You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/msal-net-token-cache-serialization.md
+6-3Lines changed: 6 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,7 +32,7 @@ The recommendation is:
32
32
- Otherwise, if you want to use an in-memory cache
33
33
- If you're only using `AcquireTokenForClient`:
34
34
- Either reuse the confidential client application instance and don’t add a serializer,
35
-
- Or new-up a new confidential client application and enable the [shared cache option](msal-net-token-cache-serialization.md?tabs=aspnet#no-token-cache-serialization). This cache is faster as it's not serialized, however, the memory will grow as tokens are cached. The number of tokens is equal to the number of tenants times the number of downstream APIs. An app token is about 2KB in size. It's great for development, or if you have few users. If you need eviction, see next bullet point.
35
+
- Or new-up a new confidential client application and enable the [shared cache option](msal-net-token-cache-serialization.md?tabs=aspnet#no-token-cache-serialization). This cache is faster as it's not serialized, however, the memory will grow as tokens are cached. The number of tokens is equal to the number of tenants times the number of downstream APIs. An app token is about 2KB in size. It's great for development, or if you have few users. If you need eviction, see next bullet point.
36
36
- If you want to use an in-memory token cache and control its size and eviction policies, use the [Microsoft.Identity.Web in memory cache option](msal-net-token-cache-serialization.md?tabs=aspnet#in-memory-token-cache-1)
37
37
- If you build an SDK and want to write your own token cache serializer for confidential client applications, inherit from [Microsoft.Identity.Web.MsalAsbtractTokenCacheProvider](https://github.com/AzureAD/microsoft-identity-web/blob/master/src/Microsoft.Identity.Web.TokenCache/MsalAbstractTokenCacheProvider.cs) and override the `WriteCacheBytesAsync` and `ReadCacheBytesAsync` methods.
@@ -247,6 +248,8 @@ You can specify that you don't want to have any token cache serialization (using
247
248
.Build();
248
249
```
249
250
251
+
`WithCacheOptions(CacheOptions.EnableSharedCacheOptions)` makestheinternalMSALtokencachesharedbetweendifferentMSALclientapplicationinstances. Sharingatokencacheisfasterthanusinganytokencacheserialization, buttheinternalin-memorytokencachedoesn't have eviction policies. Existing tokens will be refreshed in place, but fetching tokens for different users, tenants, and resources makes the cache grow accordingly. If you use this approach and have a large number of users or tenants, make sure you monitor the memory footprint. If the memory footprint becomes an issue, consider enabling token cache serialization, which might reduce the internal cache size. Also be aware that currently, you can'tusesharedcacheandcacheserializationtogether.
252
+
250
253
#### In memory token cache
251
254
252
255
Inmemorytokencacheserializationisgreatinsamples. It'salsogoodinproductionapplicationsifyouonlyrequestapptokens (`AcquireTokenForClient`), providedyoudon't mind if the token cache is lost when the web app is restarted. It'snotrecommendedinproductionifyourequestusertokens (`AcquireTokenByAuthorizationCode`, `AcquireTokenSilent`, `AcquireTokenOnBehalfOf`)
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/plan-hybrid-identity-design-considerations-identity-adoption-strategy.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,7 +55,7 @@ The following table helps in determining the advantages and disadvantages of eac
55
55
### Client experience
56
56
The strategy that you use will dictate the user sign-in experience. The following tables provide you with information on what the users should expect their sign-in experience to be. Not all federated identity providers support SSO in all scenarios.
57
57
58
-
**Doman-joined and private network applications**:
58
+
**Domain-joined and private network applications**:
Copy file name to clipboardExpand all lines: articles/cognitive-services/QnAMaker/Concepts/confidence-score.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,9 +52,9 @@ When choosing your threshold, keep in mind the balance between Accuracy and Cove
52
52
53
53
## Set threshold
54
54
55
-
Set the threshold score as a property of the [GenerateAnswer API JSON body](../how-to/metadata-generateanswer-usage.md#generateanswer-request-configuration). This means you set it for each call to GenerateAnswer.
55
+
Set the threshold score as a property of the [GenerateAnswer API JSON body](../How-To/metadata-generateanswer-usage.md#generateanswer-request-configuration). This means you set it for each call to GenerateAnswer.
56
56
57
-
From the bot framework, set the score as part of the options object with [C#](../how-to/metadata-generateanswer-usage.md?#use-qna-maker-with-a-bot-in-c) or [Node.js](../how-to/metadata-generateanswer-usage.md?#use-qna-maker-with-a-bot-in-nodejs).
57
+
From the bot framework, set the score as part of the options object with [C#](../How-To/metadata-generateanswer-usage.md?#use-qna-maker-with-a-bot-in-c) or [Node.js](../How-To/metadata-generateanswer-usage.md?#use-qna-maker-with-a-bot-in-nodejs).
58
58
59
59
## Improve confidence scores
60
60
To improve the confidence score of a particular response to a user query, you can add the user query to the knowledge base as an alternate question on that response. You can also use case-insensitive [word alterations](/rest/api/cognitiveservices/qnamaker/alterations/replace) to add synonyms to keywords in your KB.
@@ -71,7 +71,7 @@ The test index holds all the QnA pairs of your knowledge bases. When querying th
71
71
* organize your knowledge base using one of the following:
72
72
* 1 resource restricted to 1 KB: restrict your single QnA resource (and the resulting Azure Cognitive Search test index) to a single knowledge base.
73
73
* 2 resources - 1 for test, 1 for production: have two QnA Maker resources, using one for testing (with its own test and production indexes) and one for product (also having its own test and production indexes)
74
-
* and, always use the same parameters, such as **[top](../how-to/improve-knowledge-base.md#use-the-top-property-in-the-generateanswer-request-to-get-several-matching-answers)** when querying both your test and production knowledge base
74
+
* and, always use the same parameters, such as **[top](../How-To/improve-knowledge-base.md#use-the-top-property-in-the-generateanswer-request-to-get-several-matching-answers)** when querying both your test and production knowledge base
75
75
76
76
When you publish a knowledge base, the question and answer contents of your knowledge base moves from the test index to a production index in Azure search. See how the [publish](../Quickstarts/create-publish-knowledge-base.md#publish-the-knowledge-base) operation works.
Copy file name to clipboardExpand all lines: articles/virtual-desktop/screen-capture-protection.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,8 +27,8 @@ Suppose the user attempts to use an unsupported client to connect to the protect
27
27
28
28
1. To configure screen capture protection, you need to install administrative templates that add rules and settings for Azure Virtual Desktop.
29
29
2. Download the [Azure Virtual Desktop policy templates file](https://aka.ms/avdgpo) (AVDGPTemplate.cab) and extract the contents of the cab file and zip archive.
30
-
3. Copy the *terminalserver-avd.admx* file to *%windir%\PolicyDefinitions* folder
31
-
4. Copy the *en-us\terminalserver-avd.adml* file to *%windir%\PolicyDefinitions\en-us* folder
30
+
3. Copy the **terminalserver-avd.admx** file to **%windir%\PolicyDefinitions** folder.
31
+
4. Copy the **en-us\terminalserver-avd.adml** file to **%windir%\PolicyDefinitions\en-us** folder.
32
32
5. To confirm the files copied correctly, open the Group Policy Editor and navigate to **Computer Configuration** -> **Administrative Templates** -> **Windows Components** -> **Remote Desktop Services** -> **Remote Desktop Session Host** -> **Azure Virtual Desktop**
33
33
6. You should see one or more Azure Virtual Desktop policies, as shown below.
0 commit comments