Skip to content

Commit cceb05a

Browse files
authored
Merge pull request #194996 from MicrosoftDocs/main
4/13 AM Publish
2 parents f426ba6 + c67e085 commit cceb05a

File tree

64 files changed

+583
-728
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

64 files changed

+583
-728
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36613,6 +36613,11 @@
3661336613
"redirect_url": "/azure/cognitive-services/Computer-vision/quickstarts-sdk/csharp-sdk",
3661436614
"redirect_document_id": false
3661536615
},
36616+
{
36617+
"source_path_from_root": "/articles/cognitive-services/Computer-vision/Tutorials/CSharpTutorial.md",
36618+
"redirect_url": "/azure/cognitive-services/Computer-vision/overview-image-analysis",
36619+
"redirect_document_id": false
36620+
},
3661636621
{
3661736622
"source_path_from_root": "/articles/cognitive-services/Content-Moderator/Review-Tool-User-Guide/Upload-Images.md",
3661836623
"redirect_url": "/azure/cognitive-services/content-moderator",

articles/active-directory/authentication/howto-authentication-passwordless-security-key.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -99,6 +99,7 @@ There are two ways to get your AAGUID. You can either ask your security key prov
9999
1. Click **Security Info**.
100100
1. If the user already has at least one Azure AD Multi-Factor Authentication method registered, they can immediately register a FIDO2 security key.
101101
1. If they don't have at least one Azure AD Multi-Factor Authentication method registered, they must add one.
102+
1. An Administrator can issue a [Temporary Access Pass](howto-authentication-temporary-access-pass.md) to allow the user to register a Passwordless authentication method.
102103
1. Add a FIDO2 Security key by clicking **Add method** and choosing **Security key**.
103104
1. Choose **USB device** or **NFC device**.
104105
1. Have your key ready and choose **Next**.
@@ -141,4 +142,4 @@ If a user's UPN changes, you can no longer modify FIDO2 security keys to account
141142

142143
[Learn more about device registration](../devices/overview.md)
143144

144-
[Learn more about Azure AD Multi-Factor Authentication](../authentication/howto-mfa-getstarted.md)
145+
[Learn more about Azure AD Multi-Factor Authentication](../authentication/howto-mfa-getstarted.md)

articles/active-directory/develop/msal-net-token-cache-serialization.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ The recommendation is:
3434

3535
A shared cache is faster because it's not serialized. However, the memory will grow as tokens are cached. The number of tokens is equal to the number of tenants times the number of downstream APIs. An app token is about 2 KB in size, whereas tokens for a user are about 7 KB in size. It's great for development, or if you have few users.
3636
- If you want to use an in-memory token cache and control its size and eviction policies, use the [Microsoft.Identity.Web in-memory cache option](msal-net-token-cache-serialization.md?tabs=aspnet#in-memory-token-cache-1).
37-
- If you build an SDK and want to write your own token cache serializer for confidential client applications, inherit from [Microsoft.Identity.Web.MsalAsbtractTokenCacheProvider](https://github.com/AzureAD/microsoft-identity-web/blob/master/src/Microsoft.Identity.Web.TokenCache/MsalAbstractTokenCacheProvider.cs) and override the `WriteCacheBytesAsync` and `ReadCacheBytesAsync` methods.
37+
- If you build an SDK and want to write your own token cache serializer for confidential client applications, inherit from [Microsoft.Identity.Web.MsalAbstractTokenCacheProvider](https://github.com/AzureAD/microsoft-identity-web/blob/master/src/Microsoft.Identity.Web.TokenCache/MsalAbstractTokenCacheProvider.cs) and override the `WriteCacheBytesAsync` and `ReadCacheBytesAsync` methods.
3838

3939

4040
## [ASP.NET Core web apps and web APIs](#tab/aspnetcore)
@@ -496,7 +496,7 @@ The strategies are different depending on whether you're writing a token cache s
496496

497497
### Custom token cache for a web app or web API (confidential client application)
498498

499-
If you want to write your own token cache serializer for confidential client applications, we recommend that you inherit from [Microsoft.Identity.Web.MsalAsbtractTokenCacheProvider](https://github.com/AzureAD/microsoft-identity-web/blob/master/src/Microsoft.Identity.Web.TokenCache/MsalAbstractTokenCacheProvider.cs) and override the `WriteCacheBytesAsync` and `ReadCacheBytesAsync` methods.
499+
If you want to write your own token cache serializer for confidential client applications, we recommend that you inherit from [Microsoft.Identity.Web.MsalAbstractTokenCacheProvider](https://github.com/AzureAD/microsoft-identity-web/blob/master/src/Microsoft.Identity.Web.TokenCache/MsalAbstractTokenCacheProvider.cs) and override the `WriteCacheBytesAsync` and `ReadCacheBytesAsync` methods.
500500
501501
Examples of token cache serializers are provided in [Microsoft.Identity.Web/TokenCacheProviders](https://github.com/AzureAD/microsoft-identity-web/blob/master/src/Microsoft.Identity.Web.TokenCache).
502502

articles/active-directory/enterprise-users/directory-delete-howto.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ Expired (30 days) | Data accessible to all| Users have normal access to Microsof
5757
Disabled (30 days) | Data accessible to admin only | Users can’t access Microsoft 365 files, or apps<br>Admins can access the Microsoft 365 admin center but can’t assign licenses to or update users
5858
Deprovisioned (30 days after Disabled) | Data deleted (automatically deleted if no other services are in use) | Users can’t access Microsoft 365 files, or apps<br>Admins can access the Microsoft 365 admin center to purchase and manage other subscriptions
5959

60-
## Delete a subscription
60+
## Delete a Office/Microsoft 365 subscription
6161

6262
You can put a subscription into the **Deprovisioned** state to be deleted in three days using the Microsoft 365 admin center.
6363

@@ -88,6 +88,16 @@ You can put a subscription into the **Deprovisioned** state to be deleted in thr
8888
1. Once you have deleted a subscription in your organization and 72 hours have elapsed, you can sign back into the Azure AD admin center again and there should be no required action and no subscriptions blocking your organization deletion. You should be able to successfully delete your Azure AD organization.
8989

9090
![pass subscription check at deletion screen](./media/directory-delete-howto/delete-checks-passed.png)
91+
92+
## Delete an Azure subscription
93+
94+
If you have an Active or Cancelled Azure Subscription associated to your Azure AD Tenant then you would not be able to delete Azure AD Tenant. After you cancel, billing is stopped immediately. However, Microsoft waits 30 - 90 days before permanently deleting your data in case you need to access it or you change your mind. We don't charge you for keeping the data.
95+
96+
- If you have a free trial or pay-as-you-go subscription, you don't have to wait 90 days for the subscription to automatically delete. You can delete your subscription three days after you cancel it. The Delete subscription option isn't available until three days after you cancel your subscription. For more details please read through [Delete free trial or pay-as-you-go subscriptions](https://docs.microsoft.com/azure/cost-management-billing/manage/cancel-azure-subscription#delete-free-trial-or-pay-as-you-go-subscriptions).
97+
- All other subscription types are deleted only through the [subscription cancellation](https://docs.microsoft.com/azure/cost-management-billing/manage/cancel-azure-subscription#cancel-subscription-in-the-azure-portal) process. In other words, you can't delete a subscription directly unless it's a free trial or pay-as-you-go subscription. However, after you cancel a subscription, you can create an [Azure support request](https://go.microsoft.com/fwlink/?linkid=2083458) to ask to have the subscription deleted immediately.
98+
- Alternatively, you can also move/transfer the Azure subscription to another Azure AD tenant account. When you transfer billing ownership of your subscription to an account in another Azure AD tenant, you can move the subscription to the new account's tenant. Additionally, perfoming Switch Directory on the subscription would not help as the billing would still be aligned with Azure AD Tenant which was used to sign up for the subscription. For more information review [Transfer a subscription to another Azure AD tenant account](https://docs.microsoft.com/azure/cost-management-billing/manage/billing-subscription-transfer#transfer-a-subscription-to-another-azure-ad-tenant-account)
99+
100+
Once you have all the Azure and Office/Microsoft 365 Subscriptions cancelled and deleted you can proceed with cleaning up rest of the things within Azure AD Tenant before actually delete it.
91101

92102
## Enterprise apps with no way to delete
93103

articles/active-directory/enterprise-users/groups-assign-sensitivity-labels.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ To apply published labels to groups, you must first enable the feature. These st
6666
1. Save the changes and apply the settings:
6767
6868
```powershell
69-
Set-AzureADDirectorySetting -Id $grpUnifiedSetting.Id -DirectorySetting $setting
69+
Set-AzureADDirectorySetting -Id $grpUnifiedSetting.Id -DirectorySetting $Setting
7070
```
7171
7272
If you’re receiving a Request_BadRequest error, it's because the settings already exist in the tenant, so when you try to create a new property:value pair, the result is an error. In this case, take the following steps:
@@ -160,4 +160,4 @@ If you must make a change, use an [Azure AD PowerShell script](https://github.co
160160
- [Use sensitivity labels with Microsoft Teams, Microsoft 365 groups, and SharePoint sites](/microsoft-365/compliance/sensitivity-labels-teams-groups-sites)
161161
- [Update groups after label policy change manually with Azure AD PowerShell script](https://github.com/microsoftgraph/powershell-aad-samples/blob/master/ReassignSensitivityLabelToO365Groups.ps1)
162162
- [Edit your group settings](../fundamentals/active-directory-groups-settings-azure-portal.md)
163-
- [Manage groups using PowerShell commands](../enterprise-users/groups-settings-v2-cmdlets.md)
163+
- [Manage groups using PowerShell commands](../enterprise-users/groups-settings-v2-cmdlets.md)

articles/active-directory/privileged-identity-management/pim-create-azure-ad-roles-and-resource-roles-review.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -143,6 +143,7 @@ Based on your selections in **Upon completion settings**, auto-apply will be exe
143143
> [!NOTE]
144144
> It is possible for a security group to have other groups assigned to it. In this case, only the users assigned directly to the security group assigned to the role will appear in the review of the role.
145145
146+
146147
## Update the access review
147148

148149
After one or more access reviews have been started, you may want to modify or update the settings of your existing access reviews. Here are some common scenarios that you might want to consider:

articles/app-service/reference-app-settings.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -334,6 +334,7 @@ For more information on custom containers, see [Run a custom container in Azure]
334334
| `DOCKER_REGISTRY_SERVER_URL` | URL of the registry server, when running a custom container in App Service. For security, this variable is not passed on to the container. | `https://<server-name>.azurecr.io` |
335335
| `DOCKER_REGISTRY_SERVER_USERNAME` | Username to authenticate with the registry server at `DOCKER_REGISTRY_SERVER_URL`. For security, this variable is not passed on to the container. ||
336336
| `DOCKER_REGISTRY_SERVER_PASSWORD` | Password to authenticate with the registry server at `DOCKER_REGISTRY_SERVER_URL`. For security, this variable is not passed on to the container. ||
337+
| `DOCKER_ENABLE_CI` | Set to `true` to enable the continuous deployment for custom containers. The default is `false` for custom containers. ||
337338
| `WEBSITE_PULL_IMAGE_OVER_VNET` | Connect and pull from a registry inside a Virtual Network or on-premise. Your app will need to be connected to a Virtual Network using VNet integration feature. This setting is also needed for Azure Container Registry with Private Endpoint. ||
338339
| `WEBSITES_WEB_CONTAINER_NAME` | In a Docker Compose app, only one of the containers can be internet accessible. Set to the name of the container defined in the configuration file to override the default container selection. By default, the internet accessible container is the first container to define port 80 or 8080, or, when no such container is found, the first container defined in the configuration file. | |
339340
| `WEBSITES_PORT` | For a custom container, the custom port number on the container for App Service to route requests to. By default, App Service attempts automatic port detection of ports 80 and 8080. This setting is *not* injected into the container as an environment variable. ||

articles/azure-app-configuration/manage-feature-flags.md

Lines changed: 35 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -4,16 +4,16 @@ titleSuffix: Azure App Configuration
44
description: In this tutorial, you learn how to manage feature flags separately from your application by using Azure App Configuration.
55
services: azure-app-configuration
66
documentationcenter: ''
7-
author: AlexandraKemperMS
7+
author: maud-lv
88
editor: ''
99

1010
ms.assetid:
1111
ms.service: azure-app-configuration
1212
ms.workload: tbd
1313
ms.devlang: csharp
1414
ms.topic: tutorial
15-
ms.date: 04/19/2019
16-
ms.author: alkemper
15+
ms.date: 04/05/2022
16+
ms.author: malev
1717
ms.custom: "devx-track-csharp, mvc"
1818

1919
#Customer intent: I want to control feature availability in my app by using App Configuration.
@@ -35,44 +35,53 @@ The Feature Manager in the Azure portal for App Configuration provides a UI for
3535

3636
To add a new feature flag:
3737

38-
1. Select **Feature Manager** > **+Add** to add a feature flag.
38+
1. Open an Azure App Configuration store and from the **Operations** menu, select **Feature Manager** > **+Add**.
39+
:::image type="content" source="media/add-feature-flag.png" alt-text="Screenshot of the Azure platform. Add a feature flag." lightbox="media/add-feature-flag-expanded.png":::
3940

40-
![Feature flag list](./media/azure-app-configuration-feature-flags.png)
41+
1. Check the box **Enable feature flag** to make the new feature flag active as soon as the flag has been created.
4142

42-
1. Enter a unique key name for the feature flag. You need this name to reference the flag in your code.
43+
1. Enter a **Feature flag name**. The feature flag name is the unique ID of the flag, and the name that should be used when referencing the flag in code.
4344

44-
1. If you want, give the feature flag a description.
45+
1. You can edit the key for your feature flag. The default value for this key is the name of your feature flag. You can change the key to add a prefix, which can be used to find specific feature flags when loading the feature flags in your application. For example, using the application's name as prefix such as **appname:featureflagname**.
4546

46-
1. Set the initial state of the feature flag. This state is usually *Off* or *On*. The *On* state changes to *Conditional* if you add a filter to the feature flag.
47+
1. Optionally select an existing label or create a new one, and enter a description for the new feature flag.
4748

48-
![Feature flag creation](./media/azure-app-configuration-feature-flag-create.png)
49+
1. Leave the **Use feature filter** box unchecked and select **Apply** to create the feature flag. To learn more about feature filters, visit [Use feature filters to enable conditional feature flags](howto-feature-filters-aspnet-core.md) and [Enable staged rollout of features for targeted audiences](howto-targetingfilter-aspnet-core.md).
50+
:::image type="content" source="media/create-feature-flag.png" alt-text="Screenshot of the Azure platform. Feature flag creation form.":::
4951

50-
1. When the state is *On*, select **+Add filter** to specify any additional conditions to qualify the state. Enter a built-in or custom filter key, and then select **+Add parameter** to associate one or more parameters with the filter. Built-in filters include:
52+
## Update feature flags
5153

52-
| Key | JSON parameters |
53-
|---|---|
54-
| Microsoft.Percentage | {"Value": 0-100 percent} |
55-
| Microsoft.TimeWindow | {"Start": UTC time, "End": UTC time} |
56-
| Microsoft.Targeting | { "Audience": JSON blob defining users, groups, and rollout percentages. See an example under the `EnabledFor` element of [this settings file](https://github.com/microsoft/FeatureManagement-Dotnet/blob/master/examples/FeatureFlagDemo/appsettings.json) }
54+
To update a feature flag:
5755

58-
![Feature flag filter](./media/azure-app-configuration-feature-flag-filter.png)
56+
1. From the **Operations** menu, select **Feature Manager**.
5957

60-
## Update feature flag states
58+
1. Move to the right end of the feature flag you want to modify, select the **More actions** ellipsis (**...**). From this menu, you can edit the flag, create a label, lock or delete the feature flag.
59+
:::image type="content" source="media/edit-feature-flag.png" alt-text="Screenshot of the Azure platform. Edit a feature flag." lightbox="media/edit-feature-flag-expanded.png":::
6160

62-
To change a feature flag's state value:
61+
1. Select **Edit** and update the feature flag.
6362

64-
1. Select **Feature Manager**.
63+
In the **Feature manager**, you can also change the state of a feature flag by checking or unchecking the **Enable Feature flag** checkbox.
6564

66-
1. To the right of a feature flag you want to modify, select the ellipsis (**...**), and then select **Edit**.
65+
## Access feature flags
6766

68-
1. Set a new state for the feature flag.
67+
In the **Operations** menu, select **Feature manager**. You can select **Edits Columns** to add or remove columns, and change the column order.
68+
create a label, lock or delete the feature flag.
69+
:::image type="content" source="media/edit-columns-feature-flag.png" alt-text="Screenshot of the Azure platform. Edit feature flag columns." lightbox="media/edit-columns-feature-flag-expanded.png":::
6970

70-
## Access feature flags
71+
Feature flags created with the Feature Manager are stored and retrieved as regular key-values. They're kept under a special namespace prefix `.appconfig.featureflag`.
7172

72-
Feature flags created by the Feature Manager are stored and retrieved as regular key values. They're kept under a special namespace prefix `.appconfig.featureflag`. To view the underlying key values, use the Configuration Explorer. Your application can retrieve these values by using the App Configuration configuration providers, SDKs, command-line extensions, and REST APIs.
73+
To view the underlying key-values:
7374

74-
## Next steps
75+
1. In the **Operations** menu, open the **Configuration explorer**.
76+
77+
1. Select **Manage view** > **Settings**.
7578

76-
In this tutorial, you learned how to manage feature flags and their states by using App Configuration. For more information about feature-management support in App Configuration and ASP.NET Core, see the following article:
79+
1. Select **Include feature flags in the configuration explorer** and **Apply**.
80+
:::image type="content" source="media/include-feature-flag-configuration-explorer.png" alt-text="Screenshot of the Azure platform. Include feature flags in Configuration explorer." lightbox="media/include-feature-flag-configuration-explorer.png":::
81+
82+
Your application can retrieve these values by using the App Configuration configuration providers, SDKs, command-line extensions, and REST APIs.
83+
84+
## Next steps
7785

78-
* [Use feature flags in an ASP.NET Core app](./use-feature-flags-dotnet-core.md)
86+
> [!div class="nextstepaction"]
87+
> [Enable staged rollout of features for targeted audiences](./howto-targetingfilter-aspnet-core.md)
90.6 KB
Loading
190 KB
Loading

0 commit comments

Comments
 (0)