You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-monitor/essentials/metrics-supported.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ ms.reviewer: priyamishra
16
16
17
17
Date list was last updated: 2021-10-05.
18
18
19
-
Azure Monitor provides several ways to interact with metrics, including charting them in the Azure portal, accessing them through the REST API, or querying them by using PowerShell or the Azure CLI.
19
+
Azure Monitor provides several ways to interact with metrics, including charting them in the Azure portal, accessing them through the REST API, or querying them by using PowerShell or the Azure CLI (Command Line Interface).
20
20
21
21
This article is a complete list of all platform (that is, automatically collected) metrics currently available with the consolidated metric pipeline in Azure Monitor. Metrics changed or added after the date at the top of this article might not yet appear in the list. To query for and access the list of metrics programmatically, use the [2018-01-01 api-version](/rest/api/monitor/metricdefinitions). Other metrics not in this list might be available in the portal or through legacy APIs.
Copy file name to clipboardExpand all lines: articles/energy-data-services/concepts-entitlements.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,9 +33,9 @@ For each group, you can either add a user as an OWNER or a MEMBER. The only diff
33
33
34
34
## Group naming
35
35
36
-
All group identifiers (emails) will be of form {groupType}.{serviceName|resourceName}.{permission}@{partition}.{domain}.com. A group naming convention has been adopted such that the group's name should start with the word "data." for data groups; "service." for service groups; and "users." for user groups. An exception is when a data partition is provisioned. When a data partition is created, so is a corresponding group: users (for example, for data partition `opendes`, the group `[email protected]` is created).
36
+
All group identifiers (emails) will be of form {groupType}.{serviceName|resourceName}.{permission}@{partition}.{domain}.com. A group naming convention has been adopted such that the group's name should start with the word "data." for data groups; "service." for service groups; and "users." for user groups. An exception is when a data partition is provisioned. When a data partition is created, so is a corresponding group-for example, for data partition `opendes`, the group `[email protected]` is created.
37
37
38
-
## Permissions/roles
38
+
## Permissions and roles
39
39
40
40
The OSDU™ Data Ecosystem user groups provide an abstraction from permission and user management and--without a user creating their own groups--the following user groups exist by default:
Copy file name to clipboardExpand all lines: articles/energy-data-services/how-to-manage-legal-tags.md
+4-5Lines changed: 4 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,10 +9,10 @@ ms.date: 08/19/2022
9
9
ms.custom: template-how-to #Required; leave this attribute/value as-is.
10
10
---
11
11
12
-
# How to manage legal tags?
13
-
A Legal tag is the entity that represents the legal status of data in the Microsoft Energy Data Services Preview instance. Legal tag is a collection of properties that governs how data can be ingested and consumed. A legal tag is necessarily required for data to be [ingested](concepts-csv-parser-ingestion.md) into your Microsoft Energy Data Services Preview instance. It's also required for the [consumption](concepts-index-and-search.md) of the data from your Microsoft Energy Data Services Preview instance. Legal tags are defined at a data partition level individually.
12
+
# How to manage legal tags
13
+
In this article, you'll know how to manage legal tags in your Microsoft Energy Data Services Preview instance. A Legal tag is the entity that represents the legal status of data in the Microsoft Energy Data Services Preview instance. Legal tag is a collection of properties that governs how data can be ingested and consumed. A legal tag is required for data to be [ingested](concepts-csv-parser-ingestion.md) into your Microsoft Energy Data Services Preview instance. It's also required for the [consumption](concepts-index-and-search.md) of the data from your Microsoft Energy Data Services Preview instance. Legal tags are defined at a data partition level individually.
14
14
15
-
While in Microsoft Energy Data Services Preview instance, [entitlement service](concepts-entitlements.md) defines access to data for a given user(s), legal tag defines the overall access to the data across users. A user may have access to manage the data within a data partition however, they may not be able to do so, until certain legal requirements are fulfilled.
15
+
While in Microsoft Energy Data Services Preview instance, [entitlement service](concepts-entitlements.md) defines access to data for a given user(s), legal tag defines the overall access to the data across users. A user may have access to manage the data within a data partition however, they may not be able to do so-until certain legal requirements are fulfilled.
16
16
17
17
[!INCLUDE [preview features callout](./includes/preview/preview-callout.md)]
18
18
@@ -88,8 +88,7 @@ Run the below curl command in Azure Cloud Bash to create a legal tag for a given
88
88
89
89
The country of origin should follow [ISO Alpha2 format](https://www.nationsonline.org/oneworld/country_code_list.htm).
90
90
91
-
> [!NOTE]
92
-
> Create Legal Tag api, internally appends data-partition-id to legal tag name if it isn't already present. For instance, if request has name as: ```legal-tag```, then the create legal tag name would be ```<instancename>-<data-partition-id>-legal-tag```
91
+
The Create Legal Tag api, internally appends data-partition-id to legal tag name if it isn't already present. For instance, if request has name as: ```legal-tag```, then the create legal tag name would be ```<instancename>-<data-partition-id>-legal-tag```
93
92
94
93
```bash
95
94
curl --location --request POST 'https://<instance>.energy.azure.com/api/legal/v1/legaltags' \
Copy file name to clipboardExpand all lines: articles/energy-data-services/how-to-manage-users.md
+18-19Lines changed: 18 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,19 +9,16 @@ ms.date: 08/19/2022
9
9
ms.custom: template-how-to #Required; leave this attribute/value as-is.
10
10
---
11
11
12
-
# How to manage users?
13
-
This article describes how to manage users in Microsoft Energy Data Services Preview. It uses the [entitlements API](https://community.opengroup.org/osdu/platform/security-and-compliance/entitlements/-/tree/master/) and acts as a group-based authorization system for data partitions within Microsoft Energy Data Service instance. For more information about Microsoft Energy Data Services Preview entitlements, see [entitlement services](concepts-entitlements.md).
12
+
# How to manage users
13
+
In this article, you'll know how to manage users in Microsoft Energy Data Services Preview. It uses the [entitlements API](https://community.opengroup.org/osdu/platform/security-and-compliance/entitlements/-/tree/master/) and acts as a group-based authorization system for data partitions within Microsoft Energy Data Service instance. For more information about Microsoft Energy Data Services Preview entitlements, see [entitlement services](concepts-entitlements.md).
14
14
15
15
[!INCLUDE [preview features callout](./includes/preview/preview-callout.md)]
16
16
17
17
## Prerequisites
18
18
19
-
Create a Microsoft Energy Data Services Preview instance using guide at [How to create Microsoft Energy Data Services Preview instance](quickstart-create-microsoft-energy-data-services-instance.md).
19
+
Create a Microsoft Energy Data Services Preview instance using the tutorial at [How to create Microsoft Energy Data Services Preview instance](quickstart-create-microsoft-energy-data-services-instance.md).
20
20
21
-
Keep the following values handy. These values will be used to:
22
-
23
-
* Generate the access token, which you'll need to make valid calls to the Entitlements API of your Microsoft Energy Data Services Preview instance
24
-
* Pass as parameters for different user management requests to the Entitlements API.
21
+
You will need to pass parameters for generating the access token, which you'll need to make valid calls to the Entitlements API of your Microsoft Energy Data Services Preview instance. You will also need these parameters for different user management requests to the Entitlements API. Hence Keep the following values handy for these actions.
25
22
26
23
#### Find `tenant-id`
27
24
Navigate to the Azure Active Directory account for your organization. One way to do so is by searching for "Azure Active Directory" in the Azure portal's search bar. Once there, locate `tenant-id` under the basic information section in the *Overview* tab. Copy the `tenant-id` and paste in an editor to be used later.
@@ -33,15 +30,17 @@ Navigate to the Azure Active Directory account for your organization. One way to
33
30
#### Find `client-id`
34
31
Often called `app-id`, it's the same value that you used to register your application during the provisioning of your [Microsoft Energy Data Services Preview instance](quickstart-create-microsoft-energy-data-services-instance.md). You'll find the `client-id` in the *Essentials* pane of Microsoft Energy Data Services Preview *Overview* page. Copy the `client-id` and paste in an editor to be used later.
35
32
36
-
> [!NOTE]
33
+
> [!IMPORTANT]
37
34
> The 'client-id' that is passed as values in the entitlement API calls needs to be the same which was used for provisioning of your Microsoft Energy Data Services Preview instance.
35
+
38
36
:::image type="content" source="media/how-to-manage-users/client-id-or-app-id.png" alt-text="Screenshot of finding the client-id for your registered App.":::
39
37
40
38
#### Find `client-secret`
41
-
Sometimes called an application password, a `client-secret` is a string value your app can use in place of a certificate to identity itself. Navigate to *App Registrations*. Once there, open 'Certificates & secrets' under the *Manage* section.Create a `client-secret` for the `client-id` that you used to create your Microsoft Energy Data Services Preview instance, you can add one now by clicking on *New Client Secret*. Record the secret's `value` for use in your client application code.
39
+
Sometimes called an application password, a `client-secret` is a string value your app can use in place of a certificate to identity itself. Navigate to *App Registrations*. Once there, open 'Certificates & secrets' under the *Manage* section.Create a `client-secret` for the `client-id` that you used to create your Microsoft Energy Data Services Preview instance, you can add one now by clicking on *New Client Secret*. Record the secret's `value` for use in your client application code.
42
40
43
-
> [!NOTE]
41
+
> [!CAUTION]
44
42
> Don't forget to record the secret's value for use in your client application code. This secret value is never displayed again after you leave this page at the time of creation of 'client secret'.
43
+
45
44
:::image type="content" source="media/how-to-manage-users/client-secret.png" alt-text="Screenshot of finding the client secret.":::
46
45
47
46
#### Find the `url`for your Microsoft Energy Data Services Preview instance
@@ -51,11 +50,11 @@ Navigate to your Microsoft Energy Data Services Preview *Overview* page on Azure
51
50
52
51
#### Find the `data-partition-id` for your group
53
52
You have two ways to get the list of data-partitions in your Microsoft Energy Data Services Preview instance.
54
-
-By navigating *Data Partitions* menu-item under the Advanced section of your Microsoft Energy Data Services Preview UI.
53
+
-One option is to navigate *Data Partitions* menuitem under the Advanced section of your Microsoft Energy Data Services Preview UI.
55
54
56
55
:::image type="content" source="media/how-to-manage-users/data-partition-id.png" alt-text="Screenshot of finding the data-partition-id from the Microsoft Energy Data Services Preview instance.":::
57
56
58
-
-By clicking on the *view* below the *data partitions* field in the essentials pane of your Microsoft Energy Data Services Preview *Overview* page.
57
+
-Another option is by clicking on the *view* below the *data partitions* field in the essentials pane of your Microsoft Energy Data Services Preview *Overview* page.
59
58
60
59
:::image type="content" source="media/how-to-manage-users/data-partition-id-second-option.png" alt-text="Screenshot of finding the data-partition-id from the Microsoft Energy Data Services Preview instance overview page.":::
61
60
@@ -89,7 +88,7 @@ curl --location --request POST 'https://login.microsoftonline.com/<tenant-id>/oa
89
88
Copy the `access_token` value from the response. You'll need it to pass as one of the headers in all calls to the Entitlements API of your Microsoft Energy Data Services Preview instance.
90
89
91
90
## User management activities
92
-
You can manage user's access to your Microsoft Energy Data Services instance or data partitions. As a prerequisite for the same, you need to find the 'object-id' (OID) of the user(s) first.
91
+
You can manage user's access to your Microsoft Energy Data Services instance or data partitions. As a prerequisite for this step, you need to find the 'object-id' (OID) of the user(s) first.
93
92
94
93
You'll need to input `object-id` (OID) of the users as parameters in the calls to the Entitlements API of your Microsoft Energy Data Services Preview Instance. `object-id`(OID) is the Azure Active Directory User Object ID.
95
94
@@ -121,8 +120,8 @@ Run the below curl command in Azure Cloud Bash to add user(s) to the "Users" gro
121
120
"role": "MEMBER"
122
121
}'
123
122
```
124
-
> [!NOTE]
125
-
> The value to be sent for the param "email" is the Object ID of the user and not the user's email
123
+
124
+
The value to be sent for the param **"email"** is the **Object_ID (OID)** of the user and not the user's email
126
125
127
126
**Sample request**
128
127
@@ -160,8 +159,8 @@ Run the below curl command in Azure Cloud Bash to add user(s) to an entitlement
160
159
"role": "MEMBER"
161
160
}'
162
161
```
163
-
> [!NOTE]
164
-
> The value to be sent for the param "email" is the Object ID of the user and not the user's email
162
+
The value to be sent for the param **"email"** is the **Object_ID (OID)** of the user and not the user's email
163
+
165
164
**Sample request**
166
165
167
166
```bash
@@ -226,8 +225,8 @@ Run the below curl command in Azure Cloud Bash to get all the groups associated
226
225
227
226
Run the below curl command in Azure Cloud Bash to delete a given user to your Microsoft Energy Data Services instance data partition.
228
227
229
-
> [!NOTE]
230
-
> As stated above, **DO NOT** delete the OWNER of a group unless you have another OWNER that can manage users in that group.
228
+
As stated above, **DO NOT** delete the OWNER of a group unless you have another OWNER that can manage users in that group.
0 commit comments