Skip to content

Commit 8ada4a6

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into rolyon-rbac-custom-roles-rest-api
2 parents 6cd4b4b + 4ee0a48 commit 8ada4a6

File tree

23 files changed

+355
-92
lines changed

23 files changed

+355
-92
lines changed

articles/active-directory/develop/mark-app-as-publisher-verified.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: develop
99
ms.topic: how-to
1010
ms.workload: identity
11-
ms.date: 11/12/2022
11+
ms.date: 03/16/2023
1212
ms.author: ryanwi
1313
ms.custom: aaddev
1414
ms.reviewer: xurobert, brianokoyo, ardhanap
@@ -23,7 +23,7 @@ If you are already enrolled in the Microsoft Partner Network (MPN) and have met
2323

2424
1. Sign into the [App Registration portal](https://aka.ms/PublisherVerificationPreview) using [multi-factor authentication](../fundamentals/concept-fundamentals-mfa-get-started.md)
2525

26-
1. Choose an app and click **Branding**.
26+
1. Choose an app and click **Branding & properties**.
2727

2828
1. Click **Add MPN ID to verify publisher** and review the listed requirements.
2929

@@ -32,25 +32,25 @@ If you are already enrolled in the Microsoft Partner Network (MPN) and have met
3232
For more details on specific benefits, requirements, and frequently asked questions see the [overview](publisher-verification-overview.md).
3333

3434
## Mark your app as publisher verified
35-
Make sure you have met the [pre-requisites](publisher-verification-overview.md#requirements), then follow these steps to mark your app(s) as Publisher Verified.
35+
Make sure you meet the [pre-requisites](publisher-verification-overview.md#requirements), then follow these steps to mark your app(s) as Publisher Verified.
3636

37-
1. Ensure you are signed in using [multi-factor authentication](../fundamentals/concept-fundamentals-mfa-get-started.md) to an organizational (Azure AD) account that is authorized to make changes to the app(s) you want to mark as Publisher Verified and on the MPN Account in Partner Center.
37+
1. Sign in using [multi-factor authentication](../fundamentals/concept-fundamentals-mfa-get-started.md) to an organizational (Azure AD) account authorized to make changes to the app you want to mark as Publisher Verified and on the MPN Account in Partner Center.
3838

39-
- In Azure AD this user must be a member of one of the following [roles](../roles/permissions-reference.md): Application Admin, Cloud Application Admin, or Global Administrator.
39+
- The Azure AD user must have one of the following [roles](../roles/permissions-reference.md): Application Admin, Cloud Application Admin, or Global Administrator.
4040

41-
- In Partner Center this user must have of the following [roles](/partner-center/permissions-overview): MPN Admin, Accounts Admin, or a Global Administrator (this is a shared role mastered in Azure AD).
41+
- The user in Partner Center must have the following [roles](/partner-center/permissions-overview): MPN Admin, Accounts Admin, or a Global Administrator (a shared role mastered in Azure AD).
4242

4343
1. Navigate to the **App registrations** blade:
4444

45-
1. Click on an app you would like to mark as Publisher Verified and open the **Branding** blade.
45+
1. Click on an app you would like to mark as Publisher Verified and open the **Branding & properties** blade.
4646

4747
1. Ensure the app’s [publisher domain](howto-configure-publisher-domain.md) is set.
4848

4949
1. Ensure that either the publisher domain or a DNS-verified [custom domain](../fundamentals/add-custom-domain.md) on the tenant matches the domain of the email address used during the verification process for your MPN account.
5050

5151
1. Click **Add MPN ID to verify publisher** near the bottom of the page.
5252

53-
1. Enter your **MPN ID**. This MPN ID must be for:
53+
1. Enter the **MPN ID** for:
5454

5555
- A valid Microsoft Partner Network account that has completed the verification process.
5656

@@ -60,13 +60,13 @@ Make sure you have met the [pre-requisites](publisher-verification-overview.md#r
6060

6161
1. Wait for the request to process, this may take a few minutes.
6262

63-
1. If the verification was successful, the publisher verification window will close, returning you to the Branding blade. You will see a blue verified badge next to your verified **Publisher display name**.
63+
1. If the verification was successful, the publisher verification window closes, returning you to the **Branding & properties** blade. You see a blue verified badge next to your verified **Publisher display name**.
6464

65-
1. Users who get prompted to consent to your app will start seeing the badge soon after you have gone through the process successfully, although it may take some time for this to replicate throughout the system.
65+
1. Users who get prompted to consent to your app start seeing the badge soon after you've gone through the process successfully, although it may take some time for updates to replicate throughout the system.
6666

67-
1. Test this functionality by signing into your application and ensuring the verified badge shows up on the consent screen. If you are signed in as a user who has already granted consent to the app, you can use the *prompt=consent* query parameter to force a consent prompt. This parameter should be used for testing only, and never hard-coded into your app's requests.
67+
1. Test this functionality by signing into your application and ensuring the verified badge shows up on the consent screen. If you're signed in as a user who has already granted consent to the app, you can use the *prompt=consent* query parameter to force a consent prompt. This parameter should be used for testing only, and never hard-coded into your app's requests.
6868

69-
1. Repeat this process as needed for any additional apps you would like the badge to be displayed for. You can use Microsoft Graph to do this more quickly in bulk, and PowerShell cmdlets will be available soon. See [Making Microsoft API Graph calls](troubleshoot-publisher-verification.md#making-microsoft-graph-api-calls) for more info.
69+
1. Repeat these steps as needed for any more apps you would like the badge to be displayed for. You can use Microsoft Graph to do this more quickly in bulk, and PowerShell cmdlets will be available soon. See [Making Microsoft API Graph calls](troubleshoot-publisher-verification.md#making-microsoft-graph-api-calls) for more info.
7070

7171
That’s it! Let us know if you have any feedback about the process, the results, or the feature in general.
7272

articles/active-directory/develop/troubleshoot-publisher-verification.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: develop
99
ms.topic: troubleshooting
1010
ms.workload: identity
11-
ms.date: 10/21/2021
11+
ms.date: 03/16/2023
1212
ms.author: ryanwi
1313
ms.custom: aaddev
1414
ms.reviewer: ardhanap, jesakowi
@@ -31,7 +31,7 @@ Below are some common issues that may occur during the process.
3131
- **I don’t know my Microsoft Partner Network ID (MPN ID) or I don’t know who the primary contact for the account is.**
3232
1. Navigate to the [MPN enrollment page](https://partner.microsoft.com/dashboard/account/v3/enrollment/joinnow/basicpartnernetwork/new).
3333
2. Sign in with a user account in the org's primary Azure AD tenant.
34-
3. If an MPN account already exists, this will be recognized and you'll be added to the account.
34+
3. If an MPN account already exists, this is recognized and you are added to the account.
3535
4. Navigate to the [partner profile page](https://partner.microsoft.com/pcv/accountsettings/connectedpartnerprofile) where the MPN ID and primary account contact will be listed.
3636

3737
- **I don’t know who my Azure AD Global Administrator (also known as company admin or tenant admin) is, how do I find them? What about the Application Administrator or Cloud Application Administrator?**
@@ -151,7 +151,7 @@ Most commonly caused by the signed-in user not being a member of the proper role
151151

152152
- The MPN ID is correct.
153153
- There are no errors or “pending actions” shown, and the verification status under Legal business profile and Partner info both say “authorized” or “success”.
154-
2. Go to the [MPN tenant management page](https://partner.microsoft.com/dashboard/account/v3/tenantmanagement) and confirm that the tenant the app is registered in and that you're signing with a user account from is on the list of associated tenants. To add another tenant, follow the [multi-tenant-account instructions](/partner-center/multi-tenant-account). Be aware that all Global Admins of any tenant you add will be granted Global Administrator privileges on your Partner Center account.
154+
2. Go to the [MPN tenant management page](https://partner.microsoft.com/dashboard/account/v3/tenantmanagement) and confirm that the tenant the app is registered in and that you're signing with a user account from is on the list of associated tenants. To add another tenant, follow the [multi-tenant-account instructions](/partner-center/multi-tenant-account). All Global Admins of any tenant you add will be granted Global Administrator privileges on your Partner Center account.
155155
3. Go to the [MPN User Management page](https://partner.microsoft.com/pcv/users) and confirm the user you're signing in as is either a Global Administrator, MPN Admin, or Accounts Admin. To add a user to a role in Partner Center, follow the instructions for [creating user accounts and setting permissions](/partner-center/create-user-accounts-and-set-permissions).
156156

157157
### MPNGlobalAccountNotFound

articles/aks/nat-gateway.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.author: allensu
1212

1313
# Managed NAT Gateway
1414

15-
While you can route egress traffic through an Azure Load Balancer, there are limitations on the amount of outbound flows of traffic you can have. Azure NAT Gateway allows up to 64,512 outbound UDP and TCP traffic flows per IP address with a maximum of 16 IP addresses.
15+
While you can route egress traffic through an Azure Load Balancer, there are limitations on the amount of outbound flows of traffic you can have. Azure NAT Gateway allows up to 64,512 outbound UDP and TCP traffic flows per IP address with a maximum of 16 IP addresses.
1616

1717
This article shows you how to create an AKS cluster with a Managed NAT Gateway for egress traffic and how to disable OutboundNAT on Windows.
1818

@@ -24,7 +24,9 @@ This article shows you how to create an AKS cluster with a Managed NAT Gateway f
2424

2525
## Create an AKS cluster with a Managed NAT Gateway
2626

27-
To create an AKS cluster with a new Managed NAT Gateway, use `--outbound-type managedNATGateway`, `--nat-gateway-managed-outbound-ip-count`, and `--nat-gateway-idle-timeout` when running `az aks create`. The following example creates a *myResourceGroup* resource group, then creates a *natCluster* AKS cluster in *myResourceGroup* with a Managed NAT Gateway, two outbound IPs, and an idle timeout of 30 seconds.
27+
To create an AKS cluster with a new Managed NAT Gateway, use `--outbound-type managedNATGateway`, `--nat-gateway-managed-outbound-ip-count`, and `--nat-gateway-idle-timeout` when running `az aks create`. If you want the NAT gateway to be able to operate out of availability zones, specify the zones using `--zones`.
28+
29+
The following example creates a *myResourceGroup* resource group, then creates a *natCluster* AKS cluster in *myResourceGroup* with a Managed NAT Gateway, two outbound IPs, and an idle timeout of 30 seconds.
2830

2931
```azurecli-interactive
3032
az group create --name myResourceGroup --location southcentralus
Loading
Loading

articles/azure-resource-manager/managed-applications/microsoft-storage-storageaccountselector.md

Lines changed: 120 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -2,33 +2,34 @@
22
title: StorageAccountSelector UI element
33
description: Describes the Microsoft.Storage.StorageAccountSelector UI element for Azure portal.
44
author: davidsmatlak
5-
6-
ms.topic: conceptual
7-
ms.date: 06/28/2018
85
ms.author: davidsmatlak
9-
6+
ms.topic: conceptual
7+
ms.date: 03/17/2023
108
---
9+
1110
# Microsoft.Storage.StorageAccountSelector UI element
1211

13-
A control for selecting a new or existing storage account.
12+
A control that's used to select a new or existing storage account.
13+
14+
Storage account names must be globally unique across Azure with a length of 3-24 characters, and include only lowercase letters or numbers.
1415

1516
## UI sample
1617

17-
The control shows the default value.
18+
The `StorageAccountSelector` control shows the default name for a storage account. The default is set in your code.
1819

19-
![Microsoft.Storage.StorageAccountSelector](./media/managed-application-elements/microsoft-storage-storageaccountselector.png)
20+
:::image type="content" source="./media/managed-application-elements/microsoft-storage-storageaccountselector.png" alt-text="Screenshot of the storage account selector element that shows the default value for a new storage account.":::
2021

21-
The control enables the user to create a new storage account or select an existing storage account.
22+
The `StorageAccountSelector` control allows you to create a new storage account or select an existing storage account.
2223

23-
![Microsoft.Storage.StorageAccountSelector new](./media/managed-application-elements/microsoft-storage-storageaccountselector-new.png)
24+
:::image type="content" source="./media/managed-application-elements/microsoft-storage-storageaccountselector-new.png" alt-text="Screenshot that shows the storage account selector options to create a new storage account.":::
2425

2526
## Schema
2627

2728
```json
2829
{
2930
"name": "element1",
3031
"type": "Microsoft.Storage.StorageAccountSelector",
31-
"label": "Storage account",
32+
"label": "Storage account selector",
3233
"toolTip": "",
3334
"defaultValue": {
3435
"name": "storageaccount01",
@@ -50,19 +51,120 @@ The control enables the user to create a new storage account or select an existi
5051
```json
5152
{
5253
"name": "storageaccount01",
53-
"resourceGroup": "rg01",
54-
"type": "Premium_LRS",
55-
"newOrExisting": "new"
54+
"resourceGroup": "demoRG",
55+
"type": "Standard_LRS",
56+
"newOrExisting": "new",
57+
"kind": "StorageV2"
5658
}
5759
```
5860

5961
## Remarks
6062

61-
- If specified, `defaultValue.name` is automatically validated for uniqueness. If the storage account name isn't unique, the user must specify a different name or choose an existing storage account.
62-
- The default value for `defaultValue.type` is **Premium_LRS**.
63+
- The `defaultValue.name` is required and the value is automatically validated for uniqueness. If the storage account name isn't unique, the user must specify a different name or choose an existing storage account.
64+
- The default value for `defaultValue.type` is **Premium_LRS**. You can set any storage account type as the default value. For example, _Standard_LRS_ or _Standard_GRS_.
6365
- Any type not specified in `constraints.allowedTypes` is hidden, and any type not specified in `constraints.excludedTypes` is shown. `constraints.allowedTypes` and `constraints.excludedTypes` are both optional, but can't be used simultaneously.
64-
- If `options.hideExisting` is **true**, the user can't choose an existing storage account. The default value is **false**.
66+
- If `options.hideExisting` is **true**, the user can't choose an existing storage account. The default value is **false**. The control only shows storage accounts as _existing_ if they are in same resource group and region as the selections made on the **Basics** tab.
67+
- The `kind` property displays the value if a new storage account was created, or an existing storage account's value.
68+
69+
## Example
70+
71+
The default values for the storage account name and type are examples. You can set your own default values for your environment.
72+
73+
In the `outputs` section, the `storageSelector` output includes all the values for a storage account. The `storageKind` and `storageName` are examples of how to output specific values.
74+
75+
```json
76+
{
77+
"$schema": "https://schema.management.azure.com/schemas/0.1.2-preview/CreateUIDefinition.MultiVm.json#",
78+
"handler": "Microsoft.Azure.CreateUIDef",
79+
"version": "0.1.2-preview",
80+
"parameters": {
81+
"basics": [
82+
{}
83+
],
84+
"steps": [
85+
{
86+
"name": "StorageAccountSelector",
87+
"label": "Storage account selector",
88+
"elements": [
89+
{
90+
"name": "storageSelectorElement",
91+
"type": "Microsoft.Storage.StorageAccountSelector",
92+
"label": "Storage account name",
93+
"toolTip": "",
94+
"defaultValue": {
95+
"name": "storageaccount01",
96+
"type": "Premium_LRS"
97+
},
98+
"options": {
99+
"hideExisting": false
100+
},
101+
"visible": true
102+
}
103+
]
104+
}
105+
],
106+
"outputs": {
107+
"location": "[location()]",
108+
"storageSelector": "[steps('StorageAccountSelector').storageSelectorElement]",
109+
"storageKind": "[steps('StorageAccountSelector').storageSelectorElement.kind]",
110+
"storageName": "[steps('StorageAccountSelector').storageSelectorElement.name]"
111+
}
112+
}
113+
}
114+
```
115+
116+
## Example output
117+
118+
The output for a _new_ storage account.
119+
120+
```json
121+
{
122+
"location": {
123+
"value": "westus3"
124+
},
125+
"storageSelector": {
126+
"value": {
127+
"name": "demostorageaccount01",
128+
"resourceGroup": "demoRG",
129+
"type": "Standard_GRS",
130+
"newOrExisting": "new",
131+
"kind": "StorageV2"
132+
}
133+
},
134+
"storageKind": {
135+
"value": "StorageV2"
136+
},
137+
"storageName": {
138+
"value": "demostorageaccount01"
139+
}
140+
}
141+
```
142+
143+
The output for an _existing_ storage account.
144+
145+
```json
146+
{
147+
"location": {
148+
"value": "westus3"
149+
},
150+
"storageSelector": {
151+
"value": {
152+
"name": "demostorage99",
153+
"resourceGroup": "demoRG",
154+
"type": "Standard_LRS",
155+
"newOrExisting": "existing",
156+
"kind": "StorageV2"
157+
}
158+
},
159+
"storageKind": {
160+
"value": "StorageV2"
161+
},
162+
"storageName": {
163+
"value": "demostorage99"
164+
}
165+
}
166+
```
65167

66168
## Next steps
67-
* For an introduction to creating UI definitions, see [Getting started with CreateUiDefinition](create-uidefinition-overview.md).
68-
* For a description of common properties in UI elements, see [CreateUiDefinition elements](create-uidefinition-elements.md).
169+
- For an introduction to creating UI definitions, go to [CreateUiDefinition.json for Azure managed application's create experience](create-uidefinition-overview.md).
170+
- For a description of common properties in UI elements, go to [CreateUiDefinition elements](create-uidefinition-elements.md).

articles/azure-vmware/configure-customer-managed-keys.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -146,6 +146,9 @@ Navigate to your **Azure Key Vault** and provide access to the SDDC on Azure Key
146146
> [!IMPORTANT]
147147
> If you want to select a specific key version instead of the automatically selected latest version, you'll need to specify the key URI with key version. This will affect the CMK key version life cycle.
148148
149+
> [!NOTE]
150+
> The Azure key vault Managed HSM option is only supported with the Key URI option.
151+
149152
1. Select **Save** to grant access to the resource.
150153
151154
# [Azure CLI](#tab/azure-cli)

articles/cognitive-services/Translator/document-translation/how-to-guides/create-use-glossaries.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,9 +20,6 @@ A glossary is a list of terms with definitions that you create for the Document
2020

2121
## Create, upload, and use a glossary file
2222

23-
> [!NOTE]
24-
> The following example uses an enabled [**system-assigned managed identity**](create-use-managed-identities.md#enable-a-system-assigned-managed-identity) and a [**Storage Blob Data Contributor**](create-use-managed-identities.md#grant-access-to-your-storage-account) role assignment for authentication. For more information, *see* [**Managed identities for Document Translation**](./create-use-managed-identities.md).
25-
2623
1. **Create your glossary file.** Create a file in a supported format (preferably tab-separated values) that contains all the terms and phrases you want to use in your translation.
2724

2825
To check if your file format is supported, *see* [Get supported glossary formats](../reference/get-supported-glossary-formats.md).
@@ -47,6 +44,9 @@ A glossary is a list of terms with definitions that you create for the Document
4744
1. **Specify your glossary in the translation request.** Include the **`glossary URL`**, **`format`**, and **`version`** in your **`POST`** request:
4845

4946
:::code language="json" source="../../../../../cognitive-services-rest-samples/curl/Translator/translate-with-glossary.json" range="1-23" highlight="13-14":::
47+
48+
> [!NOTE]
49+
> The example used an enabled [**system-assigned managed identity**](create-use-managed-identities.md#enable-a-system-assigned-managed-identity) with a [**Storage Blob Data Contributor**](create-use-managed-identities.md#grant-access-to-your-storage-account) role assignment for authorization. For more information, *see* [**Managed identities for Document Translation**](./create-use-managed-identities.md).
5050
5151
### Case sensitivity
5252

0 commit comments

Comments
 (0)