Skip to content

Commit b9a8835

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into mrb_10_31_2022_how_to_updates
2 parents 8a149c0 + 0f9b921 commit b9a8835

27 files changed

+264
-153
lines changed
Loading
70.4 KB
Loading

articles/active-directory/develop/workload-identity-federation-create-trust-user-assigned-managed-identity.md

Lines changed: 24 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ zone_pivot_groups: identity-wif-mi-methods
1919

2020
# Configure a user-assigned managed identity to trust an external identity provider (preview)
2121

22-
This article describes how to manage a federated identity credential on a user-assigned managed identity in Azure Active Directory (Azure AD). The federated identity credential creates a trust relationship between a user-assigned managed identity and an external identity provider (IdP). Configuring a federated identity credential on a system-assigned managed identity is not supported.
22+
This article describes how to manage a federated identity credential on a user-assigned managed identity in Azure Active Directory (Azure AD). The federated identity credential creates a trust relationship between a user-assigned managed identity and an external identity provider (IdP). Configuring a federated identity credential on a system-assigned managed identity isn't supported.
2323

2424
After you configure your user-assigned managed identity to trust an external IdP, configure your external software workload to exchange a token from the external IdP for an access token from Microsoft identity platform. The external workload uses the access token to access Azure AD protected resources without needing to manage secrets (in supported scenarios). To learn more about the token exchange workflow, read about [workload identity federation](workload-identity-federation.md).
2525

@@ -50,13 +50,27 @@ In the **Federated credential scenario** dropdown box, select your scenario.
5050

5151
### GitHub Actions deploying Azure resources
5252

53-
For **Entity type**, select **Environment**, **Branch**, **Pull request**, or **Tag** and specify the value. The values must exactly match the configuration in the [GitHub workflow](https://docs.github.com/actions/using-workflows/workflow-syntax-for-github-actions#on). For more info, read the [examples](#entity-type-examples).
53+
To add a federated identity for GitHub actions, follow these steps:
5454

55-
Add a **Name** for the federated credential.
55+
1. For **Entity type**, select **Environment**, **Branch**, **Pull request**, or **Tag** and specify the value. The values must exactly match the configuration in the [GitHub workflow](https://docs.github.com/actions/using-workflows/workflow-syntax-for-github-actions#on). For more info, read the [examples](#entity-type-examples).
5656

57-
The **Issuer**, **Audiences**, and **Subject identifier** fields autopopulate based on the values you entered.
57+
1. Add a **Name** for the federated credential.
5858

59-
Click **Add** to configure the federated credential.
59+
1. The **Issuer**, **Audiences**, and **Subject identifier** fields autopopulate based on the values you entered.
60+
61+
1. Select **Add** to configure the federated credential.
62+
63+
Use the following values from your Azure AD Managed Identity for your GitHub workflow:
64+
65+
- `AZURE_CLIENT_ID` the managed identity **Client ID**
66+
67+
- `AZURE_SUBSCRIPTION_ID` the **Subscription ID**.
68+
69+
The following screenshot demonstrates how to copy the managed identity ID and subscription ID.
70+
71+
[![Screenshot that demonstrates how to copy the managed identity ID and subscription ID from Azure portal.](./media/workload-identity-federation-create-trust-user-assigned-managed-identity/copy-managed-identity-id.png)](./media/workload-identity-federation-create-trust-user-assigned-managed-identity/copy-managed-identity-id.png#lightbox)
72+
73+
- `AZURE_TENANT_ID` the **Directory (tenant) ID**. Learn [how to find your Azure Active Directory tenant ID](../fundamentals/active-directory-how-to-find-tenant.md).
6074

6175
#### Entity type examples
6276

@@ -128,7 +142,7 @@ Fill in the **Cluster issuer URL**, **Namespace**, **Service account name**, and
128142
- **Namespace** is the service account namespace.
129143
- **Name** is the name of the federated credential, which can't be changed later.
130144
131-
Click **Add** to configure the federated credential.
145+
Select **Add** to configure the federated credential.
132146
133147
### Other
134148
@@ -140,7 +154,7 @@ Specify the following fields (using a software workload running in Google Cloud
140154
- **Subject identifier**: must match the `sub` claim in the token issued by the external identity provider. In this example using Google Cloud, *subject* is the Unique ID of the service account you plan to use.
141155
- **Issuer**: must match the `iss` claim in the token issued by the external identity provider. A URL that complies with the OIDC Discovery spec. Azure AD uses this issuer URL to fetch the keys that are necessary to validate the token. For Google Cloud, the *issuer* is "https://accounts.google.com".
142156

143-
Click **Add** to configure the federated credential.
157+
Select **Add** to configure the federated credential.
144158

145159
## List federated identity credentials on a user-assigned managed identity
146160

@@ -356,11 +370,11 @@ Federated identity credential and parent user assigned identity can be created o
356370

357371
All of the template parameters are mandatory.
358372

359-
There is a limit of 3-120 characters for a federated identity credential name length. It must be alphanumeric, dash, underscore. First symbol is alphanumeric only.
373+
There's a limit of 3-120 characters for a federated identity credential name length. It must be alphanumeric, dash, underscore. First symbol is alphanumeric only.
360374

361-
You must add exactly 1 audience to a federated identity credential. The audience is verified during token exchange. Use “api://AzureADTokenExchange” as the default value.
375+
You must add exactly one audience to a federated identity credential. The audience is verified during token exchange. Use “api://AzureADTokenExchange” as the default value.
362376

363-
List, Get, and Delete operations are not available with template. Refer to Azure CLI for these operations. By default, all child federated identity credentials are created in parallel, which triggers concurrency detection logic and causes the deployment to fail with a 409-conflict HTTP status code. To create them sequentially, specify a chain of dependencies using the *dependsOn* property.
377+
List, Get, and Delete operations aren't available with template. Refer to Azure CLI for these operations. By default, all child federated identity credentials are created in parallel, which triggers concurrency detection logic and causes the deployment to fail with a 409-conflict HTTP status code. To create them sequentially, specify a chain of dependencies using the *dependsOn* property.
364378

365379
Make sure that any kind of automation creates federated identity credentials under the same parent identity sequentially. Federated identity credentials under different managed identities can be created in parallel without any restrictions.
366380

articles/active-directory/develop/workload-identity-federation-create-trust.md

Lines changed: 26 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: how-to
1111
ms.workload: identity
12-
ms.date: 07/27/2022
12+
ms.date: 10/31/2022
1313
ms.author: ryanwi
1414
ms.custom: aaddev
1515
ms.reviewer: shkhalid, udayh, vakarand
@@ -43,21 +43,37 @@ Get the *subject* and *issuer* information for your external IdP and software wo
4343
## Configure a federated identity credential on an app
4444

4545
### GitHub Actions
46-
Find your app registration in the [App Registrations](https://aka.ms/appregistrations) experience of the Azure portal. Select **Certificates & secrets** in the left nav pane, select the **Federated credentials** tab, and select **Add credential**.
4746

48-
In the **Federated credential scenario** drop-down box, select **GitHub actions deploying Azure resources**.
47+
To add a federated identity for GitHub actions, follow these steps:
48+
49+
1. Find your app registration in the [App Registrations](https://aka.ms/appregistrations) experience of the Azure portal. Select **Certificates & secrets** in the left nav pane, select the **Federated credentials** tab, and select **Add credential**.
50+
51+
1. In the **Federated credential scenario** drop-down box, select **GitHub actions deploying Azure resources**.
52+
53+
1. Specify the **Organization** and **Repository** for your GitHub Actions workflow.
54+
55+
1. For **Entity type**, select **Environment**, **Branch**, **Pull request**, or **Tag** and specify the value. The values must exactly match the configuration in the [GitHub workflow](https://docs.github.com/actions/using-workflows/workflow-syntax-for-github-actions#on). Pattern matching isn't supported for branches and tags. Specify an environment if your on-push workflow runs against many branches or tags. For more info, read the [examples](#entity-type-examples).
56+
57+
1. Add a **Name** for the federated credential.
58+
59+
1. The **Issuer**, **Audiences**, and **Subject identifier** fields autopopulate based on the values you entered.
60+
61+
1. Select **Add** to configure the federated credential.
62+
63+
:::image type="content" source="media/workload-identity-federation-create-trust/add-credential.png" alt-text="Screenshot of the Add a credential window, showing sample values." :::
4964

50-
Specify the **Organization** and **Repository** for your GitHub Actions workflow.
5165

52-
For **Entity type**, select **Environment**, **Branch**, **Pull request**, or **Tag** and specify the value. The values must exactly match the configuration in the [GitHub workflow](https://docs.github.com/actions/using-workflows/workflow-syntax-for-github-actions#on). Pattern matching is not supported for branches and tags. Specify an environment if your on-push workflow runs against many branches or tags. For more info, read the [examples](#entity-type-examples).
66+
Use the following values from your Azure AD application registration for your GitHub workflow:
5367

54-
Add a **Name** for the federated credential.
68+
- `AZURE_CLIENT_ID` the **Application (client) ID**
5569

56-
The **Issuer**, **Audiences**, and **Subject identifier** fields autopopulate based on the values you entered.
70+
- `AZURE_TENANT_ID` the **Directory (tenant) ID**
71+
72+
The following screenshot demonstrates how to copy the application ID and tenant ID.
5773

58-
Click **Add** to configure the federated credential.
74+
![Screenshot that demonstrates how to copy the application ID and tenant ID from Microsoft Entra portal.](./media/workload-identity-federation-create-trust/copy-client-id.png)
5975

60-
:::image type="content" source="media/workload-identity-federation-create-trust/add-credential.png" alt-text="Screenshot of the Add a credential window, showing sample values." :::
76+
- `AZURE_SUBSCRIPTION_ID` your subscription ID. To get the subscription ID, open **Subscriptions** in Azure portal and find your subscription. Then, copy the **Subscription ID**.
6177

6278
#### Entity type examples
6379

@@ -173,7 +189,7 @@ To delete a federated identity credential, select the **Delete** icon for the cr
173189

174190
Run the [az ad app federated-credential create](/cli/azure/ad/app/federated-credential) command to create a new federated identity credential on your app.
175191

176-
The *id* parameter specifies the identifier URI, application ID, or object ID of the application. *parameters* specifies the parameters, in JSON format, for creating the federated identity credential.
192+
The `id` parameter specifies the identifier URI, application ID, or object ID of the application. The `parameters` parameter specifies the parameters, in JSON format, for creating the federated identity credential.
177193

178194
### GitHub Actions example
179195

articles/aks/configure-kube-proxy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,7 @@ az aks update -g <resourceGroup> -n <clusterName> --kube-proxy-config kube-proxy
118118

119119
## Next steps
120120

121-
Learn more about utilizing the Standard Load Balancer for inbound traffic at the [AKS Standard Load Balancer documentation][load-balancer-standard.md].
121+
Learn more about utilizing the Standard Load Balancer for inbound traffic at the [AKS Standard Load Balancer documentation](load-balancer-standard.md).
122122

123123
Learn more about using Internal Load Balancer for Inbound traffic at the [AKS Internal Load Balancer documentation](internal-lb.md).
124124

articles/aks/use-pod-security-policies.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,12 +8,10 @@ ms.date: 03/25/2021
88

99
# Preview - Secure your cluster using pod security policies in Azure Kubernetes Service (AKS)
1010

11-
> [!WARNING]
12-
> **The feature described in this document, pod security policy (preview), will begin [deprecation](https://kubernetes.io/blog/2021/04/06/podsecuritypolicy-deprecation-past-present-and-future/) with Kubernetes version 1.21, with its removal in version 1.25.** You can now [Migrate Pod Security Policy to Pod Security Admission Controller](https://kubernetes.io/docs/tasks/configure-pod-container/migrate-from-psp/) ahead of the deprecation.
13-
>
14-
> After pod security policy (preview) is deprecated, you must have already migrated to Pod Security Admission controller or disabled the feature on any existing clusters using the deprecated feature to perform future cluster upgrades and stay within Azure support.
11+
[!Important]
12+
The feature described in this document, pod security policy (preview), will begin deprecation with Kubernetes version 1.21, with its removal in version 1.25. AKS will mark Pod Security Policy as "Deprecated" in the AKS API on 04-01-2023. You can now Migrate Pod Security Policy to Pod Security Admission Controller ahead of the deprecation.
1513

16-
To improve the security of your AKS cluster, you can limit what pods can be scheduled. Pods that request resources you don't allow can't run in the AKS cluster. You define this access using pod security policies. This article shows you how to use pod security policies to limit the deployment of pods in AKS.
14+
After pod security policy (preview) is deprecated, you must have already migrated to Pod Security Admission controller or disabled the feature on any existing clusters using the deprecated feature to perform future cluster upgrades and stay within Azure support.
1715

1816
[!INCLUDE [preview features callout](./includes/preview/preview-callout.md)]
1917

articles/analysis-services/analysis-services-create-bicep-file.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Quickstart - Create an Azure Analysis Services server resource by using B
33
description: Quickstart showing how to an Azure Analysis Services server resource by using a Bicep file.
44
ms.date: 03/08/2022
55
ms.topic: quickstart
6-
ms.service: analysis-services
6+
ms.service: azure-analysis-services
77
ms.author: jgao
88
author: mumian
99
tags: azure-resource-manager, bicep

articles/analysis-services/analysis-services-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ Azure Analysis Services is a fully managed platform as a service (PaaS) that pro
1919

2020
![Data sources](./media/analysis-services-overview/aas-overview-overall.png)
2121

22-
**Video:** Check out [Azure Analysis Services Overview](https://sec.ch9.ms/ch9/d6dd/a1cda46b-ef03-4cea-8f11-68da23c5d6dd/AzureASoverview_high.mp4) to learn how Azure Analysis Services fits in with Microsoft's overall BI capabilities.
22+
**Video:** Check out [Azure Analysis Services Overview](https://www.youtube.com/watch?v=m1jnG1zIvTo&t=31s) to learn how Azure Analysis Services fits in with Microsoft's overall BI capabilities.
2323

2424
## Get up and running quickly
2525

articles/applied-ai-services/form-recognizer/overview.md

Lines changed: 4 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
2-
title: Intelligent document processing - Form Recognizer
2+
title: Form Recognizer overview
33
titleSuffix: Azure Applied AI Services
4-
description: Machine-learning based OCR and document understanding service to automate extraction of text, table and structure, and key-value pairs from your forms and documents.
4+
description: Machine-learning based OCR and intelligent document processing understanding service to automate extraction of text, table and structure, and key-value pairs from your forms and documents.
55
author: laujan
66
manager: nitinme
77
ms.service: applied-ai-services
88
ms.subservice: forms-recognizer
99
ms.topic: overview
10-
ms.date: 10/20/2022
10+
ms.date: 10/31/2022
1111
ms.author: lajanuar
1212
recommendations: false
1313
---
@@ -16,13 +16,7 @@ recommendations: false
1616
<!-- markdownlint-disable MD024 -->
1717
<!-- markdownlint-disable MD036 -->
1818

19-
# What is Intelligent Document Processing?
20-
21-
Intelligent Document Processing (IDP) refers to capturing, transforming, and processing data from documents (e.g., PDF, or scanned documents including Microsoft Office and HTML documents). It typically uses advanced machine-learning based technologies like computer vision, Optical Character Recognition (OCR), document layout analysis, and Natural Language Processing (NLP) to extract meaningful information, process and integrate with other systems.
22-
23-
IDP solutions can extract data from structured documents with pre-defined layouts like a tax form, unstructured or free-form documents like a contract, and semi-structured documents. They have a wide variety of benefits spanning knowledge mining, business process automation, and industry-specific applications. Examples include invoice processing, medical claims processing, and contracts workflow automation.
24-
25-
## What is Azure Form Recognizer?
19+
# What is Azure Form Recognizer?
2620

2721
::: moniker range="form-recog-3.0.0"
2822
[!INCLUDE [applies to v3.0](includes/applies-to-v3-0.md)]

articles/azure-functions/functions-reference-python.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1227,7 +1227,7 @@ For a list of preinstalled system libraries in Python worker Docker images, see
12271227

12281228
| Functions runtime | Debian version | Python versions |
12291229
|------------|------------|------------|
1230-
| Version 3.x | Buster | [Python 3.6](https://github.com/Azure/azure-functions-docker/blob/master/host/3.0/buster/amd64/python/python36/python36.Dockerfile)<br/>[Python 3.7](https://github.com/Azure/azure-functions-docker/blob/master/host/3.0/buster/amd64/python/python37/python37.Dockerfile)<br />[Python 3.8](https://github.com/Azure/azure-functions-docker/blob/master/host/3.0/buster/amd64/python/python38/python38.Dockerfile)<br/> [Python 3.9](https://github.com/Azure/azure-functions-docker/blob/master/host/3.0/buster/amd64/python/python39/python39.Dockerfile)|
1230+
| Version 3.x | Buster | [Python 3.7](https://github.com/Azure/azure-functions-docker/blob/master/host/3.0/buster/amd64/python/python37/python37.Dockerfile)<br />[Python 3.8](https://github.com/Azure/azure-functions-docker/blob/master/host/3.0/buster/amd64/python/python38/python38.Dockerfile)<br/> [Python 3.9](https://github.com/Azure/azure-functions-docker/blob/master/host/3.0/buster/amd64/python/python39/python39.Dockerfile)|
12311231

12321232
## Python worker extensions
12331233

0 commit comments

Comments
 (0)