You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/displayr-tutorial.md
+10-72Lines changed: 10 additions & 72 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,11 +28,11 @@ To learn more about SaaS app integration with Azure AD, see [What is application
28
28
To get started, you need the following items:
29
29
30
30
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
31
-
* Displayr single sign-on (SSO) enabled subscription.
31
+
* Displayr single sign-on (SSO) enabled company.
32
32
33
33
## Scenario description
34
34
35
-
In this tutorial, you configure and test Azure AD SSO in a test environment. Displayr supports **SP** initiated SSO.
35
+
In this tutorial, you will learn to configure Azure AD SSO in your Displayr company. Displayr supports **SP** initiated SSO.
36
36
37
37
## Adding Displayr from the gallery
38
38
@@ -45,17 +45,13 @@ To configure the integration of Displayr into Azure AD, you need to add Displayr
45
45
1. In the **Add from the gallery** section, type **Displayr** in the search box.
46
46
1. Select **Displayr** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
47
47
48
-
## Configure and test Azure AD single sign-on
48
+
## Configure Azure AD single sign-on
49
49
50
-
Configure and test Azure AD SSO with Displayr using a test user called **Britta Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in Displayr.
51
-
52
-
To configure and test Azure AD SSO with Displayr, complete the following building blocks:
50
+
To configure Azure AD SSO with Displayr, complete the following building blocks:
53
51
54
52
1.**[Configure Azure AD SSO](#configure-azure-ad-sso)** to enable your users to use this feature.
55
53
2.**[Configure Displayr](#configure-displayr)** to configure the SSO settings on application side.
56
-
3.**[Create an Azure AD test user](#create-an-azure-ad-test-user)** to test Azure AD single sign-on with Britta Simon.
57
-
4.**[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** to enable Britta Simon to use Azure AD single sign-on.
58
-
5.**[Create Displayr test user](#create-displayr-test-user)** to have a counterpart of Britta Simon in Displayr that is linked to the Azure AD representation of user.
54
+
4.**[Restrict access to specific users](#restrict-access-to-specific-users)** to restrict which of your Azure AD users can sign in to Displayr.
59
55
6.**[Test SSO](#test-sso)** to verify whether the configuration works.
60
56
61
57
### Configure Azure AD SSO
@@ -100,10 +96,6 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
100
96
101
97
c. Select **Source Attribute** of **Group ID**.
102
98
103
-
d. Check **Customize the name of the group claim**.
104
-
105
-
e. Check **Emit groups as role claims**.
106
-
107
99
f. Click **Save**.
108
100
109
101
1. On the **Set-up Displayr** section, copy the appropriate URL(s) based on your requirement.
@@ -122,11 +114,11 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
122
114
123
115
3. If you want to set up Displayr manually, open a new web browser window and sign into your Displayr company site as an administrator and perform the following steps:
124
116
125
-
4. Click on **Settings** then navigate to **Account**.
117
+
4. Click on the **User**icon, then navigate to **Account settings**.
126
118
127
119

128
120
129
-
5. Switch to **Settings** from the top menu and scroll down the page for clicking**Configure Single Sign On (SAML)**.
121
+
5. Switch to **Settings** from the top menu and scroll down the page to click on**Configure Single Sign On (SAML)**.
130
122
131
123

132
124
@@ -148,67 +140,13 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
148
140
149
141
g. Click **Save**.
150
142
151
-
### Create an Azure AD test user
152
-
153
-
In this section, you'll create a test user in the Azure portal called Britta Simon.
154
-
155
-
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
156
-
1. Select **New user** at the top of the screen.
157
-
1. In the **User** properties, follow these steps:
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
161
-
1. Click **Create**.
162
-
163
-
### Assign the Azure AD test user
164
-
165
-
In this section, you'll enable Britta Simon to use Azure single sign-on by granting access to Displayr.
166
-
167
-
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
168
-
1. In the applications list, select **Displayr**.
169
-
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
170
-
171
-

172
-
173
-
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
174
-
175
-

176
-
177
-
1. In the **Users and groups** dialog, select **Britta Simon** from the Users list, then click the **Select** button at the bottom of the screen.
178
-
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
179
-
1. In the **Add Assignment** dialog, click the **Assign** button.
180
-
181
-
### Create Displayr test user
143
+
### Restrict access to specific users
182
144
183
-
To enable Azure AD users, sign in to Displayr, they must be provisioned into Displayr. In Displayr, provisioning is a manual task.
184
-
185
-
**To provision a user account, perform the following steps:**
186
-
187
-
1. Sign in to Displayr as an Administrator.
188
-
189
-
2. Click on **Settings** then navigate to **Account**.
190
-
191
-

192
-
193
-
3. Switch to **Settings** from the top menu and scroll down the page, until **Users** section then click on **New User**.
194
-
195
-

196
-
197
-
4. On the **New User** page, perform the following steps:
a. In **Name** text box, enter the name of user like **Brittasimon**.
202
-
203
-
b. In **Email** text box, enter the email of user like `[email protected]`.
204
-
205
-
c. Select your appropriate **Group membership**.
206
-
207
-
d. Click **Save**.
145
+
By default, all users in the tenant where you added the Displayr application can log in to Displayr by using SSO. If you want to restrict access to specific users or groups, see [Restrict your Azure AD app to a set of users in an Azure AD tenant](../develop/howto-restrict-your-app-to-a-set-of-users.md).
208
146
209
147
### Test SSO
210
148
211
-
When you select the Displayr tile in the Access Panel, you should be automatically signed in to the Displayr for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](../user-help/my-apps-portal-end-user-access.md).
149
+
When you select the Displayr tile in the Access Panel, you should be automatically signed in to the Displayr company for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](../user-help/my-apps-portal-end-user-access.md).
|PE-101 |2020.108.101.105, <br>2020.108.114.120, <br>2020.109.101.122, <br>2020.109.116.120, <br>2021.101.106.118 |**USB only**|[2021.104.110.103 USB update package](https://go.microsoft.com/fwlink/?linkid=2155734)|Public Preview major release |
46
+
|PE-101 |2021.102.108.112, <br> |OTA or USB |[2021.104.110.103 OTA manifest](https://go.microsoft.com/fwlink/?linkid=2155625)<br>[2021.104.110.103 OTA update package](https://go.microsoft.com/fwlink/?linkid=2161538)<br>[2021.104.110.103 USB update package](https://go.microsoft.com/fwlink/?linkid=2155734)|Public Preview major release |
47
+
|APDK-101 |All swVersions |OTA or USB |[2021.105.111.112 OTA manifest](https://go.microsoft.com/fwlink/?linkid=2163554)<br>[2021.105.111.112 OTA update package](https://go.microsoft.com/fwlink/?linkid=2163456)<br>[2021.105.111.112 USB update package](https://go.microsoft.com/fwlink/?linkid=2163555)|Latest monthly release (May) |
49
48
50
49
51
50
## Next steps
52
51
Update your dev kits via the methods and update packages determined in the previous section.
53
52
-[Update your Azure Percept DK over-the-air](https://docs.microsoft.com/azure/azure-percept/how-to-update-over-the-air)
54
53
-[Update your Azure Percept DK via USB](https://docs.microsoft.com/azure/azure-percept/how-to-update-via-usb)
Copy file name to clipboardExpand all lines: articles/azure-resource-manager/management/azure-subscription-service-limits.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -361,6 +361,8 @@ The latest values for Azure Purview quotas can be found in the [Azure Purview qu
361
361
362
362
For SQL Database limits, see [SQL Database resource limits for single databases](../../azure-sql/database/resource-limits-vcore-single-databases.md), [SQL Database resource limits for elastic pools and pooled databases](../../azure-sql/database/resource-limits-vcore-elastic-pools.md), and [SQL Database resource limits for SQL Managed Instance](../../azure-sql/managed-instance/resource-limits.md).
363
363
364
+
The maximum number of private endpoints per Azure SQL Database logical server is 250.
Copy file name to clipboardExpand all lines: articles/cognitive-services/form-recognizer/includes/create-resource.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,6 +18,6 @@ Go to the Azure portal and <a href="https://ms.portal.azure.com/#create/Microsof
18
18
| **Pricing tier** | The cost of your resource depends on the pricing tier you choose and your usage. For more information, see the API [pricing details](https://azure.microsoft.com/pricing/details/cognitive-services/).
19
19
20
20
> [!NOTE]
21
-
> When you create a Cognitive Service resource in the Azure portal, you have the option to create a multi-service subscription key (used across multiple cognitive services) or a single-service subscription key (used only with a specific cognitive service). Currently, Form Recognizer is not included in the multi-service subscription.
21
+
> When you create a Cognitive Service resource in the Azure portal, you have the option to create a multi-service subscription key (used across multiple Cognitive Services) or a single-service subscription key (used only with a specific Cognitive Service). Currently, Form Recognizer is not included in the multi-service subscription.
22
22
23
23
When your Form Recognizer resource finishes deploying, find and select it from the **All resources** list in the portal. Your key and endpoint will be located on the resource's key and endpoint page, under resource management. Save both of these to a temporary location before going forward.
0 commit comments