You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/azure/cna-set-up-azure-ad-use-scale/includes/3-exercise-set-up-azure-ad.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,7 +40,7 @@ You'll start by creating Microsoft Entra user and group objects. After the objec
40
40
```azurecli
41
41
ADMIN_NAME=adatumadmin1
42
42
ADMIN=$(az ad user create --display-name $ADMIN_NAME \
43
-
--password Pa55w.rd1234 \
43
+
--password <enter your password> \
44
44
--user-principal-name $ADMIN_NAME@$DOMAIN_NAME \
45
45
--force-change-password-next-sign-in false)
46
46
```
@@ -76,7 +76,7 @@ You'll start by creating Microsoft Entra user and group objects. After the objec
76
76
```azurecli
77
77
USER_NAME=adatumuser1
78
78
USER=$(az ad user create --display-name $USER_NAME \
79
-
--password Pa55w.rd1234 \
79
+
--password <enter your password> \
80
80
--user-principal-name $USER_NAME@$DOMAIN_NAME \
81
81
--force-change-password-next-sign-in false)
82
82
```
@@ -152,7 +152,7 @@ In this task, you'll create a Microsoft Entra tenant and a user account in the n
152
152
| User name | **contosouser1** |
153
153
| Name | **contosouser1** |
154
154
| Let me create the password | Enabled |
155
-
| Initial password | **Pa55w.rd1234** |
155
+
| Initial password | Enter a `<password>` |
156
156
157
157
1. Use the **Copy to clipboard** icon next to the **User name** drop-down list to record the value of the **User principal name** attribute of **contosouser1**. You'll need it later in this and subsequent exercises.
158
158
@@ -168,7 +168,7 @@ In this task, you'll create a Microsoft Entra tenant and a user account in the n
168
168
169
169
To conclude this exercise, you'll use the Azure portal to configure the user account in the **Contoso** Microsoft Entra tenant as a guest user in the **Adatum** Microsoft Entra tenant, create a new group in that tenant, and add the guest user to that group.
170
170
171
-
1. In the web browser, on the Azure portal blade displaying the **Contoso \| Overview** blade of the **Contoso** Microsoft Entra tenant, in the toolbar, in the upper right corner, select the **Subscriptions** icon next to the **Cloud Shell** icon, and then select the **Switch directory** link.
171
+
1. In the web browser, on the Azure portal blade displaying the **Contoso \| Overview** blade of the **Contoso** Microsoft Entra tenant, in the toolbar, in the upper right corner, select the **Subscriptions** icon next to the **Cloud Shell** icon, and then select the **Switch directory** link.
172
172
1. On the **Directories + subscriptions** blade, select the entry representing the Microsoft Entra tenant associated with the Azure subscription you're using in the exercises of this module, and then select **Switch**.
Copy file name to clipboardExpand all lines: learn-pr/azure/cna-set-up-azure-ad-use-scale/includes/4-azure-ad-app-development.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ To implement Microsoft Entra ID-based applications, you'll need to perform sever
11
11
When operating in a Microsoft Entra environment, a user authenticates to an application in two stages:
12
12
13
13
1. First, Microsoft Entra ID verifies the user's identity. Upon successful authentication, Microsoft Entra ID issues tokens that contain information reflecting the successful authentication.
14
-
1. The user passes tokens to the application. The application validates the user’s security tokens to ensure that authentication was successful.
14
+
1. The user passes tokens to the application. The application validates the user's security tokens to ensure that authentication was successful.
15
15
16
16
To perform such validation, the application must be able to communicate securely with Microsoft Entra ID. This, in turn, requires that the application itself operates as a Microsoft Entra security principal. To make it possible, you must ensure that the application is represented in some form in the same Microsoft Entra tenant that contains the account of the authenticating user.
Copy file name to clipboardExpand all lines: learn-pr/azure/cna-set-up-azure-ad-use-scale/includes/5-exercise-implement-multitenant-data.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,7 +47,7 @@ You'll start by creating an instance of Azure Database for PostgreSQL server:
47
47
| Version | Select **11**. |
48
48
| Compute + storage | Select the **Configure server** link. On the **Configure** blade, select **Basic**, set the **vCore** value to **1** and **Storage** to **5 GB**, and then select **OK**. |
49
49
| Admin username | Enter **student**. |
50
-
| Password | Enter **Pa55w0rd1234**. |
50
+
| Password | Enter a `<password>`. |
51
51
52
52
:::image type="content" source="../media/5-azure-db-postgresql-create-basics.png" alt-text="Screenshot of the Basics tab of the server blade in the Azure portal.":::
53
53
@@ -90,7 +90,7 @@ With the Azure Database for PostgreSQL server provisioned, you'll connect to it
90
90
1. Within the Bash session on the **Cloud Shell** pane, paste the value of the **psql** connection string from the clipboard, modify it so it matches the following command, and run it to connect to the **postgres** database hosted on the newly deployed server instance of Azure Database for PostgreSQL. The value of the `<server_name>` placeholder will be already included in the connection string you pasted from the clipboard:
psql "host=<server_name>.postgres.database.azure.com port=5432 dbname=postgres user=student@<server_name>.postgres.database.azure.com password=<enter your password> sslmode=require"
94
94
```
95
95
96
96
> [!NOTE]
@@ -125,7 +125,7 @@ With the Azure Database for PostgreSQL server provisioned, you'll connect to it
125
125
126
126
```t-sql
127
127
CREATE TABLE inventory (
128
-
id bigserial,
128
+
id bigserial,
129
129
tenant_id bigint REFERENCES tenants (id),
130
130
name VARCHAR(50),
131
131
quantity INTEGER,
@@ -179,7 +179,7 @@ To integrate the Azure Database for PostgreSQL server instance with Microsoft En
179
179
180
180
1. Within the browser window displaying the Azure portal with the Azure Database for PostgreSQL server blade, in the vertical menu, in the **Settings** section, select **Active Directory admin**, and then in the toolbar, select **Set admin**.
181
181
1. On the **Active Directory admin** blade, in the list of Microsoft Entra user accounts, select the **adatumadmin1** user account you created in the previous exercise, select **Select**, and then select **Save**.
182
-
1. Open another web browser window in the Incognito/InPrivate mode, navigate to the [Azure portal](https://portal.azure.com/?azure-portal=true), and sign in by using the **adatumadmin1** user account (with the **Pa55w.rd1234** password) you created in the previous exercise.
182
+
1. Open another web browser window in the Incognito/InPrivate mode, navigate to the [Azure portal](https://portal.azure.com/?azure-portal=true), and sign in by using the **adatumadmin1** user account with the password you created in the previous exercise.
183
183
1. In the Azure portal, open the **Cloud Shell** by selecting its icon in the toolbar next to the search text box.
184
184
1. When you're prompted to select either **Bash** or **PowerShell**, select **Bash**, and then when presented with the message **You have no storage mounted**, select **Create storage**.
185
185
1. Within the Bash session on the **Cloud Shell** pane, run the following commands to retrieve and display a Microsoft Entra access token required to access Azure Database for PostgreSQL:
@@ -363,7 +363,7 @@ With the application registered in the Microsoft Entra tenant, you can now proce
363
363
const cca = new msal.ConfidentialClientApplication(config);
@@ -275,7 +275,7 @@ You're ready to validate the Microsoft Entra integration of the app. You could c
275
275
276
276
:::image type="content" source="../media/7-azure-ad-next-js-app-sign-in-popup.png" alt-text="Screenshot of the Welcome to the Microsoft Authentication Library For JavaScript - React Quickstart page with the Sign in using Popup menu option.":::
277
277
278
-
1. When prompted to sign in, authenticate by using the **adatumuser1** **userPrincipalName** and its password **Pa55w.rd1234**.
278
+
1. When prompted to sign in, authenticate by using the **adatumuser1** **userPrincipalName** and its password.
279
279
280
280
> [!NOTE]
281
281
> You created this user account in the first exercise of this module.
@@ -307,7 +307,7 @@ You're ready to validate the Microsoft Entra integration of the app. You could c
307
307
308
308
1. Start another web browser window in the Incognito/InPrivate mode, and navigate to the **http://localhost:3000** URL.
309
309
1. On the **Welcome to the Microsoft Authentication Library For JavaScript - React Quickstart** page, select **Sign In**, and then in the expanding menu, select **Sign in using Popup**.
310
-
1. When prompted to sign in, authenticate by using the **contosouser1** **userPrincipalName** and its password **Pa55w.rd1234**.
310
+
1. When prompted to sign in, authenticate by using the **contosouser1** **userPrincipalName** and its password.
311
311
312
312
> [!NOTE]
313
313
> You created this user account in the first exercise of this module.
@@ -331,4 +331,4 @@ Congratulations! You completed the third exercise of this module. In this exerci
331
331
332
332
## Clean up the resources
333
333
334
-
To avoid unnecessary charges from using Azure resources, you should delete the **postgresql-db-RG** and **cna-aadexpress-RG** resource groups you created in the previous exercise of this module. To do so, in the Azure portal, navigate to the blade of each of these resource groups, and select the **Delete resource group** entry in the toolbar. In the **TYPE THE RESOURCE GROUP NAME** textbox, enter the name of the resource group, and then select **Delete**.
334
+
To avoid unnecessary charges from using Azure resources, you should delete the **postgresql-db-RG** and **cna-aadexpress-RG** resource groups you created in the previous exercise of this module. To do so, in the Azure portal, navigate to the blade of each of these resource groups, and select the **Delete resource group** entry in the toolbar. In the **TYPE THE RESOURCE GROUP NAME** textbox, enter the name of the resource group, and then select **Delete**.
Copy file name to clipboardExpand all lines: learn-pr/azure/create-serverless-logic-with-azure-functions/includes/3-create-an-azure-functions-app-in-the-azure-portal.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,22 +1,22 @@
1
-
You're now ready to start implementing the temperature service. In the previous unit, you determined that a serverless solution would best fit your needs. Let's start by creating a function app to hold our Azure Function.
1
+
You're now ready to start implementing the temperature service. In the previous unit, you determined that a serverless solution would best fit your needs. Let's start by creating a function app that can hold our Azure Function.
2
2
3
3
## What is a function app?
4
4
5
5
Functions are hosted in an execution context called a **function app**. You define function apps to logically group and structure your functions and a compute resource in Azure. In our escalator example, you would create a function app to host the escalator drive gear temperature service. There are a few decisions that need to be made to create the function app; you need to choose a service plan and select a compatible storage account.
6
6
7
7
### Choose a service plan
8
8
9
-
Function apps may use one of the following hosting plans:
9
+
Function apps can use one of the following hosting plans:
10
10
11
11
- Consumption plan
12
12
- Premium plan
13
13
- Dedicated (App service) plan
14
14
15
-
When using the Azure serverless application platform, choose the **Consumption plan**. This plan provides automatic scaling and bills you only when your functions are running. The Consumption plan comes with a configurable timeout period for executing a function. By default, it's five (5) minutes, but may be configured to have a timeout as long as 10 minutes.
15
+
When using the Azure serverless application platform, choose the **Consumption plan**. This plan provides automatic scaling and bills you only when your functions are running. The Consumption plan comes with a configurable timeout period for executing a function. By default, it's five (5) minutes, but can be configured to have a timeout as long as 10 minutes.
16
16
17
-
The **Premium plan** also dynamically scales your resources to meet demand, but you can specify a minimum number of VM instances to keep warm and reduce so called "cold starts." The Premium plan also lets your functions connect to and run inside virtual networks. Like the Dedicated plan, the default timeout for apps in a Premium plan is 30 minutes, but they can essentially run for an unlimited time (depending on server availability).
17
+
The **Premium plan** also dynamically scales your resources to meet demand, but you can specify a minimum number of virtual machine (VM) instances to keep warm and reduce so called "cold starts." The Premium plan also lets your functions connect to and run inside virtual networks. Like the Dedicated plan, the default timeout for apps in a Premium plan is 30 minutes, but they can essentially run for an unlimited time (depending on server availability).
18
18
19
-
The **Dedicated (App service) plan** enables you to avoid timeout periods by having your function run continuously on a VM that you define. An App service plan is technically not a serverless plan, because you're responsible for managing the app resources the function runs on. However, it may be a better choice when you already have excess App Service resources available on which to also run your functions.
19
+
The **Dedicated (App service) plan** enables you to avoid timeout periods by having your function run continuously on a VM that you define. An App service plan is technically not a serverless plan, because you're responsible for managing the app resources the function runs on. However, it might be a better choice when you already have excess App Service resources available on which to also run your functions.
20
20
21
21
### Storage account requirements
22
22
@@ -115,4 +115,4 @@ Let's create a function app in the Azure portal. Completing this module incurs a
115
115
116
116
1. When deployment completes, select **Go to resource**. The Function App pane for your escalator function appears.
117
117
118
-
1. In the **Essentials** section, select the **URL** link to open it in a browser. A default Azure web page appears with a message that your Functions app is up and running.
118
+
1. In the **Essentials** section, select the **Default domain** link to open it in a browser. A default Azure web page appears with a message that your Functions app is up and running.
0 commit comments