Skip to content

Commit 77fa4e6

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into rslanding
2 parents 7a5648c + 00c9623 commit 77fa4e6

File tree

18 files changed

+348
-30
lines changed

18 files changed

+348
-30
lines changed

articles/active-directory/develop/howto-create-service-principal-portal.md

Lines changed: 18 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -8,14 +8,14 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: how-to
11-
ms.date: 10/11/2021
11+
ms.date: 08/26/2022
1212
ms.author: ryanwi
1313
ms.custom: aaddev, identityplatformtop40, subject-rbac-steps
1414
---
1515

1616
# Use the portal to create an Azure AD application and service principal that can access resources
1717

18-
This article shows you how to create a new Azure Active Directory (Azure AD) application and service principal that can be used with the role-based access control. When you have applications, hosted services, or automated tools that needs to access or modify resources, you can create an identity for the app. This identity is known as a service principal. Access to resources is restricted by the roles assigned to the service principal, giving you control over which resources can be accessed and at which level. For security reasons, it's always recommended to use service principals with automated tools rather than allowing them to log in with a user identity.
18+
This article shows you how to create a new Azure Active Directory (Azure AD) application and service principal that can be used with the role-based access control. When you have applications, hosted services, or automated tools that need to access or modify resources, you can create an identity for the app. This identity is known as a service principal. Access to resources is restricted by the roles assigned to the service principal, giving you control over which resources can be accessed and at which level. For security reasons, it's always recommended to use service principals with automated tools rather than allowing them to log in with a user identity.
1919

2020
This article shows you how to use the portal to create the service principal in the Azure portal. It focuses on a single-tenant application where the application is intended to run within only one organization. You typically use single-tenant applications for line-of-business applications that run within your organization. You can also [use Azure PowerShell to create a service principal](howto-authenticate-service-principal-powershell.md).
2121

@@ -50,17 +50,17 @@ To check your subscription permissions:
5050

5151
1. Search for and select **Subscriptions**, or select **Subscriptions** on the **Home** page.
5252

53-
![Search](./media/howto-create-service-principal-portal/select-subscription.png)
53+
:::image type="content" source="media/howto-create-service-principal-portal/select-subscription.png" alt-text="Screenshot how to search subscription permissions.":::
5454

5555
1. Select the subscription you want to create the service principal in.
5656

57-
![Select subscription for assignment](./media/howto-create-service-principal-portal/select-one-subscription.png)
57+
:::image type="content" source="media/howto-create-service-principal-portal/select-one-subscription.png" alt-text="Select subscription for assignment.":::
5858

5959
If you don't see the subscription you're looking for, select **global subscriptions filter**. Make sure the subscription you want is selected for the portal.
6060

6161
1. Select **My permissions**. Then, select **Click here to view complete access details for this subscription**.
6262

63-
![Select the subscription you want to create the service principal in](./media/howto-create-service-principal-portal/view-details.png)
63+
:::image type="content" source="media/howto-create-service-principal-portal/view-details.png" alt-text="Select the subscription you want to create the service principal in.":::
6464

6565
1. Select **Role assignments** to view your assigned roles, and determine if you have adequate permissions to assign a role to an AD app. If not, ask your subscription administrator to add you to User Access Administrator role. In the following image, the user is assigned the Owner role, which means that user has adequate permissions.
6666

@@ -74,9 +74,9 @@ Let's jump straight into creating the identity. If you run into a problem, check
7474
1. Select **Azure Active Directory**.
7575
1. Select **App registrations**.
7676
1. Select **New registration**.
77-
1. Name the application. Select a supported account type, which determines who can use the application. Under **Redirect URI**, select **Web** for the type of application you want to create. Enter the URI where the access token is sent to. You can't create credentials for a [Native application](../app-proxy/application-proxy-configure-native-client-application.md). You can't use that type for an automated application. After setting the values, select **Register**.
77+
1. Name the application, for example "example-app". Select a supported account type, which determines who can use the application. Under **Redirect URI**, select **Web** for the type of application you want to create. Enter the URI where the access token is sent to. You can't create credentials for a [Native application](../app-proxy/application-proxy-configure-native-client-application.md). You can't use that type for an automated application. After setting the values, select **Register**.
7878

79-
![Type a name for your application](./media/howto-create-service-principal-portal/create-app.png)
79+
:::image type="content" source="media/howto-create-service-principal-portal/create-app.png" alt-text="Type a name for your application.":::
8080

8181
You've created your Azure AD application and service principal.
8282

@@ -91,20 +91,22 @@ You can set the scope at the level of the subscription, resource group, or resou
9191

9292
1. In the Azure portal, select the level of scope you wish to assign the application to. For example, to assign a role at the subscription scope, search for and select **Subscriptions**, or select **Subscriptions** on the **Home** page.
9393

94-
![For example, assign a role at the subscription scope](./media/howto-create-service-principal-portal/select-subscription.png)
94+
:::image type="content" source="media/howto-create-service-principal-portal/select-subscription.png" alt-text="For example, assign a role at the subscription scope.":::
9595

9696
1. Select the particular subscription to assign the application to.
9797

98-
![Select subscription for assignment](./media/howto-create-service-principal-portal/select-one-subscription.png)
98+
:::image type="content" source="media/howto-create-service-principal-portal/select-one-subscription.png" alt-text="Select subscription for assignment.":::
9999

100100
If you don't see the subscription you're looking for, select **global subscriptions filter**. Make sure the subscription you want is selected for the portal.
101101

102102
1. Select **Access control (IAM)**.
103-
1. Select Select **Add** > **Add role assignment** to open the **Add role assignment** page.
104-
1. Select the role you wish to assign to the application. For example, to allow the application to execute actions like **reboot**, **start** and **stop** instances, select the **Contributor** role. Read more about the [available roles](../../role-based-access-control/built-in-roles.md) By default, Azure AD applications aren't displayed in the available options. To find your application, search for the name and select it.
103+
1. Select **Add** > **Add role assignment** to open the **Add role assignment** page.
104+
1. In the **Role** tab, select the role you wish to assign to the application in the list. For example, to allow the application to execute actions like **reboot**, **start** and **stop** instances, select the **Contributor** role. Read more about the [available roles](../../role-based-access-control/built-in-roles.md).
105105

106-
Assign the Contributor role to the application at the subscription scope. For detailed steps, see [Assign Azure roles using the Azure portal](../../role-based-access-control/role-assignments-portal.md).
106+
Select the **Next** button to move to the **Members** tab. Select **Assign access to**-> **User, group, or service principal** and then select **Select members**. By default, Azure AD applications aren't displayed in the available options. To find your application, search by name (for example, "example-app") and select it from the returned list. Click the **Select** button. Then click the **Review + assign** button.
107107

108+
:::image type="content" source="media/howto-create-service-principal-portal/add-role-assignment.png" alt-text="Screenshot showing role assignment.":::
109+
108110
Your service principal is set up. You can start using it to run your scripts or apps. To manage your service principal (permissions, user consented permissions, see which users have consented, review permissions, see sign in information, and more), go to **Enterprise applications**.
109111

110112
The next section shows how to get values that are needed when signing in programmatically.
@@ -117,13 +119,13 @@ When programmatically signing in, pass the tenant ID with your authentication re
117119
1. From **App registrations** in Azure AD, select your application.
118120
1. Copy the Directory (tenant) ID and store it in your application code.
119121

120-
![Copy the directory (tenant ID) and store it in your app code](./media/howto-create-service-principal-portal/copy-tenant-id.png)
122+
:::image type="content" source="media/howto-create-service-principal-portal/copy-tenant-id.png" alt-text="Copy the directory (tenant ID) and store it in your app code.":::
121123

122124
The directory (tenant) ID can also be found in the default directory overview page.
123125

124126
1. Copy the **Application ID** and store it in your application code.
125127

126-
![Copy the application (client) ID](./media/howto-create-service-principal-portal/copy-app-id.png)
128+
:::image type="content" source="media/howto-create-service-principal-portal/copy-app-id.png" alt-text="Copy the application (client) ID.":::
127129

128130
## Authentication: Two options
129131

@@ -154,7 +156,7 @@ To upload the certificate:
154156
1. Select **Certificates & secrets**.
155157
1. Select **Certificates** > **Upload certificate** and select the certificate (an existing certificate or the self-signed certificate you exported).
156158

157-
![Select Upload certificate and select the one you want to add](./media/howto-create-service-principal-portal/upload-cert.png)
159+
:::image type="content" source="media/howto-create-service-principal-portal/upload-cert.png" alt-text="Select Upload certificate and select the one you want to add.":::
158160

159161
1. Select **Add**.
160162

@@ -172,7 +174,7 @@ If you choose not to use a certificate, you can create a new application secret.
172174

173175
After saving the client secret, the value of the client secret is displayed. Copy this value because you won't be able to retrieve the key later. You will provide the key value with the application ID to sign in as the application. Store the key value where your application can retrieve it.
174176

175-
![Copy the secret value because you can't retrieve this later](./media/howto-create-service-principal-portal/copy-secret.png)
177+
:::image type="content" source="media/howto-create-service-principal-portal/copy-secret.png" alt-text="Copy the secret value because you can't retrieve this later.":::
176178

177179
## Configure access policies on resources
178180
Keep in mind, you might need to configure additional permissions on resources that your application needs to access. For example, you must also [update a key vault's access policies](../../key-vault/general/security-features.md#privileged-access) to give your application access to keys, secrets, or certificates.
86.7 KB
Loading

articles/expressroute/howto-routing-cli.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -45,8 +45,6 @@ This section helps you create, get, update, and delete the Microsoft peering con
4545

4646
> [!IMPORTANT]
4747
> Microsoft peering of ExpressRoute circuits that were configured prior to August 1, 2017 will have all service prefixes advertised through the Microsoft peering, even if route filters are not defined. Microsoft peering of ExpressRoute circuits that are configured on or after August 1, 2017 will not have any prefixes advertised until a route filter is attached to the circuit. For more information, see [Configure a route filter for Microsoft peering](how-to-routefilter-powershell.md).
48-
>
49-
5048
5149
### To create Microsoft peering
5250

articles/expressroute/index.yml

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -88,6 +88,15 @@ landingContent:
8888
- text: Design for Disaster Recovery with private peering
8989
url: designing-for-disaster-recovery-with-expressroute-privatepeering.md
9090
# Card
91+
- title: Learn about ExpressRoute architecture
92+
linkLists:
93+
- linkListType: architecture
94+
links:
95+
- text: Extend an on-premises network using ExpressRoute
96+
url: /azure/architecture/reference-architectures/hybrid-networking/expressroute
97+
- text: Connect an on-premises network to Azure using ExpressRoute
98+
url: /azure/architecture/reference-architectures/hybrid-networking/expressroute-vpn-failover
99+
# Card
91100
- title: Encrypt traffic
92101
linkLists:
93102
- linkListType: how-to-guide

articles/healthcare-apis/azure-api-for-fhir/convert-data.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.author: mikaelw
1212

1313
# Converting your data to FHIR for Azure API for FHIR
1414

15-
The `$convert-data` custom endpoint in the FHIR service is meant for data conversion from different data types to FHIR. It uses the Liquid template engine and the templates from the [FHIR Converter](https://github.com/microsoft/FHIR-Converter) project as the default templates. You can customize these conversion templates as needed. Currently it supports three types of data conversion: **C-CDA to FHIR**, **HL7v2 to FHIR**, **JSON to FHIR**.
15+
The `$convert-data` custom endpoint in the FHIR service is meant for data conversion from different data types to FHIR. It uses the Liquid template engine and the templates from the [FHIR Converter](https://github.com/microsoft/FHIR-Converter) project as the default templates. You can customize these conversion templates as needed. Currently it supports three types of data conversion: **C-CDA to FHIR**, **HL7v2 to FHIR**, **JSON to FHIR**, **FHIR STU3 to FHIR R4(new!)**.
1616

1717
> [!NOTE]
1818
> `$convert-data` endpoint can be used as a component within an ETL pipeline for the conversion of raw healthcare data from legacy formats into FHIR format. However, it is not an ETL pipeline in itself. We recommend you to use an ETL engine such as Logic Apps or Azure Data Factory for a complete workflow in preparing your FHIR data to be persisted into the FHIR server. The workflow might include: data reading and ingestion, data validation, making $convert-data API calls, data pre/post-processing, data enrichment, and data de-duplication.
@@ -28,10 +28,10 @@ $convert-data takes a [Parameter](http://hl7.org/fhir/parameters.html) resource
2828

2929
| Parameter Name | Description | Accepted values |
3030
| ----------- | ----------- | ----------- |
31-
| inputData | Data to be converted. | For `Hl7v2`: string <br> For `Ccda`: XML <br> For `Json`: JSON |
32-
| inputDataType | Data type of input. | ```HL7v2```, ``Ccda``, ``Json`` |
33-
| templateCollectionReference | Reference to an [OCI image ](https://github.com/opencontainers/image-spec) template collection on [Azure Container Registry (ACR)](https://azure.microsoft.com/services/container-registry/). It's the image containing Liquid templates to use for conversion. It can be a reference either to the default templates or a custom template image that is registered within the FHIR service. See below to learn about customizing the templates, hosting those on ACR, and registering to the FHIR service. | For ***default/sample*** templates: <br> **HL7v2** templates: <br>```microsofthealth/fhirconverter:default``` <br>``microsofthealth/hl7v2templates:default``<br> **C-CDA** templates: <br> ``microsofthealth/ccdatemplates:default`` <br> **JSON** templates: <br> ``microsofthealth/jsontemplates:default`` <br><br> For ***custom*** templates: <br> \<RegistryServer\>/\<imageName\>@\<imageDigest\>, \<RegistryServer\>/\<imageName\>:\<imageTag\> |
34-
| rootTemplate | The root template to use while transforming the data. | For **HL7v2**:<br> "ADT_A01", "ADT_A02", "ADT_A03", "ADT_A04", "ADT_A05", "ADT_A08", "ADT_A11", "ADT_A13", "ADT_A14", "ADT_A15", "ADT_A16", "ADT_A25", "ADT_A26", "ADT_A27", "ADT_A28", "ADT_A29", "ADT_A31", "ADT_A47", "ADT_A60", "OML_O21", "ORU_R01", "ORM_O01", "VXU_V04", "SIU_S12", "SIU_S13", "SIU_S14", "SIU_S15", "SIU_S16", "SIU_S17", "SIU_S26", "MDM_T01", "MDM_T02"<br><br> For **C-CDA**:<br> "CCD", "ConsultationNote", "DischargeSummary", "HistoryandPhysical", "OperativeNote", "ProcedureNote", "ProgressNote", "ReferralNote", "TransferSummary" <br><br> For **JSON**: <br> "ExamplePatient", "Stu3ChargeItem" <br> |
31+
| inputData | Data to be converted. | For `Hl7v2`: string <br> For `Ccda`: XML <br> For `Json`: JSON <br> For `FHIR STU3`: JSON|
32+
| inputDataType | Data type of input. | ```HL7v2```, ``Ccda``, ``Json``, ``Fhir``|
33+
| templateCollectionReference | Reference to an [OCI image ](https://github.com/opencontainers/image-spec) template collection on [Azure Container Registry (ACR)](https://azure.microsoft.com/services/container-registry/). It's the image containing Liquid templates to use for conversion. It can be a reference either to the default templates or a custom template image that is registered within the FHIR service. See below to learn about customizing the templates, hosting those on ACR, and registering to the FHIR service. | For ***default/sample*** templates: <br> **HL7v2** templates: <br>```microsofthealth/fhirconverter:default``` <br>``microsofthealth/hl7v2templates:default``<br> **C-CDA** templates: <br> ``microsofthealth/ccdatemplates:default`` <br> **JSON** templates: <br> ``microsofthealth/jsontemplates:default`` <br> **FHIR-STU3** templates: <br> ``microsofthealth/stu3tor4templates:default`` <br><br> For ***custom*** templates: <br> \<RegistryServer\>/\<imageName\>@\<imageDigest\>, \<RegistryServer\>/\<imageName\>:\<imageTag\> |
34+
| rootTemplate | The root template to use while transforming the data. | For **HL7v2**:<br> "ADT_A01", "ADT_A02", "ADT_A03", "ADT_A04", "ADT_A05", "ADT_A08", "ADT_A11", "ADT_A13", "ADT_A14", "ADT_A15", "ADT_A16", "ADT_A25", "ADT_A26", "ADT_A27", "ADT_A28", "ADT_A29", "ADT_A31", "ADT_A47", "ADT_A60", "OML_O21", "ORU_R01", "ORM_O01", "VXU_V04", "SIU_S12", "SIU_S13", "SIU_S14", "SIU_S15", "SIU_S16", "SIU_S17", "SIU_S26", "MDM_T01", "MDM_T02"<br><br> For **C-CDA**:<br> "CCD", "ConsultationNote", "DischargeSummary", "HistoryandPhysical", "OperativeNote", "ProcedureNote", "ProgressNote", "ReferralNote", "TransferSummary" <br><br> For **JSON**: <br> "ExamplePatient", "Stu3ChargeItem" <br><br> **For FHIR STU3 to R4**": <br>Name of the root template that is the same as the STU3 resource name e.g., "Patient", "Observation", "Organization". |
3535

3636
> [!NOTE]
3737
> JSON templates are sample templates for use, not "default" templates that adhere to any pre-defined JSON message types. JSON doesn't have any standardized message types, unlike HL7v2 messages or C-CDA documents. Therefore, instead of default templates we provide you with some sample templates that you can use as a starting guide for your own customized templates.

articles/iot-hub/iot-hub-mqtt-5-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
description: Learn about IoT Hub's MQTT 5 API reference
44
services: iot-hub
55
author: kgremban
6-
ms.service: iot-fundamentals
6+
ms.service: iot-hub
77
ms.topic: reference
88
ms.date: 11/19/2020
99
ms.author: kgremban

articles/iot-hub/iot-hub-mqtt-5.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
description: Learn about IoT Hub's MQTT 5 support
44
services: iot-hub
55
author: kgremban
6-
ms.service: iot-fundamentals
6+
ms.service: iot-hub
77
ms.topic: conceptual
88
ms.date: 11/19/2020
99
ms.author: kgremban

articles/iot-hub/iot-hub-preview-mode.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
description: Learn how to turn on preview mode for IoT Hub, why you would want to, and some warnings
44
services: iot-hub
55
author: kgremban
6-
ms.service: iot-fundamentals
6+
ms.service: iot-hub
77
ms.topic: conceptual
88
ms.date: 11/24/2020
99
ms.author: kgremban

articles/iot-hub/iot-hub-tls-support.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
description: Learn about using secure TLS connections for devices and services communicating with IoT Hub
44
services: iot-hub
55
author: kgremban
6-
ms.service: iot-fundamentals
6+
ms.service: iot-hub
77
ms.topic: conceptual
88
ms.date: 06/29/2021
99
ms.author: kgremban

articles/iot-hub/virtual-network-support.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
description: How to use virtual networks connectivity pattern with IoT Hub
44
services: iot-hub
55
author: kgremban
6-
ms.service: iot-fundamentals
6+
ms.service: iot-hub
77
ms.topic: conceptual
88
ms.date: 10/20/2021
99
ms.author: kgremban

0 commit comments

Comments
 (0)