You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -23,41 +23,41 @@ When a client acquires an access token to access a protected resource, the clien
23
23
24
24
Before reading through this article, it's recommended that you go through the following articles:
25
25
26
-
*[ID tokens](id-tokens.md) in the Microsoft identity platform.
27
-
*[Access tokens](access-tokens.md) in the Microsoft identity platform.
26
+
-[ID tokens](id-tokens.md) in the Microsoft identity platform.
27
+
-[Access tokens](access-tokens.md) in the Microsoft identity platform.
28
28
29
29
## Refresh token lifetime
30
30
31
-
Refresh tokens have a longer lifetime than access tokens. The default lifetime for the refresh tokens is 24 hours for [single page apps](reference-third-party-cookies-spas.md) and 90 days for all other scenarios. Refresh tokens replace themselves with a fresh token upon every use. The Microsoft identity platform doesn't revoke old refresh tokens when used to fetch new access tokens. Securely delete the old refresh token after acquiring a new one. Refresh tokens need to be stored safely like access tokens or application credentials.
31
+
Refresh tokens have a longer lifetime than access tokens. The default lifetime for the refresh tokens is 24 hours for [single page apps](reference-third-party-cookies-spas.md) and 90 days for all other scenarios. Refresh tokens replace themselves with a fresh token upon every use. The Microsoft identity platform doesn't revoke old refresh tokens when used to fetch new access tokens. Securely delete the old refresh token after acquiring a new one. Refresh tokens need to be stored safely like access tokens or application credentials.
32
32
33
-
>[!IMPORTANT]
34
-
> Refresh tokens sent to a redirect URI registered as `spa` expire after 24 hours. Additional refresh tokens acquired using the initial refresh token carry over that expiration time, so apps must be prepared to rerun the authorization code flow using an interactive authentication to get a new refresh token every 24 hours. Users do not have to enter their credentials and usually don't even see any related user experience, just a reload of your application. The browser must visit the log-in page in a top-level frame to show the login session. This is due to [privacy features in browsers that block third party cookies](reference-third-party-cookies-spas.md).
33
+
>[!IMPORTANT]
34
+
> Refresh tokens sent to a redirect URI registered as `spa` expire after 24 hours. Additional refresh tokens acquired using the initial refresh token carry over that expiration time, so apps must be prepared to rerun the authorization code flow using an interactive authentication to get a new refresh token every 24 hours. Users don't have to enter their credentials and usually don't even see any related user experience, just a reload of your application. The browser must visit the log-in page in a top-level frame to show the login session. This is due to [privacy features in browsers that block third party cookies](reference-third-party-cookies-spas.md).
35
35
36
36
## Refresh token expiration
37
37
38
-
Refresh tokens can be revoked at any time, because of timeouts and revocations. Your app must handle rejections by the sign-in service gracefully when this occurs. This is done by sending the user to an interactive sign-in prompt to sign in again.
38
+
Refresh tokens can be revoked at any time, because of timeouts and revocations. Your app must handle rejections by the sign-in service gracefully when this occurs. This is done by sending the user to an interactive sign-in prompt to sign in again.
39
39
40
40
### Token timeouts
41
41
42
42
You can't configure the lifetime of a refresh token. You can't reduce or lengthen their lifetime. Configure sign-in frequency in Conditional Access to define the time periods before a user is required to sign in again. Learn more about [Configuring authentication session management with Conditional Access](../conditional-access/howto-conditional-access-session-lifetime.md).
43
43
44
-
Not all refresh tokens follow the rules set in the token lifetime policy. Specifically, refresh tokens used in [single page apps](reference-third-party-cookies-spas.md) are always fixed to 24 hours of activity, as if they have a `MaxAgeSessionSingleFactor` policy of 24 hours applied to them.
44
+
Not all refresh tokens follow the rules set in the token lifetime policy. Specifically, refresh tokens used in [single page apps](reference-third-party-cookies-spas.md) are always fixed to 24 hours of activity, as if they have a `MaxAgeSessionSingleFactor` policy of 24 hours applied to them.
45
45
46
46
### Revocation
47
47
48
-
Refresh tokens can be revoked by the server because of a change in credentials, user action, or admin action. Refresh tokens fall into two classes: tokens issued to confidential clients (the rightmost column) and tokens issued to public clients (all other columns).
48
+
Refresh tokens can be revoked by the server because of a change in credentials, user action, or admin action. Refresh tokens fall into two classes: tokens issued to confidential clients (the rightmost column) and tokens issued to public clients (all other columns).
| User revokes their refresh tokens [via PowerShell](/powershell/module/azuread/revoke-azureadsignedinuserallrefreshtoken)| Revoked | Revoked | Revoked | Revoked | Revoked |
57
-
| Admin revokes all refresh tokens for a user [via PowerShell](/powershell/module/azuread/revoke-azureaduserallrefreshtoken)| Revoked | Revoked |Revoked | Revoked | Revoked |
| User revokes their refresh tokens [via PowerShell](/powershell/module/azuread/revoke-azureadsignedinuserallrefreshtoken)| Revoked | Revoked | Revoked | Revoked | Revoked|
57
+
| Admin revokes all refresh tokens for a user [via PowerShell](/powershell/module/azuread/revoke-azureaduserallrefreshtoken)| Revoked | Revoked |Revoked | Revoked | Revoked|
A common challenge for developers is the management of secrets, credentials, certificates, keys etc used to secure communication between services. Managed identities eliminate the need for developers to manage these credentials.
25
25
26
-
While developers can securely store the secrets in [Azure Key Vault](../../key-vault/general/overview.md), services need a way to access Azure Key Vault. Managed identities provide an automatically managed identity in Azure Active Directory for applications to use when connecting to resources that support Azure Active Directory (Azure AD) authentication. Applications can use managed identities to obtain Azure AD tokens without having manage any credentials.
26
+
While developers can securely store the secrets in [Azure Key Vault](../../key-vault/general/overview.md), services need a way to access Azure Key Vault. Managed identities provide an automatically managed identity in Azure Active Directory for applications to use when connecting to resources that support Azure Active Directory (Azure AD) authentication. Applications can use managed identities to obtain Azure AD tokens without having to manage any credentials.
27
27
28
28
The following video shows how you can use managed identities:</br>
29
29
@@ -68,7 +68,7 @@ For using Managed identities, you have should do the following:
68
68
1. Create a managed identity in Azure. You can choose between system-assigned managed identity or user-assigned managed identity.
69
69
2. In case of user-assigned managed identity, assign the managed identity to the "source" Azure Resource, such as an Azure Logic App or an Azure Web App.
70
70
3. Authorize the managed identity to have accees to the "target" service.
71
-
4. Use the managed identity to perform access. For this, you can use the Azure SDK with the Azure.Identity library. Some "source" resources offer connectors that know how to use Managed identities for the connections. In that case you simply use the ideantity as a feature of that "source" resource.
71
+
4. Use the managed identity to perform access. For this, you can use the Azure SDK with the Azure.Identity library. Some "source" resources offer connectors that know how to use Managed identities for the connections. In that case you simply use the identity as a feature of that "source" resource.
72
72
73
73
74
74
## What Azure services support the feature?<aname="which-azure-services-support-managed-identity"></a>
Copy file name to clipboardExpand all lines: articles/azure-monitor/app/sampling.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -70,6 +70,8 @@ Metric counts such as request rate and exception rate are adjusted to compensate
70
70
> [!NOTE]
71
71
> This section applies to ASP.NET applications, not to ASP.NET Core applications. [Learn about configuring adaptive sampling for ASP.NET Core applications later in this document.](#configuring-adaptive-sampling-for-aspnet-core-applications)
72
72
73
+
> With ASP.NET Core and with Microsoft.ApplicationInsights.AspNetCore >= 2.15.0 you can configure AppInsights options via appsettings.json
74
+
73
75
In [`ApplicationInsights.config`](./configuration-with-applicationinsights-config.md), you can adjust several parameters in the `AdaptiveSamplingTelemetryProcessor` node. The figures shown are the default values:
> | communicationservices | Yes | Yes <br/><br/> Note that resources with attached phone numbers cannot be moved to subscriptions in different data locations, nor subscriptions that do not support having phone numbers. | No |
Copy file name to clipboardExpand all lines: articles/azure-video-indexer/deploy-with-arm-template.md
+4-5Lines changed: 4 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Deploy Azure Video Indexer with ARM template
3
-
description: In this tutorial you will create an Azure Video Indexer account by using Azure Resource Manager (ARM) template.
3
+
description: Learn how to create an Azure Video Indexer account by using Azure Resource Manager (ARM) template.
4
4
ms.topic: tutorial
5
5
ms.date: 05/23/2022
6
6
ms.author: juliako
@@ -10,13 +10,13 @@ ms.author: juliako
10
10
11
11
## Overview
12
12
13
-
In this tutorial you will create an Azure Video Indexer account by using Azure Resource Manager (ARM) template (preview).
13
+
In this tutorial, you will create an Azure Video Indexer account by using Azure Resource Manager (ARM) template (preview).
14
14
The resource will be deployed to your subscription and will create the Azure Video Indexer resource based on parameters defined in the avam.template file.
15
15
16
16
> [!NOTE]
17
17
> This sample is *not* for connecting an existing Azure Video Indexer classic account to an ARM-based Azure Video Indexer account.
18
18
> For full documentation on Azure Video Indexer API, visit the [Developer portal](https://aka.ms/avam-dev-portal) page.
19
-
> The current API Version is "2021-10-27-preview". Check this Repo from time to time to get updates on new API Versions.
19
+
> For the latest API version for Microsoft.VideoIndexer, see the [template reference](/azure/templates/microsoft.videoindexer/accounts?tabs=bicep).
20
20
21
21
## Prerequisites
22
22
@@ -40,7 +40,6 @@ The resource will be deployed to your subscription and will create the Azure Vid
40
40
41
41
* Create a new Resource group on the same location as your Azure Video Indexer account, using the [New-AzResourceGroup](/powershell/module/az.resources/new-azresourcegroup) cmdlet.
@@ -52,7 +51,7 @@ The resource will be deployed to your subscription and will create the Azure Vid
52
51
```
53
52
54
53
> [!NOTE]
55
-
> If you would like to work with bicep format, inspect the [bicep file](https://github.com/Azure-Samples/media-services-video-indexer/blob/master/ARM-Quick-Start/avam.template.bicep) on this repo.
54
+
> If you would like to work with bicep format, see [Deploy by using Bicep](./deploy-with-bicep.md).
0 commit comments