You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/ai-services/language-service/native-document-support/managed-identities.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,15 +6,15 @@ ms.topic: how-to
6
6
manager: nitinme
7
7
ms.author: lajanuar
8
8
author: laujan
9
-
ms.date: 11/21/2024
9
+
ms.date: 03/05/2025
10
10
---
11
11
12
12
13
13
# Managed identities for Language resources
14
14
15
-
Managed identities for Azure resources are service principals that create a Microsoft Entra identity and specific permissions for Azure managed resources. Managed identities are a safer way to grant access to storage data and replace the requirement for you to include shared access signature tokens (SAS) with your [source and target container URLs](use-native-documents.md#create-azure-blob-storage-containers).
15
+
Managed identities for Azure resources are service principals that create a Microsoft Entra identity and specific permissions for Azure managed resources. Managed identities are a safer way to grant access to storage data and replace the requirement for you to include shared access signature tokens (SAS) with your source and target container URLs.
16
16
17
-
:::image type="content" source="media/managed-identity-flow.png" alt-text="Screenshot of managed identity flow (RBAC).":::
17
+
:::image type="content" source="media/managed-identity-flow.png" alt-text="Screenshot of managed identity flow (`RBAC`).":::
18
18
19
19
* You can use managed identities to grant access to any resource that supports Microsoft Entra authentication, including your own applications.
20
20
@@ -24,7 +24,7 @@ Managed identities for Azure resources are service principals that create a Micr
24
24
25
25
> [!IMPORTANT]
26
26
>
27
-
> * When using managed identities, don't include a SAS token URL with your HTTP requests—your requests will fail. Using managed identities replaces the requirement for you to include shared access signature tokens (SAS) with your [source and target container URLs](use-native-documents.md#create-azure-blob-storage-containers).
27
+
> * When using managed identities, don't include a SAS token URL with your HTTP requests. Using managed identities replaces the requirement for you to include shared access signature tokens (SAS) with your source and target container URLs.
28
28
>
29
29
> * To use managed identities for Language operations, you must [create your Language resource](https://ms.portal.azure.com/#create/Microsoft.CognitiveServicesTextAnalytics) in a specific geographic Azure region such as **East US**. If your Language resource region is set to **Global**, then you can't use managed identity authentication. You can, however, still use [Shared Access Signature (SAS) tokens](shared-access-signatures.md).
30
30
>
@@ -65,7 +65,7 @@ To get started, you need the following resources:
65
65
66
66
## Managed identity assignments
67
67
68
-
There are two types of managed identities: **system-assigned** and **user-assigned**. Currently, Document Translation supports **system-assigned managed identity**:
68
+
There are two types of managed identities: **system-assigned** and **user-assigned**. Currently, Document Translation supports **system-assigned managed identity**:
69
69
70
70
* A system-assigned managed identity is **enabled** directly on a service instance. It isn't enabled by default; you must go to your resource and update the identity setting.
71
71
@@ -135,4 +135,4 @@ You must grant the Language resource access to your storage account before it ca
135
135
## Next steps
136
136
137
137
> [!div class="nextstepaction"]
138
-
> [Get started with native document support](use-native-documents.md#include-native-documents-with-an-http-request)
title: Native document support for Azure AI Language (preview)
3
+
titleSuffix: Azure AI services
4
+
description: How to use native document with Azure AI Languages Personally Identifiable Information and Summarization capabilities.
5
+
author: laujan
6
+
manager: nitinme
7
+
ms.service: azure-ai-language
8
+
ms.custom:
9
+
- ignite-2024
10
+
ms.topic: how-to
11
+
ms.date: 02/19/2025
12
+
ms.author: lajanuar
13
+
---
14
+
15
+
<!-- markdownlint-disable MD033 -->
16
+
<!-- markdownlint-disable MD051 -->
17
+
<!-- markdownlint-disable MD024 -->
18
+
<!-- markdownlint-disable MD036 -->
19
+
<!-- markdownlint-disable MD049 -->
20
+
<!-- markdownlint-disable MD001 -->
21
+
22
+
# Native document support for Azure AI Language (preview)
23
+
24
+
> [!IMPORTANT]
25
+
>
26
+
> * Azure AI Language public preview releases provide early access to features that are in active development.
27
+
> * Features, approaches, and processes can change, before General Availability (GA), based on user feedback.
28
+
29
+
Azure AI Language is a cloud-based service that applies Natural Language Processing (NLP) features to text-based data. The native document support capability enables you to send API requests asynchronously, using an HTTP POST request body to send your data and HTTP GET request query string to retrieve the status results. Your processed documents are located in your Azure Blob Storage target container.
30
+
31
+
A native document refers to the file format used to create the original document such as Microsoft Word (docx) or a portable document file (pdf). Native document support eliminates the need for text preprocessing before using Azure AI Language resource capabilities. Currently, native document support is available for the following capabilities:
32
+
33
+
*[Personally Identifiable Information (PII)](../personally-identifiable-information/overview.md). The PII detection feature can identify, categorize, and redact sensitive information in unstructured text. The `PiiEntityRecognition` API supports native document processing.
34
+
35
+
*[Document summarization](../summarization/overview.md). Document summarization uses natural language processing to generate extractive (salient sentence extraction) or abstractive (contextual word extraction) summaries for documents. Both `AbstractiveSummarization` and `ExtractiveSummarization` APIs support native document processing.
36
+
37
+
## Supported document formats
38
+
39
+
Applications use native file formats to create, save, or open native documents. Currently **PII** and **Document summarization** capabilities supports the following native document formats:
|Microsoft Word|`.docx`|A Microsoft Word document file.|
46
+
47
+
## Input guidelines
48
+
49
+
***Supported file formats***
50
+
51
+
|Type|support and limitations|
52
+
|---|---|
53
+
|**PDFs**| Fully scanned PDFs aren't supported.|
54
+
|**Text within images**| Digital images with embedded text aren't supported.|
55
+
|**Digital tables**| Tables in scanned documents aren't supported.|
56
+
57
+
***Document Size***
58
+
59
+
|Attribute|Input limit|
60
+
|---|---|
61
+
|**Total number of documents per request**|**≤ 20**|
62
+
|**Total content size per request**|**≤ 10 MB**|
63
+
64
+
## Request headers and parameters
65
+
66
+
|parameter |Description |
67
+
|---------|---------|
68
+
|`-X POST <endpoint>`| Specifies your Language resource endpoint for accessing the API. |
69
+
|`--header Content-Type: application/json`| The content type for sending JSON data. |
70
+
|`--header "Ocp-Apim-Subscription-Key:<key>`| Specifies the Language resource key for accessing the API. |
71
+
|`-data`| The JSON file containing the data you want to pass with your request. |
72
+
73
+
## Related content
74
+
75
+
> [!div class="nextstepaction"]
76
+
> [PII detection overview](../personally-identifiable-information/overview.md"Learn more about Personally Identifiable Information detection.")[Document Summarization overview](../summarization/overview.md"Learn more about automatic document summarization.")
Copy file name to clipboardExpand all lines: articles/ai-services/language-service/native-document-support/shared-access-signatures.md
+8-10Lines changed: 8 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.topic: how-to
6
6
manager: nitinme
7
7
ms.author: lajanuar
8
8
author: laujan
9
-
ms.date: 11/21/2024
9
+
ms.date: 03/05/2025
10
10
---
11
11
12
12
# SAS tokens for your storage containers
@@ -19,17 +19,15 @@ Learn to create user delegation, shared access signature (SAS) tokens, using the
19
19
>
20
20
> [Role-based access control (managed identities)](../concepts/role-based-access-control.md) provide an alternate method for granting access to your storage data without the need to include SAS tokens with your HTTP requests.
21
21
>
22
-
> *You can use managed identities to grant access to any resource that supports Microsoft Entra authentication, including your own applications.
22
+
> *Using managed identities grants access to any resource that supports Microsoft Entra authentication, including your own applications.
23
23
> * Using managed identities replaces the requirement for you to include shared access signature tokens (SAS) with your source and target URLs.
24
-
> *There's no added cost to use managed identities in Azure.
24
+
> *Using managed identities doesn't require an added cost in Azure.
25
25
26
26
At a high level, here's how SAS tokens work:
27
27
28
28
* Your application submits the SAS token to Azure Storage as part of a REST API request.
29
29
30
-
* If the storage service verifies that the SAS is valid, the request is authorized.
31
-
32
-
* If the SAS token is deemed invalid, the request is declined, and the error code 403 (Forbidden) is returned.
30
+
* The storage service verifies that the SAS is valid and then the request is authorized. If the SAS token is deemed invalid, the request is declined, and the error code 403 (Forbidden) is returned.
> * SAS tokens are used to grant permissions to storage resources, and should be protected in the same manner as an account key.
43
41
>
44
-
> * Operations that use SAS tokens should be performed only over an HTTPS connection, and SAS URIs should only be distributed on a secure connection such as HTTPS.
42
+
> * Operations that use SAS tokens should be performed only over an HTTPS connection, and `SAS URI`s should only be distributed on a secure connection such as HTTPS.
* Consider setting a longer duration period for the time you're using your storage account for Language Service operations.
81
79
* The value of the expiry time is determined by whether you're using an **Account key** or **User delegation key****Signing method**:
82
80
***Account key**: No imposed maximum time limit; however, best practices recommended that you configure an expiration policy to limit the interval and minimize compromise. [Configure an expiration policy for shared access signatures](/azure/storage/common/sas-expiration-policy).
83
-
***User delegation key**: The value for the expiry time is a maximum of seven days from the creation of the SAS token. The SAS is invalid after the user delegation key expires, so a SAS with an expiry time of greater than seven days will still only be valid for seven days. For more information,*see*[Use Microsoft Entra credentials to secure a SAS](/azure/storage/blobs/storage-blob-user-delegation-sas-create-cli#use-azure-ad-credentials-to-secure-a-sas).
81
+
***User delegation key**: The value for the expiry time is a maximum of seven days from the creation of the SAS token. The SAS is invalid after the user delegation key expires, so a SAS with an expiry time of greater than seven days will still only be valid for seven days. For more information,*see*[Use Microsoft Entra credentials to secure a SAS](/azure/storage/blobs/storage-blob-user-delegation-sas-create-cli#use-azure-ad-credentials-to-secure-a-sas).
84
82
85
-
1. The **Allowed IP addresses** field is optional and specifies an IP address or a range of IP addresses from which to accept requests. If the request IP address doesn't match the IP address or address range specified on the SAS token, authorization fails. The IP address or a range of IP addresses must be public IPs, not private. For more information,*see*, [**Specify an IP address or IP range**](/rest/api/storageservices/create-account-sas#specify-an-ip-address-or-ip-range).
83
+
1. The **Allowed IP addresses** field is optional and specifies an IP address or a range of IP addresses from which to accept requests. If the request IP address doesn't match the IP address or address range specified on the SAS token, authorization fails. The IP address or a range of IP addresses must be public IPs, not private. For more information,*see*, [**Specify an IP address or IP range**](/rest/api/storageservices/create-account-sas#specify-an-ip-address-or-ip-range).
86
84
87
85
1. The **Allowed protocols** field is optional and specifies the protocol permitted for a request made with the SAS. The default value is HTTPS.
88
86
@@ -130,5 +128,5 @@ That's it! You learned how to create SAS tokens to authorize how clients access
130
128
## Next steps
131
129
132
130
> [!div class="nextstepaction"]
133
-
> [Learn more about native document support](use-native-documents.md"Learn how to process and analyze native documents.")[Learn more about granting access with SAS ](/azure/storage/common/storage-sas-overview"Grant limited access to Azure Storage resources using shared access SAS.")
131
+
> [Learn more about native document support](overview.md"Learn how to process and analyze native documents.")[Learn more about granting access with SAS ](/azure/storage/common/storage-sas-overview"Grant limited access to Azure Storage resources using shared access SAS.")
0 commit comments