Skip to content

Commit cb1e47c

Browse files
Merge pull request #313863 from MicrosoftDocs/main
Auto Publish – main to live - 2026-03-30 11:00 UTC
2 parents 5a354fd + 00a701e commit cb1e47c

14 files changed

Lines changed: 244 additions & 33 deletions

articles/app-service/app-service-hybrid-connections.md

Lines changed: 22 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -296,7 +296,7 @@ After you edit the configuration file, restart the Hybrid Connection Manager ser
296296
- **Windows**: Restart the service through **Services** from the **Start Menu**.
297297
- **Linux**: Run `systemctl restart hybridconnectionmanager.service`.
298298
299-
Configuring a proxy server routes requests from the Hybrid Connection Manager through the selected proxy server before reaching the destination. Ensure your proxy server supports HTTP/HTTPS traffic so that the Hybrid Connection Manager can communicate with the Azure Relay Service.
299+
Configuring a proxy server routes requests from the Hybrid Connection Manager through the selected proxy server before reaching the destination. Ensure your proxy server supports HTTP/HTTPS and WebSocket traffic over port 443 so that the Hybrid Connection Manager can communicate with Azure Relay. If your proxy supports DNS allowlisting, allow `*.servicebus.windows.net`. If you can't use a wildcard, allow the specific Relay namespace hostname and the gateway hostnames for that namespace.
300300

301301
> [!NOTE]
302302
> All addresses set in `appsettings.json` (`ProxyAddress`, `BypassList`) should be in RegEx format if not an exact match.
@@ -387,7 +387,7 @@ The status of **Connected** means that at least one Hybrid Connection Manager is
387387
- Does your host have outbound access to Azure on port 443? You can test from your Hybrid Connection Manager host using the PowerShell command `Test-NetConnection Destination -P Port`.
388388
- Is your Hybrid Connection Manager potentially in a bad state? Try restarting the **Azure Hybrid Connection Manager Service** local service.
389389
- Do you have conflicting software installed? Hybrid Connection Manager can't coexist with Biztalk Hybrid Connection Manager or Service Bus for Windows Server. When you install the Hybrid Connection Manager, you should remove any versions of these packages first.
390-
- Do you have a firewall between your Hybrid Connection Manager host and Azure? If so, you need to allow outbound access to both the Service Bus endpoint URL *AND* the Service Bus gateways that service your Hybrid Connection.
390+
- Do you have a firewall between your Hybrid Connection Manager host and Azure? If so, allow outbound HTTPS and WebSocket traffic over port 443. If your firewall supports DNS allowlisting, allow `*.servicebus.windows.net`, which is the preferred configuration. If you can't use a wildcard, allow the Relay namespace hostname and the gateway hostnames for that namespace. IP allowlists aren't recommended because the Relay gateway IP addresses can change.
391391
392392
- You can find the Service Bus endpoint URL in the Hybrid Connection Manager GUI.
393393
@@ -397,31 +397,33 @@ The status of **Connected** means that at least one Hybrid Connection Manager is
397397
398398
:::image type="content" source="media/app-service-hybrid-connections/hybrid-connections-service-bus-endpoint-cli.png" alt-text="Screenshot of Hybrid Connection Service Bus endpoint in the CLI.":::
399399
400-
- The Service Bus gateways are the resources that accept the request into the Hybrid Connection and pass it through the Azure Relay. You need to allow list all of the gateways. The gateways are in the format: `G#-prod-[stamp]-sb.servicebus.windows.net` and `GV#-prod-[stamp]-sb.servicebus.windows.net`. The number sign, `#`, is a number between 0 and 127 and `stamp` is the name of the instance within your Azure data center where your Service Bus endpoint exists.
400+
- The Service Bus gateways are the resources that accept the request into the Hybrid Connection and pass it through Azure Relay. The gateway hostnames are in the format `G#-prod-[stamp]-sb.servicebus.windows.net` and `GV#-prod-[stamp]-sb.servicebus.windows.net`. The number sign, `#`, is a number between 0 and 127 and `stamp` is the name of the instance within your Azure datacenter where your Service Bus endpoint exists.
401401
402-
- If you can use a wildcard, you can allow list *\*.servicebus.windows.net*.
403-
- If you can't use a wildcard, you must allow list all 256 of the gateways.
402+
- If your firewall or proxy supports DNS allowlisting, allow `*.servicebus.windows.net`. This approach is simpler to maintain and avoids relying on changing IP addresses.
403+
- If your firewall or proxy doesn't support wildcard DNS rules, allow the namespace hostname shown in the Hybrid Connection Manager and all gateway hostnames for that namespace. Use hostnames, not IP addresses.
404404

405405
You can find out the stamp using *nslookup* on the Service Bus endpoint URL.
406406

407407
:::image type="content" source="media/app-service-hybrid-connections/hybrid-connections-stamp-name.png" alt-text="Screenshot of terminal showing where to find the stamp name for the Service Bus.":::
408408

409-
In this example, the stamp is `sn3-010`. To allow list the Service Bus gateways, you need the following entries:
410-
411-
G0-prod-sn3-010-sb.servicebus.windows.net
412-
G1-prod-sn3-010-sb.servicebus.windows.net
413-
G2-prod-sn3-010-sb.servicebus.windows.net
414-
G3-prod-sn3-010-sb.servicebus.windows.net
415-
...
416-
G126-prod-sn3-010-sb.servicebus.windows.net
417-
G127-prod-sn3-010-sb.servicebus.windows.net
418-
GV0-prod-sn3-010-sb.servicebus.windows.net
419-
GV1-prod-sn3-010-sb.servicebus.windows.net
420-
GV2-prod-sn3-010-sb.servicebus.windows.net
421-
GV3-prod-sn3-010-sb.servicebus.windows.net
422-
...
423-
GV126-prod-sn3-010-sb.servicebus.windows.net
409+
In this example, the stamp is `sn3-010`. If you need namespace-specific DNS rules instead of `*.servicebus.windows.net`, allow the namespace hostname and the following gateway hostnames:
410+
411+
```text
412+
G0-prod-sn3-010-sb.servicebus.windows.net
413+
G1-prod-sn3-010-sb.servicebus.windows.net
414+
G2-prod-sn3-010-sb.servicebus.windows.net
415+
G3-prod-sn3-010-sb.servicebus.windows.net
416+
...
417+
G126-prod-sn3-010-sb.servicebus.windows.net
418+
G127-prod-sn3-010-sb.servicebus.windows.net
419+
GV0-prod-sn3-010-sb.servicebus.windows.net
420+
GV1-prod-sn3-010-sb.servicebus.windows.net
421+
GV2-prod-sn3-010-sb.servicebus.windows.net
422+
GV3-prod-sn3-010-sb.servicebus.windows.net
423+
...
424+
GV126-prod-sn3-010-sb.servicebus.windows.net
424425
GV127-prod-sn3-010-sb.servicebus.windows.net
426+
```
425427

426428
If your status says **Connected** but your app can't reach your endpoint then:
427429

articles/app-service/configure-authentication-provider-aad.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,6 +80,8 @@ To use an existing registration, select either:
8080

8181
You can also configure the application to [use an identity instead of a client secret][fic-config]. Support for using an identity is currently in preview.
8282
- **Issuer URL**. This URL takes the form `<authentication-endpoint>/<tenant-id>/v2.0`. Replace `<authentication-endpoint>` with the authentication endpoint [value that's specific to the cloud environment](/entra/identity-platform/authentication-national-cloud#azure-ad-authentication-endpoints). For example, a workforce tenant in global Azure would use `https://login.microsoftonline.com` as its authentication endpoint.
83+
84+
You can find this value in the Microsoft Entra admin center. Go to **App registrations**, select your app, and then select **Endpoints**. Copy the **OpenID Connect metadata document** endpoint for your tenant, and then remove `/.well-known/openid-configuration` from the end of the URL. For example, if the metadata endpoint is `https://login.microsoftonline.com/<tenant-id>/v2.0/.well-known/openid-configuration`, use `https://login.microsoftonline.com/<tenant-id>/v2.0` as the issuer URL.
8385

8486
> [!NOTE]
8587
> If you created your identity provider using the express setup (Option 1), the issuer URL is automatically set to use the legacy `https://sts.windows.net` endpoint. To align with current Microsoft Entra ID best practices, edit your identity provider and update the issuer URL to use `https://login.microsoftonline.com/<tenant-id>/v2.0` instead.
@@ -169,7 +171,7 @@ To use an existing registration, select **Provide the details of an existing app
169171

170172
- **Application (client) ID**
171173
- **Client secret**
172-
- **Issuer URL**
174+
- **Issuer URL**. In the Microsoft Entra admin center, go to **App registrations**, select your app, and then select **Endpoints**. Copy the **OpenID Connect metadata document** endpoint for your tenant, and then remove `/.well-known/openid-configuration` from the end of the URL. For example, if the metadata endpoint is `https://login.microsoftonline.com/<tenant-id>/v2.0/.well-known/openid-configuration`, use `https://login.microsoftonline.com/<tenant-id>/v2.0` as the issuer URL.
173175

174176
If you need to manually create an app registration in an external tenant, see [Register an app in your external tenant](/entra/external-id/customers/how-to-register-ciam-app?tabs=webapp#register-your-web-app).
175177

@@ -219,6 +221,8 @@ For **Tenant requirement**, choose whether to:
219221
- Allow requests from specific tenants.
220222
- Use default restrictions based on the app registration's tenant.
221223

224+
For **Allowed token audiences**, add any audience values that your app should accept in the `aud` claim of incoming access tokens. You commonly need this setting when clients request tokens by using the app registration's **Application ID URI**, such as `api://<application-client-id>` or a custom URI like `https://contoso.com/api`. The app registration's client ID is already accepted by default, so you typically add values here only if your app accepts another audience format.
225+
222226
Your app might still need to make other authorization decisions in code. For more information, see [Use a built-in authorization policy](#use-a-built-in-authorization-policy) later in this article.
223227

224228
## Configure authentication settings

articles/databox/data-box-deploy-ordered.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -221,9 +221,6 @@ For detailed information on how to sign in to Azure using Windows PowerShell, se
221221

222222
## Order Data Box
223223

224-
> [!NOTE]
225-
> Azure Data Box currently does not support Azure Files Provisioned v2 Storage Accounts. For on-premises to Azure migration scenarios, you can explore [Azure Storage Mover](/azure/storage-mover/service-overview).
226-
227224
To order a device, perform the following steps:
228225

229226
# [Portal](#tab/portal)

articles/databox/data-box-security.md

Lines changed: 35 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -144,16 +144,44 @@ The following security guidelines are implemented in Data Box:
144144

145145
## Secure erase media sanitization details
146146

147-
The secure erasure process performed on our devices is compliant with [NIST SP 800-88r1](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-88r1.pdf) and following are the details of the implementation:
147+
The secure erasure process performed on our devices is compliant with [NIST SP 800-88 Revision 2](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-88r2.pdf). Customers also receive a Secure Erasure Certificate which is auto-generated as part of the cleanup process and is available directly from the Azure portal once the order is completed. The certificate is downloadable and confirms all data on the device has been securely erased along with the implementation details required by NIST standards, thus enhancing security assurance and simplifying compliance for highly regulated and sensitive scenarios.
148+
The table below covers the details of the implementation:
148149

149150
|Device |Data Erasure type |Tool used |
150151
|----------------|------------|-------------|
151-
|Azure Data Box | In Public cloud: Crypto Erase <br> In Gov cloud: Crypto Erase + Disk overwrite |ARCCONF tool |
152-
|Azure Data Box 120 | In Public and Gov cloud: Block Erase |ARCCONF tool |
153-
|Azure Data Box 525 | In Public and Gov cloud: Block Erase |ARCCONF tool |
154-
|Azure Data Box Disk | In Public and Gov cloud: Block Erase |MSECLI tool |
155-
156-
152+
|Azure Data Box 120 | Block Erase |ARCCONF 4.17.00 tool |
153+
|Azure Data Box 525 | Block Erase |ARCCONF 4.17.00 tool |
154+
|Azure Data Box Disk |Block Erase |MSECLI tool |
155+
156+
Below is a sample certificate for a Data Box 120 device:
157+
```Sample Secure Erasure Certificate
158+
Microsoft Azure Data Box Certificate of Erasure
159+
SubscriptionName: <>
160+
ResourceGroupName: <>
161+
JobName: <>
162+
{
163+
"MediaInformation": {
164+
"Model": "Azure Data Box 120",
165+
“Manufacturer”:XXXXX
166+
"SerialNumber": "XXXXXXX",
167+
"Disks": ["ABC1", "ABC2"],
168+
"MediaType": "Flash Memory SSDs",
169+
"DataBackedUp": "No backup created before erasure"
170+
}
171+
"SanitizationDetails": {
172+
"ErasureMethodType": "NIST 800-88 Purge",
173+
"MethodUsed": "Block Erase",
174+
"ToolsUsed": "ARCCONF tool",
175+
"Verification Methods": "Random 10% sampling + Secondary 2% Sampling"
176+
}
177+
"MediaDestination": "Azure Inventory"
178+
"Signature": {
179+
"Details": "We hereby state that the data erasure and validation process has been carried out in accordance with the NIST 800-88r2 standards. ",
180+
"SanitizedBy": "Azure Data Box team",
181+
"Date": "YYYY-MM-DD HH:MM:SS"
182+
}
183+
}
184+
```
157185
## Next steps
158186

159187
- Review the [Data Box requirements](data-box-system-requirements.md).

articles/iot-operations/discover-manage-assets/overview-opc-ua-connector.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ The connector for OPC UA supports the following features as part of Azure IoT Op
4343
| Feature | Supported | Notes |
4444
|---------|:---------:|-------|
4545
| Username/password authentication | Yes | |
46-
| X.509 client certificates | No | |
46+
| X.509 client certificates | Yes | |
4747
| Anonymous access | Yes | For testing purposes |
4848
| Certificate trust list | Yes | For secure, encrypted OPC UA connections |
4949
| OpenTelemetry integration | Yes | |
Lines changed: 79 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,79 @@
1+
---
2+
title: Build an Azure Migrate Report
3+
description: Build Azure Migrate reports to analyze discovered on-premises servers and workloads and generate insights for migration planning.
4+
author: habibaum
5+
ms.author: v-uhabiba
6+
ms.topic: how-to
7+
ms.service: azure-migrate
8+
ms.date: 03/25/2026
9+
monikerRange:
10+
# Customer intent: As an IT administrator managing migration resources, I want to tag workloads with relevant attributes, so that I can enhance resource organization and visibility during the migration process.
11+
---
12+
13+
# Build a report (preview)
14+
15+
This article explains how to build a report (preview) for on‑premises servers and workloads by using Azure Migrate. After completing this article, you’ll be able to generate a report by selecting the appropriate report type, migration preferences, and configuration options in an Azure Migrate project.
16+
17+
In this article, you’ll learn how to:
18+
19+
- Create a report on Azure Migrate.
20+
- Select the appropriate report type, migration preferences, and configuration options.
21+
- Generate the report to review insights about your discovered servers and workloads.
22+
- After completing this section, you can generate migration and modernization reports.
23+
24+
## Prerequisites
25+
26+
Before you build a report, ensure the following:
27+
28+
- You’ve created an Azure Migrate project. You can use an existing project if it is available.
29+
After the project is created, the Azure Migrate: Discovery and assessment tool is automatically added.
30+
- You’ve discovered your IT estate using one of the supported discovery sources for your scenario.
31+
- All discovery errors are resolved.
32+
33+
### Recommendation
34+
35+
To improve the report accuracy, we recommend the following actions:
36+
37+
- Enrich your data by defining the environment, migration intent, and application.
38+
- Define environment and migration for your [workloads to enrich your data](resource-tagging.md).
39+
- Specify [associated applications](define-manage-applications.md).
40+
- Enable application auto‑discovery and review the [discovered applications](resource-tagging.md) for accuracy.
41+
42+
## Build report
43+
44+
To build a report, follow these steps:
45+
46+
1. From **All projects**, select your project.
47+
48+
:::image type="content" source="./media/how-to-build-a-report/migrate-projects.png" alt-text="The screenshot shows how to select your project from the Migrate projects." lightbox="./media/how-to-build-a-report/migrate-projects.png":::
49+
50+
1. On the left pane go to **Manage**, and then select **Reports** (Preview).
51+
52+
:::image type="content" source="./media/how-to-build-a-report/manage-section.png" alt-text="The screenshot shows how to access and select reports." lightbox="./media/how-to-build-a-report/manage-section.png":::
53+
54+
1. On the **Generate Report** page, do the following:
55+
1. **Name**: Enter a name for the report. The report name must be unique within the project.
56+
57+
:::image type="content" source="./media/how-to-build-a-report/generate-report.png" alt-text="The screenshot shows how to generate report." lightbox="./media/how-to-build-a-report/generate-report.png":::
58+
59+
1. **Type**: Select the report type to generate. For more information, see the [supported report types](reports-overview.md#types-of-reports).
60+
1. **Migration preference**: Select the required migration preference. For more information, see [migration preferences](reports-overview.md#migration-preferences-in-azure-migrate-reports).
61+
1. **Configuration**: Choose the required configuration to generate the report. For more information, see [report configuration](reports-overview.md#report-configuration).
62+
1. Review your selections, and then select **Build report**.
63+
64+
1. Creating a report by using configurations from an existing assessment takes approximately 15 minutes. Creating a report by defining configurations from scratch takes approximately 1 hour.
65+
66+
### Download the report
67+
68+
To download a report, follow these steps:
69+
70+
1. Go to the **Reports** section to view the list of reports created so far.
71+
1. For the report you want to download, select **Download**.
72+
73+
:::image type="content" source="./media/how-to-build-a-report/download-report.png" alt-text="The screenshot shows how to download report." lightbox="./media/how-to-build-a-report/download-report.png":::
74+
75+
1. Select the required report type, and then select **Download**.
76+
77+
:::image type="content" source="./media/how-to-build-a-report/report-types.png" alt-text="The screenshot shows how to select the report types and download." lightbox="./media/how-to-build-a-report/report-types.png":::
78+
79+
38.7 KB
Loading
86.9 KB
Loading
223 KB
Loading
77.1 KB
Loading

0 commit comments

Comments
 (0)