Skip to content

Commit 744b348

Browse files
authored
Merge pull request #250013 from MicrosoftDocs/main
8/31/2023 AM Publish
2 parents 8132c06 + 16cc503 commit 744b348

29 files changed

+547
-121
lines changed

articles/active-directory/develop/scenario-mobile-app-registration.md

Lines changed: 11 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -40,25 +40,23 @@ For more information, see [Scenarios and supported authentication flows](authent
4040

4141
### Interactive authentication
4242

43-
When you build a mobile app that uses interactive authentication, the most critical registration step is the redirect URI. You can set interactive authentication through the [platform configuration on the **Authentication** blade](https://aka.ms/MobileAppReg).
43+
When you build a mobile app that uses interactive authentication, the most critical registration step is the redirect URI. This experience enables your app to get single sign-on (SSO) through Microsoft Authenticator (and Intune Company Portal on Android). It also supports device management policies.
4444

45-
This experience will enable your app to get single sign-on (SSO) through Microsoft Authenticator (and Intune Company Portal on Android). It will also support device management policies.
46-
47-
The app registration portal provides a preview experience to help you compute the brokered reply URI for iOS and Android applications:
48-
49-
1. In the app registration portal, select **Authentication** > **Try out the new experience**.
50-
51-
![The Authentication blade, where you choose a new experience](https://user-images.githubusercontent.com/13203188/60799285-2d031b00-a173-11e9-9d28-ac07a7ae894a.png)
52-
53-
2. Select **Add a platform**.
45+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Developer](../roles/permissions-reference.md#application-developer).
46+
1. Browse to **Identity** > **Applications** > **App registrations**.
47+
1. Select **New registration**.
48+
1. Enter a **Name** for the application.
49+
1. For **Supported account types**, select **Accounts in this organizational directory only**.
50+
1. Select **Register**.
51+
1. Select **Authentication** and then select **Add a platform**.
5452

5553
![Add a platform](https://user-images.githubusercontent.com/13203188/60799366-4c01ad00-a173-11e9-934f-f02e26c9429e.png)
5654

57-
3. When the list of platforms is supported, select **iOS**.
55+
1. When the list of platforms is supported, select **iOS / macOS**.
5856

5957
![Choose a mobile application](https://user-images.githubusercontent.com/13203188/60799411-60de4080-a173-11e9-9dcc-d39a45826d42.png)
6058

61-
4. Enter your bundle ID, and then select **Register**.
59+
1. Enter your bundle ID, and then select **Configure**.
6260

6361
![Enter your bundle ID](https://user-images.githubusercontent.com/13203188/60799477-7eaba580-a173-11e9-9f8b-431f5b09344e.png)
6462

@@ -81,7 +79,7 @@ If your app uses only username-password authentication, you don't need to regist
8179

8280
However, identify your application as a public client application. To do so:
8381

84-
1. Still in the <a href="https://portal.azure.com/" target="_blank">Azure portal</a>, select your app in **App registrations**, and then select **Authentication**.
82+
1. Still in the Microsoft Entra admin center, select your app in **App registrations**, and then select **Authentication**.
8583
1. In **Advanced settings** > **Allow public client flows** > **Enable the following mobile and desktop flows:**, select **Yes**.
8684

8785
:::image type="content" source="media/scenarios/default-client-type.png" alt-text="Enable public client setting on Authentication pane in Azure portal":::

articles/active-directory/develop/tutorial-blazor-webassembly.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ We also have a [tutorial for Blazor Server](tutorial-blazor-server.md).
3232
- [.NET Core 7.0 SDK](https://dotnet.microsoft.com/download/dotnet-core/7.0)
3333
- An Azure AD tenant where you can register an app. If you don't have access to an Azure AD tenant, you can get one by registering with the [Microsoft 365 Developer Program](https://developer.microsoft.com/microsoft-365/dev-program) or by creating an [Azure free account](https://azure.microsoft.com/free).
3434

35-
## Register the app in the Azure portal
35+
## Register the app
3636

3737
Every app that uses Azure AD for authentication must be registered with Azure AD. Follow the instructions in [Register an application](quickstart-register-app.md) with these specifications:
3838

@@ -47,11 +47,11 @@ To create the application, run the following command. Replace the placeholders i
4747
dotnet new blazorwasm --auth SingleOrg --calls-graph -o {APP NAME} --client-id "{CLIENT ID}" --tenant-id "{TENANT ID}" -f net7.0
4848
```
4949

50-
| Placeholder | Azure portal name | Example |
51-
| ------------- | ----------------------- | -------------------------------------- |
52-
| `{APP NAME}` | &mdash; | `BlazorWASMSample` |
50+
| Placeholder | Name | Example |
51+
| ----------- | ---- |-------- |
52+
| `{APP NAME}` | &mdash; | `BlazorWASMSample` |
5353
| `{CLIENT ID}` | Application (client) ID | `41451fa7-0000-0000-0000-69eff5a761fd` |
54-
| `{TENANT ID}` | Directory (tenant) ID | `e86c78e2-0000-0000-0000-918e0565a45e` |
54+
| `{TENANT ID}` | Directory (tenant) ID | `e86c78e2-0000-0000-0000-918e0565a45e` |
5555

5656
## Test the app
5757

@@ -77,7 +77,7 @@ Now you'll update your app's registration and code to pull a user's emails and d
7777

7878
First, add the `Mail.Read` API permission to the app's registration so that Azure AD is aware that the app will request to access its users' email.
7979

80-
1. In the Azure portal, select your app in **App registrations**.
80+
1. In the Microsoft Entra admin center, select your app in **App registrations**.
8181
1. Under **Manage**, select **API permissions**.
8282
1. Select **Add a permission** > **Microsoft Graph**.
8383
1. Select **Delegated Permissions**, then search for and select the **Mail.Read** permission.

articles/active-directory/develop/tutorial-v2-android.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ In this tutorial:
2626
> [!div class="checklist"]
2727
>
2828
> - Create an Android app project in _Android Studio_
29-
> - Register the app in the Azure portal
29+
> - Register the app in the Microsoft Entra admin center
3030
> - Add code to support user sign-in and sign-out
3131
> - Add code to call the Microsoft Graph API
3232
> - Test the app
@@ -51,18 +51,18 @@ Follow these steps to create a new project if you don't already have an Android
5151
1. Open Android Studio, and select **Start a new Android Studio project**.
5252
2. Select **Basic Activity** and select **Next**.
5353
3. Enter a name for the application, such as _MSALAndroidapp_.
54-
4. Record the package name to be used in the Azure portal in later steps.
54+
4. Record the package name to be used in later steps.
5555
5. Change the language from **Kotlin** to **Java**.
5656
6. Set the **Minimum SDK API level** to **API 19** or higher, and select **Finish**.
5757

5858
### Register your application with Azure AD
5959

6060
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
6161

62-
1. Sign in to the <a href="https://portal.azure.com/" target="_blank">Azure portal</a>.
63-
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="./media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which you want to register the application.
64-
1. Search for and select **Azure Active Directory**.
65-
1. Under **Manage**, select **App registrations** > **New registration**.
62+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Developer](../roles/permissions-reference.md#application-developer).
63+
1. If access to multiple tenants is available, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which you want to register the application.
64+
1. Browse to **Identity** > **Applications** > **App registrations**.
65+
1. Select **New registration**.
6666
1. Enter a **Name** for your application. Users of your app might see this name, and you can change it later.
6767
1. For **Supported account types**, select **Accounts in any organizational directory (Any Azure AD directory - Multitenant) and personal Microsoft accounts (e.g. Skype, Xbox)**. For information on different account types, select the **Help me choose** option.
6868
1. Select **Register**.
@@ -129,8 +129,8 @@ Follow these steps to create a new project if you don't already have an Android
129129
</activity>
130130
```
131131

132-
- Use your Azure portal **Package name** to replace `android:host=.` value. It should look like `com.azuresamples.msalandroidapp`.
133-
- Use your Azure portal **Signature Hash** to replace `android:path=` value. Ensure that there's a leading `/` at the beginning of your Signature Hash. It should look like `/1wIqXSqBj7w+h11ZifsnqwgyKrY=`.
132+
- Use the **Package name** to replace `android:host=.` value. It should look like `com.azuresamples.msalandroidapp`.
133+
- Use the **Signature Hash** to replace `android:path=` value. Ensure that there's a leading `/` at the beginning of your Signature Hash. It should look like `/1wIqXSqBj7w+h11ZifsnqwgyKrY=`.
134134

135135
You can find these values in the Authentication blade of your app registration as well.
136136

articles/active-directory/external-identities/customers/faq-customers.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,6 +67,10 @@ Opt for the next generation Microsoft Entra External ID platform if:
6767
- You’re starting fresh building identities into apps or you're in the early stages of product discovery.
6868
- The benefits of rapid innovation, new features and capabilities are a priority.
6969

70+
### Why is Azure AD B2C not part of Entra ID/External ID?
71+
72+
Microsoft Entra External ID and Azure AD B2C are two separate platforms powered by ESTS and IEF respectively. Entra External ID is our new converged platform which is future proof and developer friendly to meet all your identity needs – B2E, B2B and B2C. At the same time, we will still continue to support Azure AD B2C as a separate product offering with no change in SLA, and we’ll continue investments in the product to ensure security, availability, and reliability.
73+
7074
## Next steps
7175

72-
[Learn more about Microsoft Entra External ID for customers](index.yml)
76+
[Learn more about Microsoft Entra External ID for customers](index.yml)

articles/ai-services/openai/concepts/use-your-data.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -224,7 +224,7 @@ Azure OpenAI on your data provides several search options you can use when you a
224224
| *semantic* | Semantic search | Additional pricing for [semantic search](/azure/search/semantic-search-overview#availability-and-pricing) usage. |
225225
| *vector* | Vector search | [Additional pricing](https://azure.microsoft.com/pricing/details/cognitive-services/openai-service/) on your Azure OpenAI account from calling the embedding model. |
226226
| *vector + simple* | A hybrid of vector search and simple search | [Additional pricing](https://azure.microsoft.com/pricing/details/cognitive-services/openai-service/) on your Azure OpenAI account from calling the embedding model. |
227-
| *vector + semantic* | A hybrid of vector search and semantic search for retrieval. | [Additional pricing](https://azure.microsoft.com/pricing/details/cognitive-services/openai-service/) on your Azure OpenAI account from calling the embedding model, and additional pricing for [semantic search](/azure/search/semantic-search-overview#availability-and-pricing) usage. |
227+
| *vector + semantic + simple * | A hybrid of vector search, simple search (keyword based) and semantic search for retrieval | [Additional pricing](https://azure.microsoft.com/pricing/details/cognitive-services/openai-service/) on your Azure OpenAI account from calling the embedding model, and additional pricing for [semantic search](/azure/search/semantic-search-overview#availability-and-pricing) usage. |
228228

229229
The optimal search option can vary depending on your dataset and use-case. You may need to experiment with multiple options to determine which works best for your use-case.
230230

articles/azure-large-instances/toc.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,5 +20,5 @@
2020
items:
2121
- name: Azure Large Instances for Epic workload
2222
href: ./workloads/epic/index.yml
23-
- name: FAQ
24-
href: faq.md
23+
- name: FAQ
24+
href: faq.md
Lines changed: 26 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -1,49 +1,53 @@
11
---
2-
title: Enable SQL Azure hybrid benefit for Azure VMware Solution
3-
description: This article shows you how to apply SQL Azure hybrid benefits to your Azure VMware Solution private cloud by configuring a placement policy.
2+
title: Enable Azure Hybrid Benefit for SQL Server in Azure VMware Solution
3+
author: jjaygbay1
4+
ms.author: jacobjaygbay
5+
description: This article shows you how to apply Enable Azure Hybrid Benefit for SQL Server in Azure VMware Solution to your Azure VMware Solution private cloud by configuring a placement policy.
46
ms.topic: how-to
57
ms.service: azure-vmware
68
ms.date: 02/14/2023
79
---
810

9-
# Enable SQL Azure hybrid benefit for Azure VMware Solution
11+
# Enable Azure Hybrid Benefit for SQL Server in Azure VMware Solution
1012

11-
In this article, you’ll learn how to configure SQL Azure hybrid benefits to an Azure VMware Solution private cloud by configuring a placement policy. The placement policy defines the hosts that are running SQL as well as the virtual machines on that host.
12-
>[!IMPORTANT]
13-
> It is important to note that SQL benefits are applied at the host level.
13+
In this article, you’ll learn how to configure Azure Hybrid Benefit for SQL Server in an Azure VMware Solution private cloud by configuring a placement policy. The placement policy defines the hosts that are running SQL Server as well as the virtual machines on that host.
1414

15-
For example, if each host in Azure VMware Solution has 36 cores and you signal that two hosts run SQL, then SQL Azure hybrid benefit will apply to 72 cores irrespective of the number of SQL or other virtual machines on that host.
15+
> [!IMPORTANT]
16+
> It is important to note that SQL Server benefits are applied at the host level.
1617
17-
You can also choose to view a video tutorial for configuring SQL Azure hybrid benefits for Azure VMware Solution [here](https://www.youtube.com/watch?v=vJIQ1K2KTa0).
18+
For example, if each host in Azure VMware Solution has 36 cores and you intend to have 2 hosts run SQL Server then the Azure Hybrid Benefit will apply to 72 cores, irrespective of the number of SQL Server instances or other virtual machines are on that host.
1819

19-
## Configure host-VM placement policy
20-
1. From your Azure VMware Solution private cloud, select Azure hybrid benefit, then Create host-VM placement policy.
21-
:::image type="content" source="media/sql-azure-hybrid-benefit/azure-hybrid-benefit.png" alt-text="Diagram that shows how to create a host new virtual machine placement policy.":::
20+
You can also choose to view a video tutorial for configuring Azure Hybrid Benefit for SQL Server in Azure VMware Solution [here](https://www.youtube.com/watch?v=vJIQ1K2KTa0).
2221

23-
1. Fill in the required fields for creating the placement policy.
24-
1. **Name** – Select the name that identifies this policy.
22+
## Configure host-VM placement policy
23+
24+
1. From your Azure VMware Solution private cloud, select Azure hybrid benefit, then Create host-VM placement policy.
25+
26+
:::image type="content" source="media/sql-azure-hybrid-benefit/azure-hybrid-benefit.png" alt-text="Diagram that shows how to create a host new virtual machine placement policy.":::
27+
28+
1. Fill in the required fields for creating the placement policy.
29+
1. **Name** – Select the name that identifies this policy.
2530
2. **Type** – Select the type of policy. This type must be a VM-Host affinity rule only.
2631
3. **Azure hybrid benefit** – Select the checkbox to apply the SQL Azure hybrid benefit.
2732
4. **Cluster** – Select the correct cluster. The policy is scoped to host in this cluster only.
28-
1. **Enabled** – Select enabled to apply the policy immediately once created.
29-
33+
5. **Enabled** – Select enabled to apply the policy immediately once created.
3034
:::image type="content" source="media/sql-azure-hybrid-benefit/create-placement-policy.png" alt-text="Diagram that shows how to create a host virtual machine placement policy using the host VM affinity.":::
31-
3. Select the hosts and VMs that will be applied to the VM-Host affinity policy.
35+
2. Select the hosts and VMs that will be applied to the VM-Host affinity policy.
3236
1. **Add Hosts** – Select the hosts that will be running SQL. When hosts are replaced, policies are re-created on the new hosts automatically.
3337
2. **Add VMs** – Select the VMs that should run on the selected hosts.
3438
3. **Review and Create** the policy.
3539
:::image type="content" source="media/sql-azure-hybrid-benefit/select-policy-host.png" alt-text="Diagram that shows how to create a host virtual machine affinity.":::
3640

37-
## Manage placement policies
41+
## Manage placement policies
3842

39-
After creating the placement policy, you can review, manage, or edit the policy by way of the Placement policies menu in the Azure VMware Solution private cloud.
43+
After creating the placement policy, you can review, manage, or edit the policy by way of the Placement policies menu in the Azure VMware Solution private cloud.
4044

41-
By checking the Azure hybrid benefit checkbox in the configuration setting, you can enable existing host-VM affinity policies with the SQL Azure hybrid benefit.
45+
By checking the Azure Hybrid Benefit checkbox in the configuration setting, you can enable existing host-VM affinity policies with the Azure Hybrid Benefit for SQL Server.
4246

43-
:::image type="content" source="media/sql-azure-hybrid-benefit/placement-policies.png" alt-text="Diagram that shows how to configure virtual machine placement policies.":::
47+
:::image type="content" source="media/sql-azure-hybrid-benefit/placement-policies.png" alt-text="Diagram that shows how to configure virtual machine placement policies.":::
4448

4549
## Next steps
46-
[Azure Hybrid Benefit](https://azure.microsoft.com/pricing/hybrid-benefit/)
4750

48-
[Attach Azure NetApp Files datastores to Azure VMware Solution hosts](attach-azure-netapp-files-to-azure-vmware-solution-hosts.md)
51+
[Azure Hybrid Benefit](https://azure.microsoft.com/pricing/hybrid-benefit/)
4952

53+
[Attach Azure NetApp Files datastores to Azure VMware Solution hosts](attach-azure-netapp-files-to-azure-vmware-solution-hosts.md)

0 commit comments

Comments
 (0)