Skip to content

Commit 91dfa56

Browse files
committed
updates per mtg with KK
1 parent a5badde commit 91dfa56

File tree

9 files changed

+31
-67
lines changed

9 files changed

+31
-67
lines changed

docs/guides/integration-javascript-client-server.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -124,8 +124,6 @@ Based on the status and availability of a valid identity, the SDK does the follo
124124
1. Stores identity information in [local storage or a first-party cookie](../sdks/sdk-ref-javascript.md#uid2-storage-format).
125125
1. Uses the identity information to initiate requests for targeted advertising.
126126

127-
<!-- (**GWH_TODO. Q: Not sure about the relationship between the steps above and the table below. And the diagram 2-a which says "the publisher calls the SSP for ads using the UID2 token". A: Diagram needs to be updated.**) -->
128-
129127
The bidding step is shown in the following table.
130128

131129
| Step | Endpoint/SDK | Description |

docs/intro.md

Lines changed: 2 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ The UID2 framework has the following principles as its foundation:
3232

3333
- **Consumer control**: Consumers can opt out of UID2 at any time through the [Transparency and Control Portal](https://www.transparentadvertising.com/).
3434

35-
### Technical Design Principles
35+
## Technical Design Principles
3636

3737
The UID2 framework is built on the following technical principles:
3838

@@ -48,17 +48,13 @@ The UID2 framework is built on the following technical principles:
4848

4949
## Elements of the UID2 Infrastructure
5050

51-
For information about key elements of the UID2 infrastructure, refer to the following pages:
51+
For information about key elements of the UID2 infrastructure, and other aspects of UID2, refer to the following pages:
5252

5353
- [UID2 Identifier Types](ref-info/uid-identifier-types.md)
5454
- [UID2 Components](ref-info/uid-components.md)
5555
- [UID2 Participants](overviews/participants-overview.md)
5656
- [Workflows](ref-info/uid-workflows.md)
5757

58-
## Components
59-
60-
For details, see [UID2 Component Services](overviews/participants-overview.md#uid2-component-services).
61-
6258
## FAQs
6359

6460
See [Frequently Asked Questions](getting-started/gs-faqs.md).

docs/overviews/participants-overview.md

Lines changed: 7 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -31,14 +31,14 @@ For a diagram of how the different services work together, see [UID2 Workflows](
3131

3232
## UID2 External Participants
3333

34-
The following table summarizes the main types of external participant partners for UID2.
34+
The following table summarizes the main types of external participant partners for UID2, with a link to the overview page for more information on each participant type.
3535

36-
| Participant | Role Description | Link to Overview Page |
37-
| :--- | :--- | :--- |
38-
| **Publishers** | Organizations that propagate UID2 tokens to the bidstream via SSPs—for example, identity providers, publishers, and SSO providers. Publishers can choose to work with an SSO provider or an independent ID provider that is interoperable with UID2. Independent ID providers can handle the UID2 integration on behalf of publishers. | [UID2 Overview for Publishers](overview-publishers.md) |
39-
| **Advertisers** | Organizations that buy impressions across a range of publisher sites and use DSPs to decide which ad impressions to purchase and how much to bid on them. | [UID2 Overview for Advertisers](overview-advertisers.md) |
40-
| **DSPs** | DSPs integrate with the UID2 system to receive UID2s from advertisers (as first-party data) and third-party data providers (as third-party data) and leverage them to inform bidding on UID2s in the bidstream. | [UID2 Overview for DSPs](overview-dsps.md) |
41-
| **Data Providers** | Organizations that collect user data and push it to other UID2 participants&#8212;for example, advertisers, identity graph providers, and third-party data providers. | [UID2 Overview for Data Providers](overview-data-providers.md) |
36+
| Participant Type | Role Description |
37+
| :--- | :--- |
38+
| [Publishers](overview-publishers.md) | Organizations that propagate UID2 tokens to the bidstream via SSPs—for example, identity providers, publishers, and SSO providers. Publishers can choose to work with an SSO provider or an independent ID provider that is interoperable with UID2. Independent ID providers can handle the UID2 integration on behalf of publishers. |
39+
| [Advertisers](overview-advertisers.md) | Organizations that buy impressions across a range of publisher sites and use DSPs to decide which ad impressions to purchase and how much to bid on them. |
40+
| [DSPs](overview-dsps.md) | DSPs integrate with the UID2 system to receive UID2s from advertisers (as first-party data) and third-party data providers (as third-party data) and leverage them to inform bidding on UID2s in the bidstream. |
41+
| [Data Providers](overview-data-providers.md) | Organizations that collect user data and push it to other UID2 participants&#8212;for example, advertisers, identity graph providers, and third-party data providers. |
4242

4343
## UID2 Consumers
4444

@@ -47,13 +47,3 @@ A UID2 consumer is a user who has had a UID2 token or raw UID2 created from an e
4747
UID2 leverages multiple layers of security to help protect user and other participant data. UID2 is a privacy-compliant identifier. With UID2, consumers can enjoy more personalized advertising without compromising privacy.
4848

4949
Consumers can opt out of UID2 in the [Transparency and Control Portal](https://www.transparentadvertising.com/).
50-
51-
<!-- | Participant | Role Description |
52-
| :--- | :--- |
53-
| **Core Administrator** | An organization (currently, The Trade Desk) that manages the UID2 Core Service and other component services. For example, it distributes encryption keys and salts to UID2 operators and sends user opt-out requests to operators and DSPs. |
54-
| **Operators** | Organizations that run the <Link href="../ref-info/glossary-uid#gl-operator-service">Operator Service</Link> (via the UID2 APIs). Operators periodically receive and store up-to-date encryption keys and salts from the UID2 Core Service, salt and hash <Link href="../ref-info/glossary-uid#gl-dii">directly identifying information (DII)</Link> to return raw UID2s, encrypt raw UID2s to generate UID2 tokens, and distribute UID2 token decryption keys.<br/>Public Operators (Open Operators) run public instances of the Operator Service. For example, The Trade Desk currently serves as a Public Operator for the UID2 framework, available to all participants. If other Public Operators are available, a participant can choose which operator to work with.<br/>Any participant can also choose to become a Private Operator to generate and manage UID2s. |
55-
| **DSPs** | DSPs integrate with the UID2 system to receive UID2s from advertisers (as first-party data) and third-party data providers (as third-party data) and leverage them to inform bidding on UID2s in the bidstream. |
56-
| **Data Providers** | Organizations that collect user data and push it to other UID2 participants&#8212;for example, advertisers, identity graph providers, and third-party data providers. |
57-
| **Advertisers** | Organizations that buy impressions across a range of publisher sites and use DSPs to decide which ad impressions to purchase and how much to bid on them. |
58-
| **Publishers** | Organizations that propagate UID2 tokens to the bidstream via SSPs—for example, identity providers, publishers, and SSO providers. Publishers can choose to work with an SSO provider or an independent ID provider that is interoperable with UID2. Independent ID providers can handle the UID2 integration on behalf of publishers. |
59-
| **Consumers** | Users who have had a UID2 token or raw UID2 created from their email address or phone number. Consumers can opt out of UID2 in the [Transparency and Control Portal](https://www.transparentadvertising.com/). | -->

docs/ref-info/uid-identifier-types.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: UID2 Identifier Types
3-
description: Summary of xxx.
3+
description: Information about UID2 identifier types (raw UID2s and UID2 tokens).
44
hide_table_of_contents: false
55
sidebar_position: 01
66
displayed_sidebar: docs

i18n/ja/docusaurus-plugin-content-docs/current/guides/integration-javascript-client-server.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -124,8 +124,6 @@ SDKは、指定された [callback function](../sdks/sdk-ref-javascript.md#callb
124124
1. ID 情報を [ローカルストレージまたはファーストパーティクッキー](../sdks/sdk-ref-javascript.md#uid2-storage-format) に保存します。
125125
1. ID 情報を使用して、ターゲティング広告のリクエストを始めます。
126126

127-
<!-- (**GWH_TODO. Q: Not sure about the relationship between the steps above and the table below. And the diagram 2-a which says "the publisher calls the SSP for ads using the UID2 token". A: Diagram needs to be updated.**) -->
128-
129127
ビッドステップを次の表に示します。
130128

131129
| Step | Endpoint/SDK | Description |

i18n/ja/docusaurus-plugin-content-docs/current/guides/operator-guide-aks-enclave.md

Lines changed: 11 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -92,8 +92,6 @@ To deploy a new UID2 Private Operator for AKS, you'll need to complete the follo
9292

9393
### Download ZIP File and Extract Files
9494

95-
[**KC__GWH01 I've commented out some of what we had -- it doesn't make sense to include the table unless we add AKS to the release matrix. We need to include instructions to get the file. What I'm putting here is just a guess... please fix as needed.**]
96-
9795
To get set up with the installation files, follow these steps:
9896

9997
1. Ask your UID2 contact for the ZIP file containing the deployment files.
@@ -116,8 +114,6 @@ The latest ZIP file is linked in the AKS Download column in the following table.
116114

117115
Run the following commands to prepare environment variables that you'll use later. Choose variable names to suit your needs.
118116

119-
[**KC__GWH02 do we need to say where they need to run these commands? Maybe not... just checking. At the Azure command line?**]
120-
121117
```
122118
export RESOURCE_GROUP="my-vn-aks"
123119
export LOCATION="eastus"
@@ -135,7 +131,7 @@ export DEPLOYMENT_ENV="integ"
135131

136132
### Set Up AKS and Node Pool
137133

138-
To set up AKS and the node pool, complete the following steps: [**KC__GWH03 do they have to be done in sequence? If so we could use numbers rather than bullets**]
134+
To set up AKS and the node pool, complete the following steps:
139135

140136
- [Create Resource Group](#create-resource-group)
141137
- [Create Virtual Network](#create-virtual-network)
@@ -172,7 +168,7 @@ There are some limitations with regard to location:
172168

173169
#### Create Virtual Network
174170

175-
To create the virtual network, run the following command, using your own values as needed: [**KC__GWH04 please verify the intro line/modify as needed**]
171+
To create the virtual network, run the following command, using your own values as needed:
176172

177173
```
178174
az network vnet create \
@@ -184,7 +180,7 @@ az network vnet create \
184180

185181
#### Create Subnets
186182

187-
To create the subnets, run the following command, using your own values as needed: [**KC__GWH05 please verify the intro line/modify as needed**]
183+
To create the subnets, run the following command, using your own values as needed:
188184

189185
```
190186
# Default Subnet (10.0.0.0/24)
@@ -212,15 +208,15 @@ az network vnet subnet create \
212208

213209
#### Create Public IP Address
214210

215-
To create the public IP address, run the following command, using your own values as needed: [**KC__GWH06 please verify the intro line/modify as needed**]
211+
To create the public IP address, run the following command, using your own values as needed:
216212

217213
```
218214
az network public-ip create --name ${PUBLIC_IP_ADDRESS_NAME} --resource-group ${RESOURCE_GROUP} --sku standard --allocation static
219215
```
220216

221217
#### Create NAT Gateway
222218

223-
To create the [Azure Network Address Translation (NAT) gateway](https://learn.microsoft.com/en-us/azure/nat-gateway/nat-overview), run the following command, using your own values as needed: [**KC__GWH07 please verify the intro line/modify as needed**]
219+
To create the [Azure Network Address Translation (NAT) gateway](https://learn.microsoft.com/en-us/azure/nat-gateway/nat-overview), run the following command, using your own values as needed:
224220

225221
```
226222
az network nat gateway create \
@@ -232,7 +228,7 @@ az network nat gateway create \
232228

233229
#### Configure NAT Service for Source Subnet
234230

235-
To configure the NAT service, run the following command, using your own values as needed: [**KC__GWH08 please verify the intro line/modify as needed**]
231+
To configure the NAT service, run the following command, using your own values as needed:
236232

237233
```
238234
az network vnet subnet update \
@@ -244,7 +240,7 @@ az network vnet subnet update \
244240

245241
#### Get the AKS Subnet ID
246242

247-
To create the AKS subnet ID, run the following command, using your own values as needed: [**KC__GWH09 please verify the intro line/modify as needed**]
243+
To create the AKS subnet ID, run the following command, using your own values as needed:
248244

249245
```
250246
export AKS_SUBNET_ID=$(az network vnet subnet show \
@@ -257,7 +253,7 @@ export AKS_SUBNET_ID=$(az network vnet subnet show \
257253

258254
#### Create an AKS Service
259255

260-
To create the AKS service, run the following command, using your own values as needed: [**KC__GWH10 please verify the intro line/modify as needed**]
256+
To create the AKS service, run the following command, using your own values as needed:
261257

262258
```
263259
# Create the AKS cluster
@@ -284,7 +280,7 @@ az aks create \
284280

285281
#### Get the Principal ID of the Managed Identity
286282

287-
To get the Principal ID, run the following command, using your own values as needed: [**KC__GWH11 please verify the intro line/modify as needed.**]
283+
To get the Principal ID, run the following command, using your own values as needed:
288284

289285
```
290286
export MANAGED_IDENTITY_PRINCIPAL_ID="$(az aks show --resource-group ${RESOURCE_GROUP} --name ${AKS_CLUSTER_NAME} --query "identityProfile.kubeletidentity.clientId" --output tsv)"
@@ -294,7 +290,7 @@ For details, see [Get the principal ID of the system-assigned managed identity](
294290

295291
#### Create Contributor Role for the Two Resource Groups
296292

297-
To create the contributor role for each group, run the following commands, using your own values as needed: [**KC__GWH12 please verify the intro line/modify as needed**]
293+
To create the contributor role for each group, run the following commands, using your own values as needed:
298294

299295
```
300296
az role assignment create \
@@ -314,7 +310,7 @@ Additional reference information in external documentation:
314310

315311
### Set Up AKS Cluster
316312

317-
To set up the AKS cluster, run the following command, using your own values as needed: [**KC__GWH13 please verify the intro line/modify as needed**]
313+
To set up the AKS cluster, run the following command, using your own values as needed:
318314

319315
```
320316
az aks get-credentials --name ${AKS_CLUSTER_NAME} --resource-group ${RESOURCE_GROUP}

i18n/ja/docusaurus-plugin-content-docs/current/intro.md

Lines changed: 2 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ UID2 は、広告エコシステム全体の多くの [参加者](overviews/part
1616
「UID2」という用語は、フレームワークと実際の識別子のいずれかを指すことがあります。特に断りのない限り、このページでは UID2 フレームワークの概要を説明します。
1717
:::
1818

19-
### Guiding Principles
19+
## Guiding Principles
2020

2121
UID2 フレームワークは、以下の原則を基本としています:
2222

@@ -32,7 +32,7 @@ UID2 フレームワークは、以下の原則を基本としています:
3232

3333
- **Consumer control**: 消費者はいつでも [Transparency and Control Portal](https://www.transparentadvertising.com/) を通じて UID2 からの脱退を選択できます。
3434

35-
### Technical Design Principles
35+
## Technical Design Principles
3636

3737
UID2 フレームワークは、以下の技術原則に基づいて構築されています:
3838

@@ -75,10 +75,6 @@ UID2 は、メールアドレスや電話番号など、<Link href="ref-info/glo
7575
これらの例で使用されている架空のメールアドレス `[email protected]` に対応する Refresh Token は次のとおりです: `AAAABrexFHvQVhNJqu+y/ua7rsgShF8e9NUXUJOZFmeFRD8TAsJadaLfOlLkwC5iSxcOKWFD9YwMBzbbcPa92CInba+bcPTaAFNmM2ZpIHgGy6lDcNPzvEnPQh/5fyZ3MD44SX/tHyIXa0R2OBAOLBA1A81r3jefhSsxZdyyBF58KtnaX6UbaeOEaguOfMnJdmhaPeWKj33v7vGfROWtxDWmi6wvGL5lHTX9H6iIZ9i1WSsemYPUgmoDOQeT7nzllJK968OECFj5LkCazDN3pCrYSeuJby9o0fMuSZNxzp6EVzi6XVED4ETtzpcaY0AArzzdh0IXV9MgH8jyg7bJSUWXQG+8kMPZzwbs9EB+7ddAUOLZL/GBna8Hm3Im03EjN3sJ`.
7676
::: -->
7777

78-
### Components
79-
80-
詳細については、[UID2 Component Services](overviews/participants-overview.md#uid2-component-services)
81-
8278
<!-- ### Participants
8379
8480
UID2 は透明で相互運用可能なアプローチにより、広告エコシステム全体、すなわち広告主、パブリッシャー、DSP、SSP、シングルサインオン (SSO)プロバイダー、カスタマーデータプラットフォーム (CDP)、同意管理プロバイダー (CMP)、ID プロバイダー、サードパーティデータプロバイダー、測定プロバイダーなどの多くの参加者に協調フレームワークを提供しています。

0 commit comments

Comments
 (0)