You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/mark-app-as-publisher-verified.md
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.subservice: develop
9
9
ms.topic: how-to
10
10
ms.workload: identity
11
-
ms.date: 11/12/2022
11
+
ms.date: 03/16/2023
12
12
ms.author: ryanwi
13
13
ms.custom: aaddev
14
14
ms.reviewer: xurobert, brianokoyo, ardhanap
@@ -23,7 +23,7 @@ If you are already enrolled in the Microsoft Partner Network (MPN) and have met
23
23
24
24
1. Sign into the [App Registration portal](https://aka.ms/PublisherVerificationPreview) using [multi-factor authentication](../fundamentals/concept-fundamentals-mfa-get-started.md)
25
25
26
-
1. Choose an app and click **Branding**.
26
+
1. Choose an app and click **Branding & properties**.
27
27
28
28
1. Click **Add MPN ID to verify publisher** and review the listed requirements.
29
29
@@ -32,25 +32,25 @@ If you are already enrolled in the Microsoft Partner Network (MPN) and have met
32
32
For more details on specific benefits, requirements, and frequently asked questions see the [overview](publisher-verification-overview.md).
33
33
34
34
## Mark your app as publisher verified
35
-
Make sure you have met the [pre-requisites](publisher-verification-overview.md#requirements), then follow these steps to mark your app(s) as Publisher Verified.
35
+
Make sure you meet the [pre-requisites](publisher-verification-overview.md#requirements), then follow these steps to mark your app(s) as Publisher Verified.
36
36
37
-
1.Ensure you are signed in using [multi-factor authentication](../fundamentals/concept-fundamentals-mfa-get-started.md) to an organizational (Azure AD) account that is authorized to make changes to the app(s) you want to mark as Publisher Verified and on the MPN Account in Partner Center.
37
+
1.Sign in using [multi-factor authentication](../fundamentals/concept-fundamentals-mfa-get-started.md) to an organizational (Azure AD) account authorized to make changes to the app you want to mark as Publisher Verified and on the MPN Account in Partner Center.
38
38
39
-
-In Azure AD this user must be a member of one of the following [roles](../roles/permissions-reference.md): Application Admin, Cloud Application Admin, or Global Administrator.
39
+
-The Azure AD user must have one of the following [roles](../roles/permissions-reference.md): Application Admin, Cloud Application Admin, or Global Administrator.
40
40
41
-
-In Partner Center this user must have of the following [roles](/partner-center/permissions-overview): MPN Admin, Accounts Admin, or a Global Administrator (this is a shared role mastered in Azure AD).
41
+
-The user in Partner Center must have the following [roles](/partner-center/permissions-overview): MPN Admin, Accounts Admin, or a Global Administrator (a shared role mastered in Azure AD).
42
42
43
43
1. Navigate to the **App registrations** blade:
44
44
45
-
1. Click on an app you would like to mark as Publisher Verified and open the **Branding** blade.
45
+
1. Click on an app you would like to mark as Publisher Verified and open the **Branding & properties** blade.
46
46
47
47
1. Ensure the app’s [publisher domain](howto-configure-publisher-domain.md) is set.
48
48
49
49
1. Ensure that either the publisher domain or a DNS-verified [custom domain](../fundamentals/add-custom-domain.md) on the tenant matches the domain of the email address used during the verification process for your MPN account.
50
50
51
51
1. Click **Add MPN ID to verify publisher** near the bottom of the page.
52
52
53
-
1. Enter your**MPN ID**. This MPN ID must be for:
53
+
1. Enter the**MPN ID** for:
54
54
55
55
- A valid Microsoft Partner Network account that has completed the verification process.
56
56
@@ -60,13 +60,13 @@ Make sure you have met the [pre-requisites](publisher-verification-overview.md#r
60
60
61
61
1. Wait for the request to process, this may take a few minutes.
62
62
63
-
1. If the verification was successful, the publisher verification window will close, returning you to the Branding blade. You will see a blue verified badge next to your verified **Publisher display name**.
63
+
1. If the verification was successful, the publisher verification window closes, returning you to the **Branding & properties**blade. You see a blue verified badge next to your verified **Publisher display name**.
64
64
65
-
1. Users who get prompted to consent to your app will start seeing the badge soon after you have gone through the process successfully, although it may take some time for this to replicate throughout the system.
65
+
1. Users who get prompted to consent to your app start seeing the badge soon after you've gone through the process successfully, although it may take some time for updates to replicate throughout the system.
66
66
67
-
1. Test this functionality by signing into your application and ensuring the verified badge shows up on the consent screen. If you are signed in as a user who has already granted consent to the app, you can use the *prompt=consent* query parameter to force a consent prompt. This parameter should be used for testing only, and never hard-coded into your app's requests.
67
+
1. Test this functionality by signing into your application and ensuring the verified badge shows up on the consent screen. If you're signed in as a user who has already granted consent to the app, you can use the *prompt=consent* query parameter to force a consent prompt. This parameter should be used for testing only, and never hard-coded into your app's requests.
68
68
69
-
1. Repeat this process as needed for any additional apps you would like the badge to be displayed for. You can use Microsoft Graph to do this more quickly in bulk, and PowerShell cmdlets will be available soon. See [Making Microsoft API Graph calls](troubleshoot-publisher-verification.md#making-microsoft-graph-api-calls) for more info.
69
+
1. Repeat these steps as needed for any more apps you would like the badge to be displayed for. You can use Microsoft Graph to do this more quickly in bulk, and PowerShell cmdlets will be available soon. See [Making Microsoft API Graph calls](troubleshoot-publisher-verification.md#making-microsoft-graph-api-calls) for more info.
70
70
71
71
That’s it! Let us know if you have any feedback about the process, the results, or the feature in general.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/troubleshoot-publisher-verification.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.subservice: develop
9
9
ms.topic: troubleshooting
10
10
ms.workload: identity
11
-
ms.date: 10/21/2021
11
+
ms.date: 03/16/2023
12
12
ms.author: ryanwi
13
13
ms.custom: aaddev
14
14
ms.reviewer: ardhanap, jesakowi
@@ -31,7 +31,7 @@ Below are some common issues that may occur during the process.
31
31
-**I don’t know my Microsoft Partner Network ID (MPN ID) or I don’t know who the primary contact for the account is.**
32
32
1. Navigate to the [MPN enrollment page](https://partner.microsoft.com/dashboard/account/v3/enrollment/joinnow/basicpartnernetwork/new).
33
33
2. Sign in with a user account in the org's primary Azure AD tenant.
34
-
3. If an MPN account already exists, this will be recognized and you'll be added to the account.
34
+
3. If an MPN account already exists, this is recognized and you are added to the account.
35
35
4. Navigate to the [partner profile page](https://partner.microsoft.com/pcv/accountsettings/connectedpartnerprofile) where the MPN ID and primary account contact will be listed.
36
36
37
37
-**I don’t know who my Azure AD Global Administrator (also known as company admin or tenant admin) is, how do I find them? What about the Application Administrator or Cloud Application Administrator?**
@@ -151,7 +151,7 @@ Most commonly caused by the signed-in user not being a member of the proper role
151
151
152
152
- The MPN ID is correct.
153
153
- There are no errors or “pending actions” shown, and the verification status under Legal business profile and Partner info both say “authorized” or “success”.
154
-
2. Go to the [MPN tenant management page](https://partner.microsoft.com/dashboard/account/v3/tenantmanagement) and confirm that the tenant the app is registered in and that you're signing with a user account from is on the list of associated tenants. To add another tenant, follow the [multi-tenant-account instructions](/partner-center/multi-tenant-account). Be aware that all Global Admins of any tenant you add will be granted Global Administrator privileges on your Partner Center account.
154
+
2. Go to the [MPN tenant management page](https://partner.microsoft.com/dashboard/account/v3/tenantmanagement) and confirm that the tenant the app is registered in and that you're signing with a user account from is on the list of associated tenants. To add another tenant, follow the [multi-tenant-account instructions](/partner-center/multi-tenant-account). All Global Admins of any tenant you add will be granted Global Administrator privileges on your Partner Center account.
155
155
3. Go to the [MPN User Management page](https://partner.microsoft.com/pcv/users) and confirm the user you're signing in as is either a Global Administrator, MPN Admin, or Accounts Admin. To add a user to a role in Partner Center, follow the instructions for [creating user accounts and setting permissions](/partner-center/create-user-accounts-and-set-permissions).
Copy file name to clipboardExpand all lines: articles/aks/nat-gateway.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.author: allensu
12
12
13
13
# Managed NAT Gateway
14
14
15
-
While you can route egress traffic through an Azure Load Balancer, there are limitations on the amount of outbound flows of traffic you can have. Azure NAT Gateway allows up to 64,512 outbound UDP and TCP traffic flows per IP address with a maximum of 16 IP addresses.
15
+
While you can route egress traffic through an Azure Load Balancer, there are limitations on the amount of outbound flows of traffic you can have. Azure NAT Gateway allows up to 64,512 outbound UDP and TCP traffic flows per IP address with a maximum of 16 IP addresses.
16
16
17
17
This article shows you how to create an AKS cluster with a Managed NAT Gateway for egress traffic and how to disable OutboundNAT on Windows.
18
18
@@ -24,7 +24,9 @@ This article shows you how to create an AKS cluster with a Managed NAT Gateway f
24
24
25
25
## Create an AKS cluster with a Managed NAT Gateway
26
26
27
-
To create an AKS cluster with a new Managed NAT Gateway, use `--outbound-type managedNATGateway`, `--nat-gateway-managed-outbound-ip-count`, and `--nat-gateway-idle-timeout` when running `az aks create`. The following example creates a *myResourceGroup* resource group, then creates a *natCluster* AKS cluster in *myResourceGroup* with a Managed NAT Gateway, two outbound IPs, and an idle timeout of 30 seconds.
27
+
To create an AKS cluster with a new Managed NAT Gateway, use `--outbound-type managedNATGateway`, `--nat-gateway-managed-outbound-ip-count`, and `--nat-gateway-idle-timeout` when running `az aks create`. If you want the NAT gateway to be able to operate out of availability zones, specify the zones using `--zones`.
28
+
29
+
The following example creates a *myResourceGroup* resource group, then creates a *natCluster* AKS cluster in *myResourceGroup* with a Managed NAT Gateway, two outbound IPs, and an idle timeout of 30 seconds.
28
30
29
31
```azurecli-interactive
30
32
az group create --name myResourceGroup --location southcentralus
:::image type="content" source="./media/managed-application-elements/microsoft-storage-storageaccountselector.png" alt-text="Screenshot of the storage account selector element that shows the default value for a new storage account.":::
20
21
21
-
The control enables the user to create a new storage account or select an existing storage account.
22
+
The `StorageAccountSelector`control allows you to create a new storage account or select an existing storage account.
:::image type="content" source="./media/managed-application-elements/microsoft-storage-storageaccountselector-new.png" alt-text="Screenshot that shows the storage account selector options to create a new storage account.":::
@@ -50,19 +51,120 @@ The control enables the user to create a new storage account or select an existi
50
51
```json
51
52
{
52
53
"name": "storageaccount01",
53
-
"resourceGroup": "rg01",
54
-
"type": "Premium_LRS",
55
-
"newOrExisting": "new"
54
+
"resourceGroup": "demoRG",
55
+
"type": "Standard_LRS",
56
+
"newOrExisting": "new",
57
+
"kind": "StorageV2"
56
58
}
57
59
```
58
60
59
61
## Remarks
60
62
61
-
-If specified, `defaultValue.name` is automatically validated for uniqueness. If the storage account name isn't unique, the user must specify a different name or choose an existing storage account.
62
-
- The default value for `defaultValue.type` is **Premium_LRS**.
63
+
-The `defaultValue.name` is required and the value is automatically validated for uniqueness. If the storage account name isn't unique, the user must specify a different name or choose an existing storage account.
64
+
- The default value for `defaultValue.type` is **Premium_LRS**. You can set any storage account type as the default value. For example, _Standard_LRS_ or _Standard_GRS_.
63
65
- Any type not specified in `constraints.allowedTypes` is hidden, and any type not specified in `constraints.excludedTypes` is shown. `constraints.allowedTypes` and `constraints.excludedTypes` are both optional, but can't be used simultaneously.
64
-
- If `options.hideExisting` is **true**, the user can't choose an existing storage account. The default value is **false**.
66
+
- If `options.hideExisting` is **true**, the user can't choose an existing storage account. The default value is **false**. The control only shows storage accounts as _existing_ if they are in same resource group and region as the selections made on the **Basics** tab.
67
+
- The `kind` property displays the value if a new storage account was created, or an existing storage account's value.
68
+
69
+
## Example
70
+
71
+
The default values for the storage account name and type are examples. You can set your own default values for your environment.
72
+
73
+
In the `outputs` section, the `storageSelector` output includes all the values for a storage account. The `storageKind` and `storageName` are examples of how to output specific values.
* For an introduction to creating UI definitions, see [Getting started with CreateUiDefinition](create-uidefinition-overview.md).
68
-
* For a description of common properties in UI elements, see[CreateUiDefinition elements](create-uidefinition-elements.md).
169
+
- For an introduction to creating UI definitions, go to [CreateUiDefinition.json for Azure managed application's create experience](create-uidefinition-overview.md).
170
+
- For a description of common properties in UI elements, go to[CreateUiDefinition elements](create-uidefinition-elements.md).
Copy file name to clipboardExpand all lines: articles/azure-vmware/configure-customer-managed-keys.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -146,6 +146,9 @@ Navigate to your **Azure Key Vault** and provide access to the SDDC on Azure Key
146
146
> [!IMPORTANT]
147
147
> If you want to select a specific key version instead of the automatically selected latest version, you'll need to specify the key URI with key version. This will affect the CMK key version life cycle.
148
148
149
+
> [!NOTE]
150
+
> The Azure key vault Managed HSM option is only supported with the Key URI option.
151
+
149
152
1. Select **Save** to grant access to the resource.
Copy file name to clipboardExpand all lines: articles/cognitive-services/Translator/document-translation/how-to-guides/create-use-glossaries.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,9 +20,6 @@ A glossary is a list of terms with definitions that you create for the Document
20
20
21
21
## Create, upload, and use a glossary file
22
22
23
-
> [!NOTE]
24
-
> The following example uses an enabled [**system-assigned managed identity**](create-use-managed-identities.md#enable-a-system-assigned-managed-identity) and a [**Storage Blob Data Contributor**](create-use-managed-identities.md#grant-access-to-your-storage-account) role assignment for authentication. For more information, *see*[**Managed identities for Document Translation**](./create-use-managed-identities.md).
25
-
26
23
1.**Create your glossary file.** Create a file in a supported format (preferably tab-separated values) that contains all the terms and phrases you want to use in your translation.
27
24
28
25
To check if your file format is supported, *see*[Get supported glossary formats](../reference/get-supported-glossary-formats.md).
@@ -47,6 +44,9 @@ A glossary is a list of terms with definitions that you create for the Document
47
44
1.**Specify your glossary in the translation request.** Include the **`glossary URL`**, **`format`**, and **`version`** in your **`POST`** request:
> The example used an enabled [**system-assigned managed identity**](create-use-managed-identities.md#enable-a-system-assigned-managed-identity) with a [**Storage Blob Data Contributor**](create-use-managed-identities.md#grant-access-to-your-storage-account) role assignment for authorization. For more information, *see*[**Managed identities for Document Translation**](./create-use-managed-identities.md).
0 commit comments