You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -63,14 +63,59 @@ To use the SignalR Service annotations in Java functions, you need to add a depe
63
63
```
64
64
::: zone-end
65
65
66
-
## Connection string settings
66
+
## Connections
67
67
68
-
Add the `AzureSignalRConnectionString` key to the _host.json_ file that points to the application setting with your connection string. For local development, this value may exist in the _local.settings.json_ file.
68
+
You can use [connection string](#connection-string) or [Microsoft Entra identity](#identity-based-connections) to connect to Azure SignalR Service.
69
69
70
-
For details on how to configure and use SignalR Service and Azure Functions together, refer to [Azure Functions development and configuration with Azure SignalR Service](../azure-signalr/signalr-concept-serverless-development-config.md).
70
+
### Connection string
71
+
72
+
For instructions on how to retrieve the connection string for your Azure SignalR Service, see [Connection strings in Azure SignalR Service](../azure-signalr/concept-connection-string.md#how-to-get-connection-strings)
73
+
74
+
This connection string should be stored in an application setting with a name `AzureSignalRConnectionString`. You can customize the application setting name with the `connectionStringSetting` property of the binding configuration.
75
+
76
+
### Identity-based connections
77
+
78
+
If you're using version 1.7.0 or higher, instead of using a connection string with a secret, you can have the app use an [Microsoft Entra identity](../active-directory/fundamentals/active-directory-whatis.md).
79
+
80
+
First of all, you should make sure your Microsoft Entra identity has role [SignalR Service Owner](../role-based-access-control/built-in-roles.md#signalr-service-owner).
81
+
82
+
Then you would define settings with a common prefix `AzureSignalRConnectionString`. You can customize prefix name with the `connectionStringSetting` property of the binding configuration.
83
+
84
+
In this mode, the settings include following items:
85
+
86
+
| Property | Environment variable template | Description | Required | Example value |
87
+
|--------------|----------|-----|----------|
88
+
| Service URI |`AzureSignalRConnectionString__serviceUri`| The URI of your service endpoint. When you only configure "Service URI", the extensions would attempt to use [DefaultAzureCredential](/dotnet/azure/sdk/authentication/credential-chains?tabs=dac#defaultazurecredential-overview) type to authenticate with the service. | Yes |https://mysignalrsevice.service.signalr.net|
89
+
| Token Credential |`AzureSignalRConnectionString__credential`| Defines how a token should be obtained for the connection. This setting should be set to `managedidentity` if your deployed Azure Function intends to use managed identity authentication. This value is only valid when a managed identity is available in the hosting environment. | No | managedidentity |
90
+
| Client ID |`AzureSignalRConnectionString__clientId`| When `credential` is set to `managedidentity`, this property can be set to specify the user-assigned identity to be used when obtaining a token. The property accepts a client ID corresponding to a user-assigned identity assigned to the application. It's invalid to specify both a Resource ID and a client ID. If not specified, the system-assigned identity is used. This property is used differently in [local development scenarios](./functions-reference.md#local-development-with-identity-based-connections), when `credential` shouldn't be set. | No | 00000000-0000-0000-0000-000000000000 |
91
+
| Resource ID |`AzureSignalRConnectionString__managedIdentityResourceId`| When `credential` is set to `managedidentity`, this property can be set to specify the resource Identifier to be used when obtaining a token. The property accepts a resource identifier corresponding to the resource ID of the user-defined managed identity. It's invalid to specify both a resource ID and a client ID. If neither are specified, the system-assigned identity is used. This property is used differently in [local development scenarios](./functions-reference.md#local-development-with-identity-based-connections), when `credential` shouldn't be set. | No | /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/mygroup/providers/Microsoft.SignalRService/SignalR/mysignalrservice |
92
+
93
+
94
+
> [!NOTE]
95
+
> When using `local.settings.json` file at local, [Azure App Configuration](../azure-app-configuration/quickstart-azure-functions-csharp.md), or [Key Vault](/azure/key-vault/general/overview) to provide settings for identity-based connections, replace `__` with `:` in the setting name to ensure names are resolved correctly.
96
+
>
97
+
> For example, `AzureSignalRConnectionString:serviceUri`.
98
+
99
+
#### Multiple endpoints setting
100
+
101
+
You can also configure multiple endpoints and specify identity settings per endpoint.
102
+
103
+
In this case, prefix your settings with `Azure__SignalR__Endpoints__{endpointName}`. The `{endpointName}` is an arbitrary name assigned by you to associate a group of settings to a service endpoint. The prefix `Azure__SignalR__Endpoints__{endpointName}` can't be customized by `connectionStringSetting` property.
104
+
105
+
| Property | Environment variable template | Description | Required | Example value |
106
+
|--------------|----------|-----|----------|
107
+
| Service URI |`Azure__SignalR__Endpoints__{endpointName}__serviceUri`| The URI your service endpoint. When you only configure "Service URI", the extensions would attempt to use [DefaultAzureCredential](/dotnet/azure/sdk/authentication/credential-chains?tabs=dac#defaultazurecredential-overview) type to authenticate with the service. |Yes |https://mysignalrsevice1.service.signalr.net|
108
+
| Endpoint Type |`Azure__SignalR__Endpoints__{endpointName}__type`| Indicates whether the service endpoint is primary or secondary. If not specified, it defaults to `Primary`. Valid values are `Primary` and `Secondary`, case-insensitive. | No |`Secondary`|
109
+
| Token Credential |`Azure__SignalR__Endpoints__{endpointName}__credential`| Defines how a token should be obtained for the connection. This setting should be set to `managedidentity` if your deployed Azure Function intends to use managed identity authentication. This value is only valid when a managed identity is available in the hosting environment. | No | managedidentity |
110
+
| Client ID |`Azure__SignalR__Endpoints__{endpointName}__clientId`| When `credential` is set to `managedidentity`, this property can be set to specify the user-assigned identity to be used when obtaining a token. The property accepts a client ID corresponding to a user-assigned identity assigned to the application. It's invalid to specify both a Resource ID and a client ID. If not specified, the system-assigned identity is used. This property is used differently in [local development scenarios](./functions-reference.md#local-development-with-identity-based-connections), when `credential` shouldn't be set. | No | 00000000-0000-0000-0000-000000000000 |
111
+
| Resource ID |`Azure__SignalR__Endpoints__{endpointName}__managedIdentityResourceId`| When `credential` is set to `managedidentity`, this property can be set to specify the resource Identifier to be used when obtaining a token. The property accepts a resource identifier corresponding to the resource ID of the user-defined managed identity. It's invalid to specify both a resource ID and a client ID. If neither are specified, the system-assigned identity is used. This property is used differently in [local development scenarios](./functions-reference.md#local-development-with-identity-based-connections), when `credential` shouldn't be set. | No | /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/myrg/providers/Microsoft.ManagedIdentity/userAssignedIdentities/myusermanagedidentity |
112
+
113
+
For more information about multiple endpoints, see [Scale SignalR Service with multiple instances](../azure-signalr/signalr-howto-scale-multi-instances.md?pivots=serverless-mode#for-signalr-functions-extensions)
71
114
72
115
## Next steps
73
116
117
+
For details on how to configure and use SignalR Service and Azure Functions together, refer to [Azure Functions development and configuration with Azure SignalR Service](../azure-signalr/signalr-concept-serverless-development-config.md).
118
+
74
119
-[Handle messages from SignalR Service (Trigger binding)](./functions-bindings-signalr-service-trigger.md)
75
120
-[Return the service endpoint URL and access token (Input binding)](./functions-bindings-signalr-service-input.md)
76
121
-[Send SignalR Service messages (Output binding)](./functions-bindings-signalr-service-output.md)
Copy file name to clipboardExpand all lines: articles/backup/blob-backup-support-matrix.md
+6-2Lines changed: 6 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Support matrix for Azure Blobs backup
3
3
description: Provides a summary of support settings and limitations when backing up Azure Blobs.
4
4
ms.topic: reference
5
-
ms.date: 12/18/2024
5
+
ms.date: 12/27/2024
6
6
ms.custom: references_regions, engagement-fy24
7
7
ms.service: azure-backup
8
8
author: AbhishekMallick-MS
@@ -56,7 +56,7 @@ Operational backup of blobs uses blob point-in-time restore, blob versioning, so
56
56
57
57
- You can back up only block blobs in a *standard general-purpose v2 storage account* using the vaulted backup solution for blobs.
58
58
- HNS-enabled storage accounts are currently not supported. This includes *ADLS Gen2 accounts*, *accounts using NFS 3.0*, and *SFTP protocols* for blobs.
59
-
- You can back up storage accounts with *up to 100 containers*. You can also select a subset of containers to back up (up to 100 containers).
59
+
- You can back up storage accounts with *up to 100 containers*, there is no limit on the number of blobs within those containers. You can also select a subset of containers to back up (up to 100 containers).
60
60
- If your storage account contains more than 100 containers, you need to select *up to 100 containers* to back up.
61
61
- To back up any new containers that get created after backup configuration for the storage account, modify the protection of the storage account. These containers aren't backed up automatically.
62
62
- The storage accounts to be backed up must contain *a minimum of one container*. If the storage account doesn't contain any containers or if no containers are selected, an error may appear when you configure backup.
@@ -69,6 +69,10 @@ Operational backup of blobs uses blob point-in-time restore, blob versioning, so
69
69
- If you suspend and resume protection or delete the **Object Replication policy** on the **source storage account**, the policy triggers a full backup.
70
70
- Backup vaults with User-Assigned Managed Identity (UAMI) aren't compatible with Azure Blob Vaulted backups. Only System-Assigned Managed Identity (SAMI) works, because the vault needs to access the storage account where the blobs are stored. The vault uses its system-assigned managed identity for this access.
71
71
72
+
- Enabling backups isn't supported for the blob container that are configured with native replication using data factory.
73
+
- The protection of a container that is part of any object replication isn't supported, either as a source or destination. Attempting to back up such a container will result in backup failure.
Copy file name to clipboardExpand all lines: articles/batch/managed-identity-pools.md
+23-1Lines changed: 23 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,8 +2,9 @@
2
2
title: Configure managed identities in Batch pools
3
3
description: Learn how to enable user-assigned managed identities on Batch pools and how to use managed identities within the nodes.
4
4
ms.topic: conceptual
5
-
ms.date: 08/12/2024
5
+
ms.date: 12/23/2024
6
6
ms.devlang: csharp
7
+
ai-usage: ai-assisted
7
8
ms.custom:
8
9
---
9
10
# Configure managed identities in Batch pools
@@ -13,6 +14,10 @@ complicated identity and credential management by providing an identity for the
13
14
(Azure AD ID). This identity is used to obtain Microsoft Entra tokens to authenticate with target
14
15
resources in Azure.
15
16
17
+
When adding a User-Assigned Managed Identity to a Batch Pool, it is crucial to set the *Identity* property in your configuration. This property links the managed identity to the pool, enabling it to access Azure resources securely. Incorrect setting of the *Identity* property can result in common errors, such as access issues or upload errors.
18
+
19
+
For more information on configuring managed identities in Azure Batch, please refer to the [Azure Batch Managed Identities documentation](/troubleshoot/azure/hpc/batch/use-managed-identities-azure-batch-account-pool).
20
+
16
21
This topic explains how to enable user-assigned managed identities on Batch pools and how to use managed identities within the nodes.
Copy file name to clipboardExpand all lines: articles/batch/tutorial-run-python-batch-azure-data-factory.md
+16-3Lines changed: 16 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,8 @@ title: 'Tutorial: Run a Batch job through Azure Data Factory'
3
3
description: Learn how to use Batch Explorer, Azure Storage Explorer, and a Python script to run a Batch workload through an Azure Data Factory pipeline.
4
4
ms.devlang: python
5
5
ms.topic: tutorial
6
-
ms.date: 03/01/2024
6
+
ms.date: 12/23/2024
7
+
ai-usage: ai-assisted
7
8
ms.custom: mvc, devx-track-python
8
9
---
9
10
@@ -82,8 +83,10 @@ Paste the connection string into the following script, replacing the `<storage-a
# Initialize the BlobServiceClient (This initializes a connection to the Azure Blob Storage, downloads the content of the 'iris.csv' file, and then loads it into a Pandas DataFrame for further processing.)
@@ -106,6 +117,8 @@ with open(outputBlobName, "rb") as data:
106
117
blob.upload_blob(data, overwrite=True)
107
118
```
108
119
120
+
For more information on working with Azure Blob Storage, refer to the [Azure Blob Storage documentation](/azure/storage/blobs/storage-blobs-introduction).
121
+
109
122
Run the script locally to test and validate functionality.
0 commit comments