Skip to content

Commit 3d75bee

Browse files
authored
Update Azure AI Foundry and Azure AI services references (#36799)
1 parent 3991a37 commit 3d75bee

11 files changed

Lines changed: 18 additions & 18 deletions

aspnetcore/blazor/host-and-deploy/server/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -151,7 +151,7 @@ For a deeper exploration of scaling server-side Blazor apps on the Azure Contain
151151

152152
1. To create the container app managed identity and grant it access to blob storage and a key vault, complete the following steps:
153153

154-
1. In the Azure Portal, navigate to the overview page of the container app.
154+
1. In the Azure portal, navigate to the overview page of the container app.
155155
1. Select **Service Connector** from the left navigation.
156156
1. Select **+ Create** from the top navigation.
157157
1. In the **Create connection** flyout menu, enter the following values:

aspnetcore/blazor/security/webassembly/hosted-with-azure-active-directory-b2c.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -328,7 +328,7 @@ builder.Services.AddMsalAuthentication(options =>
328328

329329
The `{SCOPE URI}` is the default access token scope (for example, `https://contoso.onmicrosoft.com/00001111-aaaa-2222-bbbb-3333cccc4444/API.Access` or the custom URI that you configured in the Azure portal).
330330

331-
The <xref:Microsoft.Extensions.DependencyInjection.MsalWebAssemblyServiceCollectionExtensions.AddMsalAuthentication%2A> method accepts a callback to configure the parameters required to authenticate an app. The values required for configuring the app can be obtained from the Azure Portal AAD configuration when you register the app.
331+
The <xref:Microsoft.Extensions.DependencyInjection.MsalWebAssemblyServiceCollectionExtensions.AddMsalAuthentication%2A> method accepts a callback to configure the parameters required to authenticate an app. The values required for configuring the app can be obtained from the Azure portal AAD configuration when you register the app.
332332

333333
### Access token scopes
334334

aspnetcore/blazor/security/webassembly/hosted-with-microsoft-entra-id.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -334,7 +334,7 @@ builder.Services.AddMsalAuthentication(options =>
334334
});
335335
```
336336

337-
The <xref:Microsoft.Extensions.DependencyInjection.MsalWebAssemblyServiceCollectionExtensions.AddMsalAuthentication%2A> method accepts a callback to configure the parameters required to authenticate an app. The values required for configuring the app can be obtained from the Azure Portal ME-ID configuration when you register the app.
337+
The <xref:Microsoft.Extensions.DependencyInjection.MsalWebAssemblyServiceCollectionExtensions.AddMsalAuthentication%2A> method accepts a callback to configure the parameters required to authenticate an app. The values required for configuring the app can be obtained from the Azure portal ME-ID configuration when you register the app.
338338

339339
### Access token scopes
340340

aspnetcore/blazor/security/webassembly/microsoft-entra-id-groups-and-roles-net-5-to-7.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -532,7 +532,7 @@ The following example assumes that the **CLIENT** and **SERVER** apps are config
532532
> [!NOTE]
533533
> When developing a hosted Blazor WebAssembly app or a client-server pair of standalone apps (a standalone Blazor WebAssembly app and an ASP.NET Core server API/web API app), the `appRoles` manifest property of both the client and the server Azure portal app registrations must include the same configured roles. After establishing the roles in the client app's manifest, copy them in their entirety to the server app's manifest. If you don't mirror the manifest `appRoles` between the client and server app registrations, role claims aren't established for authenticated users of the server API/web API, even if their access token has the correct entries in the role claims.
534534
535-
Although you can't [assign roles to groups](/entra/identity/role-based-access-control/groups-concept) without an Microsoft Entra ID Premium account, you can assign roles to users and receive role claims for users with a standard Azure account. The guidance in this section doesn't require an ME-ID Premium account.
535+
Although you can't [assign roles to groups](/entra/identity/role-based-access-control/groups-concept) without a Microsoft Entra ID Premium account, you can assign roles to users and receive role claims for users with a standard Azure account. The guidance in this section doesn't require an ME-ID Premium account.
536536

537537
When working with the default directory, follow the guidance in [Add app roles to your application and receive them in the token](/entra/identity-platform/howto-add-app-roles-in-apps) to configure and assign roles. If you aren't working with the default directory, edit the app's manifest in the Azure portal to establish the app's roles manually in the `appRoles` entry of the manifest file. The following is an example `appRoles` entry that creates `Admin` and `Developer` roles. These example roles are used later in this section's example at the component level to implement access restrictions:
538538

aspnetcore/blazor/security/webassembly/standalone-with-azure-active-directory-b2c.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ The output location specified with the `-o|--output` option creates a project fo
9090

9191
After creating the app, you should be able to:
9292

93-
* Log into the app using an Microsoft Entra ID user account.
93+
* Log into the app using a Microsoft Entra ID user account.
9494
* Request access tokens for Microsoft APIs. For more information, see:
9595
* [Access token scopes](#access-token-scopes)
9696
* [Quickstart: Configure an application to expose web APIs](/entra/identity-platform/quickstart-configure-app-expose-web-apis).

aspnetcore/host-and-deploy/azure-apps/index.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ Understand and troubleshoot warnings and errors with ASP.NET Core projects.
4646

4747
### Platform
4848

49-
The platform architecture (x86/x64) of an App Services app is set in the app's settings in the Azure Portal for apps that are hosted on an A-series compute (Basic) or higher hosting tier. Confirm that the app's publish settings (for example, in the Visual Studio [publish profile (.pubxml)](xref:host-and-deploy/visual-studio-publish-profiles)) match the setting in the app's service configuration in the Azure Portal.
49+
The platform architecture (x86/x64) of an App Services app is set in the app's settings in the Azure portal for apps that are hosted on an A-series compute (Basic) or higher hosting tier. Confirm that the app's publish settings (for example, in the Visual Studio [publish profile (.pubxml)](xref:host-and-deploy/visual-studio-publish-profiles)) match the setting in the app's service configuration in the Azure portal.
5050

5151
:::moniker range=">= aspnetcore-2.2"
5252

@@ -72,9 +72,9 @@ Include the following NuGet packages to provide automatic logging features for a
7272

7373
The preceding packages must be explicitly referenced in the app's project file.
7474

75-
## Override app configuration using the Azure Portal
75+
## Override app configuration using the Azure portal
7676

77-
App settings in the Azure Portal permit you to set environment variables for the app. For more information, see the following resources:
77+
App settings in the Azure portal permit you to set environment variables for the app. For more information, see the following resources:
7878

7979
* [Configure an App Service app (Azure documentation)](/azure/app-service/configure-common)
8080
* <xref:fundamentals/configuration/index#environment-variables-configuration-provider>
@@ -186,7 +186,7 @@ The Docker Hub at `https://hub.docker.com/_/microsoft-dotnet` contains the lates
186186

187187
If a problem occurs using the preview site extension, open an [dotnet/AspNetCore issue](https://github.com/dotnet/AspNetCore/issues).
188188

189-
1. From the Azure Portal, navigate to the App Service.
189+
1. From the Azure portal, navigate to the App Service.
190190
1. Select the web app.
191191
1. Type "ex" in the search box to filter for "Extensions" or scroll down the list of management tools.
192192
1. Select **Extensions**.
@@ -209,9 +209,9 @@ When the operation completes, the latest .NET Core preview is installed. Verify
209209
The command returns `True` when the x64 preview runtime is installed.
210210

211211
> [!NOTE]
212-
> The platform architecture (x86/x64) of an App Services app is set in the app's settings in the Azure Portal for apps that are hosted on an A-series compute (Basic) or higher hosting tier. Confirm that the app's publish settings (for example, in the Visual Studio [publish profile (.pubxml)](xref:host-and-deploy/visual-studio-publish-profiles)) match the setting in the app's service configuration in the Azure portal.
212+
> The platform architecture (x86/x64) of an App Services app is set in the app's settings in the Azure portal for apps that are hosted on an A-series compute (Basic) or higher hosting tier. Confirm that the app's publish settings (for example, in the Visual Studio [publish profile (.pubxml)](xref:host-and-deploy/visual-studio-publish-profiles)) match the setting in the app's service configuration in the Azure portal.
213213
>
214-
> If the app is run in in-process mode and the platform architecture is configured for 64-bit (x64), the ASP.NET Core Module uses the 64-bit preview runtime, if present. Install the **ASP.NET Core {X.Y} (x64) Runtime** extension using the Azure Portal.
214+
> If the app is run in in-process mode and the platform architecture is configured for 64-bit (x64), the ASP.NET Core Module uses the 64-bit preview runtime, if present. Install the **ASP.NET Core {X.Y} (x64) Runtime** extension using the Azure portal.
215215
>
216216
> After installing the x64 preview runtime, run the following command in the Azure Kudu PowerShell command window to verify the installation. Substitute the ASP.NET Core runtime version for `{X.Y}` in the following command:
217217
>

aspnetcore/host-and-deploy/visual-studio-publish-profiles.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -214,7 +214,7 @@ In the preceding example:
214214
See [Microsoft.NET.Sdk.Publish](https://github.com/dotnet/sdk/tree/main/src/WebSdk#microsoftnetsdkpublish).
215215
216216
<!-- As of Nov 2024
217-
On the Azure Portal, settings/configuration, enable SCM and FTB basic auth publishing.
217+
On the Azure portal, settings/configuration, enable SCM and FTB basic auth publishing.
218218
Download the publish profile and get the username and password.
219219
220220
Using the default publish profile, the following command publishes to an MSDeploy endpoint:

aspnetcore/security/key-vault-configuration.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,7 @@ Complete the following steps to create an Azure Key Vault and store the sample a
104104

105105
## Use Application ID and X.509 certificate for non-Azure-hosted apps
106106

107-
Configure Azure Key Vault and the app to use an Microsoft Entra ID Application ID and X.509 certificate to authenticate to a vault **when the app is hosted outside of Azure**. For more information, see [About keys, secrets, and certificates](/azure/key-vault/about-keys-secrets-and-certificates).
107+
Configure Azure Key Vault and the app to use a Microsoft Entra ID Application ID and X.509 certificate to authenticate to a vault **when the app is hosted outside of Azure**. For more information, see [About keys, secrets, and certificates](/azure/key-vault/about-keys-secrets-and-certificates).
108108

109109
> [!NOTE]
110110
> Although using an Application ID and X.509 certificate is supported for apps hosted in Azure, it's not recommended. Instead, use [Managed identities for Azure resources](#use-managed-identities-for-azure-resources) when hosting an app in Azure. Managed identities don't require storing a certificate in the app or in the `Development` environment.
@@ -483,7 +483,7 @@ Complete the following steps to create an Azure Key Vault and store the sample a
483483

484484
## Use Application ID and X.509 certificate for non-Azure-hosted apps
485485

486-
Configure Azure Key Vault and the app to use an Microsoft Entra ID Application ID and X.509 certificate to authenticate to a vault **when the app is hosted outside of Azure**. For more information, see [About keys, secrets, and certificates](/azure/key-vault/about-keys-secrets-and-certificates).
486+
Configure Azure Key Vault and the app to use a Microsoft Entra ID Application ID and X.509 certificate to authenticate to a vault **when the app is hosted outside of Azure**. For more information, see [About keys, secrets, and certificates](/azure/key-vault/about-keys-secrets-and-certificates).
487487

488488
> [!NOTE]
489489
> Although using an Application ID and X.509 certificate is supported for apps hosted in Azure, it's not recommended. Instead, use [Managed identities for Azure resources](#use-managed-identities-for-azure-resources) when hosting an app in Azure. Managed identities don't require storing a certificate in the app or in the `Development` environment.

aspnetcore/test/troubleshoot-azure-iis.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -328,7 +328,7 @@ The console output from the app, showing any errors, is piped to the Kudu consol
328328
329329
The ASP.NET Core Module stdout log often records useful error messages not found in the Application Event Log. To enable and view stdout logs:
330330
331-
1. In the Azure Portal, navigate to the web app.
331+
1. In the Azure portal, navigate to the web app.
332332
1. In the **App Service** blade, enter **kudu** in the search box.
333333
1. Select **Advanced Tools** > **Go**.
334334
1. Select **Debug console > CMD**.

aspnetcore/test/troubleshoot-azure-iis/includes/troubleshoot-azure-iis7.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -316,7 +316,7 @@ The console output from the app, showing any errors, is piped to the Kudu consol
316316
317317
The ASP.NET Core Module stdout log often records useful error messages not found in the Application Event Log. To enable and view stdout logs:
318318
319-
1. In the Azure Portal, navigate to the web app.
319+
1. In the Azure portal, navigate to the web app.
320320
1. In the **App Service** blade, enter **kudu** in the search box.
321321
1. Select **Advanced Tools** > **Go**.
322322
1. Select **Debug console > CMD**.

0 commit comments

Comments
 (0)