You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/palantir-foundry-tutorial.md
+6-26Lines changed: 6 additions & 26 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -66,37 +66,19 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
66
66
67
67
1. In the Azure portal, on the **Palantir Foundry** application integration page, find the **Manage** section and select **single sign-on**.
68
68
1. On the **Select a single sign-on method** page, select **SAML**.
69
-
1.On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration**to edit the settings.
69
+
1.Select **Upload metadata file**, select the metadata file which you have downloaded in the **[Configure Palantir Foundry SSO](#configure-palantir-foundry-sso)**section, and then select **Add**.
1. In the **Basic SAML Configuration** section, if you see **Service Provider metadata file**, follow these steps:
74
-
1. Select **Upload metadata file**.
75
-
1. Select the folder icon to select the metadata file which you have downloaded in **Configure Palantir Foundry SSO** section, and then select **Upload**.
76
-
1. When the metadata file is successfully uploaded, the values for **Identifier** and **Reply URL** appear automatically in the Palantir Foundry section text box.
73
+
1. When the metadata file is successfully uploaded, the values for **Identifier**, **Reply URL** and **Logout URL** appear automatically in the Palantir Foundry section text box.
77
74
78
75
> [!Note]
79
-
> If the **Identifier** and **Reply URL** values don't appear automatically, fill in the values manually according to your requirements.
80
-
81
-
1. If you don't see **Service Provider metadata file** in the **Basic SAML Configuration** section, perform the following steps:
82
-
83
-
1. In the **Identifier** text box, type a value using the following pattern: `urn:uuid:<SOME_UUID>`
84
-
85
-
1. In the **Reply URL** text box, type a URL using the following pattern: `https://<DOMAIN>/multipass/api/collectors/<SOME_UUID>/saml/SSO`
86
-
87
-
1. In the **Logout URL** text box, type a URL using the following pattern: `https://<DOMAIN>/multipass/api/collectors/<SOME_UUID>/SingleLogout`
88
-
89
-
> [!NOTE]
90
-
> These values are not real. Update these values with the actual Identifier, Reply URL and Logout URL. Contact [Palantir Foundry Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
76
+
> If the **Identifier**, **Reply URL** and **Logout URL** values don't appear automatically, fill in the values manually which can be found in Foundry Control Panel.
91
77
92
78
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
In this section, you'll create a test user in the Azure portal called B.Simon.
@@ -123,9 +105,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
123
105
124
106
## Configure Palantir Foundry SSO
125
107
126
-
1. Log in to the Palantir Foundry as an administrator.
127
-
128
-
1. In Foundry Control Panel tab, go to the **Authentication** and click **Add SAML provider**.
108
+
1. In Foundry Control Panel, go to the **Authentication** tab and click **Add SAML provider**.
129
109
130
110

131
111
@@ -167,4 +147,4 @@ You can also use Microsoft My Apps to test the application in any mode. When you
167
147
168
148
## Next steps
169
149
170
-
Once you configure Palantir Foundry you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).
150
+
Once you configure Palantir Foundry you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).
Copy file name to clipboardExpand all lines: articles/storage/blobs/storage-manage-find-blobs.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -333,7 +333,7 @@ This section describes known issues and conditions.
333
333
334
334
- Uploading page blobs with index tags doesn't persist the tags. Set the tags after uploading a page blob.
335
335
336
-
- If Blob storage versioning is enabled, you can still use index tags on the current version. Index tags are preserved for previous versions, but those tags aren't passed to the blob index engine, so you cannot them to retrieve previous versions. If you promote a previous version to the current version, then the tags of that previous version become the tags of the current version. Because those tags are associated with the current version, they are passed to the blob index engine and you can query them.
336
+
- If Blob storage versioning is enabled, you can still use index tags on the current version. Index tags are preserved for previous versions, but those tags aren't passed to the blob index engine, so you cannot use them to retrieve previous versions. If you promote a previous version to the current version, then the tags of that previous version become the tags of the current version. Because those tags are associated with the current version, they are passed to the blob index engine and you can query them.
337
337
338
338
- There is no API to determine if index tags are indexed.
Copy file name to clipboardExpand all lines: articles/virtual-wan/sd-wan-connectivity-architecture.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ ms.author: sukishen
16
16
17
17
Azure Virtual WAN is a networking service that brings together many cloud connectivity and security services with a single operational interface. These services include branch (via Site-to-site VPN), remote user (Point-to-site VPN), private (ExpressRoute) connectivity, intra-cloud transitive connectivity for Vnets, VPN and ExpressRoute interconnectivity, routing, Azure Firewall, and encryption for private connectivity.
18
18
19
-
Although Azure Virtual WAN itself is a Software Defined WAN (SD-WAN), it is also designed to enable seamless interconnection with the premises-based SD-WAN technologies and services. Many such services are offered by our [Virtual WAN](virtual-wan-locations-partners.md) ecosystem and Azure Networking Managed Services partners [(MSPs)](../networking/networking-partners-msp.md). Enterprises that are transforming their private WAN to SD-WAN have options when interconnecting their private SD-WAN with Azure Virtual WAN. Enterprises can choose from these options:
19
+
Although Azure Virtual WAN is a cloud-based SD-WAN that provides a rich suite of Azure first-party connectivity, routing, and security services, Azure Virtual WAN also is designed to enable seamless interconnection with premises-based SD-WAN and SASE technologies and services. Many such services are offered by our [Virtual WAN](virtual-wan-locations-partners.md) ecosystem and Azure Networking Managed Services partners [(MSPs)](../networking/networking-partners-msp.md). Enterprises that are transforming their private WAN to SD-WAN have options when interconnecting their private SD-WAN with Azure Virtual WAN. Enterprises can choose from these options:
0 commit comments