Skip to content

Commit 5f3cd35

Browse files
authored
Merge pull request #269479 from MicrosoftDocs/main
3/19/2024 AM Publish
2 parents 5b1d77f + 7d05964 commit 5f3cd35

File tree

268 files changed

+3367
-2996
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

268 files changed

+3367
-2996
lines changed

.openpublishing.redirection.json

Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,45 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/internet-analyzer/internet-analyzer-cli.md",
5+
"redirect_url": "/previous-versions/azure/internet-analyzer/internet-analyzer-cli",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "articles/internet-analyzer/internet-analyzer-create-test-portal.md",
10+
"redirect_url": "/previous-versions/azure/internet-analyzer/internet-analyzer-create-test-portal",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path": "articles/internet-analyzer/internet-analyzer-custom-endpoint.md",
15+
"redirect_url": "/previous-versions/azure/internet-analyzer/internet-analyzer-custom-endpoint",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path": "articles/internet-analyzer/internet-analyzer-embed-client.md",
20+
"redirect_url": "/previous-versions/azure/internet-analyzer/internet-analyzer-embed-client",
21+
"redirect_document_id": false
22+
},
23+
{
24+
"source_path": "articles/internet-analyzer/internet-analyzer-faq.md",
25+
"redirect_url": "/previous-versions/azure/internet-analyzer/internet-analyzer-faq",
26+
"redirect_document_id": false
27+
},
28+
{
29+
"source_path": "articles/internet-analyzer/internet-analyzer-overview.md",
30+
"redirect_url": "/previous-versions/azure/internet-analyzer/internet-analyzer-overview",
31+
"redirect_document_id": false
32+
},
33+
{
34+
"source_path": "articles/internet-analyzer/internet-analyzer-scorecard.md",
35+
"redirect_url": "/previous-versions/azure/internet-analyzer/internet-analyzer-scorecard",
36+
"redirect_document_id": false
37+
},
38+
{
39+
"source_path": "articles/internet-analyzer/troubleshoot.md",
40+
"redirect_url": "/previous-versions/azure/internet-analyzer/troubleshoot",
41+
"redirect_document_id": false
42+
},
343
{
444
"source_path": "articles/batch/batch-pool-no-public-ip-address.md",
545
"redirect_url": "/previous-versions/azure/batch/articles/batch/batch-pool-no-public-ip-address",

articles/active-directory-b2c/conditional-access-identity-protection-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Identity Protection and Conditional Access in Azure AD B2C
33
description: Learn how Identity Protection gives you visibility into risky sign-ins and risk detections. Find out how and Conditional Access lets you enforce organizational policies based on risk events in your Azure AD B2C tenants.
44
ms.service: active-directory
5-
ms.subservice: conditional-access
5+
ms.subservice: B2C
66
ms.topic: overview
77
ms.date: 01/11/2024
88
ms.author: kengaderdus
@@ -29,7 +29,7 @@ If you're already familiar with [Identity Protection](../active-directory/identi
2929

3030
By pairing Conditional Access policies with Identity Protection risk detection, you can respond to risky authentications with the appropriate policy action.
3131

32-
- **Gain a new level of visibility into the authentication risks for your apps and your customer base**. With signals from billions of monthly authentications across Microsoft Entra ID and Microsoft Account, the risk detection algorithms will now flag authentications as low, medium, or high risk for your local consumer or citizen authentications.
32+
- **Gain a new level of visibility into the authentication risks for your apps and your customer base**. With signals from billions of monthly authentications across Microsoft Entra ID and Microsoft Account, the risk detection algorithms flag authentications as low, medium, or high risk for your local consumer or citizen authentications.
3333
- **Automatically address risks by configuring your own adaptive authentication**. For specified applications, you can require a specific set of users to provide a second authentication factor, as in multi-factor authentication (MFA). Or you can block access based on the risk level detected. As with other Azure AD B2C experiences, you can customize resulting end-user experience with your organization’s voice, style, and brand. You can also display mitigation alternatives if the user isn't able to gain access.
3434
- **Control access based on location, groups, and apps**.  Conditional Access can also be used to control non-risk based situations. For example, you can require MFA for customers accessing a specific app, or block access from specified geographies.
3535
- **Integrate with Azure AD B2C user flows and Identity Experience Framework custom policies**. Use your existing customized experiences and add the controls you need to interface with Conditional Access. You can also implement advanced scenarios for granting access, such as knowledge-based access or your own preferred MFA provider.

articles/active-directory-b2c/conditional-access-user-flow.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Add Conditional Access to a user flow in Azure AD B2C
33
description: Learn how to add Conditional Access to your Azure AD B2C user flows. Configure multifactor authentication (MFA) settings and Conditional Access policies in your user flows to enforce policies and remediate risky sign-ins.
44

55
ms.service: active-directory
6-
ms.subservice: conditional-access
6+
ms.subservice: B2C
77
ms.topic: overview
88
ms.date: 01/11/2024
99
ms.author: kengaderdus
@@ -40,13 +40,13 @@ The following example shows a Conditional Access technical profile that is used
4040
</TechnicalProfile>
4141
```
4242

43-
To ensure that Identity Protection signals are evaluated properly, you'll want to call the `ConditionalAccessEvaluation` technical profile for all users, including both [local and social accounts](technical-overview.md#consumer-accounts). Otherwise, Identity Protection will indicate an incorrect degree of risk associated with users.
43+
To ensure that Identity Protection signals are evaluated properly, you'll want to call the `ConditionalAccessEvaluation` technical profile for all users, including both [local and social accounts](technical-overview.md#consumer-accounts). Otherwise, Identity Protection indicates an incorrect degree of risk associated with users.
4444
::: zone-end
4545
In the *Remediation* phase that follows, the user is challenged with MFA. Once complete, Azure AD B2C informs Identity Protection that the identified sign-in threat has been remediated and by which method. In this example, Azure AD B2C signals that the user has successfully completed the multifactor authentication challenge.
4646
The remediation may also happen through other channels. For example, when the account's password is reset, either by the administrator or by the user. You can check the user *Risk state* in the [risky users report](identity-protection-investigate-risk.md#navigating-the-risky-users-report).
4747
::: zone pivot="b2c-custom-policy"
4848
> [!IMPORTANT]
49-
> To remediate the risk successfully within the journey, make sure the *Remediation* technical profile is called after the *Evaluation* technical profile is executed. If *Evaluation* is invoked without *Remediation*, the risk state will be *At risk*.
49+
> To remediate the risk successfully within the journey, make sure the *Remediation* technical profile is called after the *Evaluation* technical profile is executed. If *Evaluation* is invoked without *Remediation*, the risk state indicates as *At risk*.
5050
When the *Evaluation* technical profile recommendation returns `Block`, the call to the *Evaluation* technical profile is not required. The risk state is set to *At risk*.
5151
The following example shows a Conditional Access technical profile used to remediate the identified threat:
5252

@@ -122,7 +122,7 @@ To add a Conditional Access policy:
122122

123123
| Include |License | Notes|
124124
|---|---|---|
125-
|**All users** | P1, P2 | This policy will affect all of your users. To be sure not to lock yourself out, exclude your administrative account by choosing **Exclude**, selecting **Directory roles**, and then selecting **Global Administrator** in the list. You can also select **Users and Groups** and then select your account in the **Select excluded users** list. |
125+
|**All users** | P1, P2 | This policy affects all of your users. To be sure not to lock yourself out, exclude your administrative account by choosing **Exclude**, selecting **Directory roles**, and then selecting **Global Administrator** in the list. You can also select **Users and Groups** and then select your account in the **Select excluded users** list. |
126126

127127
1. Select **Cloud apps or actions**, and then **Select apps**. Browse for your [relying party application](tutorial-register-applications.md).
128128
1. Select **Conditions**, and then select from the following conditions. For example, select **Sign-in risk** and **High**, **Medium**, and **Low** risk levels.
@@ -228,7 +228,7 @@ To configure your user based conditional access:
228228
7. Under **Conditions** > **User risk**, set **Configure** to **Yes**. Under **Configure user risk levels needed for policy to be enforced**
229229
1. Select **High** and **Medium**.
230230
2. Select **Done**.
231-
8. Under **Access controls** > **Grant**, select **Grant access**, **Require password change**, and select **Select**. **Require multi-factor authentication** will also be required by default.
231+
8. Under **Access controls** > **Grant**, select **Grant access**, **Require password change**, and select **Select**. **Require multi-factor authentication** is also be required by default.
232232
9. Confirm your settings and set **Enable policy** to **On**.
233233
10. Select **Create** to create to enable your policy.
234234

@@ -345,7 +345,7 @@ The following template can be used to create a Conditional Access policy with di
345345
## Add Conditional Access to a user flow
346346

347347
After you've added the Microsoft Entra Conditional Access policy, enable Conditional Access in your user flow or custom policy. When you enable Conditional Access, you don't need to specify a policy name.
348-
Multiple Conditional Access policies may apply to an individual user at any time. In this case, the most strict access control policy takes precedence. For example, if one policy requires MFA while the other blocks access, the user will be blocked.
348+
Multiple Conditional Access policies may apply to an individual user at any time. In this case, the most strict access control policy takes precedence. For example, if one policy requires MFA while the other blocks access, the user is blocked.
349349

350350
## Enable multifactor authentication (optional)
351351

@@ -386,7 +386,7 @@ To enable Conditional Access for a user flow, make sure the version supports Con
386386
### Configure claim other than phone number to be used for MFA
387387

388388
In the Conditional Access policy above, the `DoesClaimExist` claim transformation method checks if a claim contains a value, for example if the `strongAuthenticationPhoneNumber` claim contains a phone number.
389-
The claims transformation isn't limited to the `strongAuthenticationPhoneNumber` claim. Depending on the scenario, you can use any other claim. In the following XML snippet, the `strongAuthenticationEmailAddress` claim is checked instead. The claim you choose must have a valid value, otherwise the `IsMfaRegistered` claim will be set to `False`. When set to `False`, the Conditional Access policy evaluation returns a `Block` grant type, preventing the user from completing user flow.
389+
The claims transformation isn't limited to the `strongAuthenticationPhoneNumber` claim. Depending on the scenario, you can use any other claim. In the following XML snippet, the `strongAuthenticationEmailAddress` claim is checked instead. The claim you choose must have a valid value, otherwise the `IsMfaRegistered` claim is set to `False`. When set to `False`, the Conditional Access policy evaluation returns a `Block` grant type, preventing the user from completing user flow.
390390

391391
```xml
392392
<ClaimsTransformation Id="IsMfaRegisteredCT" TransformationMethod="DoesClaimExist">

articles/ai-services/openai/includes/model-matrix/quota.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,13 +18,13 @@ The default quota for models varies by model and region. Default quota limits ar
1818
| eastus | - | - | 80 K | - | 240 K | 240 K | 240 K | 350 K | 350 K | - | - | - | - | - | - | - |
1919
| eastus2 | 40 K | 80 K | 80 K | - | 300 K | - | 350 K | 350 K | 350 K | - | - | - | - | - | - | - |
2020
| francecentral | 20 K | 60 K | 80 K | - | 240 K | - | 240 K | - | - | - | - | - | - | - | - | - |
21-
| japaneast | 40 K | 80 K | - | 30 K | 313 K | - | 350 K | - | - | - | - | - | - | - | - | - |
21+
| japaneast | 40 K | 80 K | - | 30 K | 300 K | - | 350 K | - | - | - | - | - | - | - | - | - |
2222
| northcentralus | - | - | 80 K | - | 300 K | - | 350 K | - | - | 240 K | 250 K | 240 K | 250 K | 250 K | 250 K | 250 K |
2323
| norwayeast | - | - | 150 K | - | - | - | 350 K | - | - | - | - | - | - | - | - | - |
2424
| southafricanorth | - | - | - | - | - | - | 350 K | - | - | - | - | - | - | - | - | - |
2525
| southcentralus | - | - | 80 K | - | 240 K | - | 240 K | - | - | - | - | - | - | - | - | - |
2626
| southindia | - | - | 150 K | - | 300 K | - | 350 K | - | - | - | - | - | - | - | - | - |
27-
| swedencentral | 40 K | 80 K | 150 K | 30 K | 305 K | 240 K | 350 K | - | - | 240 K | 250 K | 240 K | 250 K | 250 K | 250 K | 250 K |
27+
| swedencentral | 40 K | 80 K | 150 K | 30 K | 300 K | 240 K | 350 K | - | - | 240 K | 250 K | 240 K | 250 K | 250 K | 250 K | 250 K |
2828
| switzerlandnorth | 40 K | 80 K | - | 30 K | 300 K | - | 350 K | - | - | - | - | - | - | - | - | - |
2929
| uksouth | 40 K | 80 K | 80 K | - | 240 K | - | 350 K | - | - | - | - | - | - | - | - | - |
3030
| westeurope | - | - | - | - | 240 K | - | 240 K | - | - | - | - | - | - | - | - | - |

articles/ai-services/openai/includes/whisper-python.md

Lines changed: 29 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ author: mrbullwinkle
44
ms.author: mbullwin
55
ms.service: openai
66
ms.topic: include
7-
ms.date: 1/25/2024
7+
ms.date: 3/19/2024
88
---
99

1010
## Python
@@ -18,16 +18,16 @@ ms.date: 1/25/2024
1818

1919
Install the OpenAI Python client library with:
2020

21-
# [OpenAI Python 0.28.1](#tab/python)
21+
# [OpenAI Python 1.x](#tab/python-new)
2222

2323
```console
24-
pip install openai==0.28.1
24+
pip install openai
2525
```
2626

27-
# [OpenAI Python 1.x](#tab/python-new)
27+
# [OpenAI Python 0.28.1](#tab/python)
2828

2929
```console
30-
pip install openai
30+
pip install openai==0.28.1
3131
```
3232

3333
---
@@ -36,30 +36,30 @@ pip install openai
3636

3737
1. Replace the contents of quickstart.py with the following code. Modify the code to add your deployment name:
3838

39-
```python
40-
import openai
41-
import time
42-
import os
43-
44-
openai.api_key = os.getenv("AZURE_OPENAI_API_KEY")
45-
openai.api_base = os.getenv("AZURE_OPENAI_ENDPOINT") # your endpoint should look like the following https://YOUR_RESOURCE_NAME.openai.azure.com/
46-
openai.api_type = "azure"
47-
openai.api_version = "2024-02-01"
48-
49-
model_name = "whisper"
50-
deployment_id = "YOUR-DEPLOYMENT-NAME-HERE" #This will correspond to the custom name you chose for your deployment when you deployed a model."
51-
audio_language="en"
52-
53-
audio_test_file = "./wikipediaOcelot.wav"
54-
55-
result = openai.Audio.transcribe(
56-
file=open(audio_test_file, "rb"),
57-
model=model_name,
58-
deployment_id=deployment_id
59-
)
60-
61-
print(result)
62-
```
39+
```python
40+
import openai
41+
import time
42+
import os
43+
44+
openai.api_key = os.getenv("AZURE_OPENAI_API_KEY")
45+
openai.api_base = os.getenv("AZURE_OPENAI_ENDPOINT") # your endpoint should look like the following https://YOUR_RESOURCE_NAME.openai.azure.com/
46+
openai.api_type = "azure"
47+
openai.api_version = "2024-02-01"
48+
49+
model_name = "whisper"
50+
deployment_id = "YOUR-DEPLOYMENT-NAME-HERE" #This will correspond to the custom name you chose for your deployment when you deployed a model."
51+
audio_language="en"
52+
53+
audio_test_file = "./wikipediaOcelot.wav"
54+
55+
result = openai.Audio.transcribe(
56+
file=open(audio_test_file, "rb"),
57+
model=model_name,
58+
deployment_id=deployment_id
59+
)
60+
61+
print(result)
62+
```
6363

6464
Run the application with the python command on your quickstart file:
6565

articles/ai-services/openai/whisper-quickstart.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ manager: nitinme
66
ms.service: azure-ai-openai
77
ms.custom: devx-track-python
88
ms.topic: quickstart
9-
ms.date: 2/1/2024
9+
ms.date: 3/19/2024
1010
ms.reviewer: v-baolianzou
1111
ms.author: eur
1212
author: eric-urban

0 commit comments

Comments
 (0)