Skip to content

Commit e4289ad

Browse files
committed
2 parents ba393e8 + 4fc514d commit e4289ad

File tree

4 files changed

+10
-8
lines changed

4 files changed

+10
-8
lines changed

articles/active-directory/develop/scenario-web-app-call-api-acquire-token.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ public async Task<IActionResult> Profile()
6161

6262
// Use the access token to call a protected web API.
6363
HttpClient client = new HttpClient();
64-
client.DefaultRequestHeaders.Add("Authorization", authorizationHeader);
64+
client.DefaultRequestHeaders.Add("Authorization", accessToken);
6565
string json = await client.GetStringAsync(url);
6666
}
6767
```

articles/ai-services/document-intelligence/index.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -65,6 +65,8 @@ landingContent:
6565
url: concept-custom.md
6666
- text: Tax document models
6767
url: concept-tax-document.md
68+
- text: Contract model
69+
url: concept-contract.md
6870
- text: Invoice model
6971
url: concept-invoice.md
7072
- text: Receipt model

articles/azure-monitor/essentials/migrate-to-azure-storage-lifecycle-policy.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,7 @@ The sample policy definition file below sets the retention for all blobs in the
120120
]
121121
}
122122

123-
``````
123+
```
124124

125125
## [Templates](#tab/templates)
126126

@@ -130,7 +130,7 @@ Apply the following template to create a lifecycle management policy. You must s
130130
131131
az deployment group create --resource-group <resource group name> --template-file <template file>
132132
133-
``````
133+
```
134134

135135
The following template sets the retention for storage account *azmonstorageaccount001* for all blobs in the container *insights-activity-logs* for all resources for the subscription ID *ABCD1234-5849-ABCD-1234-9876543210AB*.
136136

@@ -180,7 +180,7 @@ The following template sets the retention for storage account *azmonstorageaccou
180180
}
181181
]
182182
}
183-
``````
183+
```
184184

185185
---
186186

articles/hdinsight/domain-joined/apache-domain-joined-configure-using-azure-adds.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn how to set up and configure an HDInsight cluster integrated w
55
ms.service: hdinsight
66
ms.topic: how-to
77
ms.custom: seodec18,seoapr2020, contperf-fy21q2
8-
ms.date: 04/25/2023
8+
ms.date: 09/21/2023
99
---
1010

1111
# Configure HDInsight clusters for Azure Active Directory integration with Enterprise Security Package
@@ -19,7 +19,7 @@ For a detailed, step-by-step tutorial on setting up and configuring a domain in
1919
Enterprise Security Package (ESP) provides Active Directory integration for Azure HDInsight. This integration allows domain users to use their domain credentials to authenticate with HDInsight clusters and run big data jobs.
2020

2121
> [!NOTE]
22-
> ESP is generally available in HDInsight 3.6 and 4.0 for these cluster types: Apache Spark, Interactive, Hadoop, and HBase. ESP for the Apache Kafka cluster type is in preview with best-effort support only. ESP clusters created before the ESP GA date (October 1, 2018) are not supported.
22+
> ESP is generally available in HDInsight 4.0 and 5.0 for these cluster types: Apache Spark, Interactive, Hadoop, Apache Kafka and HBase. ESP clusters created before the ESP GA date (October 1, 2018) are not supported.
2323
2424
## Prerequisites
2525

@@ -31,7 +31,7 @@ There are a few prerequisites to complete before you can create an ESP-enabled H
3131
- Create and authorize a managed identity.
3232
- Complete Networking setup for DNS and related issues.
3333

34-
Each of these items will be discussed in detail below. For a walkthrough of completing all of these steps, see [Create and configure Enterprise Security Package clusters in Azure HDInsight](apache-domain-joined-create-configure-enterprise-security-cluster.md).
34+
Each of these items are discussed in details. For a walkthrough of completing all of these steps, see [Create and configure Enterprise Security Package clusters in Azure HDInsight](apache-domain-joined-create-configure-enterprise-security-cluster.md).
3535

3636
### Enable Azure AD DS
3737

@@ -102,7 +102,7 @@ Change the configuration of the DNS servers in the Azure AD DS virtual network.
102102

103103
It's easier to place both the Azure AD DS instance and the HDInsight cluster in the same Azure virtual network. If you plan to use different virtual networks, you must peer those virtual networks so that the domain controller is visible to HDInsight VMs. For more information, see [Virtual network peering](../../virtual-network/virtual-network-peering-overview.md).
104104

105-
After the virtual networks are peered, configure the HDInsight virtual network to use a custom DNS server. And enter the Azure AD DS private IPs as the DNS server addresses. When both virtual networks use the same DNS servers, your custom domain name will resolve to the right IP and will be reachable from HDInsight. For example, if your domain name is `contoso.com`, then after this step, `ping contoso.com` should resolve to the right Azure AD DS IP.
105+
After the virtual networks are peered, configure the HDInsight virtual network to use a custom DNS server. And enter the Azure AD DS private IPs as the DNS server addresses. When both virtual networks use the same DNS servers, your custom domain name resolves to the right IP and it is reachable from HDInsight. For example, if your domain name is `contoso.com`, then after this step, `ping contoso.com` should resolve to the right Azure AD DS IP.
106106

107107
:::image type="content" source="./media/apache-domain-joined-configure-using-azure-adds/hdinsight-aadds-peered-vnet-configuration.png" alt-text="Configuring custom DNS servers for a peered virtual network" border="true":::
108108

0 commit comments

Comments
 (0)