Skip to content

Commit bd62756

Browse files
committed
more edits
1 parent 7044e86 commit bd62756

File tree

8 files changed

+49
-49
lines changed

8 files changed

+49
-49
lines changed

articles/ai-foundry/foundry-models/how-to/configure-entra-id.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn how to configure key-less authorization to use Azure AI Found
55
ms.service: azure-ai-foundry
66
ms.subservice: azure-ai-foundry-model-inference
77
ms.topic: how-to
8-
ms.date: 08/29/2025
8+
ms.date: 09/26/2025
99
ms.custom: ignite-2024, github-universe-2024
1010
author: msakande
1111
ms.author: mopeakande

articles/ai-foundry/foundry-models/includes/code-create-chat-client-entra.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -3,20 +3,20 @@ manager: nitinme
33
ms.service: azure-ai-foundry
44
ms.subservice: azure-ai-foundry-model-inference
55
ms.topic: include
6-
ms.date: 1/21/2025
6+
ms.date: 09/26/2025
77
ms.author: fasantia
88
author: santiagxf
99
---
1010

1111
# [Python](#tab/python)
1212

13-
Install the package `azure-ai-inference` using your package manager, like pip:
13+
Install the `azure-ai-inference` package, using a package manager like pip:
1414

1515
```bash
1616
pip install azure-ai-inference
1717
```
1818

19-
Then, you can use the package to consume the model. The following example shows how to create a client to consume chat completions with Entra ID:
19+
Then, use the package to consume the model. The following example shows how to create a client to consume chat completions with Microsoft Entra ID:
2020

2121
```python
2222
import os
@@ -32,13 +32,13 @@ client = ChatCompletionsClient(
3232

3333
# [JavaScript](#tab/javascript)
3434

35-
Install the package `@azure-rest/ai-inference` using npm:
35+
Install the `@azure-rest/ai-inference` package with npm:
3636

3737
```bash
3838
npm install @azure-rest/ai-inference
3939
```
4040

41-
Then, you can use the package to consume the model. The following example shows how to create a client to consume chat completions with Entra ID:
41+
Then, use the package to consume the model. The following example shows how to create a client to consume chat completions with Microsoft Entra ID:
4242

4343
```javascript
4444
import ModelClient from "@azure-rest/ai-inference";
@@ -76,7 +76,7 @@ using Azure.Identity;
7676
using Azure.AI.Inference;
7777
```
7878

79-
Then, you can use the package to consume the model. The following example shows how to create a client to consume chat completions with Entra ID:
79+
Then, use the package to consume the model. The following example shows how to create a client to consume chat completions with Microsoft Entra ID:
8080

8181
```csharp
8282
TokenCredential credential = new DefaultAzureCredential();
@@ -108,7 +108,7 @@ Add the package to your project:
108108
</dependency>
109109
```
110110

111-
Then, you can use the package to consume the model. The following example shows how to create a client to consume chat completions:
111+
Then, use the package to consume the model. The following example shows how to create a client to consume chat completions:
112112

113113
```java
114114
TokenCredential defaultCredential = new DefaultAzureCredentialBuilder().build();
@@ -118,11 +118,11 @@ ChatCompletionsClient client = new ChatCompletionsClientBuilder()
118118
.buildClient();
119119
```
120120

121-
Explore our [samples](https://github.com/Azure/azure-sdk-for-java/tree/main/sdk/ai/azure-ai-inference/src/samples) and read the [API reference documentation](https://aka.ms/azsdk/azure-ai-inference/java/reference) to get yourself started.
121+
Explore our [samples](https://github.com/Azure/azure-sdk-for-java/tree/main/sdk/ai/azure-ai-inference/src/samples) and read the [API reference documentation](https://aka.ms/azsdk/azure-ai-inference/java/reference) to get started.
122122

123123
# [REST](#tab/rest)
124124

125-
Use the reference section to explore the API design and which parameters are available and indicate authentication token in the header `Authorization`. For example, the reference section for [Chat completions](../../model-inference/reference/reference-model-inference-chat-completions.md) details how to use the route `/chat/completions` to generate predictions based on chat-formatted instructions. Notice that the path `/models` is included to the root of the URL:
125+
Use the reference section to explore the API design and see which parameters are available. Indicate the authentication token in the header `Authorization`. For example, the reference section for [Chat completions](../../model-inference/reference/reference-model-inference-chat-completions.md) details how to use the route `/chat/completions` to generate predictions based on chat-formatted instructions. The path `/models` is included in the root of the URL:
126126

127127
__Request__
128128

@@ -132,7 +132,7 @@ Authorization: Bearer <bearer-token>
132132
Content-Type: application/json
133133
```
134134

135-
Tokens have to be issued with scope `https://cognitiveservices.azure.com/.default`.
135+
Tokens must be issued with scope `https://cognitiveservices.azure.com/.default`.
136136

137137
For testing purposes, the easiest way to get a valid token for your user account is to use the Azure CLI. In a console, run the following Azure CLI command:
138138

articles/ai-foundry/foundry-models/includes/configure-entra-id/about-credentials.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,15 +4,15 @@ author: santiagxf
44
ms.author: fasantia
55
ms.service: azure-ai-foundry
66
ms.subservice: azure-ai-foundry-model-inference
7-
ms.date: 01/23/2025
7+
ms.date: 09/26/2025
88
ms.topic: include
99
---
1010

1111
### Options for credential when using Microsoft Entra ID
1212

13-
`DefaultAzureCredential` is an opinionated, ordered sequence of mechanisms for authenticating to Microsoft Entra ID. Each authentication mechanism is a class derived from the `TokenCredential` class and is known as a credential. At runtime, `DefaultAzureCredential` attempts to authenticate using the first credential. If that credential fails to acquire an access token, the next credential in the sequence is attempted, and so on, until an access token is successfully obtained. In this way, your app can use different credentials in different environments without writing environment-specific code.
13+
`DefaultAzureCredential` is an opinionated, ordered sequence of mechanisms for authenticating to Microsoft Entra ID. Each authentication mechanism is a class derived from the `TokenCredential` class and is known as a credential. At runtime, `DefaultAzureCredential` attempts to authenticate by using the first credential. If that credential fails to acquire an access token, the next credential in the sequence is attempted, and so on, until an access token is successfully obtained. In this way, your app can use different credentials in different environments without writing environment-specific code.
1414

15-
When the preceding code runs on your local development workstation, it looks in the environment variables for an application service principal or at locally installed developer tools, such as Visual Studio, for a set of developer credentials. Either approach can be used to authenticate the app to Azure resources during local development.
15+
When the preceding code runs on your local development workstation, it looks in the environment variables for an application service principal or at locally installed developer tools, such as Visual Studio, for a set of developer credentials. You can use either approach to authenticate the app to Azure resources during local development.
1616

1717
When deployed to Azure, this same code can also authenticate your app to other Azure resources. `DefaultAzureCredential` can retrieve environment settings and managed identity configurations to authenticate to other services automatically.
1818

articles/ai-foundry/foundry-models/includes/configure-entra-id/bicep.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ author: santiagxf
44
ms.author: fasantia
55
ms.service: azure-ai-foundry
66
ms.subservice: azure-ai-foundry-model-inference
7-
ms.date: 08/29/2025
7+
ms.date: 09/26/2025
88
ms.topic: include
99
zone_pivot_groups: azure-ai-models-deployment
1010
---
@@ -19,7 +19,7 @@ zone_pivot_groups: azure-ai-models-deployment
1919

2020
## About this tutorial
2121

22-
The example in this article is based on code samples contained in the [Azure-Samples/azureai-model-inference-bicep](https://github.com/Azure-Samples/azureai-model-inference-bicep) repository. To run the commands locally without having to copy or paste file content, use the following commands to clone the repository and go to the folder for your coding language:
22+
The example in this article is based on code samples in the [Azure-Samples/azureai-model-inference-bicep](https://github.com/Azure-Samples/azureai-model-inference-bicep) repository. To run the commands locally without copying or pasting file content, use the following commands to clone the repository and go to the folder for your coding language:
2323

2424
```azurecli
2525
git clone https://github.com/Azure-Samples/azureai-model-inference-bicep
@@ -36,12 +36,12 @@ cd azureai-model-inference-bicep/infra
3636
In this tutorial, you create the following resources:
3737

3838

39-
* An Azure AI Foundry (formerly known Azure AI Services) resource with key access disabled. For simplicity, this template doesn't deploy models.
39+
* An Azure AI Foundry resource (formerly known as Azure AI Services resource) with key access disabled. For simplicity, this template doesn't deploy models.
4040
* A role-assignment for a given security principal with the role **Cognitive Services User**.
4141

4242
To create these resources, use the following assets:
4343

44-
1. Use the template `modules/ai-services-template.bicep` to describe your Azure AI Foundry (formerly known Azure AI Services) resource:
44+
1. Use the template `modules/ai-services-template.bicep` to describe your Azure AI Foundry resource:
4545

4646
__modules/ai-services-template.bicep__
4747

@@ -107,7 +107,7 @@ After you configure Microsoft Entra ID in your resource, update your code to use
107107
108108
## Disable key-based authentication in the resource
109109
110-
We advise that you disable key-based authentication when you implement Microsoft Entra ID and fully address compatibility or fallback concerns in all the applications that consume the service. Change the `disableLocalAuth` property to disable key-based authentication:
110+
Disable key-based authentication when you implement Microsoft Entra ID and fully address compatibility or fallback concerns in all the applications that consume the service. Change the `disableLocalAuth` property to disable key-based authentication:
111111
112112
__modules/ai-services-template.bicep__
113113

articles/ai-foundry/foundry-models/includes/configure-entra-id/cli.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ author: santiagxf
44
ms.author: fasantia
55
ms.service: azure-ai-foundry
66
ms.subservice: azure-ai-foundry-model-inference
7-
ms.date: 08/29/2025
7+
ms.date: 09/26/2025
88
ms.topic: include
99
zone_pivot_groups: azure-ai-models-deployment
1010
---
@@ -17,36 +17,36 @@ zone_pivot_groups: azure-ai-models-deployment
1717

1818
* Your Azure subscription ID.
1919

20-
* Your Azure AI Foundry (formerly known Azure AI Services) resource name.
20+
* Your Azure AI Foundry resource (formerly known as Azure AI Services resource) name.
2121

22-
* The resource group where you deployed the Azure AI Foundry resource (formerly known Azure AI Services resource).
22+
* The resource group where you deployed the Azure AI Foundry resource.
2323

2424

2525
## Configure Microsoft Entra ID for inference
2626

2727
Follow these steps to configure Microsoft Entra ID for inference:
2828

2929

30-
1. Sign in to your Azure subscription:
30+
1. Sign in to your Azure subscription.
3131

3232
```azurecli
3333
az login
3434
```
3535
36-
1. If you have more than one subscription, select the subscription where your resource is located:
36+
1. If you have more than one subscription, select the subscription where your resource is located.
3737
3838
```azurecli
3939
az account set --subscription "<subscription-id>"
4040
```
4141
42-
1. Set the following environment variables with the name of the Azure AI Foundry (formerly known Azure AI Services) resource you plan to use and resource group.
42+
1. Set the following environment variables with the name of the Azure AI Foundry resource you plan to use and resource group.
4343
4444
```azurecli
4545
ACCOUNT_NAME="<ai-services-resource-name>"
4646
RESOURCE_GROUP="<resource-group>"
4747
```
4848
49-
1. Get the full name of your resource:
49+
1. Get the full name of your resource.
5050
5151
```azurecli
5252
RESOURCE_ID=$(az resource show -g $RESOURCE_GROUP -n $ACCOUNT_NAME --resource-type "Microsoft.CognitiveServices/accounts" --query id --output tsv)

articles/ai-foundry/foundry-models/includes/configure-entra-id/intro.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ author: santiagxf
44
ms.author: fasantia
55
ms.service: azure-ai-foundry
66
ms.subservice: azure-ai-foundry-model-inference
7-
ms.date: 08/29/2025
7+
ms.date: 09/26/2025
88
ms.topic: include
99
---
1010

@@ -14,17 +14,17 @@ This article explains how to configure Microsoft Entra ID for inference in Azure
1414

1515
## Understand roles in the context of resource in Azure
1616

17-
Microsoft Entra ID uses the idea of role-based access control (RBAC) for authorization. Roles are central to managing access to your cloud resources. A role is essentially a collection of permissions that define what actions can be performed on specific Azure resources. By assigning roles to users, groups, service principals, or managed identities—collectively known as security principals—you control their access within your Azure environment to specific resources.
17+
Microsoft Entra ID uses role-based access control (RBAC) for authorization. Roles are central to managing access to your cloud resources. A role is a collection of permissions that define what actions can be performed on specific Azure resources. By assigning roles to users, groups, service principals, or managed identities—collectively known as security principals—you control their access within your Azure environment to specific resources.
1818

1919
When you assign a role, you specify the security principal, the role definition, and the scope. This combination is known as a role assignment. Azure AI Foundry Models is a capability of the Azure AI Services resources, and hence, roles assigned to that particular resource control the access for inference.
2020

2121
You identify two different types of access to the resources:
2222

23-
* **Administration access**: The actions that are related with the administration of the resource. They usually change the state of the resource and its configuration. In Azure, those operations are control-plane operations and can be executed using the Azure portal, the Azure CLI, or with infrastructure as code. Examples of includes creating a new model deployments, changing content filtering configurations, changing the version of the model served, or changing SKU of a deployment.
23+
* **Administration access**: The actions related to the administration of the resource. They usually change the state of the resource and its configuration. In Azure, those operations are control-plane operations and can be executed using the Azure portal, the Azure CLI, or with infrastructure as code. Examples include creating new model deployments, changing content filtering configurations, changing the version of the model served, or changing SKU of a deployment.
2424

25-
* **Developer access**: The actions that are related with the consumption of the resources. For example, invoking the chat completions API. However, the user can't change the state of the resource and its configuration.
25+
* **Developer access**: The actions related to the consumption of the resources. For example, invoking the chat completions API. However, the user can't change the state of the resource and its configuration.
2626

27-
In Azure, administration operations are always performed using Microsoft Entra ID. Roles like **Cognitive Services Contributor** allow you to perform those operations. On the other hand, developer operations can be performed using either access keys or/and Microsoft Entra ID. Roles like **Cognitive Services User** allow you to perform those operations.
27+
In Azure, Microsoft Entra ID always performs administration operations. Roles like **Cognitive Services Contributor** allow you to perform those operations. On the other hand, developer operations can be performed using either access keys or/and Microsoft Entra ID. Roles like **Cognitive Services User** allow you to perform those operations.
2828

2929
> [!IMPORTANT]
3030
> Having administration access to a resource doesn't necessarily grant developer access to it. Explicit access by granting roles is still required. It's analogous to how database servers work. Having administrator access to the database server doesn't mean you can read the data inside of a database.

articles/ai-foundry/foundry-models/includes/configure-entra-id/portal.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -15,13 +15,13 @@ zone_pivot_groups: azure-ai-models-deployment
1515

1616
Follow these steps to configure Microsoft Entra ID for inference:
1717

18-
1. Go to the [Azure portal](https://portal.azure.com) and locate the **Azure AI Foundry (formerly known Azure AI Services)** resource you're using. If you're using Azure AI Foundry with projects or hubs, you can navigate to it by:
18+
1. Go to the [Azure portal](https://portal.azure.com) and locate the **Azure AI Foundry resource** (formerly known as Azure AI Services resource) you're using. If you're using Azure AI Foundry with projects or hubs, you can navigate to it by:
1919

2020
1. Go to the [Azure AI Foundry portal](https://ai.azure.com/?cid=learnDocs).
2121

22-
1. On the landing page, select **Open management center**.
22+
1. On the landing page, select **Management center**.
2323

24-
1. Go to the section **Connected resources** and select the connection to the Azure AI Foundry (formerly known Azure AI Services) resource that you want to configure. If it isn't listed, select **View all** to see the full list.
24+
1. Go to the section **Connected resources** and select the connection to the Azure AI Foundry resource that you want to configure. If it isn't listed, select **View all** to see the full list.
2525

2626
:::image type="content" source="../../media/configure-entra-id/resource-behind-select.png" alt-text="Screenshot showing how to navigate to the details of the connection in Azure AI Foundry in the management center." lightbox="../../media/configure-entra-id/resource-behind-select.png":::
2727

@@ -77,11 +77,11 @@ To change this behavior, update the connections in your projects to use Microsof
7777

7878
1. Go to the [Azure AI Foundry portal](https://ai.azure.com/?cid=learnDocs).
7979

80-
1. Go to the projects or hubs that use the Azure AI Foundry (formerly known Azure AI Services) resource through a connection.
80+
1. Go to the projects or hubs that use the Azure AI Foundry resource through a connection.
8181

8282
1. Select **Management center**.
8383

84-
1. Go to the **Connected resources** section and select the connection to the Azure AI Foundry (formerly known Azure AI Services) resource that you want to configure. If it's not listed, select **View all** to see the full list.
84+
1. Go to the **Connected resources** section and select the connection to the Azure AI Foundry resource that you want to configure. If it's not listed, select **View all** to see the full list.
8585

8686
1. In the **Connection details** section, next to **Access details**, select the edit icon.
8787

@@ -93,4 +93,4 @@ To change this behavior, update the connections in your projects to use Microsof
9393

9494
## Disable key-based authentication in the resource
9595

96-
We advise that you disable key-based authentication when you implement Microsoft Entra ID and fully address compatibility or fallback concerns in all the applications that consume the service. You can disable key-based authentication only when deploying with Bicep or ARM.
96+
Disable key-based authentication when you implement Microsoft Entra ID and fully address compatibility or fallback concerns in all the applications that consume the service. You can disable key-based authentication only when deploying with Bicep or ARM.

0 commit comments

Comments
 (0)