Skip to content

Commit bdc680d

Browse files
authored
Merge pull request #111409 from julieMSFT/release-ignite-arcadia
Dirty PR to resolve merge conflicts with master in release-ignite-arcadia
2 parents 54f0bc4 + 9382f81 commit bdc680d

File tree

728 files changed

+1871
-18884
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

728 files changed

+1871
-18884
lines changed

.openpublishing.redirection.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5504,7 +5504,12 @@
55045504
},
55055505
{
55065506
"source_path": "articles/managed-applications/publish-managed-app-definition-quickstart.md",
5507-
"redirect_url": "/azure/azure-resource-manager/managed-applications/publish-managed-app-definition-quickstart",
5507+
"redirect_url": "/azure/azure-resource-manager/managed-applications/publish-service-catalog-app",
5508+
"redirect_document_id": false
5509+
},
5510+
{
5511+
"source_path": "articles/azure-resource-manager/managed-applications/publish-managed-app-definition-quickstart.md",
5512+
"redirect_url": "/azure/azure-resource-manager/managed-applications/publish-service-catalog-app",
55085513
"redirect_document_id": false
55095514
},
55105515
{

articles/active-directory/saas-apps/blink-provisioning-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -117,7 +117,7 @@ This section guides you through the steps to configure the Azure AD provisioning
117117

118118
9. Review the user attributes that are synchronized from Azure AD to Blink in the **Attribute Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in Blink for update operations. Select the **Save** button to commit any changes.
119119

120-
![Blink User Attributes](media/blink-provisioning-tutorial/User_attributes.png)
120+
![Blink User Attributes](media/blink-provisioning-tutorial/user-attributes.png)
121121

122122
10. To configure scoping filters, refer to the following instructions provided in the [Scoping filter tutorial](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
123123

articles/active-directory/saas-apps/envoy-provisioning-tutorial.md

Lines changed: 85 additions & 76 deletions
Large diffs are not rendered by default.
32.8 KB
Loading
3.44 KB
Loading

articles/analysis-services/TOC.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,9 @@
1010
href: analysis-services-create-server.md
1111
- name: Create a server - PowerShell
1212
href: analysis-services-create-powershell.md
13+
- name: Create a server - ARM template
14+
displayName: Resource Manager
15+
href: analysis-services-create-template.md
1316
- name: Configure server firewall - Portal
1417
href: analysis-services-qs-firewall.md
1518
- name: Tutorials
Lines changed: 103 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,103 @@
1+
---
2+
title: Quickstart - Create an Azure Analysis Services server resource by using Azure Resource Manager template
3+
description: Quickstart showing how to an Azure Analysis Services server resource by using an Azure Resource Manager template.
4+
author: minewiskan
5+
ms.author: owend
6+
tags: azure-resource-manager
7+
ms.service: analysis-services
8+
ms.topic: quickstart
9+
ms.date: 04/14/2020
10+
ms.custom: subject-armqs
11+
12+
#Customer intent: As a BI developer who is new to Azure, I want to use Azure Analysis Services to store and manage my organizations data models.
13+
14+
---
15+
16+
# Quickstart: Create a server - Azure Resource Manager template
17+
18+
This quickstart describes how to create an Analysis Services server resource in your Azure subscription by using a Resource Manager template.
19+
20+
[!INCLUDE [About Azure Resource Manager](../../includes/resource-manager-quickstart-introduction.md)]
21+
22+
## Prerequisites
23+
24+
* **Azure subscription**: Visit [Azure Free Trial](https://azure.microsoft.com/offers/ms-azr-0044p/) to create an account.
25+
* **Azure Active Directory**: Your subscription must be associated with an Azure Active Directory tenant. And, you need to be signed in to Azure with an account in that Azure Active Directory. To learn more, see [Authentication and user permissions](analysis-services-manage-users.md).
26+
27+
## Create a server
28+
29+
### Review the template
30+
31+
The template used in this quickstart is from [Azure Quickstart templates](https://azure.microsoft.com/resources/templates/101-analysis-services-create/).
32+
33+
:::code language="json" source="~/quickstart-templates/101-analysis-services-create/azuredeploy.json":::
34+
35+
A single [Microsoft.AnalysisServices/servers](https://docs.microsoft.com/azure/templates/microsoft.analysisservices/2017-08-01/servers) resource with a firewall rule is defined in the template.
36+
37+
### Deploy the template
38+
39+
1. Select the following Deploy to Azure link to sign in to Azure and open a template. The template is used to create an Analysis Services server resource and specify required and optional properties.
40+
41+
<a href="https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2Fazure-quickstart-templates%2Fmaster%2F101-analysis-services-create%2Fazuredeploy.json"><img src="./media/analysis-services-create-template/deploy-azure.png" alt="deploy to azure"/></a>
42+
43+
2. Select or enter the following values.
44+
45+
Unless specified otherwise, use default values.
46+
47+
* **Subscription**: Select an Azure subscription.
48+
* **Resource group**: Click **Create new**, and then enter a unique name for the new resource group.
49+
* **Location**: Select a default location for resources created in the resource group.
50+
* **Server Name**: Enter a name for the server resource.
51+
* **Location**: Ignore for Analysis Services. Location is specified in Server Location.
52+
* **Server location**: Enter the location of the Analysis Services server. This is often the same region as the default Location specified for the Resource Group, but not required. For example **North Central US**. For supported regions, see [Analysis Services availability by region](analysis-services-overview.md#availability-by-region).
53+
* **Sku Name**: Enter the sku name for the Analysis Services server to create. Choose from: B1, B2, D1, S0, S1, S2, S3, S4, S8v2, S9v2. Sku availability depends on region. S0 or D1 is recommended for evaluation and testing.
54+
* **Capacity**: Enter the total number of query replica scale-out instances. Scale-out of more than one instance is supported in select regions only.
55+
* **Firewall Settings**: Enter inbound firewall rules to define for the server. If not specified, firewall is disabled.
56+
* **Backup Blob Container Uri**: Enter the SAS URI to a private Azure Blob Storage container with read, write and list permissions. Required only if you intend to use [Backup/restore](analysis-services-backup.md).
57+
* **I agree to the terms and conditions state above**: Select.
58+
59+
3. Select **Purchase**. After the server has been deployed successfully, you get a notification:
60+
61+
![Resource Manager template, deploy portal notification](./media/analysis-services-create-template/notification.png)
62+
63+
## Validate the deployment
64+
65+
Use the Azure portal or Azure PowerShell to verify the resource group and server resource was created.
66+
67+
#### PowerShell
68+
69+
```azurepowershell-interactive
70+
$resourceGroupName = Read-Host -Prompt "Enter the Resource Group name"
71+
(Get-AzResource -ResourceType "Microsoft.AnalysisServices/servers" -ResourceGroupName $resourceGroupName).Name
72+
Write-Host "Press [ENTER] to continue..."
73+
```
74+
75+
---
76+
77+
## Clean up resources
78+
79+
When no longer needed, use the Azure portal, Azure CLI, or Azure PowerShell to delete the resource group and the server resource.
80+
81+
# [CLI](#tab/CLI)
82+
83+
```azurecli-interactive
84+
echo "Enter the Resource Group name:" &&
85+
read resourceGroupName &&
86+
az group delete --name $resourceGroupName &&
87+
echo "Press [ENTER] to continue ..."
88+
```
89+
90+
# [PowerShell](#tab/PowerShell)
91+
92+
```azurepowershell-interactive
93+
$resourceGroupName = Read-Host -Prompt "Enter the Resource Group name"
94+
Remove-AzResourceGroup -Name $resourceGroupName
95+
Write-Host "Press [ENTER] to continue..."
96+
```
97+
98+
## Next steps
99+
100+
In this quickstart, you used an Azure Resource Manager template to create a new resource group and an Azure Analysis Services server resource. After you've create a server resource by using the template, consider the following:
101+
- [Quickstart: Create a server - PowerShell](analysis-services-create-powershell.md)
102+
- [Add a sample model from the portal](analysis-services-create-sample-model.md)
103+
- [Configure server administrator and user roles](tutorials/analysis-services-tutorial-roles.md)
3.08 KB
Loading
16.3 KB
Loading

articles/app-service/configure-authentication-provider-aad.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Configure Azure AD authentication
33
description: Learn how to configure Azure Active Directory authentication as an identity provider for your App Service or Azure Functions app.
44
ms.assetid: 6ec6a46c-bce4-47aa-b8a3-e133baef22eb
55
ms.topic: article
6-
ms.date: 09/03/2019
6+
ms.date: 04/14/2020
77
ms.custom: seodec18, fasttrack-edit
88
---
99

@@ -14,8 +14,7 @@ ms.custom: seodec18, fasttrack-edit
1414
This article shows you how to configure Azure App Service or Azure Functions to use Azure Active Directory (Azure AD) as an authentication provider.
1515

1616
> [!NOTE]
17-
> At this time, [Azure Active Directory v2.0](../active-directory/develop/v2-overview.md) (including [MSAL](../active-directory/develop/msal-overview.md)) is not supported for Azure App Service and Azure Functions. Please check back for updates.
18-
>
17+
> The express settings flow sets up an AAD V1 application registration. If you wish to use [Azure Active Directory v2.0](../active-directory/develop/v2-overview.md) (including [MSAL](../active-directory/develop/msal-overview.md)), please follow the [advanced configuration instructions](#advanced).
1918
2019
Follow these best practices when setting up your app and authentication:
2120

@@ -96,7 +95,7 @@ Perform the following steps:
9695
|Field|Description|
9796
|-|-|
9897
|Client ID| Use the **Application (client) ID** of the app registration. |
99-
|Issuer Url| Use `https://login.microsoftonline.com/<tenant-id>`, and replace *\<tenant-id>* with the **Directory (tenant) ID** of the app registration. This value is used to redirect users to the correct Azure AD tenant, as well as to download the appropriate metadata to determine the appropriate token signing keys and token issuer claim value for example. |
98+
|Issuer Url| Use `https://login.microsoftonline.com/<tenant-id>/v2.0`, and replace *\<tenant-id>* with the **Directory (tenant) ID** of the app registration. This value is used to redirect users to the correct Azure AD tenant, as well as to download the appropriate metadata to determine the appropriate token signing keys and token issuer claim value for example. The `/v2.0` section may be omitted for applications using AAD v1. |
10099
|Client Secret (Optional)| Use the client secret you generated in the app registration.|
101100
|Allowed Token Audiences| If this is a cloud or server app and you want to allow authentication tokens from a web app, add the **Application ID URI** of the web app here. The configured **Client ID** is *always* implicitly considered to be an allowed audience. |
102101

0 commit comments

Comments
 (0)