Skip to content

Commit a2a4e85

Browse files
authored
Merge branch 'MicrosoftDocs:main' into Broken-link-pgibson
2 parents a87eac9 + 07c04b0 commit a2a4e85

File tree

22 files changed

+222
-73
lines changed

22 files changed

+222
-73
lines changed

articles/active-directory/hybrid/how-to-connect-install-multiple-domains.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.service: active-directory
1212
ms.workload: identity
1313
ms.tgt_pltfrm: na
1414
ms.topic: how-to
15-
ms.date: 01/21/2022
15+
ms.date: 03/09/2022
1616
ms.subservice: hybrid
1717
ms.author: billmath
1818

@@ -128,7 +128,7 @@ By using the PowerShell command `Get-MsolDomainFederationSettings -DomainName <y
128128

129129
![Screenshot that shows the federation settings updated on the original domain.](./media/how-to-connect-install-multiple-domains/MsolDomainFederationSettings.png)
130130

131-
And the IssuerUri on the new domain has been set to `https://bmfabrikam.com/adfs/services/trust`
131+
And the IssuerUri on the new domain has been set to `https://bmcontoso.com/adfs/services/trust`
132132

133133
![Get-MsolDomainFederationSettings](./media/how-to-connect-install-multiple-domains/settings2.png)
134134

articles/attestation/basic-concepts.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -45,6 +45,8 @@ Azure Attestation provides a regional shared provider in every available region.
4545
| South East Asia | `https://sharedsasia.sasia.attest.azure.net` |
4646
| North Central US | `https://sharedncus.ncus.attest.azure.net` |
4747
| South Central US | `https://sharedscus.scus.attest.azure.net` |
48+
| Australia East | `https://sharedeau.eau.attest.azure.net` |
49+
| Australia SouthEast | `https://sharedsau.sau.attest.azure.net` |
4850
| US Gov Virginia | `https://sharedugv.ugv.attest.azure.us` |
4951
| US Gov Arizona | `https://shareduga.uga.attest.azure.us` |
5052

articles/attestation/overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.custom: references_regions
1212
---
1313
# Microsoft Azure Attestation
1414

15-
Microsoft Azure Attestation is a unified solution for remotely verifying the trustworthiness of a platform and integrity of the binaries running inside it. The service supports attestation of the platforms backed by Trusted Platform Modules (TPMs) alongside the ability to attest to the state of Trusted Execution Environments (TEEs) such as [Intel® Software Guard Extensions](https://www.intel.com/content/www/us/en/architecture-and-technology/software-guard-extensions.html) (SGX) enclaves and [Virtualization-based Security](/windows-hardware/design/device-experiences/oem-vbs) (VBS) enclaves.
15+
Microsoft Azure Attestation is a unified solution for remotely verifying the trustworthiness of a platform and integrity of the binaries running inside it. The service supports attestation of the platforms backed by Trusted Platform Modules (TPMs) alongside the ability to attest to the state of Trusted Execution Environments (TEEs) such as [Intel® Software Guard Extensions](https://www.intel.com/content/www/us/en/architecture-and-technology/software-guard-extensions.html) (SGX) enclaves, [Virtualization-based Security](/windows-hardware/design/device-experiences/oem-vbs) (VBS) enclaves, [Trusted Platform Modules (TPMs)](/windows/security/information-protection/tpm/trusted-platform-module-overview), [Trusted launch for Azure VMs](/azure/virtual-machines/trusted-launch#microsoft-defender-for-cloud-integration) and [Azure confidential VMs](/azure/confidential-computing/confidential-vm-overview).
1616

1717
Attestation is a process for demonstrating that software binaries were properly instantiated on a trusted platform. Remote relying parties can then gain confidence that only such intended software is running on trusted hardware. Azure Attestation is a unified customer-facing service and framework for attestation.
1818

@@ -67,7 +67,7 @@ Azure Attestation is the preferred choice for attesting TEEs as it offers the fo
6767

6868
- Unified framework for attesting multiple environments such as TPMs, SGX enclaves and VBS enclaves
6969
- Allows creation of custom attestation providers and configuration of policies to restrict token generation
70-
- Offers regional shared providers which can attest with no configuration from users
70+
- Offers [regional shared providers](basic-concepts.md#regional-shared-provider) which can attest with no configuration from users
7171
- Protects its data while-in use with implementation in an SGX enclave
7272
- Highly available service
7373

articles/azure-arc/data/release-notes.md

Lines changed: 1 addition & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.reviewer: mikeray
77
services: azure-arc
88
ms.service: azure-arc
99
ms.subservice: azure-arc-data
10-
ms.date: 03/08/2022
10+
ms.date: 03/09/2022
1111
ms.topic: conceptual
1212
ms.custom: references_regions, devx-track-azurecli
1313
# Customer intent: As a data professional, I want to understand why my solutions would benefit from running with Azure Arc-enabled data services so that I can leverage the capability of the feature.
@@ -29,27 +29,6 @@ For complete release version information, see [Version log](version-log.md).
2929
### Data Controller
3030
- Fixed the issue "ConfigMap sql-config-[SQL MI] does not exist" from the February 2022 release. This issue occurs when deploying a SQL Managed Instance with service type of `loadBalancer` with certain load balancers.
3131

32-
### SQL Managed Instance
33-
34-
- Support for readable secondary replicas:
35-
- To set readable secondary replicas use `--readable-secondaries` when you create or update an Arc-enabled SQL Managed Instance deployment.
36-
- Set `--readable secondaries` to any value between 0 and the number of replicas minus 1.
37-
- `--readable-secondaries` only applies to Business Critical tier.
38-
- Automatic backups are taken on the primary instance in a Business Critical service tier when there are multiple replicas. When a failover happens, backups move to the new primary.
39-
- RWX capable storage class is required for backups, for both General Purpose and Business Critical service tiers.
40-
- Billing support when using multiple read replicas.
41-
42-
For additional information about service tiers, see [High Availability with Azure Arc-enabled SQL Managed Instance (preview)](managed-instance-high-availability.md).
43-
44-
### User experience improvements
45-
46-
The following improvements are available in [Azure Data Studio](/sql/azure-data-studio/download-azure-data-studio).
47-
48-
- Azure Arc and Azure CLI extensions now generally available.
49-
- Changed edit commands for SQL Managed Instance for Azure Arc dashboard to use `update`, reflecting Azure CLI changes. This works in indirect or direct mode.
50-
- Data controller deployment wizard step for connectivity mode is now earlier in the process.
51-
- Removed an extra backups field in SQL MI deployment wizard.
52-
5332
## February 2022
5433

5534
This release is published February 25, 2022.

articles/azure-arc/data/version-log.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.reviewer: mikeray
77
services: azure-arc
88
ms.service: azure-arc
99
ms.subservice: azure-arc-data
10-
ms.date: 03/08/2022
10+
ms.date: 03/09/2022
1111
ms.topic: conceptual
1212
# Customer intent: As a data professional, I want to understand what versions of components align with specific releases.
1313
---
@@ -23,8 +23,8 @@ This article identifies the component versions with each release of Azure Arc-en
2323
|Container images tag |`v1.4.1_2022-03-08`
2424
|CRD names and versions |`datacontrollers.arcdata.microsoft.com`: v1beta1, v1, v2, v3</br>`exporttasks.tasks.arcdata.microsoft.com`: v1beta1, v1, v2</br>`kafkas.arcdata.microsoft.com`: v1beta1</br>`monitors.arcdata.microsoft.com`: v1beta1, v1, v2</br>`sqlmanagedinstances.sql.arcdata.microsoft.com`: v1beta1, v1, v2, v3, v4</br>`postgresqls.arcdata.microsoft.com`: v1beta1, v1beta2</br>`sqlmanagedinstancerestoretasks.tasks.sql.arcdata.microsoft.com`: v1beta1, v1</br>`dags.sql.arcdata.microsoft.com`: v1beta1, v2beta2</br>`activedirectoryconnectors.arcdata.microsoft.com`: v1beta1|
2525
|ARM API version|2021-11-01|
26-
|`arcdata` Azure CLI extension version| 1.2.1|
27-
|Arc enabled Kubernetes helm chart extension version|1.1.18791000|
26+
|`arcdata` Azure CLI extension version| 1.2.3|
27+
|Arc enabled Kubernetes helm chart extension version|1.1.18911000|
2828
|Arc Data extension for Azure Data Studio|1.0|
2929

3030
### February 25, 2022

articles/azure-sql/database/authentication-azure-ad-user-assigned-managed-identity.md

Lines changed: 16 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,31 +1,29 @@
11
---
22
title: User-assigned managed identity in Azure AD for Azure SQL
3-
description: This article provides information on user-assigned managed identities in Azure Active Directory (AD) with Azure SQL Database and Azure SQL Managed Instance
3+
description: User-assigned managed identities (UMI) in Azure AD (AD) for Azure SQL Database, SQL Managed Instance, and dedicated SQL pools in Azure Synapse Analytics.
44
titleSuffix: Azure SQL Database & Azure SQL Managed Instance
55
ms.service: sql-db-mi
66
ms.subservice: security
77
ms.topic: conceptual
88
author: GithubMirek
99
ms.author: mireks
1010
ms.reviewer: vanto
11-
ms.date: 12/15/2021
11+
ms.date: 03/09/2022
1212
---
1313

1414
# User-assigned managed identity in Azure AD for Azure SQL
1515

16-
[!INCLUDE[appliesto-sqldb-sqlmi](../includes/appliesto-sqldb-sqlmi.md)]
16+
[!INCLUDE[appliesto-sqldb-sqlmi-asa-dedicated-only](../includes/appliesto-sqldb-sqlmi-asa-dedicated-only.md)]
1717

1818
> [!NOTE]
1919
> User-assigned managed identity for Azure SQL is in **public preview**.
2020
2121
Azure Active Directory (AD) supports two types of managed identities: System-assigned managed identity (SMI) and user-assigned managed identity (UMI). For more information, see [Managed identity types](../../active-directory/managed-identities-azure-resources/overview.md#managed-identity-types).
2222

23-
When using Azure AD authentication with Azure SQL Managed Instance, a managed identity must be assigned to the server identity. Previously, only a system-assigned managed identity could be assigned to the Managed Instance or SQL Database server identity. With support for user-assigned managed identity, the UMI can be assigned to Azure SQL Managed Instance or Azure SQL Database as the instance or server identity. This feature is now supported for SQL Database.
23+
A system-assigned managed identity is automatically assigned to a managed instance when it is created. When using Azure AD authentication with Azure SQL Managed Instance, a managed identity must be assigned to the server identity. Previously, only a system-assigned managed identity could be assigned to the Managed Instance or SQL Database server identity. With support for user-assigned managed identity, the UMI can be assigned to Azure SQL Managed Instance or Azure SQL Database as the instance or server identity. This feature is now supported for SQL Database.
2424

2525
> [!NOTE]
26-
> A system-assigned managed identity is automatically assigned to a managed instance when it is created.
27-
>
28-
> User-assigned managed identity is not supported for Azure Synapse Analytics.
26+
> This article applies only to dedicated SQL pools (formerly SQL DW) in standalone Azure SQL servers. For more information on user-assigned managed identities for dedicated pools in Azure Synapse workspaces, see [Using a user-assigned managed identity](../../synapse-analytics/security/workspaces-encryption.md#using-a-user-assigned-managed-identity).
2927
3028
## Benefits of using user-assigned managed identities
3129

@@ -55,9 +53,12 @@ Once the UMI is created, some permissions are needed to allow the UMI to read fr
5553
- [**GroupMember.Read.All**](/graph/permissions-reference#group-permissions) – allows access to Azure AD group information
5654
- [**Application.Read.ALL**](/graph/permissions-reference#application-resource-permissions) – allows access to Azure AD service principal (applications) information
5755

58-
### Granting permissions
56+
### Grant permissions
5957

60-
The following is a sample PowerShell script that will grant the necessary permissions for UMI or SMI.
58+
The following is a sample PowerShell script that will grant the necessary permissions for UMI or SMI. This sample will assign permissions to the UMI `umiservertest`. To execute the script, you must sign in as a user with a "Global Administrator" or "Privileged Role Administrator" role, and have the following [Microsoft Graph permissions](/graph/auth/auth-concepts#microsoft-graph-permissions):
59+
- User.Read.All
60+
- GroupMember.Read.All
61+
- Application.Read.ALL
6162

6263
```powershell
6364
# Script to assign permissions to the UMI "umiservertest"
@@ -108,6 +109,8 @@ $AAD_AppRole = $AAD_SP.AppRoles | Where-Object {$_.Value -eq "Application.Read.A
108109
New-AzureADServiceAppRoleAssignment -ObjectId $MSI.ObjectId -PrincipalId $MSI.ObjectId -ResourceId $AAD_SP.ObjectId[0] -Id $AAD_AppRole.Id
109110
```
110111

112+
In the final steps of the script, if you have more UMIs with similar names, you have to use the proper `$MSI[ ]array` number, for example, `$AAD_SP.ObjectId[0]`.
113+
111114
### Check permissions for user-assigned manage identity
112115

113116
To check permissions for a UMI, go to the [Azure portal](https://portal.azure.com). In the **Azure Active Directory** resource, go to **Enterprise applications**. Select **All Applications** for the **Application type**, and search for the UMI that was created.
@@ -178,7 +181,6 @@ The ARM template used in [Creating an Azure SQL logical server using a user-assi
178181
179182
## Limitations and known issues
180183

181-
- This feature isn't supported for Azure Synapse Analytics.
182184
- After a Managed Instance is created, the **Active Directory admin** blade in the Azure portal shows a warning: `Managed Instance needs permissions to access Azure Active Directory. Click here to grant "Read" permissions to your Managed Instance.` If the user-assigned managed identity was given the appropriate permissions discussed in the above [Permissions](#permissions) section, this warning can be ignored.
183185
- If a system-assigned or user-assigned managed identity is used as the server or instance identity, deleting the identity will result in the server or instance inability to access Microsoft Graph. Azure AD authentication and other functions will fail. To restore Azure AD functionality, a new SMI or UMI must be assigned to the server with appropriate permissions.
184186
- Permissions to access Microsoft Graph using UMI or SMI can only be granted using PowerShell. These permissions can't be granted using the Azure portal.
@@ -189,4 +191,7 @@ The ARM template used in [Creating an Azure SQL logical server using a user-assi
189191
> [Create an Azure SQL logical server using a user-assigned managed identity](authentication-azure-ad-user-assigned-managed-identity-create-server.md)
190192
191193
> [!div class="nextstepaction"]
192-
> [Create an Azure SQL Managed Instance with a user-assigned managed identity](../managed-instance/authentication-azure-ad-user-assigned-managed-identity-create-managed-instance.md)
194+
> [Create an Azure SQL Managed Instance with a user-assigned managed identity](../managed-instance/authentication-azure-ad-user-assigned-managed-identity-create-managed-instance.md)
195+
196+
> [!div class="nextstepaction"]
197+
> [Using a user-assigned managed identity in Azure Synapse workspaces](../../synapse-analytics/security/workspaces-encryption.md#using-a-user-assigned-managed-identity)

articles/cognitive-services/Computer-vision/includes/quickstarts-sdk/go-sdk.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.author: pafarley
1616

1717
Use the OCR client library to read printed and handwritten text from images.
1818

19-
[Reference documentation](https://godoc.org/github.com/Azure/azure-sdk-for-go/services/cognitiveservices/v2.1/computervision) | [Library source code](https://github.com/Azure/azure-sdk-for-go/tree/master/services/cognitiveservices/v2.1/computervision) | [Package](https://github.com/Azure/azure-sdk-for-go)
19+
[Reference documentation](https://godoc.org/github.com/Azure/azure-sdk-for-go/services/cognitiveservices/v2.1/computervision) | [Library source code](github.com/Azure/azure-sdk-for-go/services/cognitiveservices/v2.1/computervision) | [Package](https://github.com/Azure/azure-sdk-for-go)
2020

2121
## Prerequisites
2222

articles/cognitive-services/Custom-Vision-Service/includes/quickstarts/python-tutorial.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -58,6 +58,8 @@ Create variables for your resource's Azure endpoint and subscription keys.
5858
>
5959
> You can find the prediction resource ID on the resource's **Properties** tab in the Azure portal, listed as **Resource ID**.
6060
>
61+
> You also can go to https://www.customvision.ai/. After you sign in, select the **Settings** icon at the top right. On the **Setting** pages, you can get all the keys, resource ID, and endpoints.
62+
>
6163
> Remember to remove the keys from your code when you're done, and never post them publicly. For production, consider using a secure way of storing and accessing your credentials. For more information, see the Cognitive Services [security](../../../cognitive-services-security.md) article.
6264
6365
## Object model

articles/cost-management-billing/reservations/view-reservations.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,8 +28,6 @@ By default, the following users can view and manage reservations:
2828

2929
Currently, the reservation administrator and reservation reader roles are are only available to assign using PowerShell. They can't be viewed or assigned in the Azure portal. For more information, see [Grant access with PowerShell](#grant-access-with-powershell).
3030

31-
The reservation administrator and reservation reader roles provide access to only reservations and not to reservation orders, hence any operation that requires to have access to reservation order is not permitted with these roles. For providing access to reservation orders, see [Grant access to individual reservations](#grant-access-to-individual-reservations).
32-
3331
The reservation lifecycle is independent of an Azure subscription, so the reservation isn't a resource under the Azure subscription. Instead, it's a tenant-level resource with its own Azure RBAC permission separate from subscriptions. Reservations don't inherit permissions from subscriptions after the purchase.
3432

3533
## View and manage reservations

articles/data-factory/monitor-shir-in-azure.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,11 +18,11 @@ By default, the Self Hosted Integration Runtime’s diagnostic and performance t
1818

1919
## Event logs
2020

21-
When logged on locally to the Self Hosted Integration Runtime, specific events can be viewed using the [event viewer](/windows/win32/eventlog/viewing-the-event-log.md). The relevant events are captured in two event viewer journals named: **Connectors – Integration Runtime** and **Integration Runtime** respectively. While it’s possible to log on to to the Self Hosted Integration Runtime hosts individually to view these events, it's also possible to stream these events to a Log Analytics workspace in Azure monitor for ease of query and centralization purposes.
21+
When logged on locally to the Self Hosted Integration Runtime, specific events can be viewed using the [event viewer](/windows/win32/eventlog/viewing-the-event-log). The relevant events are captured in two event viewer journals named: **Connectors – Integration Runtime** and **Integration Runtime** respectively. While it’s possible to log on to to the Self Hosted Integration Runtime hosts individually to view these events, it's also possible to stream these events to a Log Analytics workspace in Azure monitor for ease of query and centralization purposes.
2222

2323
## Performance counters
2424

25-
Performance counters in Windows and Linux provide insight into the performance of hardware components, operating systems, and applications such as the Self Hosted Integration Runtime. The performance counters can be viewed and collected locally on the VM using the performance monitor tool. See the article on [using performance counters](/windows/win32/perfctrs/using-performance-counters.md) for more details.
25+
Performance counters in Windows and Linux provide insight into the performance of hardware components, operating systems, and applications such as the Self Hosted Integration Runtime. The performance counters can be viewed and collected locally on the VM using the performance monitor tool. See the article on [using performance counters](/windows/win32/perfctrs/using-performance-counters) for more details.
2626

2727
## Centralize log collection and analysis
2828

@@ -32,4 +32,4 @@ When a deployment requires a more in-depth level of analysis or has reached a ce
3232

3333
- [How to configure SHIR for log analytics collection](how-to-configure-shir-for-log-analytics-collection.md)
3434
- [Review integration runtime concepts in Azure Data Factory.](concepts-integration-runtime.md)
35-
- Learn how to [create a self-hosted integration runtime in the Azure portal.](create-self-hosted-integration-runtime.md)
35+
- Learn how to [create a self-hosted integration runtime in the Azure portal.](create-self-hosted-integration-runtime.md)

0 commit comments

Comments
 (0)