Skip to content

Commit 97c275a

Browse files
authored
Merge pull request #213414 from MicrosoftDocs/release-ignite-cosmos-db
[Ignite 2022 ship room] | Rename Azure Cosmos DB Services | Cosmos DB | #696896
2 parents c3b3cb9 + f463bf1 commit 97c275a

File tree

1,711 files changed

+12081
-10624
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,711 files changed

+12081
-10624
lines changed

articles/active-directory/app-proxy/what-is-application-proxy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -134,7 +134,7 @@ The following diagram illustrates in general how Azure AD authentication service
134134

135135
|**Component**|**Description**|
136136
|:-|:-|
137-
|Endpoint|The endpoint is a URL or an [user portal](../manage-apps/end-user-experiences.md). Users can reach applications while outside of your network by accessing an external URL. Users within your network can access the application through a URL or an user portal. When users go to one of these endpoints, they authenticate in Azure AD and then are routed through the connector to the on-premises application.|
137+
|Endpoint|The endpoint is a URL or an [user portal](../manage-apps/end-user-experiences.md). Users can reach applications while outside of your network by accessing an external URL. Users within your network can access the application through a URL or a user portal. When users go to one of these endpoints, they authenticate in Azure AD and then are routed through the connector to the on-premises application.|
138138
|Azure AD|Azure AD performs the authentication using the tenant directory stored in the cloud.|
139139
|Application Proxy service|This Application Proxy service runs in the cloud as part of Azure AD. It passes the sign-on token from the user to the Application Proxy Connector. Application Proxy forwards any accessible headers on the request and sets the headers as per its protocol, to the client IP address. If the incoming request to the proxy already has that header, the client IP address is added to the end of the comma-separated list that is the value of the header.|
140140
|Application Proxy connector|The connector is a lightweight agent that runs on a Windows Server inside your network. The connector manages communication between the Application Proxy service in the cloud and the on-premises application. The connector only uses outbound connections, so you don't have to open any inbound ports or put anything in the DMZ. The connectors are stateless and pull information from the cloud as necessary. For more information about connectors, like how they load-balance and authenticate, see [Understand Azure AD Application Proxy connectors](./application-proxy-connectors.md).|

articles/active-directory/authentication/how-to-mfa-registration-campaign.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -277,7 +277,7 @@ The feature aims to empower admins to get users set up with MFA using the Authen
277277

278278
If this user doesn’t have the Authenticator app set up for push notifications and is enabled for it by policy, yes, the user will see the nudge.
279279

280-
**Will a user who has a the Authenticator app setup only for TOTP codes see the nudge?** 
280+
**Will a user who has the Authenticator app setup only for TOTP codes see the nudge?** 
281281

282282
Yes. If the Authenticator app is not set up for push notifications and the user is enabled for it by policy, yes, the user will see the nudge.
283283

@@ -308,4 +308,4 @@ It's the same as snoozing.
308308

309309
## Next steps
310310

311-
[Enable passwordless sign-in with Microsoft Authenticator](howto-authentication-passwordless-phone.md)
311+
[Enable passwordless sign-in with Microsoft Authenticator](howto-authentication-passwordless-phone.md)

articles/active-directory/azuread-dev/videos.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Learn about the new Microsoft identity platform and how to migrate to it from th
2121

2222
## Migrate from v1.0 to v2.0
2323

24-
**Learn about migrating to the the latest version of the Microsoft identity platform**
24+
**Learn about migrating to the latest version of the Microsoft identity platform**
2525

2626
:::row:::
2727
:::column:::

articles/active-directory/cloud-sync/concept-how-it-works.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Cloud sync is built on top of the Azure AD services and has 2 key components:
2626

2727

2828
## Initial setup
29-
During initial setup, the a few things are done that makes cloud sync happen. These are:
29+
During initial setup, a few things are done that makes cloud sync happen. These are:
3030

3131
- **During agent installation**: You configure the agent for the AD domains you want to provision from. This configuration registers the domains in the hybrid identity service and establishes an outbound connection to the service bus listening for requests.
3232
- **When you enable provisioning**: You select the AD domain and enable provisioning which runs every 2 mins. Optionally you may deselect password hash sync and define notification email. You can also manage attribute transformation using Microsoft Graph APIs.

articles/active-directory/develop/active-directory-claims-mapping.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -218,7 +218,7 @@ To run this script you need:
218218
- password for the private key (pfx file)
219219
220220
> [!IMPORTANT]
221-
> The private key must be in PKCS#12 format since Azure AD does not support other format types. Using the wrong format can result in the the error "Invalid certificate: Key value is invalid certificate" when using Microsoft Graph to PATCH the service principal with a `keyCredentials` containing the certificate info.
221+
> The private key must be in PKCS#12 format since Azure AD does not support other format types. Using the wrong format can result in the error "Invalid certificate: Key value is invalid certificate" when using Microsoft Graph to PATCH the service principal with a `keyCredentials` containing the certificate info.
222222
223223
```powershell
224224

articles/active-directory/develop/custom-rbac-for-developers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ Developers can also use [Azure AD groups](../fundamentals/active-directory-manag
5656
5757
### Custom data store
5858

59-
App roles and groups both store information about user assignments in the Azure AD directory. Another option for managing user role information that is available to developers is to maintain the information outside of the directory in a custom data store. For example, in a SQL Database, Azure Table storage or Azure Cosmos DB Table API.
59+
App roles and groups both store information about user assignments in the Azure AD directory. Another option for managing user role information that is available to developers is to maintain the information outside of the directory in a custom data store. For example, in a SQL database, Azure Table storage, or Azure Cosmos DB for Table.
6060

6161
Using custom storage allows developers extra customization and control over how to assign roles to users and how to represent them. However, the extra flexibility also introduces more responsibility. For example, there's no mechanism currently available to include this information in tokens returned from Azure AD. If developers maintain role information in a custom data store, they'll need to have the applications retrieve the roles. Retrieving the roles is typically done using extensibility points defined in the middleware available to the platform that's being used to develop the application. Developers are responsible for properly securing the custom data store.
6262

articles/active-directory/fundamentals/secure-with-azure-ad-single-tenant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ Azure RBAC allows you to design an administration model with granular scopes and
8282

8383
* **Resource group** - You can assign roles to specific resource groups so that they don't impact any other resource groups. In the example above, the Benefits engineering team can assign the Contributor role to the test lead so they can manage the test DB and the test web app, or to add more resources.
8484

85-
* **Individual resources** - You can assign roles to specific resources so that they don't impact any other resources. In the example above, the Benefits engineering team can assign a data analyst the Cosmos DB Account Reader role just for the test instance of the Cosmos DB, without interfering with the test web app, or any production resource.
85+
* **Individual resources** - You can assign roles to specific resources so that they don't impact any other resources. In the example above, the Benefits engineering team can assign a data analyst the Cosmos DB Account Reader role just for the test instance of the Azure Cosmos DB database, without interfering with the test web app or any production resource.
8686

8787
For more information, see [Azure built-in roles](../../role-based-access-control/built-in-roles.md) and [What is Azure role-based access control (Azure RBAC)?](../../role-based-access-control/overview.md).
8888

articles/active-directory/fundamentals/service-accounts-managed-identities.md

Lines changed: 4 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ With managed identities the source system can obtain a token from Azure AD witho
4141

4242
The target system needs to authenticate (identify) and authorize the source system before allowing access. When the target service supports Azure AD-based authentication it accepts an access token issued by Azure AD.
4343

44-
Azure has a control plane and a data plane. In the control plane, you create resources, and in the data plane you access them. For example, you create a Cosmos database in the control plane, but query it in the data plane.
44+
Azure has a control plane and a data plane. In the control plane, you create resources, and in the data plane you access them. For example, you create an Azure Cosmos DB database in the control plane, but query it in the data plane.
4545

4646
Once the target system accepts the token for authentication, it can support different mechanisms for authorization for its control plane and data plane.
4747

@@ -91,7 +91,7 @@ There are several ways in which you can find managed identities:
9191

9292
You can get a list of all managed identities in your tenant with the following GET request to Microsoft Graph:
9393

94-
`https://graph.microsoft.com/v1.0/servicePrincipals?$filter=(servicePrincipalType eq 'ManagedIdentity') `
94+
`https://graph.microsoft.com/v1.0/servicePrincipals?$filter=(servicePrincipalType eq 'ManagedIdentity')`
9595

9696
You can filter these requests. For more information, see the Graph documentation for [GET servicePrincipal](/graph/api/serviceprincipal-get).
9797

@@ -101,11 +101,10 @@ You can assess the security of managed identities in the following ways:
101101

102102
* Examine privileges and ensure that the least privileged model is selected. Use the following PowerShell cmdlet to get the permissions assigned to your managed identities.
103103

104-
` Get-AzureADServicePrincipal | % { Get-AzureADServiceAppRoleAssignment -ObjectId $_ }`
104+
`Get-AzureADServicePrincipal | % { Get-AzureADServiceAppRoleAssignment -ObjectId $_ }`
105105

106106

107-
* Ensure the managed identity is not part of any privileged groups, such as an administrators group.
108-
‎You can do this by enumerating the members of your highly privileged groups with PowerShell.
107+
* Ensure the managed identity is not part of any privileged groups, such as an administrators group. You can do this by enumerating the members of your highly privileged groups with PowerShell.
109108

110109
`Get-AzureADGroupMember -ObjectId <String> [-All <Boolean>] [-Top <Int32>] [<CommonParameters>]`
111110

@@ -134,8 +133,3 @@ If you are using a service principal or an Azure AD user account, evaluate if y
134133
[Governing Azure service accounts](service-accounts-governing-azure.md)
135134

136135
[Introduction to on-premises service accounts](service-accounts-on-premises.md)
137-
138-
139-
140-
141-

articles/active-directory/managed-identities-azure-resources/tutorial-linux-vm-access-cosmos-db.md

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -25,12 +25,12 @@ ms.collection: M365-identity-device-management
2525
This tutorial shows you how to use a system-assigned managed identity for a Linux virtual machine (VM) to access Azure Cosmos DB. You learn how to:
2626

2727
> [!div class="checklist"]
28-
> * Create a Cosmos DB account
29-
> * Create a collection in the Cosmos DB account
28+
> * Create an Azure Cosmos DB account
29+
> * Create a collection in the Azure Cosmos DB account
3030
> * Grant the system-assigned managed identity access to an Azure Cosmos DB instance
3131
> * Retrieve the `principalID` of the of the Linux VM's system-assigned managed identity
3232
> * Get an access token and use it to call Azure Resource Manager
33-
> * Get access keys from Azure Resource Manager to make Cosmos DB calls
33+
> * Get access keys from Azure Resource Manager to make Azure Cosmos DB calls
3434
3535
## Prerequisites
3636

@@ -41,28 +41,28 @@ This tutorial shows you how to use a system-assigned managed identity for a Linu
4141
- Use the [Azure Cloud Shell](../../cloud-shell/overview.md), which you can open using the **Try It** button on the top right corner of code blocks.
4242
- Run scripts locally by installing the latest version of the [Azure CLI](/cli/azure/install-azure-cli), then sign in to Azure using [az login](/cli/azure/reference-index#az-login). Use an account associated with the Azure subscription in which you'd like to create resources.
4343

44-
## Create a Cosmos DB account
44+
## Create an Azure Cosmos DB account
4545

46-
If you don't already have one, create a Cosmos DB account. You can skip this step and use an existing Cosmos DB account.
46+
If you don't already have one, create an Azure Cosmos DB account. You can skip this step and use an existing Azure Cosmos DB account.
4747

4848
1. Click the **+ Create a resource** button found on the upper left-hand corner of the Azure portal.
4949
2. Click **Databases**, then **Azure Cosmos DB**, and a new "New account" panel displays.
50-
3. Enter an **ID** for the Cosmos DB account, which you use later.
50+
3. Enter an **ID** for the Azure Cosmos DB account, which you use later.
5151
4. **API** should be set to "SQL." The approach described in this tutorial can be used with the other available API types, but the steps in this tutorial are for the SQL API.
52-
5. Ensure the **Subscription** and **Resource Group** match the ones you specified when you created your VM in the previous step. Select a **Location** where Cosmos DB is available.
52+
5. Ensure the **Subscription** and **Resource Group** match the ones you specified when you created your VM in the previous step. Select a **Location** where Azure Cosmos DB is available.
5353
6. Click **Create**.
5454

55-
### Create a collection in the Cosmos DB account
55+
### Create a collection in the Azure Cosmos DB account
5656

57-
Next, add a data collection in the Cosmos DB account that you can query in later steps.
57+
Next, add a data collection in the Azure Cosmos DB account that you can query in later steps.
5858

59-
1. Navigate to your newly created Cosmos DB account.
59+
1. Navigate to your newly created Azure Cosmos DB account.
6060
2. On the **Overview** tab click the **+/Add Collection** button, and an "Add Collection" panel slides out.
6161
3. Give the collection a database ID, collection ID, select a storage capacity, enter a partition key, enter a throughput value, then click **OK**. For this tutorial, it is sufficient to use "Test" as the database ID and collection ID, select a fixed storage capacity and lowest throughput (400 RU/s).
6262

6363
## Grant access
6464

65-
To gain access to the Cosmos DB account access keys from the Resource Manager in the following section, you need to retrieve the `principalID` of the Linux VM's system-assigned managed identity. Be sure to replace the `<SUBSCRIPTION ID>`, `<RESOURCE GROUP>` (resource group in which your VM resides), and `<VM NAME>` parameter values with your own values.
65+
To gain access to the Azure Cosmos DB account access keys from the Resource Manager in the following section, you need to retrieve the `principalID` of the Linux VM's system-assigned managed identity. Be sure to replace the `<SUBSCRIPTION ID>`, `<RESOURCE GROUP>` (resource group in which your VM resides), and `<VM NAME>` parameter values with your own values.
6666

6767
```azurecli-interactive
6868
az resource show --id /subscriptions/<SUBSCRIPTION ID>/resourceGroups/<RESOURCE GROUP>/providers/Microsoft.Compute/virtualMachines/<VM NAMe> --api-version 2017-12-01
@@ -79,11 +79,11 @@ The response includes the details of the system-assigned managed identity (note
7979
}
8080
```
8181

82-
### Grant your Linux VM's system-assigned identity access to the Cosmos DB account access keys
82+
### Grant your Linux VM's system-assigned identity access to the Azure Cosmos DB account access keys
8383

84-
Cosmos DB does not natively support Azure AD authentication. However, you can use a managed identity to retrieve a Cosmos DB access key from the Resource Manager, then use the key to access Cosmos DB. In this step, you grant your system-assigned managed identity access to the keys to the Cosmos DB account.
84+
Azure Cosmos DB does not natively support Azure AD authentication. However, you can use a managed identity to retrieve an Azure Cosmos DB access key from the Resource Manager, then use the key to access Azure Cosmos DB. In this step, you grant your system-assigned managed identity access to the keys to the Azure Cosmos DB account.
8585

86-
To grant the system-assigned managed identity access to the Cosmos DB account in Azure Resource Manager using the Azure CLI, update the values for `<SUBSCRIPTION ID>`, `<RESOURCE GROUP>`, and `<COSMOS DB ACCOUNT NAME>` for your environment. Replace `<MI PRINCIPALID>` with the `principalId` property returned by the `az resource show` command in Retrieve the principalID of the Linux VM's MI. Cosmos DB supports two levels of granularity when using access keys: read/write access to the account, and read-only access to the account. Assign the `DocumentDB Account Contributor` role if you want to get read/write keys for the account, or assign the `Cosmos DB Account Reader Role` role if you want to get read-only keys for the account:
86+
To grant the system-assigned managed identity access to the Azure Cosmos DB account in Azure Resource Manager using the Azure CLI, update the values for `<SUBSCRIPTION ID>`, `<RESOURCE GROUP>`, and `<COSMOS DB ACCOUNT NAME>` for your environment. Replace `<MI PRINCIPALID>` with the `principalId` property returned by the `az resource show` command in Retrieve the principalID of the Linux VM's MI. Azure Cosmos DB supports two levels of granularity when using access keys: read/write access to the account, and read-only access to the account. Assign the `DocumentDB Account Contributor` role if you want to get read/write keys for the account, or assign the `Cosmos DB Account Reader Role` role if you want to get read-only keys for the account:
8787

8888
```azurecli-interactive
8989
az role assignment create --assignee <MI PRINCIPALID> --role '<ROLE NAME>' --scope "/subscriptions/<SUBSCRIPTION ID>/resourceGroups/<RESOURCE GROUP>/providers/Microsoft.DocumentDB/databaseAccounts/<COSMODS DB ACCOUNT NAME>"
@@ -134,9 +134,9 @@ To complete these steps, you need an SSH client. If you are using Windows, you c
134134
"client_id":"1ef89848-e14b-465f-8780-bf541d325cd5"}
135135
```
136136

137-
### Get access keys from Azure Resource Manager to make Cosmos DB calls
137+
### Get access keys from Azure Resource Manager to make Azure Cosmos DB calls
138138

139-
Now use CURL to call Resource Manager using the access token retrieved in the previous section to retrieve the Cosmos DB account access key. Once we have the access key, we can query Cosmos DB. Be sure to replace the `<SUBSCRIPTION ID>`, `<RESOURCE GROUP>`, and `<COSMOS DB ACCOUNT NAME>` parameter values with your own values. Replace the `<ACCESS TOKEN>` value with the access token you retrieved earlier. If you want to retrieve read/write keys, use key operation type `listKeys`. If you want to retrieve read-only keys, use the key operation type `readonlykeys`:
139+
Now use CURL to call Resource Manager using the access token retrieved in the previous section to retrieve the Azure Cosmos DB account access key. Once we have the access key, we can query Azure Cosmos DB. Be sure to replace the `<SUBSCRIPTION ID>`, `<RESOURCE GROUP>`, and `<COSMOS DB ACCOUNT NAME>` parameter values with your own values. Replace the `<ACCESS TOKEN>` value with the access token you retrieved earlier. If you want to retrieve read/write keys, use key operation type `listKeys`. If you want to retrieve read-only keys, use the key operation type `readonlykeys`:
140140

141141
```bash
142142
curl 'https://management.azure.com/subscriptions/<SUBSCRIPTION ID>/resourceGroups/<RESOURCE GROUP>/providers/Microsoft.DocumentDB/databaseAccounts/<COSMOS DB ACCOUNT NAME>/<KEY OPERATION TYPE>?api-version=2016-03-31' -X POST -d "" -H "Authorization: Bearer <ACCESS TOKEN>"
@@ -152,11 +152,11 @@ The CURL response gives you the list of Keys. For example, if you get the read-
152152
"secondaryReadonlyMasterKey":"38v5ns...7bA=="}
153153
```
154154

155-
Now that you have the access key for the Cosmos DB account you can pass it to a Cosmos DB SDK and make calls to access the account.
155+
Now that you have the access key for the Azure Cosmos DB account, you can pass it to an Azure Cosmos DB SDK and make calls to access the account.
156156

157157
## Next steps
158158

159-
In this tutorial, you learned how to use a system-assigned managed identity on a Linux virtual machine to access Cosmos DB. To learn more about Cosmos DB see:
159+
In this tutorial, you learned how to use a system-assigned managed identity on a Linux virtual machine to access Azure Cosmos DB. To learn more about Azure Cosmos DB, see:
160160

161161
> [!div class="nextstepaction"]
162162
>[Azure Cosmos DB overview](../../cosmos-db/introduction.md)

0 commit comments

Comments
 (0)