Skip to content

Commit e059ae8

Browse files
authored
Merge pull request #3954 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-ai-docs (branch main)
2 parents 2231db7 + d7a400f commit e059ae8

File tree

3 files changed

+14
-21
lines changed

3 files changed

+14
-21
lines changed

articles/ai-foundry/how-to/azure-policy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33,12 +33,12 @@ The following table lists the built-in policies that apply to both Azure AI Foun
3333
|[Computes should have local authentication methods disabled](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2Fe96a9a5f-07ca-471b-9bc5-6a0f33cbd68f) |Disabling local authentication methods improves security by ensuring that computes require Microsoft Entra ID identities exclusively for authentication. Learn more at: [https://aka.ms/azure-ml-aad-policy](https://aka.ms/azure-ml-aad-policy). |Audit, Deny, Disabled |[2.1.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Machine%20Learning/DisableLocalAuth_Audit.json) |
3434
|[Hubs should be encrypted with a customer-managed key](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2Fba769a63-b8cc-4b2d-abf6-ac33c7204be8) |Manage encryption at rest of data with customer-managed keys. By default, customer data is encrypted with service-managed keys, but customer-managed keys are commonly required to meet regulatory compliance standards. Customer-managed keys enable the data to be encrypted with an Azure Key Vault key created and owned by you. You have full control and responsibility for the key lifecycle, including rotation and management. Learn more at [https://aka.ms/azureml-workspaces-cmk](https://aka.ms/azureml-workspaces-cmk). |Audit, Deny, Disabled |[1.1.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Machine%20Learning/Workspace_CMKEnabled_Audit.json) |
3535
|[Hubs should disable public network access](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F438c38d2-3772-465a-a9cc-7a6666a275ce) |Disabling public network access improves security by ensuring that hubs and projects aren't exposed on the public internet. You can control exposure of your workspaces by creating private endpoints instead. Learn more at: [https://learn.microsoft.com/azure/ai-studio/how-to\configure-private-link](configure-private-link.md). |Audit, Deny, Disabled |[2.0.1](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Machine%20Learning/Workspace_PublicNetworkAccessDisabled_Audit.json) |
36-
|[Hubs should use private link](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F45e05259-1eb5-4f70-9574-baf73e9d219b) |Azure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to hubs, data leakage risks are reduced. Learn more about private links at: [https://docs.microsoft.com/azure/ai-studio/how-to/configure-private-link](configure-private-link.md). |Audit, Disabled |[1.0.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Machine%20Learning/Workspace_PrivateEndpoint_Audit_V2.json) |
36+
|[Hubs should use private link](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F45e05259-1eb5-4f70-9574-baf73e9d219b) |Azure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to hubs, data leakage risks are reduced. Learn more about private links at: [https://learn.microsoft.com/azure/ai-studio/how-to/configure-private-link](configure-private-link.md). |Audit, Disabled |[1.0.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Machine%20Learning/Workspace_PrivateEndpoint_Audit_V2.json) |
3737
|[Hubs should use user-assigned managed identity](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F5f0c7d88-c7de-45b8-ac49-db49e72eaa78) |Manage access to hubs and associated resources, Azure Container Registry, KeyVault, Storage, and App Insights using user-assigned managed identity. By default, system-assigned managed identity is used by a hub to access the associated resources. User-assigned managed identity allows you to create the identity as an Azure resource and maintain the life cycle of that identity. |Audit, Deny, Disabled |[1.0.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Machine%20Learning/Workspace_UAIEnabled_Audit.json) |
3838
|[Computes to disable local authentication methods](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2Fa6f9a2d0-cff7-4855-83ad-4cd750666512) |Disable location authentication methods so that your computes require Microsoft Entra ID identities exclusively for authentication. Learn more at: [https://aka.ms/azure-ml-aad-policy](https://aka.ms/azure-ml-aad-policy). |Modify, Disabled |[2.1.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Machine%20Learning/DisableLocalAuth_Modify.json) |
3939
|[Configure hubs to use private DNS zones](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2Fee40564d-486e-4f68-a5ca-7a621edae0fb) |Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to Azure AI Foundry hubs. |DeployIfNotExists, Disabled |[1.1.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Machine%20Learning/Workspace_PrivateDnsZones_DINE.json) |
4040
|[Configure hubs to disable public network access](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2Fa10ee784-7409-4941-b091-663697637c0f) |Disable public network access for hubs and projects so that they aren't accessible over the public internet. This helps protect the workspaces against data leakage risks. You can control exposure of your workspaces by creating private endpoints instead. Learn more at: [https://learn.microsoft.com/azure/ai-studio/how-to/configure-private-link](configure-private-link.md). |Modify, Disabled |[1.0.3](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Machine%20Learning/Workspace_PublicNetworkAccessDisabled_Modify.json) |
41-
|[Configure Azure hubs with private endpoints](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F7838fd83-5cbb-4b5d-888c-bfa240972597) |Private endpoints connect your virtual network to Azure services without a public IP address at the source or destination. By mapping private endpoints to your hub, you can reduce data leakage risks. Learn more about private links at: [https://docs.microsoft.com/azure/ai-studio/how-to/configure-private-link](configure-private-link.md). |DeployIfNotExists, Disabled |[1.0.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Machine%20Learning/Workspace_PrivateEndpoint_DINE.json) |
41+
|[Configure Azure hubs with private endpoints](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F7838fd83-5cbb-4b5d-888c-bfa240972597) |Private endpoints connect your virtual network to Azure services without a public IP address at the source or destination. By mapping private endpoints to your hub, you can reduce data leakage risks. Learn more about private links at: [https://learn.microsoft.com/azure/ai-studio/how-to/configure-private-link](configure-private-link.md). |DeployIfNotExists, Disabled |[1.0.0](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Machine%20Learning/Workspace_PrivateEndpoint_DINE.json) |
4242
|[Configure diagnostic settings for hubs to Log Analytics workspace](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2Ff59276f0-5740-4aaf-821d-45d185aa210e) |Deploys the diagnostic settings for Azure AI Foundry hubs to stream resource logs to a Log Analytics Workspace when any hub which is missing this diagnostic setting is created or updated. |DeployIfNotExists, Disabled |[1.0.1](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Machine%20Learning/AuditDiagnosticLog_DINE.json) |
4343
|[Resource logs in hubs should be enabled](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2Fafe0c3be-ba3b-4544-ba52-0c99672a8ad6) |Resource logs enable recreating activity trails to use for investigation purposes when a security incident occurs or when your network is compromised. |AuditIfNotExists, Disabled |[1.0.1](https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Machine%20Learning/AuditDiagnosticLog_Audit.json) |
4444

articles/ai-services/document-intelligence/quickstarts/includes/csharp-sdk.md

Lines changed: 11 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -644,15 +644,9 @@ AzureKeyCredential credential = new AzureKeyCredential(key);
644644
DocumentIntelligenceClient client = new DocumentIntelligenceClient(new Uri(endpoint), credential);
645645

646646
//sample invoice document
647+
Uri uriSource = new Uri("https://raw.githubusercontent.com/Azure-Samples/cognitive-services-REST-api-samples/master/curl/form-recognizer/sample-invoice.pdf");
647648

648-
Uri invoiceUri = new Uri ("https://raw.githubusercontent.com/Azure-Samples/cognitive-services-REST-api-samples/master/curl/form-recognizer/sample-invoice.pdf");
649-
650-
AnalyzeDocumentContent content = new AnalyzeDocumentContent()
651-
{
652-
UrlSource = invoiceUri
653-
};
654-
655-
Operation<AnalyzeResult> operation = await client.AnalyzeDocumentAsync(WaitUntil.Completed, "prebuilt-invoice", content);
649+
Operation<AnalyzeResult> operation = await client.AnalyzeDocumentAsync(WaitUntil.Completed, "prebuilt-invoice", uriSource);
656650

657651
AnalyzeResult result = operation.Value;
658652

@@ -663,39 +657,39 @@ for (int i = 0; i < result.Documents.Count; i++)
663657
AnalyzedDocument document = result.Documents[i];
664658

665659
if (document.Fields.TryGetValue("VendorName", out DocumentField vendorNameField)
666-
&& vendorNameField.Type == DocumentFieldType.String)
660+
&& vendorNameField.FieldType == DocumentFieldType.String)
667661
{
668662
string vendorName = vendorNameField.ValueString;
669663
Console.WriteLine($"Vendor Name: '{vendorName}', with confidence {vendorNameField.Confidence}");
670664
}
671665

672666
if (document.Fields.TryGetValue("CustomerName", out DocumentField customerNameField)
673-
&& customerNameField.Type == DocumentFieldType.String)
667+
&& customerNameField.FieldType == DocumentFieldType.String)
674668
{
675669
string customerName = customerNameField.ValueString;
676670
Console.WriteLine($"Customer Name: '{customerName}', with confidence {customerNameField.Confidence}");
677671
}
678672

679673
if (document.Fields.TryGetValue("Items", out DocumentField itemsField)
680-
&& itemsField.Type == DocumentFieldType.List)
674+
&& itemsField.FieldType == DocumentFieldType.List)
681675
{
682676
foreach (DocumentField itemField in itemsField.ValueList)
683677
{
684678
Console.WriteLine("Item:");
685679

686-
if (itemField.Type == DocumentFieldType.Dictionary)
680+
if (itemField.FieldType == DocumentFieldType.Dictionary)
687681
{
688682
IReadOnlyDictionary<string, DocumentField> itemFields = itemField.ValueDictionary;
689683

690684
if (itemFields.TryGetValue("Description", out DocumentField itemDescriptionField)
691-
&& itemDescriptionField.Type == DocumentFieldType.String)
685+
&& itemDescriptionField.FieldType == DocumentFieldType.String)
692686
{
693687
string itemDescription = itemDescriptionField.ValueString;
694688
Console.WriteLine($" Description: '{itemDescription}', with confidence {itemDescriptionField.Confidence}");
695689
}
696690

697691
if (itemFields.TryGetValue("Amount", out DocumentField itemAmountField)
698-
&& itemAmountField.Type == DocumentFieldType.Currency)
692+
&& itemAmountField.FieldType == DocumentFieldType.Currency)
699693
{
700694
CurrencyValue itemAmount = itemAmountField.ValueCurrency;
701695
Console.WriteLine($" Amount: '{itemAmount.CurrencySymbol}{itemAmount.Amount}', with confidence {itemAmountField.Confidence}");
@@ -705,27 +699,26 @@ for (int i = 0; i < result.Documents.Count; i++)
705699
}
706700

707701
if (document.Fields.TryGetValue("SubTotal", out DocumentField subTotalField)
708-
&& subTotalField.Type == DocumentFieldType.Currency)
702+
&& subTotalField.FieldType == DocumentFieldType.Currency)
709703
{
710704
CurrencyValue subTotal = subTotalField.ValueCurrency;
711705
Console.WriteLine($"Sub Total: '{subTotal.CurrencySymbol}{subTotal.Amount}', with confidence {subTotalField.Confidence}");
712706
}
713707

714708
if (document.Fields.TryGetValue("TotalTax", out DocumentField totalTaxField)
715-
&& totalTaxField.Type == DocumentFieldType.Currency)
709+
&& totalTaxField.FieldType == DocumentFieldType.Currency)
716710
{
717711
CurrencyValue totalTax = totalTaxField.ValueCurrency;
718712
Console.WriteLine($"Total Tax: '{totalTax.CurrencySymbol}{totalTax.Amount}', with confidence {totalTaxField.Confidence}");
719713
}
720714

721715
if (document.Fields.TryGetValue("InvoiceTotal", out DocumentField invoiceTotalField)
722-
&& invoiceTotalField.Type == DocumentFieldType.Currency)
716+
&& invoiceTotalField.FieldType == DocumentFieldType.Currency)
723717
{
724718
CurrencyValue invoiceTotal = invoiceTotalField.ValueCurrency;
725719
Console.WriteLine($"Invoice Total: '{invoiceTotal.CurrencySymbol}{invoiceTotal.Amount}', with confidence {invoiceTotalField.Confidence}");
726720
}
727721
}
728-
729722
```
730723

731724
**Run your application**

articles/machine-learning/prompt-flow/how-to-enable-trace-feedback-for-deployment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -121,7 +121,7 @@ trace.set_tracer_provider(TracerProvider())
121121
# The example below assumes JSON formatting which may be updated
122122
# depending on the format your endpoint expects.
123123
# More information can be found here:
124-
# https://docs.microsoft.com/azure/machine-learning/how-to-deploy-advanced-entry-script
124+
# https://learn.microsoft.com/azure/machine-learning/how-to-deploy-advanced-entry-script
125125
data = {
126126
"question": "hello",
127127
"chat_history": []

0 commit comments

Comments
 (0)