You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/guides/integration-javascript-client-server.md
-2Lines changed: 0 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -124,8 +124,6 @@ Based on the status and availability of a valid identity, the SDK does the follo
124
124
1. Stores identity information in [local storage or a first-party cookie](../sdks/sdk-ref-javascript.md#uid2-storage-format).
125
125
1. Uses the identity information to initiate requests for targeted advertising.
126
126
127
-
<!-- (**GWH_TODO. Q: Not sure about the relationship between the steps above and the table below. And the diagram 2-a which says "the publisher calls the SSP for ads using the UID2 token". A: Diagram needs to be updated.**) -->
Copy file name to clipboardExpand all lines: docs/intro.md
+2-6Lines changed: 2 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,7 +32,7 @@ The UID2 framework has the following principles as its foundation:
32
32
33
33
-**Consumer control**: Consumers can opt out of UID2 at any time through the [Transparency and Control Portal](https://www.transparentadvertising.com/).
34
34
35
-
###Technical Design Principles
35
+
## Technical Design Principles
36
36
37
37
The UID2 framework is built on the following technical principles:
38
38
@@ -48,17 +48,13 @@ The UID2 framework is built on the following technical principles:
48
48
49
49
## Elements of the UID2 Infrastructure
50
50
51
-
For information about key elements of the UID2 infrastructure, refer to the following pages:
51
+
For information about key elements of the UID2 infrastructure, and other aspects of UID2, refer to the following pages:
Copy file name to clipboardExpand all lines: docs/overviews/participants-overview.md
+7-17Lines changed: 7 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,14 +31,14 @@ For a diagram of how the different services work together, see [UID2 Workflows](
31
31
32
32
## UID2 External Participants
33
33
34
-
The following table summarizes the main types of external participant partners for UID2.
34
+
The following table summarizes the main types of external participant partners for UID2, with a link to the overview page for more information on each participant type.
35
35
36
-
| Participant | Role Description| Link to Overview Page|
37
-
| :--- | :--- | :--- |
38
-
|**Publishers**| Organizations that propagate UID2 tokens to the bidstream via SSPs—for example, identity providers, publishers, and SSO providers. Publishers can choose to work with an SSO provider or an independent ID provider that is interoperable with UID2. Independent ID providers can handle the UID2 integration on behalf of publishers.|[UID2 Overview for Publishers](overview-publishers.md)|
39
-
|**Advertisers**| Organizations that buy impressions across a range of publisher sites and use DSPs to decide which ad impressions to purchase and how much to bid on them.|[UID2 Overview for Advertisers](overview-advertisers.md)|
40
-
|**DSPs**| DSPs integrate with the UID2 system to receive UID2s from advertisers (as first-party data) and third-party data providers (as third-party data) and leverage them to inform bidding on UID2s in the bidstream.|[UID2 Overview for DSPs](overview-dsps.md)|
41
-
|**Data Providers**| Organizations that collect user data and push it to other UID2 participants—for example, advertisers, identity graph providers, and third-party data providers.|[UID2 Overview for Data Providers](overview-data-providers.md)|
36
+
| Participant Type | Role Description |
37
+
| :--- | :--- |
38
+
|[Publishers](overview-publishers.md)| Organizations that propagate UID2 tokens to the bidstream via SSPs—for example, identity providers, publishers, and SSO providers. Publishers can choose to work with an SSO provider or an independent ID provider that is interoperable with UID2. Independent ID providers can handle the UID2 integration on behalf of publishers. |
39
+
|[Advertisers](overview-advertisers.md)| Organizations that buy impressions across a range of publisher sites and use DSPs to decide which ad impressions to purchase and how much to bid on them. |
40
+
|[DSPs](overview-dsps.md)| DSPs integrate with the UID2 system to receive UID2s from advertisers (as first-party data) and third-party data providers (as third-party data) and leverage them to inform bidding on UID2s in the bidstream. |
41
+
|[Data Providers](overview-data-providers.md)| Organizations that collect user data and push it to other UID2 participants—for example, advertisers, identity graph providers, and third-party data providers. |
42
42
43
43
## UID2 Consumers
44
44
@@ -47,13 +47,3 @@ A UID2 consumer is a user who has had a UID2 token or raw UID2 created from an e
47
47
UID2 leverages multiple layers of security to help protect user and other participant data. UID2 is a privacy-compliant identifier. With UID2, consumers can enjoy more personalized advertising without compromising privacy.
48
48
49
49
Consumers can opt out of UID2 in the [Transparency and Control Portal](https://www.transparentadvertising.com/).
50
-
51
-
<!-- | Participant | Role Description |
52
-
| :--- | :--- |
53
-
| **Core Administrator** | An organization (currently, The Trade Desk) that manages the UID2 Core Service and other component services. For example, it distributes encryption keys and salts to UID2 operators and sends user opt-out requests to operators and DSPs. |
54
-
| **Operators** | Organizations that run the <Link href="../ref-info/glossary-uid#gl-operator-service">Operator Service</Link> (via the UID2 APIs). Operators periodically receive and store up-to-date encryption keys and salts from the UID2 Core Service, salt and hash <Link href="../ref-info/glossary-uid#gl-dii">directly identifying information (DII)</Link> to return raw UID2s, encrypt raw UID2s to generate UID2 tokens, and distribute UID2 token decryption keys.<br/>Public Operators (Open Operators) run public instances of the Operator Service. For example, The Trade Desk currently serves as a Public Operator for the UID2 framework, available to all participants. If other Public Operators are available, a participant can choose which operator to work with.<br/>Any participant can also choose to become a Private Operator to generate and manage UID2s. |
55
-
| **DSPs** | DSPs integrate with the UID2 system to receive UID2s from advertisers (as first-party data) and third-party data providers (as third-party data) and leverage them to inform bidding on UID2s in the bidstream. |
56
-
| **Data Providers** | Organizations that collect user data and push it to other UID2 participants—for example, advertisers, identity graph providers, and third-party data providers. |
57
-
| **Advertisers** | Organizations that buy impressions across a range of publisher sites and use DSPs to decide which ad impressions to purchase and how much to bid on them. |
58
-
| **Publishers** | Organizations that propagate UID2 tokens to the bidstream via SSPs—for example, identity providers, publishers, and SSO providers. Publishers can choose to work with an SSO provider or an independent ID provider that is interoperable with UID2. Independent ID providers can handle the UID2 integration on behalf of publishers. |
59
-
| **Consumers** | Users who have had a UID2 token or raw UID2 created from their email address or phone number. Consumers can opt out of UID2 in the [Transparency and Control Portal](https://www.transparentadvertising.com/). | -->
1. ID 情報を [ローカルストレージまたはファーストパーティクッキー](../sdks/sdk-ref-javascript.md#uid2-storage-format) に保存します。
125
125
1. ID 情報を使用して、ターゲティング広告のリクエストを始めます。
126
126
127
-
<!-- (**GWH_TODO. Q: Not sure about the relationship between the steps above and the table below. And the diagram 2-a which says "the publisher calls the SSP for ads using the UID2 token". A: Diagram needs to be updated.**) -->
Copy file name to clipboardExpand all lines: i18n/ja/docusaurus-plugin-content-docs/current/guides/operator-guide-aks-enclave.md
+11-15Lines changed: 11 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -92,8 +92,6 @@ To deploy a new UID2 Private Operator for AKS, you'll need to complete the follo
92
92
93
93
### Download ZIP File and Extract Files
94
94
95
-
[**KC__GWH01 I've commented out some of what we had -- it doesn't make sense to include the table unless we add AKS to the release matrix. We need to include instructions to get the file. What I'm putting here is just a guess... please fix as needed.**]
96
-
97
95
To get set up with the installation files, follow these steps:
98
96
99
97
1. Ask your UID2 contact for the ZIP file containing the deployment files.
@@ -116,8 +114,6 @@ The latest ZIP file is linked in the AKS Download column in the following table.
116
114
117
115
Run the following commands to prepare environment variables that you'll use later. Choose variable names to suit your needs.
118
116
119
-
[**KC__GWH02 do we need to say where they need to run these commands? Maybe not... just checking. At the Azure command line?**]
120
-
121
117
```
122
118
export RESOURCE_GROUP="my-vn-aks"
123
119
export LOCATION="eastus"
@@ -135,7 +131,7 @@ export DEPLOYMENT_ENV="integ"
135
131
136
132
### Set Up AKS and Node Pool
137
133
138
-
To set up AKS and the node pool, complete the following steps:[**KC__GWH03 do they have to be done in sequence? If so we could use numbers rather than bullets**]
134
+
To set up AKS and the node pool, complete the following steps:
@@ -172,7 +168,7 @@ There are some limitations with regard to location:
172
168
173
169
#### Create Virtual Network
174
170
175
-
To create the virtual network, run the following command, using your own values as needed:[**KC__GWH04 please verify the intro line/modify as needed**]
171
+
To create the virtual network, run the following command, using your own values as needed:
176
172
177
173
```
178
174
az network vnet create \
@@ -184,7 +180,7 @@ az network vnet create \
184
180
185
181
#### Create Subnets
186
182
187
-
To create the subnets, run the following command, using your own values as needed:[**KC__GWH05 please verify the intro line/modify as needed**]
183
+
To create the subnets, run the following command, using your own values as needed:
188
184
189
185
```
190
186
# Default Subnet (10.0.0.0/24)
@@ -212,15 +208,15 @@ az network vnet subnet create \
212
208
213
209
#### Create Public IP Address
214
210
215
-
To create the public IP address, run the following command, using your own values as needed:[**KC__GWH06 please verify the intro line/modify as needed**]
211
+
To create the public IP address, run the following command, using your own values as needed:
216
212
217
213
```
218
214
az network public-ip create --name ${PUBLIC_IP_ADDRESS_NAME} --resource-group ${RESOURCE_GROUP} --sku standard --allocation static
219
215
```
220
216
221
217
#### Create NAT Gateway
222
218
223
-
To create the [Azure Network Address Translation (NAT) gateway](https://learn.microsoft.com/en-us/azure/nat-gateway/nat-overview), run the following command, using your own values as needed:[**KC__GWH07 please verify the intro line/modify as needed**]
219
+
To create the [Azure Network Address Translation (NAT) gateway](https://learn.microsoft.com/en-us/azure/nat-gateway/nat-overview), run the following command, using your own values as needed:
224
220
225
221
```
226
222
az network nat gateway create \
@@ -232,7 +228,7 @@ az network nat gateway create \
232
228
233
229
#### Configure NAT Service for Source Subnet
234
230
235
-
To configure the NAT service, run the following command, using your own values as needed:[**KC__GWH08 please verify the intro line/modify as needed**]
231
+
To configure the NAT service, run the following command, using your own values as needed:
236
232
237
233
```
238
234
az network vnet subnet update \
@@ -244,7 +240,7 @@ az network vnet subnet update \
244
240
245
241
#### Get the AKS Subnet ID
246
242
247
-
To create the AKS subnet ID, run the following command, using your own values as needed:[**KC__GWH09 please verify the intro line/modify as needed**]
243
+
To create the AKS subnet ID, run the following command, using your own values as needed:
248
244
249
245
```
250
246
export AKS_SUBNET_ID=$(az network vnet subnet show \
To create the AKS service, run the following command, using your own values as needed:[**KC__GWH10 please verify the intro line/modify as needed**]
256
+
To create the AKS service, run the following command, using your own values as needed:
261
257
262
258
```
263
259
# Create the AKS cluster
@@ -284,7 +280,7 @@ az aks create \
284
280
285
281
#### Get the Principal ID of the Managed Identity
286
282
287
-
To get the Principal ID, run the following command, using your own values as needed:[**KC__GWH11 please verify the intro line/modify as needed.**]
283
+
To get the Principal ID, run the following command, using your own values as needed:
288
284
289
285
```
290
286
export MANAGED_IDENTITY_PRINCIPAL_ID="$(az aks show --resource-group ${RESOURCE_GROUP} --name ${AKS_CLUSTER_NAME} --query "identityProfile.kubeletidentity.clientId" --output tsv)"
@@ -294,7 +290,7 @@ For details, see [Get the principal ID of the system-assigned managed identity](
294
290
295
291
#### Create Contributor Role for the Two Resource Groups
296
292
297
-
To create the contributor role for each group, run the following commands, using your own values as needed:[**KC__GWH12 please verify the intro line/modify as needed**]
293
+
To create the contributor role for each group, run the following commands, using your own values as needed:
298
294
299
295
```
300
296
az role assignment create \
@@ -314,7 +310,7 @@ Additional reference information in external documentation:
314
310
315
311
### Set Up AKS Cluster
316
312
317
-
To set up the AKS cluster, run the following command, using your own values as needed:[**KC__GWH13 please verify the intro line/modify as needed**]
313
+
To set up the AKS cluster, run the following command, using your own values as needed:
318
314
319
315
```
320
316
az aks get-credentials --name ${AKS_CLUSTER_NAME} --resource-group ${RESOURCE_GROUP}
0 commit comments