Skip to content

Commit 3a54155

Browse files
authored
Merge pull request #252592 from MicrosoftDocs/main
09/22 AM Publishing
2 parents bbc58e1 + 6df98b6 commit 3a54155

File tree

120 files changed

+1552
-653
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

120 files changed

+1552
-653
lines changed

articles/active-directory/manage-apps/delete-recover-faq.yml

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -58,12 +58,6 @@ sections:
5858
answer: |
5959
> No. You can't configure the periodicity of hard deletion.
6060
>
61-
- question: |
62-
Why can't I recover managed identities?
63-
answer: |
64-
> [Managed identities](../managed-identities-azure-resources/overview.md) are a special type of service principals. Deleted managed identities can't be recovered currently.
65-
>
66-
>
6761
- question: |
6862
I can't see the provisioning data from a recovered service principal. How can I recover it?
6963
answer: |

articles/active-directory/saas-apps/foundu-tutorial.md

Lines changed: 16 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 11/21/2022
12+
ms.date: 09/20/2023
1313
ms.author: jeedes
1414

1515
---
@@ -75,21 +75,19 @@ Follow these steps to enable Microsoft Entra SSO.
7575

7676
![Edit Basic SAML Configuration](common/edit-urls.png)
7777

78-
1. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, enter the values for the following fields:
78+
1. On the **Basic SAML Configuration** section, enter the values for the following fields:
7979

8080
a. In the **Identifier** text box, type a URL using the following pattern:
8181
`https://<CUSTOMER_NAME>.foundu.com.au/saml`
8282

8383
b. In the **Reply URL** text box, type a URL using the following pattern:
8484
`https://<CUSTOMER_NAME>.foundu.com.au/saml/consume`
8585

86-
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
87-
88-
In the **Sign-on URL** text box, type a URL using the following pattern:
89-
`https://<CUSTOMER_NAME>.foundu.com.au/saml/login`
86+
c. In the **Logout URL** text box, type a URL using the following pattern:
87+
`https://<CUSTOMER_NAME>.foundu.com.au/saml/logout`
9088

9189
> [!NOTE]
92-
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign-on URL. Contact [foundU Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section.
90+
> These values are not real. Update these values with the actual Identifier, Reply URL and Logout URL. Contact [foundU Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
9391

9492
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
9593

@@ -103,7 +101,7 @@ Follow these steps to enable Microsoft Entra SSO.
103101

104102
### Create a Microsoft Entra test user
105103

106-
In this section, you'll create a test user called B.Simon.
104+
In this section, you'll create a test user in the Azure portal called B.Simon.
107105

108106
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
109107
1. Browse to **Identity** > **Users** > **All users**.
@@ -119,7 +117,7 @@ In this section, you'll create a test user called B.Simon.
119117

120118
### Assign the Microsoft Entra test user
121119

122-
In this section, you'll enable B.Simon to use single sign-on by granting access to foundU.
120+
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to foundU.
123121

124122
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
125123
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **foundU**.
@@ -141,17 +139,17 @@ In this section, you'll enable B.Simon to use single sign-on by granting access
141139

142140
![Screenshot for foundU sso configuration](./media/foundu-tutorial/configuration-1.png)
143141

144-
a. Copy **Identifier(Entity ID)** value, paste this value into the **Identifier** text box in the **Basic SAML Configuration section**.
142+
a. Copy **Identifier(Entity ID)** value, paste this value into the **Identifier** text box in the **Basic SAML Configuration section** in the Azure portal.
145143

146-
b. Copy **Reply URL (Assertion Consumer Service URL)** value, paste this value into the **Reply URL** text box in the **Basic SAML Configuration section**.
144+
b. Copy **Reply URL (Assertion Consumer Service URL)** value, paste this value into the **Reply URL** text box in the **Basic SAML Configuration section** in the Azure portal.
147145

148-
c. Copy **Logout URL** value, paste this value into the **Logout URL** text box in the **Basic SAML Configuration section**.
146+
c. Copy **Logout URL** value, paste this value into the **Logout URL** text box in the **Basic SAML Configuration section** in the Azure portal.
149147

150-
d. In the **Entity ID** textbox, paste the **Identifier** value which you copied previously.
148+
d. In the **Entity ID** textbox, paste the **Identifier** value, which you have copied from the Azure portal.
151149

152-
e. In the **Single Sign-on Service URL** textbox, paste the **Login URL** value which you copied previously.
150+
e. In the **Single Sign-on Service URL** textbox, paste the **Login URL** value, which you have copied from the Azure portal.
153151

154-
f. In the **Single Logout Service URL** textbox, paste the **Logout URL** value which you copied previously.
152+
f. In the **Single Logout Service URL** textbox, paste the **Logout URL** value, which you have copied from the Azure portal.
155153

156154
g. Click **Choose File** to upload the downloaded **Certificate (Base64)** file from Azure portal.
157155

@@ -167,15 +165,15 @@ In this section, you test your Microsoft Entra single sign-on configuration with
167165

168166
#### SP initiated:
169167

170-
* Click on **Test this application**, this will redirect to foundU Sign on URL where you can initiate the login flow.
168+
* Click on **Test this application** in Azure portal. This will redirect to foundU Sign on URL where you can initiate the login flow.
171169

172170
* Go to foundU Sign-on URL directly and initiate the login flow from there.
173171

174172
#### IDP initiated:
175173

176-
* Click on **Test this application**, and you should be automatically signed in to the foundU for which you set up the SSO
174+
* Click on **Test this application** in Azure portal and you should be automatically signed in to the foundU for which you set up the SSO
177175

178-
You can also use Microsoft My Apps to test the application in any mode. When you click the foundU tile in the My Apps, if configured in SP mode you would be redirected to the application sign on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the foundU for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
176+
You can also use Microsoft My Apps to test the application in any mode. When you click the foundU tile in the My Apps, if configured in SP mode you would be redirected to the application sign-on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the foundU for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
179177

180178

181179
## Next steps

articles/active-directory/saas-apps/parallels-desktop-tutorial.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 05/25/2023
12+
ms.date: 09/21/2023
1313
ms.author: jeedes
1414

1515
---
@@ -88,11 +88,11 @@ Complete the following steps to enable Microsoft Entra single sign-on.
8888

8989
## Configure Parallels Desktop SSO
9090

91-
To configure single sign-on on **Parallels Desktop** side, you need to send the downloaded **Certificate (PEM)** and appropriate copied URLs from the application configuration to [Parallels Desktop support team](https://www.parallels.com/support/). They set this setting to have the SAML SSO connection set properly on both sides.
91+
To configure single sign-on on **Parallels Desktop** side, follow the latest version of Parallels's Azure SSO setup guide on [this page](https://kb.parallels.com/en/129240). If you encounter any difficulties throughout the setup process, contact [Parallels Desktop support team](https://www.parallels.com/support/).
9292

9393
### Create Parallels Desktop test user
9494

95-
In this section, you create a user called Britta Simon at Parallels Desktop. Work with [Parallels Desktop support team](https://www.parallels.com/support/) to add the users in the Parallels Desktop platform. Users must be created and activated before you use single sign-on.
95+
Add existing user accounts to the Admin or User groups on the Azure AD side, following Parallels's Azure SSO setup guide that can be found on [this page](https://kb.parallels.com/en/129240). When a user account gets deactivated following their departure from the organization, that is immediately reflected in the user count of the Parallels's product license.
9696

9797
## Test SSO
9898

articles/ai-services/computer-vision/includes/how-to-guides/analyze-image-40-python.md

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -34,20 +34,14 @@ Start by creating a [VisionServiceOptions](/python/api/azure-ai-vision/azure.ai.
3434

3535
You can select an image by providing a publicly accessible image URL, a local image file name, or by copying the image into the SDK's input buffer. See [Image requirements](../../overview-image-analysis.md?tabs=4-0#image-requirements) for supported image formats.
3636

37-
## Image URL
37+
### Image URL
3838

3939
In your script, create a new [VisionSource](/python/api/azure-ai-vision/azure.ai.vision.visionsource) object from the URL of the image you want to analyze.
4040

4141
[!code-python[](~/azure-ai-vision-sdk/docs/learn.microsoft.com/python/image-analysis/how-to/main.py?name=vision_source)]
4242

4343
### Image file
4444

45-
In your script, create a new [VisionSource](/python/api/azure-ai-vision/azure.ai.vision.visionsource) object from the local image file you want to analyze.
46-
47-
[!code-python[](~/azure-ai-vision-sdk/docs/learn.microsoft.com/python/image-analysis/how-to/main.py?name=vision_source)]
48-
49-
### Image buffer
50-
5145
In your script, first create an **image_source_buffer**. Get its **image_writer** and call the **write** method to copy the image data into the writer. Then create a new [vision_source](/python/api/azure-ai-vision/azure.ai.vision.visionsource) object from your **image_source_buffer**. In the following code example, `image_buffer` is a variable of type `bytes` containing the image data.
5246

5347
```python

articles/ai-services/computer-vision/includes/setup-sdk/python-requirements.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ You must install the [Microsoft Visual C++ Redistributable for Visual Studio 201
1919
2020
# [Linux](#tab/linux)
2121

22-
The Vision SDK for C# only supports **Ubuntu 18.04/20.04/22.04** and **Debian 9/10/11** on the x64 architecture when used with Linux.
22+
The Vision SDK for Python only supports **Ubuntu 18.04/20.04/22.04** and **Debian 9/10/11** on the x64 architecture when used with Linux.
2323

2424
[!INCLUDE [Linux distributions](linux-distributions.md)]
2525

articles/ai-services/openai/concepts/use-your-data.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -317,9 +317,7 @@ When customizing the app, we recommend:
317317

318318
##### Important considerations
319319

320-
- Publishing creates an Azure App Service in your subscription. It may incur costs depending on the
321-
322-
[pricing plan](https://azure.microsoft.com/pricing/details/app-service/windows/) you select. When you're done with your app, you can delete it from the Azure portal.
320+
- Publishing creates an Azure App Service in your subscription. It may incur costs depending on the [pricing plan](https://azure.microsoft.com/pricing/details/app-service/windows/) you select. When you're done with your app, you can delete it from the Azure portal.
323321
- By default, the app will only be accessible to you. To add authentication (for example, restrict access to the app to members of your Azure tenant):
324322

325323
1. Go to the [Azure portal](https://portal.azure.com/#home) and search for the app name you specified during publishing. Select the web app, and go to the **Authentication** tab on the left navigation menu. Then select **Add an identity provider**.

articles/api-management/front-door-api-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,7 @@ In the following example, the same operation in the Demo Conference API is calle
9292

9393
## Restrict incoming traffic to API Management instance
9494

95-
Use API Management policies to ensure that your API Management instance accepts traffic only from Azure Front Door. You can accomplish this restriction using one or both of the [following methods](../frontdoor/front-door-faq.yml#how-do-i-lock-down-the-access-to-my-backend-to-only-azure-front-door-):
95+
Use API Management policies to ensure that your API Management instance accepts traffic only from Azure Front Door. You can accomplish this restriction using one or both of the [following methods](../frontdoor/front-door-faq.yml#what-are-the-steps-to-restrict-the-access-to-my-backend-to-only-azure-front-door-):
9696

9797
1. Restrict incoming IP addresses to your API Management instances
9898
1. Restrict traffic based on the value of the `X-Azure-FDID` header

articles/automation/update-management/overview.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,11 @@ ms.topic: conceptual
1010
# Update Management overview
1111

1212
> [!Important]
13-
> - Automation Update management relies on [Log Analytics agent](../../azure-monitor/agents/log-analytics-agent.md) (aka MMA agent), which is on a deprecation path and won’t be supported after **August 31, 2024**. [Azure Update Manager (preview)](../../update-center/overview.md) (AUM) is the v2 version of Automation Update management and the future of Update management in Azure. AUM is a native service in Azure and does not rely on [Log Analytics agent](../../azure-monitor/agents/log-analytics-agent.md) or [Azure Monitor agent](../../azure-monitor/agents/agents-overview.md).
14-
> - Guidance for migrating from Automation Update management to Azure Update Manager (preview) will be provided to customers once the latter is Generally Available. For customers using Automation Update management, we recommend continuing to use the Log Analytics agent and **NOT** migrate to Azure Monitoring agent until migration guidance is provided for Azure Update manager or else Automation Update management will not work. Also, the Log Analytics agent would not be deprecated before moving all Automation Update management customers to Azure Update Manager (preview).
13+
> - Automation Update management relies on [Log Analytics agent](../../azure-monitor/agents/log-analytics-agent.md) (aka MMA agent), which is on a deprecation path and won’t be supported after **August 31, 2024**.
14+
> - [Azure Update Manager](../../update-center/overview.md) (AUM) is the v2 version of Automation Update management and the future of Update management in Azure. AUM is a native service in Azure and does not rely on [Log Analytics agent](../../azure-monitor/agents/log-analytics-agent.md) or [Azure Monitor agent](../../azure-monitor/agents/agents-overview.md).
15+
> - Follow [guidance](../../update-center/guidance-migration-automation-update-management-azure-update-manager.md) to migrate machines and schedules from Automation Update Management to Azure Update Manager.
16+
> - If you are using Automation Update Management, we recommend that you continue to use the Log Analytics agent and *not* migrate to the Azure Monitor agent until machines and schedules are migrated to Azure Update Manager.
17+
> - The Log Analytics agent wouldn't be deprecated before moving all Automation Update Management customers to Update Manager.
1518
1619
You can use Update Management in Azure Automation to manage operating system updates for your Windows and Linux virtual machines in Azure, physical or VMs in on-premises environments, and in other cloud environments. You can quickly assess the status of available updates and manage the process of installing required updates for your machines reporting to Update Management.
1720

articles/azure-maps/about-azure-maps.md

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -63,9 +63,15 @@ For more information, see the [Geolocation service] documentation.
6363

6464
### Render service
6565

66-
[Render V2 service] introduces a new version of the [Get Map Tile V2 API] that supports using Azure Maps tiles not only in the Azure Maps SDKs but other map controls as well. It includes raster and vector tile formats, 256x256 or 512x512 tile sizes (where applicable) and numerous map types such as road, weather, contour, or map tiles. For a complete list, see [TilesetID] in the REST API documentation. It's recommended that you use Render V2 service instead of Render service V1. You're required to display the appropriate copyright attribution on the map anytime you use the Azure Maps Render V2 service, either as basemaps or layers, in any third-party map control. For more information, see [How to use the Get Map Attribution API].
66+
[Render service] introduces a new version of the [Get Map Tile] API that supports using Azure Maps tiles not only in the Azure Maps SDKs but other map controls as well. It includes raster and vector tile formats, 256x256 or 512x512 tile sizes (where applicable) and numerous map types such as road, weather, contour, or map tiles. For a complete list, see [TilesetID] in the REST API documentation. You're required to display the appropriate copyright attribution on the map anytime you use the Azure Maps Render service, either as basemaps or layers, in any third-party map control. For more information, see [How to use the Get Map Attribution API].
6767

68-
:::image type="content" source="./media/about-azure-maps/intro_map.png" border="false" alt-text="Example of a map from the Render V2 service":::
68+
:::image type="content" source="./media/about-azure-maps/intro_map.png" border="false" alt-text="Example of a map from the Render service":::
69+
70+
> [!NOTE]
71+
>
72+
> **Azure Maps Render v1 service retirement**
73+
>
74+
> The Azure Maps [Render v1] service is now deprecated and will be retired on 9/17/26. To avoid service disruptions, all calls to Render v1 API will need to be updated to use [Render v2] API by 9/17/26.
6975
7076
### Route service
7177

@@ -157,7 +163,7 @@ The Weather service offers API to retrieve weather information for a particular
157163

158164
Developers can use the [Get Weather along route API] to retrieve weather information along a particular route. Also, the service supports the generation of weather notifications for waypoints affected by weather hazards, such as flooding or heavy rain.
159165

160-
The [Get Map Tile V2 API] allows you to request past, current, and future radar and satellite tiles.
166+
The [Get Map Tile] API allows you to request past, current, and future radar and satellite tiles.
161167

162168
![Example of map with real-time weather radar tiles](media/about-azure-maps/intro_weather.png)
163169

@@ -217,9 +223,9 @@ Stay up to date on Azure Maps:
217223
<!--------- REST API Links --------------->
218224
[Data service]: /rest/api/maps/data-v2
219225
[Geolocation service]: /rest/api/maps/geolocation
220-
[Get Map Tile V2 API]: /rest/api/maps/render-v2/get-map-tile
226+
[Get Map Tile]: /rest/api/maps/render-v2/get-map-tile
221227
[Get Weather along route API]: /rest/api/maps/weather/getweatheralongroute
222-
[Render V2 service]: /rest/api/maps/render-v2
228+
[Render service]: /rest/api/maps/render-v2
223229
[REST APIs]: /rest/api/maps/
224230
[Route service]: /rest/api/maps/route
225231
[Search service]: /rest/api/maps/search

0 commit comments

Comments
 (0)