Skip to content

Commit b1c380f

Browse files
committed
[BULK] DocuTune - Updates to Azure AD rebranding g
1 parent 6e2d217 commit b1c380f

23 files changed

+185
-161
lines changed

articles/logic-apps/azure-arc-enabled-logic-apps-create-deploy-workflows.md

+11-11
Original file line numberDiff line numberDiff line change
@@ -53,24 +53,24 @@ This section describes the common prerequisites across all the approaches and to
5353
- [Set up an Azure Arc-enabled Kubernetes cluster to run App Service, Functions, and Logic Apps (Preview)](../app-service/manage-create-arc-environment.md)
5454
- [Change the default scaling behavior](#change-scaling)
5555

56-
- Your own Azure Active Directory (Azure AD) identity
56+
- Your own Microsoft Entra identity
5757

58-
If your workflows need to use any Azure-hosted connections, such as Office 365 Outlook or Azure Storage, your logic app must use an Azure AD identity for authentication. Azure Arc-enabled Logic Apps can run on any infrastructure but requires an identity that has permissions to use Azure-hosted connections. To set up this identity, create an app registration in Azure AD that your logic app uses as the required identity.
58+
If your workflows need to use any Azure-hosted connections, such as Office 365 Outlook or Azure Storage, your logic app must use a Microsoft Entra identity for authentication. Azure Arc-enabled Logic Apps can run on any infrastructure but requires an identity that has permissions to use Azure-hosted connections. To set up this identity, create an app registration in Microsoft Entra ID that your logic app uses as the required identity.
5959

6060
> [!NOTE]
6161
> Managed identity support is currently unavailable for Azure Arc-enabled Logic Apps.
6262
63-
To create an Azure Active Directory (Azure AD) app registration using the Azure CLI, follow these steps:
63+
To create a Microsoft Entra app registration using the Azure CLI, follow these steps:
6464

6565
1. Create an app registration by using the [`az ad sp create`](/cli/azure/ad/sp#az-ad-sp-create) command.
6666

6767
1. To review all the details, run the [`az ad sp show`](/cli/azure/ad/sp#az-ad-sp-show) command.
6868

6969
1. From the output of both commands, find and save the client ID, object ID, tenant ID, and client secret values, which you need to keep for later use.
7070

71-
To create an Azure Active Directory (Azure AD) app registration using the Azure portal, follow these steps:
71+
To create a Microsoft Entra app registration using the Azure portal, follow these steps:
7272

73-
1. Create a new Azure AD app registration by using the [Azure portal](../active-directory/develop/quickstart-register-app.md).
73+
1. Create a new Microsoft Entra app registration by using the [Azure portal](../active-directory/develop/quickstart-register-app.md).
7474

7575
1. After creation finishes, find the new app registration in the portal.
7676

@@ -283,9 +283,9 @@ You can create, deploy, and monitor your logic app workflows from end to end in
283283

284284
1. Select or create a new Application Insights resource for storing application logs for your logic app.
285285

286-
1. If you haven't done so, set up your Azure Active Directory (Azure AD) identity so that your logic app can authenticate managed API connections. For more information, see the top-level [Prerequisites](#prerequisites).
286+
1. If you haven't done so, set up your Microsoft Entra identity so that your logic app can authenticate managed API connections. For more information, see the top-level [Prerequisites](#prerequisites).
287287

288-
1. Enter the client ID, tenant ID, object ID, and client secret for your Azure AD identity.
288+
1. Enter the client ID, tenant ID, object ID, and client secret for your Microsoft Entra identity.
289289

290290
> [!NOTE]
291291
> You only have to complete this step once. Visual Studio Code updates your project's
@@ -316,9 +316,9 @@ The portal-based designer's editing capability is currently under development fo
316316

317317
Currently, Azure Arc-enabled Kubernetes clusters don't support using a logic app's managed identity to authenticate managed API connections. You create these Azure-hosted and managed connections when you use managed connectors in your workflows.
318318

319-
Instead, you have to create your own app registration in Azure Active Directory (Azure AD). You can then use this app registration as an identity for logic apps deployed and running in Azure Arc-enabled Logic Apps. For more information, review the [top-level prerequisites](#prerequisites).
319+
Instead, you have to create your own app registration in Microsoft Entra ID. You can then use this app registration as an identity for logic apps deployed and running in Azure Arc-enabled Logic Apps. For more information, review the [top-level prerequisites](#prerequisites).
320320

321-
From your app registration, you need the client ID, object ID, tenant ID, and client secret. If you use Visual Studio Code to deploy, you have a built-in experience for setting up your logic app with an Azure AD identity. For more information, review [Create and deploy logic app workflows - Visual Studio Code](#create-and-deploy-logic-apps).
321+
From your app registration, you need the client ID, object ID, tenant ID, and client secret. If you use Visual Studio Code to deploy, you have a built-in experience for setting up your logic app with a Microsoft Entra identity. For more information, review [Create and deploy logic app workflows - Visual Studio Code](#create-and-deploy-logic-apps).
322322

323323
However, if you use Visual Studio Code for development, but you use Azure CLI or automated pipelines to deploy, follow these steps.
324324

@@ -367,8 +367,8 @@ In your Azure Resource Manager template (ARM template), include the following re
367367
| Parameter | Description |
368368
|-----------|-------------|
369369
| <*connection-name*> | The name for your managed API connection, for example `office365` |
370-
| <*object-ID*> | The object ID for your Azure AD identity, previously saved from your app registration |
371-
| <*tenant-ID*> | The tenant ID for your Azure AD identity, previously saved from your app registration |
370+
| <*object-ID*> | The object ID for your Microsoft Entra identity, previously saved from your app registration |
371+
| <*tenant-ID*> | The tenant ID for your Microsoft Entra identity, previously saved from your app registration |
372372
|||
373373

374374
```json

articles/logic-apps/biztalk-server-to-azure-integration-services-overview.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -566,7 +566,7 @@ BizTalk includes [Enterprise Single Sign-On (SSO)](/biztalk/core/enterprise-sing
566566

567567
- Managed identities
568568

569-
Some connectors support using a [managed identity](../active-directory/managed-identities-azure-resources/overview.md) for authenticating access to resources protected by Azure Active Directory (Azure AD). When you use a managed identity to authenticate your connection, you don't have to provide credentials, secrets, or Azure AD tokens.
569+
Some connectors support using a [managed identity](../active-directory/managed-identities-azure-resources/overview.md) for authenticating access to resources protected by Microsoft Entra ID. When you use a managed identity to authenticate your connection, you don't have to provide credentials, secrets, or Microsoft Entra tokens.
570570

571571
### Application management and access management
572572

@@ -837,7 +837,7 @@ For the latest information, see [Service Bus Premium and Standard messaging tier
837837

838838
Azure API Management offers various pricing tiers so that you can choose the best tier that meets your needs. Each tier has its own capabilities and are named Consumption, Developer, Basic, Standard, and Premium.
839839

840-
The capabilities in these tiers range from Azure AD integration, Azure virtual network support, built-in cache, self-hosted gateways, and more. For more information about these tiers and their capabilities, see [Feature-based comparison of the Azure API Management tiers](../api-management/api-management-features.md).
840+
The capabilities in these tiers range from Microsoft Entra integration, Azure virtual network support, built-in cache, self-hosted gateways, and more. For more information about these tiers and their capabilities, see [Feature-based comparison of the Azure API Management tiers](../api-management/api-management-features.md).
841841

842842
##### Azure Data Factory
843843

@@ -919,7 +919,7 @@ The following table and diagram roughly show how resources, artifacts, features,
919919
| EDI | - BizTalk Server out-of-the-box capabilities <br>- Parties, partners, agreements, AS2, X12, EDIFACT | Azure Logic Apps and Azure Integration Account (partners, agreements, AS2, X12, EDIFACT) |
920920
| HL7, RosettaNet, and SWIFT | BizTalk Server accelerators for HL7, RosettaNet, and SWIFT | - Azure Logic Apps, RosettaNet and SWIFT connectors, and Azure Integration Account <br>- Azure API Management for FHIR (HL7) <br>- Azure Blueprint, which enables SWIFT CSP compliance on Azure |
921921
| Secrets | Enterprise Single Sign-On (SSO) | - Azure Key Vault <br>- SQL Server <br>- Application configuration |
922-
| Security and governance | - Enterprise Single Sign-On (SSO) <br>- SSO affiliate applications <br>- Active Directory <br>- Signing certificates <br>- IIS Security Authentication <br>- Network security | - Azure Active Directory <br>- Azure Network Security <br>- Azure role-based access control (Azure RBAC) <br>- Claims, tokens <br>- Shared Access Policies |
922+
| Security and governance | - Enterprise Single Sign-On (SSO) <br>- SSO affiliate applications <br>- Active Directory <br>- Signing certificates <br>- IIS Security Authentication <br>- Network security | - Microsoft Entra ID <br>- Azure Network Security <br>- Azure role-based access control (Azure RBAC) <br>- Claims, tokens <br>- Shared Access Policies |
923923
| Data configuration | - Config files <br>- Enterprise SSO application configuration <br>- Custom cache components <br>- Custom database <br>- Business Rules Engine <br>- Windows registry | - Azure Key Vault <br>- Azure App Configuration <br>- Azure Cosmos DB <br>- Azure Table Storage <br>- Azure Logic Apps (Standard) configuration <br>- Azure Functions configuration <br>- Azure API Management named values and backends <br>- SQL Server <br>- Custom caching <br>- Custom database |
924924
| Deployment | - BizTalk Server binding file | - Azure DevOps pipelines <br>- Bicep scripts <br>- Terraform |
925925
| Tracking | - BizTalk Server tracking capabilities (Receive ports, Send ports, pipelines, orchestrations) <br>- IIS tracking <br>- Azure API Management built-in analytics (hybrid capabilities) | - Azure Logic Apps run history and tracked properties <br>- Azure Storage Account <br>- Azure Monitor (Application Insights) <br>- Azure API Management built-in analytics <br>- Custom solution, for example, Azure Event Hubs plus Azure Functions plus SQL Server plus Azure Data Explorer |

articles/logic-apps/block-connections-across-tenants.md

+8-8
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
22
title: Block access to and from other tenants
3-
description: Block connections between your tenant and other Azure Active Directory (Azure AD) tenants in Azure Logic Apps.
3+
description: Block connections between your tenant and other Microsoft Entra tenants in Azure Logic Apps.
44
services: logic-apps
55
ms.suite: integration
66
ms.reviewer: estfan, azla
77
ms.topic: how-to
88
ms.date: 08/01/2022
9-
# Customer intent: As a developer, I want to prevent access to and from other Azure Active Directory tenants.
9+
# Customer intent: As a developer, I want to prevent access to and from other Microsoft Entra tenants.
1010
---
1111

1212
# Block connections to and from other tenants in Azure Logic Apps (Preview)
@@ -15,11 +15,11 @@ ms.date: 08/01/2022
1515
> This capability is in preview and is subject to the
1616
> [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
1717
18-
Azure Logic Apps includes many connectors for you to build integration apps and workflows and to access various data, apps, services, systems, and other resources. These connectors authorize your access to these resources by using Azure Active Directory (Azure AD) to authenticate your credentials.
18+
Azure Logic Apps includes many connectors for you to build integration apps and workflows and to access various data, apps, services, systems, and other resources. These connectors authorize your access to these resources by using Microsoft Entra ID to authenticate your credentials.
1919

20-
When you create a connection from your workflow to access a resource, you can share that connection with others in the same Azure AD tenant or different tenant by sending a consent link. This shared connection provides access to same resource but creates a security vulnerability.
20+
When you create a connection from your workflow to access a resource, you can share that connection with others in the same Microsoft Entra tenant or different tenant by sending a consent link. This shared connection provides access to same resource but creates a security vulnerability.
2121

22-
As a security measure to prevent this scenario, you can block access to and from your own Azure AD tenant through such shared connections. You can also permit but restrict connections only to specific tenants. By setting up a tenant isolation policy, you can better control data movement between your tenant and resources that require Azure AD authorized access.
22+
As a security measure to prevent this scenario, you can block access to and from your own Microsoft Entra tenant through such shared connections. You can also permit but restrict connections only to specific tenants. By setting up a tenant isolation policy, you can better control data movement between your tenant and resources that require Microsoft Entra authorized access.
2323

2424
## Prerequisites
2525

@@ -31,7 +31,7 @@ As a security measure to prevent this scenario, you can block access to and from
3131
3232
- Collect the following information:
3333

34-
- The tenant ID for your Azure AD tenant.
34+
- The tenant ID for your Microsoft Entra tenant.
3535

3636
- The choice whether to enforce two-way tenant isolation for connections that don't have a client tenant ID.
3737

@@ -47,7 +47,7 @@ As a security measure to prevent this scenario, you can block access to and from
4747

4848
- The choice whether to allow outbound connections from your tenant to each allowed tenant.
4949

50-
- To test the tenant isolation policy, you need a second Azure AD tenant. From this tenant, you'll try connecting to and from the isolated tenant after the isolation policy takes effect.
50+
- To test the tenant isolation policy, you need a second Microsoft Entra tenant. From this tenant, you'll try connecting to and from the isolated tenant after the isolation policy takes effect.
5151

5252
## Request an isolation policy for your tenant
5353

@@ -68,7 +68,7 @@ After the policy takes effect in a region, test the policy. You can try immediat
6868

6969
### Test inbound connections to your tenant
7070

71-
1. Sign in to your "other" Azure AD tenant.
71+
1. Sign in to your "other" Microsoft Entra tenant.
7272

7373
1. Create logic app workflow with a connection, such as Office 365 Outlook.
7474

articles/logic-apps/block-connections-connectors.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -286,7 +286,7 @@ For more information about Azure Policy definitions, see these topics:
286286

287287
## Create policy assignment
288288

289-
Next, you need to assign the policy definition where you want to enforce the policy, for example, to a single resource group, multiple resource groups, Azure Active Directory (Azure AD) tenant, or Azure subscription. For this task, follow these steps to create a policy assignment:
289+
Next, you need to assign the policy definition where you want to enforce the policy, for example, to a single resource group, multiple resource groups, Microsoft Entra tenant, or Azure subscription. For this task, follow these steps to create a policy assignment:
290290

291291
1. In the [Azure portal](https://portal.azure.com), portal search box, enter **policy**, and select **Policy**.
292292

0 commit comments

Comments
 (0)