You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/how-to-connect-sync-endpoint-api-v2.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ editor: ''
8
8
ms.service: active-directory
9
9
ms.workload: identity
10
10
ms.topic: conceptual
11
-
ms.date: 05/19/2020
11
+
ms.date: 05/20/2020
12
12
ms.subservice: hybrid
13
13
ms.author: billmath
14
14
ms.collection: M365-identity-device-management
@@ -27,6 +27,9 @@ Microsoft has deployed a new endpoint (API) for Azure AD Connect that improves t
27
27
## Pre-requisites
28
28
In order to use the new V2 endpoint, you will need to use [Azure AD Connect version 1.5.30.0](https://www.microsoft.com/download/details.aspx?id=47594) or later and follow the deployment steps provided below to enable the V2 endpoint for your Azure AD Connect server.
29
29
30
+
>[!NOTE]
31
+
>Currently, this public preview is only available in the Azure global cloud and not available for [national clouds](https://docs.microsoft.com/azure/active-directory/develop/authentication-national-cloud).
32
+
30
33
### Public preview limitations
31
34
While this release has undergone extensive testing, you may still encounter issues. One of the goals of this public preview release is to find and fix any such issues.
Copy file name to clipboardExpand all lines: articles/active-directory/managed-identities-azure-resources/known-issues.md
+1-35Lines changed: 1 addition & 35 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,27 +46,7 @@ The security boundary of the identity is the resource to which it is attached to
46
46
- If system assigned managed identity is not enabled, and only one user assigned managed identity exists, IMDS will default to that single user assigned managed identity.
47
47
- If system assigned managed identity is not enabled, and multiple user assigned managed identities exist, then specifying a managed identity in the request is required.
48
48
49
-
### Should I use the managed identities for Azure resources IMDS endpoint or the VM extension endpoint?
50
49
51
-
When using managed identities for Azure resources with VMs, we recommend using the IMDS endpoint. The Azure Instance Metadata Service is a REST Endpoint accessible to all IaaS VMs created via the Azure Resource Manager.
52
-
53
-
Some of the benefits of using managed identities for Azure resources over IMDS are:
54
-
- All Azure IaaS supported operating systems can use managed identities for Azure resources over IMDS.
55
-
- No longer need to install an extension on your VM to enable managed identities for Azure resources.
56
-
- The certificates used by managed identities for Azure resources are no longer present in the VM.
57
-
- The IMDS endpoint is a well-known non-routable IP address, only available from within the VM.
58
-
- 1000 user-assigned managed identities can be assigned to a single VM.
59
-
60
-
The managed identities for Azure resources VM extension is still available; however, we are no longer developing new functionality on it. We recommend switching to use the IMDS endpoint.
61
-
62
-
Some of the limitations of using the VM extension endpoint are:
63
-
- Limited support for Linux distributions: CoreOS Stable, CentOS 7.1, Red Hat 7.2, Ubuntu 15.04, Ubuntu 16.04
64
-
- Only 32 user-assigned managed identities can be assigned to the VM.
65
-
66
-
67
-
Note: The managed identities for Azure resources VM extension will be out of support in January 2019.
68
-
69
-
For more information on Azure Instance Metadata Service, see [IMDS documentation](https://docs.microsoft.com/azure/virtual-machines/windows/instance-metadata-service)
70
50
71
51
### Will managed identities be recreated automatically if I move a subscription to another directory?
72
52
@@ -83,16 +63,7 @@ No. Managed identities do not currently support cross-directory scenarios.
83
63
- System-assigned managed identity: You need write permissions over the resource. For example, for virtual machines you need Microsoft.Compute/virtualMachines/write. This action is included in resource specific built-in roles like [Virtual Machine Contributor](https://docs.microsoft.com/azure/role-based-access-control/built-in-roles#virtual-machine-contributor).
84
64
- User-assigned managed identity: You need write permissions over the resource. For example, for virtual machines you need Microsoft.Compute/virtualMachines/write. In addition to [Managed Identity Operator](https://docs.microsoft.com/azure/role-based-access-control/built-in-roles#managed-identity-operator) role assignment over the managed identity.
85
65
86
-
### How do you restart the managed identities for Azure resources extension?
87
-
On Windows and certain versions of Linux, if the extension stops, the following cmdlet may be used to manually restart it:
88
-
89
-
```powershell
90
-
Set-AzVMExtension -Name <extension name> -Type <extension Type> -Location <location> -Publisher Microsoft.ManagedIdentity -VMName <vm name> -ResourceGroupName <resource group name> -ForceRerun <Any string different from any last value used>
91
-
```
92
66
93
-
Where:
94
-
- Extension name and type for Windows is: ManagedIdentityExtensionForWindows
95
-
- Extension name and type for Linux is: ManagedIdentityExtensionForLinux
96
67
97
68
## Known issues
98
69
@@ -128,12 +99,7 @@ Once the VM is started, the tag can be removed by using following command:
128
99
az vm update -n <VM Name> -g <Resource Group> --remove tags.fixVM
129
100
```
130
101
131
-
### VM extension provisioning fails
132
102
133
-
Provisioning of the VM extension might fail due to DNS lookup failures. Restart the VM, and try again.
134
-
135
-
> [!NOTE]
136
-
> The VM extension is planned for deprecation by January 2019. We recommend you move to using the IMDS endpoint.
137
103
138
104
### Transferring a subscription between Azure AD directories
139
105
@@ -146,4 +112,4 @@ Workaround for managed identities in a subscription that has been moved to anoth
146
112
147
113
### Moving a user-assigned managed identity to a different resource group/subscription
148
114
149
-
Moving a user-assigned managed identity to a different resource group will cause the identity to break. As a result, resources (e.g. VM) using that identity will not be able to request tokens for it.
115
+
Moving a user-assigned managed identity to a different resource group is not supported.
Copy file name to clipboardExpand all lines: articles/cognitive-services/LUIS/luis-interactive-test.md
+12-5Lines changed: 12 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Test app in LUIS portal
3
3
description: Use Language Understanding (LUIS) to continuously work on your application to refine it and improve its language understanding.
4
4
ms.topic: conceptual
5
-
ms.date: 05/17/2020
5
+
ms.date: 05/20/2020
6
6
---
7
7
8
8
# Test your LUIS app in the LUIS portal
@@ -37,18 +37,23 @@ The test utterance should not be exactly the same as any example utterances in t
37
37
38
38
1. The utterance, its top intent, and score are added to the list of utterances under the text box.
39
39
40
-

40
+
> [!div class="mx-imgBorder"]
41
+
> 
41
42
42
43
## Inspect the prediction
43
44
44
45
You inspect details of the test result in the **Inspect** panel.
45
46
46
47
1. With the **Test** slide-out panel open, select **Inspect** for an utterance you want to compare.
47
48
48
-

49
+
> [!div class="mx-imgBorder"]
50
+
> 
49
51
50
52
1. The **Inspection** panel appears. The panel includes the top scoring intent as well as any identified entities. The panel shows the prediction of the selected utterance.
51
53
54
+
> [!div class="mx-imgBorder"]
55
+
> 
56
+
52
57
## Add to example utterances
53
58
54
59
From the inspection panel, you can add the test utterance to an intent by selecting **Add to example utterances**.
@@ -71,12 +76,14 @@ If you are using [Patterns](luis-concept-patterns.md) and the utterance matched
71
76
72
77
You can test the active version of your app with the published [endpoint](luis-glossary.md#endpoint) version. In the **Inspect** panel, select **Compare with published**. Any testing against the published model is deducted from your Azure subscription quota balance.
73
78
74
-

79
+
> [!div class="mx-imgBorder"]
80
+
> 
75
81
76
82
## View endpoint JSON in test panel
77
83
You can view the endpoint JSON returned for the comparison by selecting the **Show JSON view**.
Copy file name to clipboardExpand all lines: includes/azure-storage-account-limits-standard.md
+3-5Lines changed: 3 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,16 +5,16 @@
5
5
author: tamram
6
6
ms.service: storage
7
7
ms.topic: include
8
-
ms.date: 03/13/2020
8
+
ms.date: 05/20/2020
9
9
ms.author: tamram
10
10
ms.custom: include file
11
11
---
12
12
13
-
The following table describes default limits for Azure general-purpose v1, v2, Blob storage, block blob storage, and Data Lake Storage Gen2 enabled storage accounts. The *ingress* limit refers to all data that is sent to a storage account. The *egress* limit refers to all data that is received from a storage account.
13
+
The following table describes default limits for Azure general-purpose v1, v2, Blob storage, and block blob storage accounts. The *ingress* limit refers to all data that is sent to a storage account. The *egress* limit refers to all data that is received from a storage account.
14
14
15
15
| Resource | Limit |
16
16
| --- | --- |
17
-
| Number of storage accounts per region per subscription, including standard, premium, and Data Lake Storage Gen2 enabled storage accounts.<sup>3</sup> | 250 |
17
+
| Number of storage accounts per region per subscription, including standard, and premium storage accounts.| 250 |
18
18
| Maximum storage account capacity | 5 PiB <sup>1</sup>|
19
19
| Maximum number of blob containers, blobs, file shares, tables, queues, entities, or messages per storage account | No limit |
20
20
| Maximum request rate<sup>1</sup> per storage account | 20,000 requests per second |
@@ -32,8 +32,6 @@ The following table describes default limits for Azure general-purpose v1, v2, B
<sup>3</sup> [Azure Data Lake Storage Gen2](../articles/storage/blobs/data-lake-storage-introduction.md) is a set of capabilities dedicated to big data analytics, built on Azure Blob storage. Azure Storage and blob storage limitations apply to Data Lake Storage Gen2.
36
-
37
35
> [!NOTE]
38
36
> Microsoft recommends that you use a general-purpose v2 storage account for most scenarios. You can easily upgrade a general-purpose v1 or an Azure Blob storage account to a general-purpose v2 account with no downtime and without the need to copy data. For more information, see [Upgrade to a general-purpose v2 storage account](../articles/storage/common/storage-account-upgrade.md).
0 commit comments