Skip to content

Commit 5ef956c

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into ipv6ds-add-portal
2 parents 707bdbd + 9383980 commit 5ef956c

File tree

8 files changed

+38
-31
lines changed

8 files changed

+38
-31
lines changed

articles/active-directory/saas-apps/snowflake-tutorial.md

Lines changed: 22 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 07/14/2022
12+
ms.date: 08/16/2022
1313
ms.author: jeedes
1414
---
1515
# Tutorial: Azure AD SSO integration with Snowflake
@@ -26,6 +26,8 @@ To configure Azure AD integration with Snowflake, you need the following items:
2626

2727
* An Azure AD subscription. If you don't have an Azure AD environment, you can get a [free account](https://azure.microsoft.com/free/).
2828
* Snowflake single sign-on enabled subscription.
29+
* Along with Cloud Application Administrator, Application Administrator can also add or manage applications in Azure AD.
30+
For more information, see [Azure built-in roles](../roles/permissions-reference.md).
2931

3032
> [!NOTE]
3133
> This integration is also available to use from Azure AD US Government Cloud environment. You can find this application in the Azure AD US Government Cloud Application Gallery and configure it in the same way as you do from public cloud.
@@ -69,17 +71,17 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
6971
1. On the **Select a single sign-on method** page, select **SAML**.
7072
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
7173

72-
![Edit Basic SAML Configuration](common/edit-urls.png)
74+
![Screenshot shows to edit Basic S A M L Configuration.](common/edit-urls.png "Basic Configuration")
7375

74-
4. In the **Basic SAML Configuration** section, perform the following steps, if you wish to configure the application in **IDP** initiated mode:
76+
1. In the **Basic SAML Configuration** section, perform the following steps, if you wish to configure the application in **IDP** initiated mode:
7577

7678
a. In the **Identifier** text box, type a URL using the following pattern:
7779
`https://<SNOWFLAKE-URL>.snowflakecomputing.com`
7880

7981
b. In the **Reply URL** text box, type a URL using the following pattern:
8082
`https://<SNOWFLAKE-URL>.snowflakecomputing.com/fed/login`
8183

82-
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in SP initiated mode:
84+
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
8385

8486
a. In the **Sign-on URL** text box, type a URL using the following pattern:
8587
`https://<SNOWFLAKE-URL>.snowflakecomputing.com`
@@ -88,15 +90,15 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8890
`https://<SNOWFLAKE-URL>.snowflakecomputing.com/fed/logout`
8991

9092
> [!NOTE]
91-
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign-on URL. Contact [Snowflake Client support team](https://support.snowflake.net/s/) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
93+
> These values are not real. Update these values with the actual Identifier, Reply URL, Sign-on URL and Logout URL. Contact [Snowflake Client support team](https://support.snowflake.net/s/) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
9294

93-
4. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Certificate (Base64)** from the given options as per your requirement and save it on your computer.
95+
1. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Certificate (Base64)** from the given options as per your requirement and save it on your computer.
9496

95-
![The Certificate download link](common/certificatebase64.png)
97+
![Screenshot shows the Certificate download link.](common/certificatebase64.png "Certificate")
9698

97-
6. On the **Set up Snowflake** section, copy the appropriate URL(s) as per your requirement.
99+
1. On the **Set up Snowflake** section, copy the appropriate URL(s) as per your requirement.
98100

99-
![Copy configuration URLs](common/copy-configuration-urls.png)
101+
![Screenshot shows to copy configuration appropriate U R L.](common/copy-configuration-urls.png "Metadata")
100102

101103
### Create an Azure AD test user
102104

@@ -143,16 +145,15 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
143145

144146
1. Select the **All Queries** and click **Run**.
145147

146-
147-
![Snowflake sql](./media/snowflake-tutorial/certificate.png)
148+
![Snowflake sql](./media/snowflake-tutorial/certificate.png)
148149

149-
```
150-
CREATE [ OR REPLACE ] SECURITY INTEGRATION [ IF NOT EXISTS ]
150+
```
151+
CREATE [ OR REPLACE ] SECURITY INTEGRATION [ IF NOT EXISTS ]
151152
TYPE = SAML2
152153
ENABLED = TRUE | FALSE
153154
SAML2_ISSUER = '<EntityID/Issuer value which you have copied from the Azure portal>'
154155
SAML2_SSO_URL = '<Login URL value which you have copied from the Azure portal>'
155-
SAML2_PROVIDER = 'AzureAD'
156+
SAML2_PROVIDER = 'CUSTOM'
156157
SAML2_X509_CERT = '<Paste the content of downloaded certificate from Azure portal>'
157158
[ SAML2_SP_INITIATED_LOGIN_PAGE_LABEL = '<string_literal>' ]
158159
[ SAML2_ENABLE_SP_INITIATED = TRUE | FALSE ]
@@ -163,11 +164,11 @@ CREATE [ OR REPLACE ] SECURITY INTEGRATION [ IF NOT EXISTS ]
163164
[ SAML2_FORCE_AUTHN = TRUE | FALSE ]
164165
[ SAML2_SNOWFLAKE_ISSUER_URL = '<string_literal>' ]
165166
[ SAML2_SNOWFLAKE_ACS_URL = '<string_literal>' ]
166-
```
167+
```
167168
168169
If you are using a new Snowflake URL with an organization name as the login URL, it is necessary to update the following parameters:
169170
170-
Alter the integration to add Snowflake Issuer URL and SAML2 Snowflake ACS URL, please follow the step-6 in [this](https://community.snowflake.com/s/article/HOW-TO-SETUP-SSO-WITH-ADFS-AND-THE-SNOWFLAKE-NEW-URL-FORMAT-OR-PRIVATELINK) article for more information.
171+
Alter the integration to add Snowflake Issuer URL and SAML2 Snowflake ACS URL, please follow the step-6 in [this](https://community.snowflake.com/s/article/HOW-TO-SETUP-SSO-WITH-ADFS-AND-THE-SNOWFLAKE-NEW-URL-FORMAT-OR-PRIVATELINK) article for more information.
171172
172173
1. [ SAML2_SNOWFLAKE_ISSUER_URL = '<string_literal>' ]
173174
@@ -203,24 +204,24 @@ To enable Azure AD users to log in to Snowflake, they must be provisioned into S
203204
use role accountadmin;
204205
CREATE USER britta_simon PASSWORD = '' LOGIN_NAME = '[email protected]' DISPLAY_NAME = 'Britta Simon';
205206
```
206-
>[!NOTE]
207-
>Manually provisioning is uneccesary, if users and groups are provisioned with a SCIM integration. See how to enable auto provisioning for [Snowflake](snowflake-provisioning-tutorial.md).
207+
> [!NOTE]
208+
> Manually provisioning is uneccesary, if users and groups are provisioned with a SCIM integration. See how to enable auto provisioning for [Snowflake](snowflake-provisioning-tutorial.md).
208209
209210
## Test SSO
210211
211212
In this section, you test your Azure AD single sign-on configuration with following options.
212213
213214
#### SP initiated:
214215
215-
* Click on **Test this application** in Azure portal. This will redirect to Snowflake Sign on URL where you can initiate the login flow.
216+
* Click on **Test this application** in Azure portal. This will redirect to Snowflake Sign-on URL where you can initiate the login flow.
216217
217-
* Go to Snowflake Sign on URL directly and initiate the login flow from there.
218+
* Go to Snowflake Sign-on URL directly and initiate the login flow from there.
218219
219220
#### IDP initiated:
220221
221222
* Click on **Test this application** in Azure portal and you should be automatically signed in to the Snowflake for which you set up the SSO.
222223
223-
You can also use Microsoft My Apps to test the application in any mode. When you click the Snowflake tile in the My Apps, if configured in SP mode you would be redirected to the application Sign-on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the Snowflake for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
224+
You can also use Microsoft My Apps to test the application in any mode. When you click the Snowflake tile in the My Apps, if configured in SP mode you would be redirected to the application sign-on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the Snowflake for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
224225
225226
## Next steps
226227

articles/machine-learning/how-to-deploy-pipelines.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,6 +63,10 @@ Once you have a pipeline up and running, you can publish a pipeline so that it r
6363
version="1.0")
6464
```
6565

66+
4. After you publish your pipeline, you can check it in the UI. Pipeline ID is the unique identified of the published pipeline.
67+
68+
:::image type="content" source="./media/how-to-deploy-pipelines/published-pipeline-detail.png" alt-text="Screenshot showing published pipeline detail." lightbox= "./media/how-to-deploy-pipelines/published-pipeline-detail.png":::
69+
6670
## Run a published pipeline
6771

6872
All published pipelines have a REST endpoint. With the pipeline endpoint, you can trigger a run of the pipeline from any external systems, including non-Python clients. This endpoint enables "managed repeatability" in batch scoring and retraining scenarios.
@@ -296,7 +300,7 @@ You can create a Pipeline Endpoint with multiple published pipelines behind it.
296300
```python
297301
from azureml.pipeline.core import PipelineEndpoint
298302

299-
published_pipeline = PublishedPipeline.get(workspace=ws, name="My_Published_Pipeline")
303+
published_pipeline = PublishedPipeline.get(workspace=ws, id="My_Published_Pipeline_id")
300304
pipeline_endpoint = PipelineEndpoint.publish(workspace=ws, name="PipelineEndpointTest",
301305
pipeline=published_pipeline, description="Test description Notebook")
302306
```

articles/machine-learning/how-to-trigger-published-pipeline.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: machine-learning
77
ms.subservice: mlops
88
ms.author: larryfr
99
author: blackmist
10-
ms.date: 10/21/2021
10+
ms.date: 08/12/2022
1111
ms.topic: how-to
1212
ms.custom: devx-track-python, sdkv1, event-tier1-build-2022
1313
#Customer intent: As a Python coding data scientist, I want to improve my operational efficiency by scheduling my training pipeline of my model using the latest data.
@@ -81,6 +81,9 @@ recurring_schedule = Schedule.create(ws, name="MyRecurringSchedule",
8181

8282
Pipelines that are triggered by file changes may be more efficient than time-based schedules. When you want to do something before a file is changed, or when a new file is added to a data directory, you can preprocess that file. You can monitor any changes to a datastore or changes within a specific directory within the datastore. If you monitor a specific directory, changes within subdirectories of that directory will _not_ trigger a job.
8383

84+
> [!NOTE]
85+
> Change-based schedules only supports monitoring Azure Blob storage.
86+
8487
To create a file-reactive `Schedule`, you must set the `datastore` parameter in the call to [Schedule.create](/python/api/azureml-pipeline-core/azureml.pipeline.core.schedule.schedule#create-workspace--name--pipeline-id--experiment-name--recurrence-none--description-none--pipeline-parameters-none--wait-for-provisioning-false--wait-timeout-3600--datastore-none--polling-interval-5--data-path-parameter-name-none--continue-on-step-failure-none--path-on-datastore-none---workflow-provider-none---service-endpoint-none-). To monitor a folder, set the `path_on_datastore` argument.
8588

8689
The `polling_interval` argument allows you to specify, in minutes, the frequency at which the datastore is checked for changes.

articles/machine-learning/how-to-use-pipeline-ui.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -89,11 +89,10 @@ If your pipeline fails or gets stuck on a node, first view the logs.
8989

9090
The **system_logs folder** contains logs generated by Azure Machine Learning. Learn more about [View and download diagnostic logs](how-to-log-view-metrics.md#view-and-download-diagnostic-logs).
9191

92-
:::image type="content" source="./media/how-to-use-pipeline-ui/view-user-log.png" alt-text="Screenshot showing the user logs of a node." lightbox= "./media/how-to-use-pipeline-ui/view-user-log.png":::
92+
![How to check node logs](media/how-to-use-pipeline-ui/node-logs.gif)
9393

9494
If you don't see those folders, this is due to the compute run time update isn't released to the compute cluster yet, and you can look at **70_driver_log.txt** under **azureml-logs** folder first.
9595

96-
:::image type="content" source="./media/how-to-use-pipeline-ui/view-driver-logs.png" alt-text="Screenshot showing the driver logs of a node." lightbox= "./media/how-to-use-pipeline-ui/view-driver-logs.png":::
9796

9897
## Clone a pipeline job to continue editing
9998

144 KB
Loading
97 KB
Loading
3.69 MB
Loading

articles/site-recovery/vmware-physical-mobility-service-overview.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -157,7 +157,7 @@ Agent configuration logs | `%ProgramData%\ASRSetupLogs\ASRUnifiedAgentConfigurat
157157
2. Install as follows (root account is not required, but root permissions are required):
158158

159159
```shell
160-
sudo ./install -d <Install Location> -r Agent -v VmWare -q
160+
sudo ./install -r MS -v VmWare -d <Install Location> -q
161161
```
162162

163163
3. After the installation is finished, the Mobility service must be registered to the configuration server. Run the following command to register the Mobility service with the configuration server.
@@ -170,7 +170,7 @@ Agent configuration logs | `%ProgramData%\ASRSetupLogs\ASRUnifiedAgentConfigurat
170170

171171
Setting | Details
172172
--- | ---
173-
Syntax | `./install -d \<Install Location> -r \<MS/MT> -v VmWare -q`
173+
Syntax | `./install -r MS -v VmWare [-d <Install Location>] [-q]`
174174
`-r` | Mandatory installation parameter. Specifies whether the mobility service (MS) or master target (MT) should be installed.
175175
`-d` | Optional parameter. Specifies the Mobility service installation location: `/usr/local/ASR`.
176176
`-v` | Mandatory. Specifies the platform on which Mobility service is installed. <br/> **VMware** for VMware VMs/physical servers. <br/> **Azure** for Azure VMs.
@@ -180,9 +180,9 @@ Syntax | `./install -d \<Install Location> -r \<MS/MT> -v VmWare -q`
180180

181181
Setting | Details
182182
--- | ---
183-
Syntax | `cd /usr/local/ASR/Vx/bin<br/><br/> UnifiedAgentConfigurator.sh -i \<CSIP> -P \<PassphraseFilePath>`
183+
Syntax | `cd /usr/local/ASR/Vx/bin`</br> `UnifiedAgentConfigurator.sh -i \<CSIP> -P \<PassphraseFilePath>`
184184
`-i` | Mandatory parameter. `<CSIP>` specifies the configuration server's IP address. Use any valid IP address.
185-
`-P` | Mandatory. Full file path of the file in which the passphrase is saved. Use any valid folder.
185+
`-P` | Mandatory. Full file path of the file in which the passphrase is saved. [Learn more](/azure/site-recovery/vmware-azure-manage-configuration-server#generate-configuration-server-passphrase).
186186

187187
## Azure Virtual Machine agent
188188

@@ -413,8 +413,8 @@ Syntax | `"<InstallLocation>\UnifiedAgentConfigurator.exe" /SourceConfigFilePath
413413

414414
Setting | Details
415415
--- | ---
416-
Syntax | `cd <InstallLocation>/Vx/bin UnifiedAgentConfigurator.sh -c CSPrime -S -q`
417-
`-s` | Mandatory. Full file path of the Mobility Service configuration file. Use any valid folder.
416+
Syntax | `<InstallLocation>/Vx/bin/UnifiedAgentConfigurator.sh -c CSPrime -S config.json -q`
417+
`-S` | Mandatory. Full file path of the Mobility Service configuration file. Use any valid folder.
418418
`-c` | Mandatory. Used to define preview or legacy architecture. (CSPrime or CSLegacy).
419419
`-q` | Optional. Specifies whether to run the installer in silent mode.
420420

0 commit comments

Comments
 (0)