You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/delete-recover-faq.yml
-6Lines changed: 0 additions & 6 deletions
Original file line number
Diff line number
Diff line change
@@ -58,12 +58,6 @@ sections:
58
58
answer: |
59
59
> No. You can't configure the periodicity of hard deletion.
60
60
>
61
-
- question: |
62
-
Why can't I recover managed identities?
63
-
answer: |
64
-
> [Managed identities](../managed-identities-azure-resources/overview.md) are a special type of service principals. Deleted managed identities can't be recovered currently.
65
-
>
66
-
>
67
61
- question: |
68
62
I can't see the provisioning data from a recovered service principal. How can I recover it?
1. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, enter the values for the following fields:
78
+
1. On the **Basic SAML Configuration** section, enter the values for the following fields:
79
79
80
80
a. In the **Identifier** text box, type a URL using the following pattern:
81
81
`https://<CUSTOMER_NAME>.foundu.com.au/saml`
82
82
83
83
b. In the **Reply URL** text box, type a URL using the following pattern:
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign-on URL. Contact [foundU Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section.
90
+
> These values are not real. Update these values with the actual Identifier, Reply URL and Logout URL. Contact [foundU Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
93
91
94
92
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
95
93
@@ -103,7 +101,7 @@ Follow these steps to enable Microsoft Entra SSO.
103
101
104
102
### Create a Microsoft Entra test user
105
103
106
-
In this section, you'll create a test user called B.Simon.
104
+
In this section, you'll create a test user in the Azure portal called B.Simon.
107
105
108
106
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
109
107
1. Browse to **Identity** > **Users** > **All users**.
@@ -119,7 +117,7 @@ In this section, you'll create a test user called B.Simon.
119
117
120
118
### Assign the Microsoft Entra test user
121
119
122
-
In this section, you'll enable B.Simon to use single sign-on by granting access to foundU.
120
+
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to foundU.
123
121
124
122
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
@@ -141,17 +139,17 @@ In this section, you'll enable B.Simon to use single sign-on by granting access
141
139
142
140

143
141
144
-
a. Copy **Identifier(Entity ID)** value, paste this value into the **Identifier** text box in the **Basic SAML Configuration section**.
142
+
a. Copy **Identifier(Entity ID)** value, paste this value into the **Identifier** text box in the **Basic SAML Configuration section** in the Azure portal.
145
143
146
-
b. Copy **Reply URL (Assertion Consumer Service URL)** value, paste this value into the **Reply URL** text box in the **Basic SAML Configuration section**.
144
+
b. Copy **Reply URL (Assertion Consumer Service URL)** value, paste this value into the **Reply URL** text box in the **Basic SAML Configuration section** in the Azure portal.
147
145
148
-
c. Copy **Logout URL** value, paste this value into the **Logout URL** text box in the **Basic SAML Configuration section**.
146
+
c. Copy **Logout URL** value, paste this value into the **Logout URL** text box in the **Basic SAML Configuration section** in the Azure portal.
149
147
150
-
d. In the **Entity ID** textbox, paste the **Identifier** value which you copied previously.
148
+
d. In the **Entity ID** textbox, paste the **Identifier** value, which you have copied from the Azure portal.
151
149
152
-
e. In the **Single Sign-on Service URL** textbox, paste the **Login URL** value which you copied previously.
150
+
e. In the **Single Sign-on Service URL** textbox, paste the **Login URL** value, which you have copied from the Azure portal.
153
151
154
-
f. In the **Single Logout Service URL** textbox, paste the **Logout URL** value which you copied previously.
152
+
f. In the **Single Logout Service URL** textbox, paste the **Logout URL** value, which you have copied from the Azure portal.
155
153
156
154
g. Click **Choose File** to upload the downloaded **Certificate (Base64)** file from Azure portal.
157
155
@@ -167,15 +165,15 @@ In this section, you test your Microsoft Entra single sign-on configuration with
167
165
168
166
#### SP initiated:
169
167
170
-
* Click on **Test this application**, this will redirect to foundU Sign on URL where you can initiate the login flow.
168
+
* Click on **Test this application** in Azure portal. This will redirect to foundU Sign on URL where you can initiate the login flow.
171
169
172
170
* Go to foundU Sign-on URL directly and initiate the login flow from there.
173
171
174
172
#### IDP initiated:
175
173
176
-
* Click on **Test this application**, and you should be automatically signed in to the foundU for which you set up the SSO
174
+
* Click on **Test this application** in Azure portal and you should be automatically signed in to the foundU for which you set up the SSO
177
175
178
-
You can also use Microsoft My Apps to test the application in any mode. When you click the foundU tile in the My Apps, if configured in SP mode you would be redirected to the application signon page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the foundU for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
176
+
You can also use Microsoft My Apps to test the application in any mode. When you click the foundU tile in the My Apps, if configured in SP mode you would be redirected to the application sign-on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the foundU for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/parallels-desktop-tutorial.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
9
9
ms.subservice: saas-app-tutorial
10
10
ms.workload: identity
11
11
ms.topic: how-to
12
-
ms.date: 05/25/2023
12
+
ms.date: 09/21/2023
13
13
ms.author: jeedes
14
14
15
15
---
@@ -88,11 +88,11 @@ Complete the following steps to enable Microsoft Entra single sign-on.
88
88
89
89
## Configure Parallels Desktop SSO
90
90
91
-
To configure single sign-on on **Parallels Desktop** side, you need to send the downloaded **Certificate (PEM)** and appropriate copied URLs from the application configuration to [Parallels Desktop support team](https://www.parallels.com/support/). They set this setting to have the SAML SSO connection set properly on both sides.
91
+
To configure single sign-on on **Parallels Desktop** side, follow the latest version of Parallels's Azure SSO setup guide on [this page](https://kb.parallels.com/en/129240). If you encounter any difficulties throughout the setup process, contact [Parallels Desktop support team](https://www.parallels.com/support/).
92
92
93
93
### Create Parallels Desktop test user
94
94
95
-
In this section, you create a user called Britta Simon at Parallels Desktop. Work with [Parallels Desktop support team](https://www.parallels.com/support/) to add the users in the Parallels Desktop platform. Users must be created and activated before you use single sign-on.
95
+
Add existing user accounts to the Admin or User groups on the Azure AD side, following Parallels's Azure SSO setup guide that can be found on [this page](https://kb.parallels.com/en/129240). When a user account gets deactivated following their departure from the organization, that is immediately reflected in the user count of the Parallels's product license.
Copy file name to clipboardExpand all lines: articles/ai-services/computer-vision/includes/how-to-guides/analyze-image-40-python.md
+1-7Lines changed: 1 addition & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,20 +34,14 @@ Start by creating a [VisionServiceOptions](/python/api/azure-ai-vision/azure.ai.
34
34
35
35
You can select an image by providing a publicly accessible image URL, a local image file name, or by copying the image into the SDK's input buffer. See [Image requirements](../../overview-image-analysis.md?tabs=4-0#image-requirements) for supported image formats.
36
36
37
-
## Image URL
37
+
###Image URL
38
38
39
39
In your script, create a new [VisionSource](/python/api/azure-ai-vision/azure.ai.vision.visionsource) object from the URL of the image you want to analyze.
In your script, create a new [VisionSource](/python/api/azure-ai-vision/azure.ai.vision.visionsource) object from the local image file you want to analyze.
In your script, first create an **image_source_buffer**. Get its **image_writer** and call the **write** method to copy the image data into the writer. Then create a new [vision_source](/python/api/azure-ai-vision/azure.ai.vision.visionsource) object from your **image_source_buffer**. In the following code example, `image_buffer` is a variable of type `bytes` containing the image data.
Copy file name to clipboardExpand all lines: articles/ai-services/openai/concepts/use-your-data.md
+1-3Lines changed: 1 addition & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -317,9 +317,7 @@ When customizing the app, we recommend:
317
317
318
318
##### Important considerations
319
319
320
-
- Publishing creates an Azure App Service in your subscription. It may incur costs depending on the
321
-
322
-
[pricing plan](https://azure.microsoft.com/pricing/details/app-service/windows/) you select. When you're done with your app, you can delete it from the Azure portal.
320
+
- Publishing creates an Azure App Service in your subscription. It may incur costs depending on the [pricing plan](https://azure.microsoft.com/pricing/details/app-service/windows/) you select. When you're done with your app, you can delete it from the Azure portal.
323
321
- By default, the app will only be accessible to you. To add authentication (for example, restrict access to the app to members of your Azure tenant):
324
322
325
323
1. Go to the [Azure portal](https://portal.azure.com/#home) and search for the app name you specified during publishing. Select the web app, and go to the **Authentication** tab on the left navigation menu. Then select **Add an identity provider**.
Copy file name to clipboardExpand all lines: articles/api-management/front-door-api-management.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -92,7 +92,7 @@ In the following example, the same operation in the Demo Conference API is calle
92
92
93
93
## Restrict incoming traffic to API Management instance
94
94
95
-
Use API Management policies to ensure that your API Management instance accepts traffic only from Azure Front Door. You can accomplish this restriction using one or both of the [following methods](../frontdoor/front-door-faq.yml#how-do-i-lock-down-the-access-to-my-backend-to-only-azure-front-door-):
95
+
Use API Management policies to ensure that your API Management instance accepts traffic only from Azure Front Door. You can accomplish this restriction using one or both of the [following methods](../frontdoor/front-door-faq.yml#what-are-the-steps-to-restrict-the-access-to-my-backend-to-only-azure-front-door-):
96
96
97
97
1. Restrict incoming IP addresses to your API Management instances
98
98
1. Restrict traffic based on the value of the `X-Azure-FDID` header
Copy file name to clipboardExpand all lines: articles/automation/update-management/overview.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,8 +10,11 @@ ms.topic: conceptual
10
10
# Update Management overview
11
11
12
12
> [!Important]
13
-
> - Automation Update management relies on [Log Analytics agent](../../azure-monitor/agents/log-analytics-agent.md) (aka MMA agent), which is on a deprecation path and won’t be supported after **August 31, 2024**. [Azure Update Manager (preview)](../../update-center/overview.md) (AUM) is the v2 version of Automation Update management and the future of Update management in Azure. AUM is a native service in Azure and does not rely on [Log Analytics agent](../../azure-monitor/agents/log-analytics-agent.md) or [Azure Monitor agent](../../azure-monitor/agents/agents-overview.md).
14
-
> - Guidance for migrating from Automation Update management to Azure Update Manager (preview) will be provided to customers once the latter is Generally Available. For customers using Automation Update management, we recommend continuing to use the Log Analytics agent and **NOT** migrate to Azure Monitoring agent until migration guidance is provided for Azure Update manager or else Automation Update management will not work. Also, the Log Analytics agent would not be deprecated before moving all Automation Update management customers to Azure Update Manager (preview).
13
+
> - Automation Update management relies on [Log Analytics agent](../../azure-monitor/agents/log-analytics-agent.md) (aka MMA agent), which is on a deprecation path and won’t be supported after **August 31, 2024**.
14
+
> -[Azure Update Manager](../../update-center/overview.md) (AUM) is the v2 version of Automation Update management and the future of Update management in Azure. AUM is a native service in Azure and does not rely on [Log Analytics agent](../../azure-monitor/agents/log-analytics-agent.md) or [Azure Monitor agent](../../azure-monitor/agents/agents-overview.md).
15
+
> - Follow [guidance](../../update-center/guidance-migration-automation-update-management-azure-update-manager.md) to migrate machines and schedules from Automation Update Management to Azure Update Manager.
16
+
> - If you are using Automation Update Management, we recommend that you continue to use the Log Analytics agent and *not* migrate to the Azure Monitor agent until machines and schedules are migrated to Azure Update Manager.
17
+
> - The Log Analytics agent wouldn't be deprecated before moving all Automation Update Management customers to Update Manager.
15
18
16
19
You can use Update Management in Azure Automation to manage operating system updates for your Windows and Linux virtual machines in Azure, physical or VMs in on-premises environments, and in other cloud environments. You can quickly assess the status of available updates and manage the process of installing required updates for your machines reporting to Update Management.
Copy file name to clipboardExpand all lines: articles/azure-maps/about-azure-maps.md
+11-5Lines changed: 11 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -63,9 +63,15 @@ For more information, see the [Geolocation service] documentation.
63
63
64
64
### Render service
65
65
66
-
[Render V2 service] introduces a new version of the [Get Map Tile V2 API] that supports using Azure Maps tiles not only in the Azure Maps SDKs but other map controls as well. It includes raster and vector tile formats, 256x256 or 512x512 tile sizes (where applicable) and numerous map types such as road, weather, contour, or map tiles. For a complete list, see [TilesetID] in the REST API documentation. It's recommended that you use Render V2 service instead of Render service V1. You're required to display the appropriate copyright attribution on the map anytime you use the Azure Maps Render V2 service, either as basemaps or layers, in any third-party map control. For more information, see [How to use the Get Map Attribution API].
66
+
[Render service] introduces a new version of the [Get Map Tile]API that supports using Azure Maps tiles not only in the Azure Maps SDKs but other map controls as well. It includes raster and vector tile formats, 256x256 or 512x512 tile sizes (where applicable) and numerous map types such as road, weather, contour, or map tiles. For a complete list, see [TilesetID] in the REST API documentation. You're required to display the appropriate copyright attribution on the map anytime you use the Azure Maps Render service, either as basemaps or layers, in any third-party map control. For more information, see [How to use the Get Map Attribution API].
67
67
68
-
:::image type="content" source="./media/about-azure-maps/intro_map.png" border="false" alt-text="Example of a map from the Render V2 service":::
68
+
:::image type="content" source="./media/about-azure-maps/intro_map.png" border="false" alt-text="Example of a map from the Render service":::
69
+
70
+
> [!NOTE]
71
+
>
72
+
> **Azure Maps Render v1 service retirement**
73
+
>
74
+
> The Azure Maps [Render v1] service is now deprecated and will be retired on 9/17/26. To avoid service disruptions, all calls to Render v1 API will need to be updated to use [Render v2] API by 9/17/26.
69
75
70
76
### Route service
71
77
@@ -157,7 +163,7 @@ The Weather service offers API to retrieve weather information for a particular
157
163
158
164
Developers can use the [Get Weather along route API] to retrieve weather information along a particular route. Also, the service supports the generation of weather notifications for waypoints affected by weather hazards, such as flooding or heavy rain.
159
165
160
-
The [Get Map Tile V2 API] allows you to request past, current, and future radar and satellite tiles.
166
+
The [Get Map Tile]API allows you to request past, current, and future radar and satellite tiles.
161
167
162
168

163
169
@@ -217,9 +223,9 @@ Stay up to date on Azure Maps:
0 commit comments