You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/app-service-hybrid-connections.md
+22-20Lines changed: 22 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -296,7 +296,7 @@ After you edit the configuration file, restart the Hybrid Connection Manager ser
296
296
- **Windows**: Restart the service through **Services** from the **Start Menu**.
297
297
- **Linux**: Run `systemctl restart hybridconnectionmanager.service`.
298
298
299
-
Configuring a proxy server routes requests from the Hybrid Connection Manager through the selected proxy server before reaching the destination. Ensure your proxy server supports HTTP/HTTPS traffic so that the Hybrid Connection Manager can communicate with the Azure Relay Service.
299
+
Configuring a proxy server routes requests from the Hybrid Connection Manager through the selected proxy server before reaching the destination. Ensure your proxy server supports HTTP/HTTPS and WebSocket traffic over port 443 so that the Hybrid Connection Manager can communicate with Azure Relay. If your proxy supports DNS allowlisting, allow `*.servicebus.windows.net`. If you can't use a wildcard, allow the specific Relay namespace hostname and the gateway hostnames for that namespace.
300
300
301
301
> [!NOTE]
302
302
> All addresses setin`appsettings.json` (`ProxyAddress`, `BypassList`) should be in RegEx format if not an exact match.
@@ -387,7 +387,7 @@ The status of **Connected** means that at least one Hybrid Connection Manager is
387
387
- Does your host have outbound access to Azure on port 443? You can test from your Hybrid Connection Manager host using the PowerShell command`Test-NetConnection Destination -P Port`.
388
388
- Is your Hybrid Connection Manager potentially in a bad state? Try restarting the **Azure Hybrid Connection Manager Service**local service.
389
389
- Do you have conflicting software installed? Hybrid Connection Manager can't coexist with Biztalk Hybrid Connection Manager or Service Bus for Windows Server. When you install the Hybrid Connection Manager, you should remove any versions of these packages first.
390
-
- Do you have a firewall between your Hybrid Connection Manager host and Azure? If so, you need to allow outbound access to both the Service Bus endpoint URL *AND* the Service Bus gateways that service your Hybrid Connection.
390
+
- Do you have a firewall between your Hybrid Connection Manager host and Azure? If so, allow outbound HTTPS and WebSocket traffic over port 443. If your firewall supports DNS allowlisting, allow `*.servicebus.windows.net`, which is the preferred configuration. If you can't use a wildcard, allow the Relay namespace hostname and the gateway hostnames forthat namespace. IP allowlists aren't recommended because the Relay gateway IP addresses can change.
391
391
392
392
- You can find the Service Bus endpoint URL in the Hybrid Connection Manager GUI.
393
393
@@ -397,31 +397,33 @@ The status of **Connected** means that at least one Hybrid Connection Manager is
397
397
398
398
:::image type="content" source="media/app-service-hybrid-connections/hybrid-connections-service-bus-endpoint-cli.png" alt-text="Screenshot of Hybrid Connection Service Bus endpoint in the CLI.":::
399
399
400
-
- The Service Bus gateways are the resources that accept the request into the Hybrid Connection and pass it through the Azure Relay. You need to allow list all of the gateways. The gateways are in the format: `G#-prod-[stamp]-sb.servicebus.windows.net` and `GV#-prod-[stamp]-sb.servicebus.windows.net`. The number sign, `#`, is a number between 0 and 127 and `stamp` is the name of the instance within your Azure data center where your Service Bus endpoint exists.
400
+
- The Service Bus gateways are the resources that accept the request into the Hybrid Connection and pass it through Azure Relay. The gateway hostnames are in the format `G#-prod-[stamp]-sb.servicebus.windows.net` and `GV#-prod-[stamp]-sb.servicebus.windows.net`. The number sign, `#`, is a number between 0 and 127 and `stamp` is the name of the instance within your Azure datacenter where your Service Bus endpoint exists.
401
401
402
-
- If you can use a wildcard, you can allow list *\*.servicebus.windows.net*.
403
-
- If you can't use a wildcard, you must allow list all 256 of the gateways.
402
+
- If your firewall or proxy supports DNS allowlisting, allow `*.servicebus.windows.net`. This approach is simpler to maintain and avoids relying on changing IP addresses.
403
+
- If your firewall or proxy doesn't support wildcard DNS rules, allow the namespace hostname shown inthe Hybrid Connection Manager and all gateway hostnames for that namespace. Use hostnames, not IP addresses.
404
404
405
405
You can find out the stamp using *nslookup* on the Service Bus endpoint URL.
406
406
407
407
:::image type="content" source="media/app-service-hybrid-connections/hybrid-connections-stamp-name.png" alt-text="Screenshot of terminal showing where to find the stamp name for the Service Bus.":::
408
408
409
-
In this example, the stamp is `sn3-010`. To allow list the Service Bus gateways, you need the following entries:
410
-
411
-
G0-prod-sn3-010-sb.servicebus.windows.net
412
-
G1-prod-sn3-010-sb.servicebus.windows.net
413
-
G2-prod-sn3-010-sb.servicebus.windows.net
414
-
G3-prod-sn3-010-sb.servicebus.windows.net
415
-
...
416
-
G126-prod-sn3-010-sb.servicebus.windows.net
417
-
G127-prod-sn3-010-sb.servicebus.windows.net
418
-
GV0-prod-sn3-010-sb.servicebus.windows.net
419
-
GV1-prod-sn3-010-sb.servicebus.windows.net
420
-
GV2-prod-sn3-010-sb.servicebus.windows.net
421
-
GV3-prod-sn3-010-sb.servicebus.windows.net
422
-
...
423
-
GV126-prod-sn3-010-sb.servicebus.windows.net
409
+
In this example, the stamp is `sn3-010`. If you need namespace-specific DNS rules instead of `*.servicebus.windows.net`, allow the namespace hostname and the following gateway hostnames:
410
+
411
+
```text
412
+
G0-prod-sn3-010-sb.servicebus.windows.net
413
+
G1-prod-sn3-010-sb.servicebus.windows.net
414
+
G2-prod-sn3-010-sb.servicebus.windows.net
415
+
G3-prod-sn3-010-sb.servicebus.windows.net
416
+
...
417
+
G126-prod-sn3-010-sb.servicebus.windows.net
418
+
G127-prod-sn3-010-sb.servicebus.windows.net
419
+
GV0-prod-sn3-010-sb.servicebus.windows.net
420
+
GV1-prod-sn3-010-sb.servicebus.windows.net
421
+
GV2-prod-sn3-010-sb.servicebus.windows.net
422
+
GV3-prod-sn3-010-sb.servicebus.windows.net
423
+
...
424
+
GV126-prod-sn3-010-sb.servicebus.windows.net
424
425
GV127-prod-sn3-010-sb.servicebus.windows.net
426
+
```
425
427
426
428
If your status says **Connected** but your app can't reach your endpoint then:
Copy file name to clipboardExpand all lines: articles/app-service/configure-authentication-provider-aad.md
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -80,6 +80,8 @@ To use an existing registration, select either:
80
80
81
81
You can also configure the application to [use an identity instead of a client secret][fic-config]. Support for using an identity is currently in preview.
82
82
-**Issuer URL**. This URL takes the form `<authentication-endpoint>/<tenant-id>/v2.0`. Replace `<authentication-endpoint>` with the authentication endpoint [value that's specific to the cloud environment](/entra/identity-platform/authentication-national-cloud#azure-ad-authentication-endpoints). For example, a workforce tenant in global Azure would use `https://login.microsoftonline.com` as its authentication endpoint.
83
+
84
+
You can find this value in the Microsoft Entra admin center. Go to **App registrations**, select your app, and then select **Endpoints**. Copy the **OpenID Connect metadata document** endpoint for your tenant, and then remove `/.well-known/openid-configuration` from the end of the URL. For example, if the metadata endpoint is `https://login.microsoftonline.com/<tenant-id>/v2.0/.well-known/openid-configuration`, use `https://login.microsoftonline.com/<tenant-id>/v2.0` as the issuer URL.
83
85
84
86
> [!NOTE]
85
87
> If you created your identity provider using the express setup (Option 1), the issuer URL is automatically set to use the legacy `https://sts.windows.net` endpoint. To align with current Microsoft Entra ID best practices, edit your identity provider and update the issuer URL to use `https://login.microsoftonline.com/<tenant-id>/v2.0` instead.
@@ -169,7 +171,7 @@ To use an existing registration, select **Provide the details of an existing app
169
171
170
172
-**Application (client) ID**
171
173
-**Client secret**
172
-
-**Issuer URL**
174
+
-**Issuer URL**. In the Microsoft Entra admin center, go to **App registrations**, select your app, and then select **Endpoints**. Copy the **OpenID Connect metadata document** endpoint for your tenant, and then remove `/.well-known/openid-configuration` from the end of the URL. For example, if the metadata endpoint is `https://login.microsoftonline.com/<tenant-id>/v2.0/.well-known/openid-configuration`, use `https://login.microsoftonline.com/<tenant-id>/v2.0` as the issuer URL.
173
175
174
176
If you need to manually create an app registration in an external tenant, see [Register an app in your external tenant](/entra/external-id/customers/how-to-register-ciam-app?tabs=webapp#register-your-web-app).
175
177
@@ -219,6 +221,8 @@ For **Tenant requirement**, choose whether to:
219
221
- Allow requests from specific tenants.
220
222
- Use default restrictions based on the app registration's tenant.
221
223
224
+
For **Allowed token audiences**, add any audience values that your app should accept in the `aud` claim of incoming access tokens. You commonly need this setting when clients request tokens by using the app registration's **Application ID URI**, such as `api://<application-client-id>` or a custom URI like `https://contoso.com/api`. The app registration's client ID is already accepted by default, so you typically add values here only if your app accepts another audience format.
225
+
222
226
Your app might still need to make other authorization decisions in code. For more information, see [Use a built-in authorization policy](#use-a-built-in-authorization-policy) later in this article.
Copy file name to clipboardExpand all lines: articles/databox/data-box-deploy-ordered.md
-3Lines changed: 0 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -221,9 +221,6 @@ For detailed information on how to sign in to Azure using Windows PowerShell, se
221
221
222
222
## Order Data Box
223
223
224
-
> [!NOTE]
225
-
> Azure Data Box currently does not support Azure Files Provisioned v2 Storage Accounts. For on-premises to Azure migration scenarios, you can explore [Azure Storage Mover](/azure/storage-mover/service-overview).
Copy file name to clipboardExpand all lines: articles/databox/data-box-security.md
+35-7Lines changed: 35 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -144,16 +144,44 @@ The following security guidelines are implemented in Data Box:
144
144
145
145
## Secure erase media sanitization details
146
146
147
-
The secure erasure process performed on our devices is compliant with [NIST SP 800-88r1](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-88r1.pdf) and following are the details of the implementation:
147
+
The secure erasure process performed on our devices is compliant with [NIST SP 800-88 Revision 2](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-88r2.pdf). Customers also receive a Secure Erasure Certificate which is auto-generated as part of the cleanup process and is available directly from the Azure portal once the order is completed. The certificate is downloadable and confirms all data on the device has been securely erased along with the implementation details required by NIST standards, thus enhancing security assurance and simplifying compliance for highly regulated and sensitive scenarios.
148
+
The table below covers the details of the implementation:
148
149
149
150
|Device |Data Erasure type |Tool used |
150
151
|----------------|------------|-------------|
151
-
|Azure Data Box | In Public cloud: Crypto Erase <br> In Gov cloud: Crypto Erase + Disk overwrite |ARCCONF tool |
152
-
|Azure Data Box 120 | In Public and Gov cloud: Block Erase |ARCCONF tool |
153
-
|Azure Data Box 525 | In Public and Gov cloud: Block Erase |ARCCONF tool |
154
-
|Azure Data Box Disk | In Public and Gov cloud: Block Erase |MSECLI tool |
description: Build Azure Migrate reports to analyze discovered on-premises servers and workloads and generate insights for migration planning.
4
+
author: habibaum
5
+
ms.author: v-uhabiba
6
+
ms.topic: how-to
7
+
ms.service: azure-migrate
8
+
ms.date: 03/25/2026
9
+
monikerRange:
10
+
# Customer intent: As an IT administrator managing migration resources, I want to tag workloads with relevant attributes, so that I can enhance resource organization and visibility during the migration process.
11
+
---
12
+
13
+
# Build a report (preview)
14
+
15
+
This article explains how to build a report (preview) for on‑premises servers and workloads by using Azure Migrate. After completing this article, you’ll be able to generate a report by selecting the appropriate report type, migration preferences, and configuration options in an Azure Migrate project.
16
+
17
+
In this article, you’ll learn how to:
18
+
19
+
- Create a report on Azure Migrate.
20
+
- Select the appropriate report type, migration preferences, and configuration options.
21
+
- Generate the report to review insights about your discovered servers and workloads.
22
+
- After completing this section, you can generate migration and modernization reports.
23
+
24
+
## Prerequisites
25
+
26
+
Before you build a report, ensure the following:
27
+
28
+
- You’ve created an Azure Migrate project. You can use an existing project if it is available.
29
+
After the project is created, the Azure Migrate: Discovery and assessment tool is automatically added.
30
+
- You’ve discovered your IT estate using one of the supported discovery sources for your scenario.
31
+
- All discovery errors are resolved.
32
+
33
+
### Recommendation
34
+
35
+
To improve the report accuracy, we recommend the following actions:
36
+
37
+
- Enrich your data by defining the environment, migration intent, and application.
38
+
- Define environment and migration for your [workloads to enrich your data](resource-tagging.md).
- Enable application auto‑discovery and review the [discovered applications](resource-tagging.md) for accuracy.
41
+
42
+
## Build report
43
+
44
+
To build a report, follow these steps:
45
+
46
+
1. From **All projects**, select your project.
47
+
48
+
:::image type="content" source="./media/how-to-build-a-report/migrate-projects.png" alt-text="The screenshot shows how to select your project from the Migrate projects." lightbox="./media/how-to-build-a-report/migrate-projects.png":::
49
+
50
+
1. On the left pane go to **Manage**, and then select **Reports** (Preview).
51
+
52
+
:::image type="content" source="./media/how-to-build-a-report/manage-section.png" alt-text="The screenshot shows how to access and select reports." lightbox="./media/how-to-build-a-report/manage-section.png":::
53
+
54
+
1. On the **Generate Report** page, do the following:
55
+
1.**Name**: Enter a name for the report. The report name must be unique within the project.
56
+
57
+
:::image type="content" source="./media/how-to-build-a-report/generate-report.png" alt-text="The screenshot shows how to generate report." lightbox="./media/how-to-build-a-report/generate-report.png":::
58
+
59
+
1.**Type**: Select the report type to generate. For more information, see the [supported report types](reports-overview.md#types-of-reports).
60
+
1.**Migration preference**: Select the required migration preference. For more information, see [migration preferences](reports-overview.md#migration-preferences-in-azure-migrate-reports).
61
+
1.**Configuration**: Choose the required configuration to generate the report. For more information, see [report configuration](reports-overview.md#report-configuration).
62
+
1. Review your selections, and then select **Build report**.
63
+
64
+
1. Creating a report by using configurations from an existing assessment takes approximately 15 minutes. Creating a report by defining configurations from scratch takes approximately 1 hour.
65
+
66
+
### Download the report
67
+
68
+
To download a report, follow these steps:
69
+
70
+
1. Go to the **Reports** section to view the list of reports created so far.
71
+
1. For the report you want to download, select **Download**.
72
+
73
+
:::image type="content" source="./media/how-to-build-a-report/download-report.png" alt-text="The screenshot shows how to download report." lightbox="./media/how-to-build-a-report/download-report.png":::
74
+
75
+
1. Select the required report type, and then select **Download**.
76
+
77
+
:::image type="content" source="./media/how-to-build-a-report/report-types.png" alt-text="The screenshot shows how to select the report types and download." lightbox="./media/how-to-build-a-report/report-types.png":::
0 commit comments