You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The transcription result can be stored in an Azure container. If you don't specify a container, the Speech service stores the results in a container managed by Microsoft. In that case, when the transcription job is deleted, the transcription result data is also deleted.
355
355
356
-
You can store the results of a batch transcription to a writable Azure Blob storage container using option `destinationContainerUrl` in the [batch transcription creation request](#create-a-transcription-job). This option uses only an [ad hoc SAS](batch-transcription-audio-data.md#sas-url-for-batch-transcription) URI and doesn't support [Trusted Azure services security mechanism](batch-transcription-audio-data.md#trusted-azure-services-security-mechanism). This option also doesn't support Access policy based SAS. The Storage account resource of the destination container must allow all external traffic.
356
+
You can store the results of a batch transcription to a writable Azure Blob storage container using option `destinationContainerUrl` in the [batch transcription creation request](#create-a-transcription-job). This option uses only an [ad hoc SAS](batch-transcription-audio-data.md#sas-url-for-batch-transcription) URI and doesn't support [Trusted Azure services security mechanism](batch-transcription-audio-data.md#trusted-azure-services-security-mechanism). This option also doesn't support Access policy based SAS. **The Storage account resource of the destination container must allow all external traffic.**
357
357
358
358
If you want to store the transcription results in an Azure Blob storage container by using the [Trusted Azure services security mechanism](batch-transcription-audio-data.md#trusted-azure-services-security-mechanism), consider using [Bring-your-own-storage (BYOS)](bring-your-own-storage-speech-resource.md). For more information, see [Use the Bring your own storage (BYOS) Speech resource for speech to text](bring-your-own-storage-speech-resource-speech-to-text.md).
Copy file name to clipboardExpand all lines: articles/ai-services/speech-service/personal-voice-how-to-use.md
+1-3Lines changed: 1 addition & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,14 +44,12 @@ Here's example SSML in a request for text to speech with the voice name and the
44
44
</speak>
45
45
```
46
46
47
-
You can use the SSML via the [Speech SDK](./get-started-text-to-speech.md), [REST API](rest-text-to-speech.md), or [batch synthesis API](batch-synthesis.md).
47
+
You can use the SSML via the [Speech SDK](./get-started-text-to-speech.md) or [REST API](rest-text-to-speech.md).
48
48
49
49
***Real-time speech synthesis**: Use the [Speech SDK](./get-started-text-to-speech.md) or [REST API](rest-text-to-speech.md) to convert text to speech.
50
50
* When you use Speech SDK, don't set Endpoint Id, just like prebuild voice.
51
51
* When you use REST API, please use prebuilt neural voices endpoint.
52
52
53
-
***Asynchronous synthesis of long audio**: Use the [batch synthesis API](batch-synthesis.md) (Preview) to asynchronously synthesize text to speech files longer than 10 minutes (for example, audio books or lectures). Unlike synthesis performed via the Speech SDK or Speech to text REST API, responses aren't returned in real-time. The expectation is that requests are sent asynchronously, responses are polled for, and synthesized audio is downloaded when the service makes it available.
Copy file name to clipboardExpand all lines: articles/aks/trusted-access-feature.md
+5-40Lines changed: 5 additions & 40 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,20 +4,18 @@ description: Learn how to use the Trusted Access feature to give Azure resources
4
4
author: schaffererin
5
5
ms.topic: article
6
6
ms.custom: devx-track-azurecli
7
-
ms.date: 12/04/2023
7
+
ms.date: 03/05/2024
8
8
ms.author: schaffererin
9
9
---
10
10
11
-
# Get secure access for Azure resources in Azure Kubernetes Service by using Trusted Access (preview)
11
+
# Get secure access for Azure resources in Azure Kubernetes Service by using Trusted Access
12
12
13
13
Many Azure services that integrate with Azure Kubernetes Service (AKS) need access to the Kubernetes API server. To avoid granting these services admin access or making your AKS clusters public for network access, you can use the AKS Trusted Access feature.
14
14
15
-
This feature gives services secure access to AKS and Kubernetes by using the Azure back end without requiring a private endpoint. Instead of relying on identities that have [Microsoft Entra](../active-directory/fundamentals/active-directory-whatis.md) permissions, this feature can use your system-assigned managed identity to authenticate with the managed services and applications that you want to use with your AKS clusters.
15
+
This feature gives services secure access to AKS API server by using the Azure back end without requiring a private endpoint. Instead of relying on identities that have [Microsoft Entra](../active-directory/fundamentals/active-directory-whatis.md) permissions, this feature can use your system-assigned managed identity to authenticate with the managed services and applications that you want to use with your AKS clusters.
16
16
17
17
This article shows you how to get secure access for your Azure services to your Kubernetes API server in AKS by using Trusted Access.
18
18
19
-
[!INCLUDE [preview features callout](./includes/preview/preview-callout.md)]
20
-
21
19
> [!NOTE]
22
20
> The Trusted Access API is generally available. We provide general availability (GA) support for the Azure CLI, but it's still in preview and requires using the aks-preview extension.
23
21
@@ -35,46 +33,12 @@ You can use Trusted Access to give explicit consent to your system-assigned mana
35
33
36
34
* An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
37
35
* Resource types that support [system-assigned managed identity](../active-directory/managed-identities-azure-resources/overview.md).
38
-
* If you're using the Azure CLI, the aks-preview extension version 0.5.74 or later is required.
36
+
* Azure CLI version 2.53.0 or later. Run `az --version` to find your version. If you need to install or upgrade, see [Install Azure CLI][azure-cli-install].
39
37
* To learn what roles to use in different scenarios, see these articles:
40
38
*[Azure Machine Learning access to AKS clusters with special configurations](https://github.com/Azure/AML-Kubernetes/blob/master/docs/azureml-aks-ta-support.md)
41
39
*[What is Azure Kubernetes Service backup?][aks-azure-backup]
42
40
*[Turn on an agentless container posture](../defender-for-cloud/concept-agentless-containers.md)
43
41
44
-
## Get started
45
-
46
-
First, install the aks-preview extension:
47
-
48
-
```azurecli
49
-
az extension add --name aks-preview
50
-
```
51
-
52
-
Run the following command to update to the latest version of the extension:
53
-
54
-
```azurecli
55
-
az extension update --name aks-preview
56
-
```
57
-
58
-
Then, register the TrustedAccessPreview feature flag by using the [az feature register][az-feature-register] command.
59
-
60
-
Here's an example:
61
-
62
-
```azurecli-interactive
63
-
az feature register --namespace "Microsoft.ContainerService" --name "TrustedAccessPreview"
64
-
```
65
-
66
-
It takes a few minutes for the status to appear as **Registered**. Verify the registration status by using the [az feature show][az-feature-show] command:
67
-
68
-
```azurecli-interactive
69
-
az feature show --namespace "Microsoft.ContainerService" --name "TrustedAccessPreview"
70
-
```
71
-
72
-
When the status is **Registered**, refresh the registration of the Microsoft.ContainerService resource provider by using the [az provider register][az-provider-register] command:
73
-
74
-
```azurecli-interactive
75
-
az provider register --namespace Microsoft.ContainerService
76
-
```
77
-
78
42
## Create an AKS cluster
79
43
80
44
In the same subscription as the Azure resource that you want to access the cluster, [create an AKS cluster](tutorial-kubernetes-deploy-cluster.md).
@@ -171,3 +135,4 @@ az aks trustedaccess rolebinding delete --name <role binding name> --resource-gr
authentication = os.getenv('AZURE_SQL_AUTHENTICATION')# The value should be 'ActiveDirectoryMsi'
89
89
90
90
# Uncomment the following lines according to the authentication type.
91
91
# For system-assigned managed identity.
92
92
# connString = f'Driver={{ODBC Driver 18 for SQL Server}};Server={server},{port};Database={database};Authentication={authentication};Encrypt=yes;'
93
93
94
94
# For user-assigned managed identity.
95
-
#user = os.getenv('AZURE_SQL_USER')
96
-
# connString = f'Driver={{ODBC Driver 18 for SQL Server}};Server={server},{port};Database={database};UID={user};Authentication={authentication};Encrypt=yes;'
95
+
#client_id = os.getenv('AZURE_SQL_USER')
96
+
# connString = f'Driver={{ODBC Driver 18 for SQL Server}};Server={server},{port};Database={database};UID={client_id};Authentication={authentication};Encrypt=yes;'
97
97
98
98
conn = pyodbc.connect(connString)
99
99
```
100
-
100
+
For an alternative method, you can also connect to Azure SQL Database using an access token, refer to [Migrate a Python application to use passwordless connections with Azure SQL Database](/azure/azure-sql/database/azure-sql-passwordless-migration-python).
101
101
102
102
### [NodeJS](#tab/nodejs)
103
103
@@ -135,13 +135,11 @@ For more information, see [Connect using Microsoft Entra authentication](/sql/co
Copy file name to clipboardExpand all lines: articles/app-service/tutorial-connect-msi-azure-database.md
+16-12Lines changed: 16 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -188,27 +188,31 @@ If you encounter any problem when creating a connection, refer to [Troubleshooti
188
188
189
189
## 3. Modify your code
190
190
191
-
In this section, connectivity to the Azure database in your code follows the `DefaultAzureCredential` pattern for all language stacks. `DefaultAzureCredential` is flexible enough to adapt to both the development environment and the Azure environment. When running locally, it can retrieve the logged-in Azure user from the environment of your choice (Visual Studio, Visual Studio Code, Azure CLI, or Azure PowerShell). When running in Azure, it retrieves the managed identity. So it's possible to have connectivity to database both at development time and in production. The pattern is as follows:
192
-
193
-
1. Instantiate a `DefaultAzureCredential` from the Azure Identity client library. If you're using a user-assigned identity, specify the client ID of the identity.
194
-
2. Get an access token for the resource URI respective to the database type.
195
-
* For Azure SQL Database: `https://database.windows.net/.default`
196
-
* For Azure Database for MySQL: `https://ossrdbms-aad.database.windows.net/.default`
197
-
* For Azure Database for PostgreSQL: `https://ossrdbms-aad.database.windows.net/.default`
198
-
3. Add the token to your connection string.
199
-
4. Open the connection.
200
-
201
191
# [Azure SQL Database](#tab/sqldatabase-sc)
202
192
203
-
[!INCLUDE [code sample for postgres managed identity authentication connection](./includes/tutorial-connect-msi-azure-database/code-sql-mi.md)]
193
+
[!INCLUDE [code sample for sql managed identity authentication connection](./includes/tutorial-connect-msi-azure-database/code-sql-mi.md)]
204
194
205
195
# [Azure Database for MySQL](#tab/mysql-sc)
206
196
197
+
Connectivity to the Azure Database for MySQL in your code follows the `DefaultAzureCredential` pattern for all language stacks. `DefaultAzureCredential` is flexible enough to adapt to both the development environment and the Azure environment. When running locally, it can retrieve the logged-in Azure user from the environment of your choice (Visual Studio, Visual Studio Code, Azure CLI, or Azure PowerShell). When running in Azure, it retrieves the managed identity. So it's possible to have connectivity to database both at development time and in production. The pattern is as follows:
198
+
199
+
1. Instantiate a `DefaultAzureCredential` from the Azure Identity client library. If you're using a user-assigned identity, specify the client ID of the identity.
200
+
2. Get an access token for Azure Database for MySQL: `https://ossrdbms-aad.database.windows.net/.default`.
201
+
3. Add the token to your connection string.
202
+
4. Open the connection.
203
+
207
204
[!INCLUDE [code sample for mysql managed identity authentication connection](./includes/tutorial-connect-msi-azure-database/code-mysql-mi.md)]
208
205
209
206
# [Azure Database for PostgreSQL](#tab/postgresql-sc)
210
207
211
-
[!INCLUDE [code sample for sql managed identity authentication connection](./includes/tutorial-connect-msi-azure-database/code-postgres-mi.md)]
208
+
Connectivity to the Azure Database for PostgreSQL in your code follows the `DefaultAzureCredential` pattern for all language stacks. `DefaultAzureCredential` is flexible enough to adapt to both the development environment and the Azure environment. When running locally, it can retrieve the logged-in Azure user from the environment of your choice (Visual Studio, Visual Studio Code, Azure CLI, or Azure PowerShell). When running in Azure, it retrieves the managed identity. So it's possible to have connectivity to database both at development time and in production. The pattern is as follows:
209
+
210
+
1. Instantiate a `DefaultAzureCredential` from the Azure Identity client library. If you're using a user-assigned identity, specify the client ID of the identity.
211
+
2. Get an access token for Azure Database for PostgreSQL: `https://ossrdbms-aad.database.windows.net/.default`.
212
+
3. Add the token to your connection string.
213
+
4. Open the connection.
214
+
215
+
[!INCLUDE [code sample for postgres managed identity authentication connection](./includes/tutorial-connect-msi-azure-database/code-postgres-mi.md)]
0 commit comments