be omitted completely for debugging or demo purposes. For information on how to get LdapsCertChainInfo and OidcCertChainInfo, see [PKI for disconnected operations](disconnected-operations-pki.md).
310+
> `LdapsCertChainInfo` and `OidcCertChain` can be omitted completely for debugging or demo purposes. For information on how to get LdapsCertChainInfo and OidcCertChainInfo, see [PKI for disconnected operations](disconnected-operations-pki.md). In this preview release, there's an issue with the `Get-CertificateChainFromEndpoint` not being exported as intended. Use the steps in [Known issues for disconnected operations for Azure Local](disconnected-operations-known-issues.md) to mitigate this issue.
311+
312+
312313
313314
For more information, see [Identity for disconnected operations](disconnected-operations-identity.md).
314315
@@ -407,7 +408,7 @@ To configure observability, follow these steps:
407408
408409
```json
409410
{
410-
"appId": "f9c68c7b-0df2-4b3a-9833-3cfb41c6f829",
411+
"appId": "<AppId>",
411412
"displayName": "azlocalobsapp",
412413
"password": "<RETRACTED>",
413414
"tenant": "<RETRACTED>"
@@ -421,7 +422,7 @@ To configure observability, follow these steps:
421422
$observabilityConfiguration = New-ApplianceObservabilityConfiguration -ResourceGroupName "azure-disconnectedoperations" `
422423
-TenantId "<TenantID>" `
423424
-Location "<Location>" `
424-
-SubscriptionId "<subscriptionId>" `
425+
-SubscriptionId "<SubscriptionId>" `
425426
-ServicePrincipalId "<AppId>" `
426427
-ServicePrincipalSecret ("<Password>"|ConvertTo-SecureString -AsPlainText -Force)
427428
@@ -485,7 +486,7 @@ Use the operator account to create an SPN for Arc initialization of each Azure L
485486
486487
```json
487488
{
488-
"appId": "f9c68c7b-0df2-4b3a-9833-3cfb41c6f829",
489+
"appId": "<AppId>",
489490
"displayName": "azlocalclusapp",
490491
"password": "<RETRACTED>",
491492
"tenant": "<RETRACTED>"
@@ -520,7 +521,7 @@ To initialize each node, follow these steps. Modify where necessary to match you
520521
Write-Host "az login to Disconnected operations cloud"
521522
az cloud set -n $applianceCloudName --only-show-errors
522523
Write-Host "Login using service principal"
523-
az login --service-principal --username $appId --password $clientSecret --tenant 98b8267d-e97f-426e-8b3f-7956511fd63f
524+
az login --service-principal --username $appId --password $clientSecret --tenant <TenantId>
524525
# If you prefer interactive login..
525526
# Write-Host "Using device code login - complete the login from your browser"
526527
# az login --use-device-code
@@ -658,7 +659,6 @@ From a client with network access to the management endpoint, import the **Opera
658659

659660
```powershell
660661
Import-Module "$applianceConfigBasePath\OperationsModule\Azure.Local.DisconnectedOperations.psd1" -Force
661-
Import-Module "$applianceConfigBasePath\OperationsModule\ExternalIdentityConfigurationModule.psm1" -Force
662662
663663
$password = ConvertTo-SecureString 'RETRACTED' -AsPlainText -Force
664664
$context = Set-DisconnectedOperationsClientContext -ManagementEndpointClientCertificatePath "${env:localappdata}\AzureLocalOpModuleDev\certs\ManagementEndpoint\ManagementEndpointClientAuth.pfx" -ManagementEndpointClientCertificatePassword $password -ManagementEndpointIpAddress "169.254.53.25"

azure-local/manage/disconnected-operations-known-issues.md

Lines changed: 17 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,10 +21,25 @@ These release notes update continuously, and we add critical issues that need a
2121

2222
## Known issues in the preview release
2323

24+
### Get-CertificateChainFromEndpoint method not found
25+
There's a known issue when running `Get-CertificateChainFromEndpoint` in order to populate the OidcCertChainInfo object.
26+
27+
Mitigation: You need to make a modification in the OperationsModule.
28+
Open the Azure.Local.DisconnectedOperations.psm1 file in notepad (or another text editor). Add the end of the file with the following
29+
```powershell
30+
Export-ModuleMember Get-CertificateChainFromEndpoint
31+
```
32+
Save the file and exit your editor. Restart your powershell session. Set the execution policy to unrestricted and import the modified OperationsModule module
33+
```powershell
34+
Set-ExeuctionPolicy Unrestricted
35+
Import-Module "$applianceConfigBasePath\OperationsModule\Azure.Local.DisconnectedOperations.psd1" -Force
36+
```
37+
38+
2439
### Air-gapped deployment when local DNS forwards and resolves external domain requests
25-
There is a known issue if you try to deploy an air-gapped enviroment - in the rare condition you would have a local DNS server that is able to resolve public (Microsoft.com) endpoints.
40+
There's a known issue when deploying an air-gapped environment—this happens if you’ve got a local DNS server that can resolve public endpoints like Microsoft.com.
2641

27-
Mitigation: Disable DNS forwarding for microsoft.com and azure.com zones. The appliance should not be able to resolve these DNS endpoint and will fail if it receives an IP address.
42+
Mitigation: Disable DNS forwarding for microsoft.com and azure.com zones. The appliance can't resolve these DNS endpoints and fails if it receives an IP address.
2843

2944
### Azure Local deployment with Azure Keyvault
3045

azure-local/manage/disconnected-operations-pki.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -314,11 +314,10 @@ Here's an example of how to populate the required parameters:
314314

315315
```powershell
316316
Import-Module "$applianceConfigBasePath\OperationsModule\Azure.Local.DisconnectedOperations.psd1" -Force
317-
Import-Module "$applianceConfigBasePath\OperationsModule\ExternalIdentityConfigurationModule.psm1" -Force
317+
318318
319319
$oidcCertChain = Get-CertificateChainFromEndpoint -requestUri 'https://adfs.azurestack.local/adfs'
320-
# Omit LDAPSCertChain in this preview releases
321-
# $ldapsCertChain = Get-CertificateChainFromEndpoint -requestUri 'https://dc01.azurestack.local'
320+
$ldapsCertChain = Get-CertificateChainFromEndpoint -requestUri 'https://dc01.azurestack.local'
322321
```
323322

324323
Here's an example of the output from Get-CertificateChainFromEndpoint

azure-local/security-book/TOC.yml

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
items:
2+
- name: Azure Local Security Book
3+
href: overview.md
4+
- name: Trustworthy addition
5+
href: trustworthy-addition.md
6+
- name: Operational security
7+
href: operational-security.md
8+
- name: Workload security
9+
href: workload-security.md
10+
- name: Silicon-assisted security
11+
href: silicon-assisted-security.md
12+
- name: Security foundation
13+
href: security-foundation.md
14+
- name: Conclusion
15+
href: conclusion.md
16+
17+
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
---
2+
title: Azure Local security book conclusion
3+
description: Conclusion for the Azure Local security book.
4+
author: alkohli
5+
ms.topic: conceptual
6+
ms.date: 08/11/2025
7+
ms.author: alkohli
8+
ms.reviewer: alkohli
9+
---
10+
11+
# Azure Local security book conclusion
12+
13+
[!INCLUDE [hci-applies-to-23h2](../includes/hci-applies-to-23h2.md)]
14+
15+
We designed Azure Local so it's secure right out of the box. Further, we provide mechanisms to help the system remain secure over time. We'll continue to build on our security foundations with innovations that deliver powerful protection now and in the future.
16+
17+
## Endnotes
18+
19+
The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it shouldn't be interpreted to be a commitment on the part of Microsoft, and Microsoft can't guarantee the accuracy of any information presented after the date of publication.
20+
21+
This paper is for informational purposes only. Microsoft makes no warranties, express or implied, in this document.
22+
23+
## Copyrights
24+
25+
Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in, or introduced into a retrieval system, or transmitted in any form or by any means electronic, mechanical, photocopying, recording, or otherwise, or for any purpose, without the express written permission of Microsoft Corporation.
26+
27+
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document doesn't give you any license to these patents, trademarks, copyrights, or other intellectual property.
28+
29+
## Related content
30+
31+
- [Overview](overview.md)
71.6 KB
Loading
403 KB
Loading
103 KB
Loading

0 commit comments

Comments
 (0)