You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/how-to-connect-install-multiple-domains.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.service: active-directory
12
12
ms.workload: identity
13
13
ms.tgt_pltfrm: na
14
14
ms.topic: how-to
15
-
ms.date: 01/21/2022
15
+
ms.date: 03/09/2022
16
16
ms.subservice: hybrid
17
17
ms.author: billmath
18
18
@@ -128,7 +128,7 @@ By using the PowerShell command `Get-MsolDomainFederationSettings -DomainName <y
128
128
129
129

130
130
131
-
And the IssuerUri on the new domain has been set to `https://bmfabrikam.com/adfs/services/trust`
131
+
And the IssuerUri on the new domain has been set to `https://bmcontoso.com/adfs/services/trust`
Copy file name to clipboardExpand all lines: articles/attestation/overview.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.custom: references_regions
12
12
---
13
13
# Microsoft Azure Attestation
14
14
15
-
Microsoft Azure Attestation is a unified solution for remotely verifying the trustworthiness of a platform and integrity of the binaries running inside it. The service supports attestation of the platforms backed by Trusted Platform Modules (TPMs) alongside the ability to attest to the state of Trusted Execution Environments (TEEs) such as [Intel® Software Guard Extensions](https://www.intel.com/content/www/us/en/architecture-and-technology/software-guard-extensions.html) (SGX) enclaves and [Virtualization-based Security](/windows-hardware/design/device-experiences/oem-vbs) (VBS) enclaves.
15
+
Microsoft Azure Attestation is a unified solution for remotely verifying the trustworthiness of a platform and integrity of the binaries running inside it. The service supports attestation of the platforms backed by Trusted Platform Modules (TPMs) alongside the ability to attest to the state of Trusted Execution Environments (TEEs) such as [Intel® Software Guard Extensions](https://www.intel.com/content/www/us/en/architecture-and-technology/software-guard-extensions.html) (SGX) enclaves, [Virtualization-based Security](/windows-hardware/design/device-experiences/oem-vbs) (VBS) enclaves, [Trusted Platform Modules (TPMs)](/windows/security/information-protection/tpm/trusted-platform-module-overview), [Trusted launch for Azure VMs](/azure/virtual-machines/trusted-launch#microsoft-defender-for-cloud-integration) and [Azure confidential VMs](/azure/confidential-computing/confidential-vm-overview).
16
16
17
17
Attestation is a process for demonstrating that software binaries were properly instantiated on a trusted platform. Remote relying parties can then gain confidence that only such intended software is running on trusted hardware. Azure Attestation is a unified customer-facing service and framework for attestation.
18
18
@@ -67,7 +67,7 @@ Azure Attestation is the preferred choice for attesting TEEs as it offers the fo
67
67
68
68
- Unified framework for attesting multiple environments such as TPMs, SGX enclaves and VBS enclaves
69
69
- Allows creation of custom attestation providers and configuration of policies to restrict token generation
70
-
- Offers regional shared providers which can attest with no configuration from users
70
+
- Offers [regional shared providers](basic-concepts.md#regional-shared-provider) which can attest with no configuration from users
71
71
- Protects its data while-in use with implementation in an SGX enclave
# Customer intent: As a data professional, I want to understand why my solutions would benefit from running with Azure Arc-enabled data services so that I can leverage the capability of the feature.
@@ -29,27 +29,6 @@ For complete release version information, see [Version log](version-log.md).
29
29
### Data Controller
30
30
- Fixed the issue "ConfigMap sql-config-[SQL MI] does not exist" from the February 2022 release. This issue occurs when deploying a SQL Managed Instance with service type of `loadBalancer` with certain load balancers.
31
31
32
-
### SQL Managed Instance
33
-
34
-
- Support for readable secondary replicas:
35
-
- To set readable secondary replicas use `--readable-secondaries` when you create or update an Arc-enabled SQL Managed Instance deployment.
36
-
- Set `--readable secondaries` to any value between 0 and the number of replicas minus 1.
37
-
-`--readable-secondaries` only applies to Business Critical tier.
38
-
- Automatic backups are taken on the primary instance in a Business Critical service tier when there are multiple replicas. When a failover happens, backups move to the new primary.
39
-
- RWX capable storage class is required for backups, for both General Purpose and Business Critical service tiers.
40
-
- Billing support when using multiple read replicas.
41
-
42
-
For additional information about service tiers, see [High Availability with Azure Arc-enabled SQL Managed Instance (preview)](managed-instance-high-availability.md).
43
-
44
-
### User experience improvements
45
-
46
-
The following improvements are available in [Azure Data Studio](/sql/azure-data-studio/download-azure-data-studio).
47
-
48
-
- Azure Arc and Azure CLI extensions now generally available.
49
-
- Changed edit commands for SQL Managed Instance for Azure Arc dashboard to use `update`, reflecting Azure CLI changes. This works in indirect or direct mode.
50
-
- Data controller deployment wizard step for connectivity mode is now earlier in the process.
51
-
- Removed an extra backups field in SQL MI deployment wizard.
Copy file name to clipboardExpand all lines: articles/azure-sql/database/authentication-azure-ad-user-assigned-managed-identity.md
+16-11Lines changed: 16 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,31 +1,29 @@
1
1
---
2
2
title: User-assigned managed identity in Azure AD for Azure SQL
3
-
description: This article provides information on user-assigned managed identities in Azure Active Directory (AD) with Azure SQL Databaseand Azure SQL Managed Instance
3
+
description: User-assigned managed identities (UMI) in Azure AD (AD) for Azure SQL Database, SQL Managed Instance, and dedicated SQL pools in Azure Synapse Analytics.
> User-assigned managed identity for Azure SQL is in **public preview**.
20
20
21
21
Azure Active Directory (AD) supports two types of managed identities: System-assigned managed identity (SMI) and user-assigned managed identity (UMI). For more information, see [Managed identity types](../../active-directory/managed-identities-azure-resources/overview.md#managed-identity-types).
22
22
23
-
When using Azure AD authentication with Azure SQL Managed Instance, a managed identity must be assigned to the server identity. Previously, only a system-assigned managed identity could be assigned to the Managed Instance or SQL Database server identity. With support for user-assigned managed identity, the UMI can be assigned to Azure SQL Managed Instance or Azure SQL Database as the instance or server identity. This feature is now supported for SQL Database.
23
+
A system-assigned managed identity is automatically assigned to a managed instance when it is created. When using Azure AD authentication with Azure SQL Managed Instance, a managed identity must be assigned to the server identity. Previously, only a system-assigned managed identity could be assigned to the Managed Instance or SQL Database server identity. With support for user-assigned managed identity, the UMI can be assigned to Azure SQL Managed Instance or Azure SQL Database as the instance or server identity. This feature is now supported for SQL Database.
24
24
25
25
> [!NOTE]
26
-
> A system-assigned managed identity is automatically assigned to a managed instance when it is created.
27
-
>
28
-
> User-assigned managed identity is not supported for Azure Synapse Analytics.
26
+
> This article applies only to dedicated SQL pools (formerly SQL DW) in standalone Azure SQL servers. For more information on user-assigned managed identities for dedicated pools in Azure Synapse workspaces, see [Using a user-assigned managed identity](../../synapse-analytics/security/workspaces-encryption.md#using-a-user-assigned-managed-identity).
29
27
30
28
## Benefits of using user-assigned managed identities
31
29
@@ -55,9 +53,12 @@ Once the UMI is created, some permissions are needed to allow the UMI to read fr
55
53
-[**GroupMember.Read.All**](/graph/permissions-reference#group-permissions) – allows access to Azure AD group information
56
54
-[**Application.Read.ALL**](/graph/permissions-reference#application-resource-permissions) – allows access to Azure AD service principal (applications) information
57
55
58
-
### Granting permissions
56
+
### Grant permissions
59
57
60
-
The following is a sample PowerShell script that will grant the necessary permissions for UMI or SMI.
58
+
The following is a sample PowerShell script that will grant the necessary permissions for UMI or SMI. This sample will assign permissions to the UMI `umiservertest`. To execute the script, you must sign in as a user with a "Global Administrator" or "Privileged Role Administrator" role, and have the following [Microsoft Graph permissions](/graph/auth/auth-concepts#microsoft-graph-permissions):
59
+
- User.Read.All
60
+
- GroupMember.Read.All
61
+
- Application.Read.ALL
61
62
62
63
```powershell
63
64
# Script to assign permissions to the UMI "umiservertest"
In the final steps of the script, if you have more UMIs with similar names, you have to use the proper `$MSI[ ]array` number, for example, `$AAD_SP.ObjectId[0]`.
113
+
111
114
### Check permissions for user-assigned manage identity
112
115
113
116
To check permissions for a UMI, go to the [Azure portal](https://portal.azure.com). In the **Azure Active Directory** resource, go to **Enterprise applications**. Select **All Applications** for the **Application type**, and search for the UMI that was created.
@@ -178,7 +181,6 @@ The ARM template used in [Creating an Azure SQL logical server using a user-assi
178
181
179
182
## Limitations and known issues
180
183
181
-
- This feature isn't supported for Azure Synapse Analytics.
182
184
- After a Managed Instance is created, the **Active Directory admin** blade in the Azure portal shows a warning: `Managed Instance needs permissions to access Azure Active Directory. Click here to grant "Read" permissions to your Managed Instance.` If the user-assigned managed identity was given the appropriate permissions discussed in the above [Permissions](#permissions) section, this warning can be ignored.
183
185
- If a system-assigned or user-assigned managed identity is used as the server or instance identity, deleting the identity will result in the server or instance inability to access Microsoft Graph. Azure AD authentication and other functions will fail. To restore Azure AD functionality, a new SMI or UMI must be assigned to the server with appropriate permissions.
184
186
- Permissions to access Microsoft Graph using UMI or SMI can only be granted using PowerShell. These permissions can't be granted using the Azure portal.
@@ -189,4 +191,7 @@ The ARM template used in [Creating an Azure SQL logical server using a user-assi
189
191
> [Create an Azure SQL logical server using a user-assigned managed identity](authentication-azure-ad-user-assigned-managed-identity-create-server.md)
190
192
191
193
> [!div class="nextstepaction"]
192
-
> [Create an Azure SQL Managed Instance with a user-assigned managed identity](../managed-instance/authentication-azure-ad-user-assigned-managed-identity-create-managed-instance.md)
194
+
> [Create an Azure SQL Managed Instance with a user-assigned managed identity](../managed-instance/authentication-azure-ad-user-assigned-managed-identity-create-managed-instance.md)
195
+
196
+
> [!div class="nextstepaction"]
197
+
> [Using a user-assigned managed identity in Azure Synapse workspaces](../../synapse-analytics/security/workspaces-encryption.md#using-a-user-assigned-managed-identity)
Copy file name to clipboardExpand all lines: articles/cognitive-services/Custom-Vision-Service/includes/quickstarts/python-tutorial.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -58,6 +58,8 @@ Create variables for your resource's Azure endpoint and subscription keys.
58
58
>
59
59
> You can find the prediction resource ID on the resource's **Properties** tab in the Azure portal, listed as **Resource ID**.
60
60
>
61
+
> You also can go to https://www.customvision.ai/. After you sign in, select the **Settings** icon at the top right. On the **Setting** pages, you can get all the keys, resource ID, and endpoints.
62
+
>
61
63
> Remember to remove the keys from your code when you're done, and never post them publicly. For production, consider using a secure way of storing and accessing your credentials. For more information, see the Cognitive Services [security](../../../cognitive-services-security.md) article.
Copy file name to clipboardExpand all lines: articles/cost-management-billing/reservations/view-reservations.md
-2Lines changed: 0 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,8 +28,6 @@ By default, the following users can view and manage reservations:
28
28
29
29
Currently, the reservation administrator and reservation reader roles are are only available to assign using PowerShell. They can't be viewed or assigned in the Azure portal. For more information, see [Grant access with PowerShell](#grant-access-with-powershell).
30
30
31
-
The reservation administrator and reservation reader roles provide access to only reservations and not to reservation orders, hence any operation that requires to have access to reservation order is not permitted with these roles. For providing access to reservation orders, see [Grant access to individual reservations](#grant-access-to-individual-reservations).
32
-
33
31
The reservation lifecycle is independent of an Azure subscription, so the reservation isn't a resource under the Azure subscription. Instead, it's a tenant-level resource with its own Azure RBAC permission separate from subscriptions. Reservations don't inherit permissions from subscriptions after the purchase.
Copy file name to clipboardExpand all lines: articles/data-factory/monitor-shir-in-azure.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,11 +18,11 @@ By default, the Self Hosted Integration Runtime’s diagnostic and performance t
18
18
19
19
## Event logs
20
20
21
-
When logged on locally to the Self Hosted Integration Runtime, specific events can be viewed using the [event viewer](/windows/win32/eventlog/viewing-the-event-log.md). The relevant events are captured in two event viewer journals named: **Connectors – Integration Runtime** and **Integration Runtime** respectively. While it’s possible to log on to to the Self Hosted Integration Runtime hosts individually to view these events, it's also possible to stream these events to a Log Analytics workspace in Azure monitor for ease of query and centralization purposes.
21
+
When logged on locally to the Self Hosted Integration Runtime, specific events can be viewed using the [event viewer](/windows/win32/eventlog/viewing-the-event-log). The relevant events are captured in two event viewer journals named: **Connectors – Integration Runtime** and **Integration Runtime** respectively. While it’s possible to log on to to the Self Hosted Integration Runtime hosts individually to view these events, it's also possible to stream these events to a Log Analytics workspace in Azure monitor for ease of query and centralization purposes.
22
22
23
23
## Performance counters
24
24
25
-
Performance counters in Windows and Linux provide insight into the performance of hardware components, operating systems, and applications such as the Self Hosted Integration Runtime. The performance counters can be viewed and collected locally on the VM using the performance monitor tool. See the article on [using performance counters](/windows/win32/perfctrs/using-performance-counters.md) for more details.
25
+
Performance counters in Windows and Linux provide insight into the performance of hardware components, operating systems, and applications such as the Self Hosted Integration Runtime. The performance counters can be viewed and collected locally on the VM using the performance monitor tool. See the article on [using performance counters](/windows/win32/perfctrs/using-performance-counters) for more details.
26
26
27
27
## Centralize log collection and analysis
28
28
@@ -32,4 +32,4 @@ When a deployment requires a more in-depth level of analysis or has reached a ce
32
32
33
33
-[How to configure SHIR for log analytics collection](how-to-configure-shir-for-log-analytics-collection.md)
34
34
-[Review integration runtime concepts in Azure Data Factory.](concepts-integration-runtime.md)
35
-
- Learn how to [create a self-hosted integration runtime in the Azure portal.](create-self-hosted-integration-runtime.md)
35
+
- Learn how to [create a self-hosted integration runtime in the Azure portal.](create-self-hosted-integration-runtime.md)
0 commit comments