Skip to content

Commit fa69a35

Browse files
Merge pull request #2857 from MicrosoftDocs/main639077689705053245sync_temp
For protected branch, push strategy should use PR and merge to target branch method to work around git push error
2 parents e98f5e9 + 5686811 commit fa69a35

5 files changed

Lines changed: 40 additions & 32 deletions

File tree

data-explorer/includes/managed-identity.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,10 +37,10 @@ ms.date: 01/09/2025
3737
"id": "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/my-resource-group/providers/Microsoft.ManagedIdentity/userAssignedIdentities/my-managed-identity",
3838
"location": "eastus",
3939
"name": "my-managed-identity",
40-
"principalId": "00001111-aaaa-2222-bbbb-3333cccc4444",
40+
"principalId": "ffffffff-eeee-dddd-cccc-bbbbbbbbbbb0",
4141
"resourceGroup": "my-resource-group",
4242
"tags": {},
43-
"tenantId": "00001111-aaaa-2222-bbbb-3333cccc4444",
43+
"tenantId": "aaaabbbb-0000-cccc-1111-dddd2222eeee",
4444
"type": "Microsoft.ManagedIdentity/userAssignedIdentities"
4545
}
4646
```

data-explorer/kusto/api/monaco/host-web-ux-in-iframe.md

Lines changed: 19 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ The `workspace=<guid>` query parameter creates a separate workspace for the embe
3333

3434
### Handle authentication
3535

36-
When embedding the web UI, the hosting page is responsible for authentication. The following diagrams describe the authentication flow.
36+
When you embed the web UI, the hosting page is responsible for authentication. The following diagrams describe the authentication flow.
3737

3838
:::image type="content" source="../media/host-web-ux-in-iframe/adx-embed-sequence-diagram.png" lightbox="../media/host-web-ux-in-iframe/adx-embed-sequence-diagram.png" alt-text="Diagram that shows the authentication flow for an embedded web U I iframe.":::
3939

@@ -60,7 +60,7 @@ Use the following steps to handle authentication:
6060
| Graph | `People.Read` | `People.Read`, `User.ReadBasic.All`, `Group.Read.All` |
6161
| Dashboards | `https://rtd-metadata.azurewebsites.net/user_impersonation` | `https://rtd-metadata.azurewebsites.net/user_impersonation` |
6262

63-
For example, the following function maps scopes based on the information in the table.
63+
For example, the following function maps the scopes based on the information in the table.
6464

6565
```javascript
6666
function mapScope(scope) {
@@ -74,7 +74,7 @@ Use the following steps to handle authentication:
7474

7575
1. Get a [JWT access token](https://tools.ietf.org/html/rfc7519) from the [Perform Single Page Application (SPA) authentication](../rest/authenticate-with-msal.md#perform-single-page-application-spa-authentication) for the scope. This code replaces placeholder CODE-1.
7676

77-
For example, you can use @azure/MSAL-react to get the access token. The example uses the **mapScope** function you defined earlier.
77+
For example, you can use `@azure/MSAL-react` to get the access token. The example uses the **mapScope** function you defined earlier.
7878

7979
```javascript
8080
import { useMsal } from "@azure/msal-react";
@@ -91,7 +91,7 @@ Use the following steps to handle authentication:
9191
```
9292

9393
> [!IMPORTANT]
94-
> You can only use User Principal Name (UPN) for authentication, service principals are not supported.
94+
> You can only use User Principal Name (UPN) for authentication, service principals aren't supported.
9595
9696
1. Post a **postToken** message with the access token. This code replaces placeholder CODE-2:
9797
@@ -122,9 +122,15 @@ To embed a dashboard, a trust relationship must be established between the host'
122122
1. Select **requiredResourceAccess**.
123123
1. In the manifest, add the following entry:
124124

125+
> [!IMPORTANT]
126+
> Replace `<RTD Metadata Service - Application ID>` with the application ID of the **RTD Metadata Service**. To get the application ID of this service, follow these steps:
127+
> - Sign in to the Azure portal.
128+
> - In the search bar, enter **RTD Metadata Service**, and then select the **Service Principal**: **RTD Metadata Service**.
129+
> - On the **Enterprise Application** page for **RTD Metadata Service**, note down the value of the **Application ID**.
130+
125131
```json
126132
{
127-
"resourceAppId": "35e917a9-4d95-4062-9d97-5781291353b9",
133+
"resourceAppId": "<RTD Metadata Service - Application ID>",
128134
"resourceAccess": [
129135
{
130136
"id": "388e2b3a-fdb8-4f0b-ae3e-0692ca9efc1c",
@@ -134,16 +140,18 @@ To embed a dashboard, a trust relationship must be established between the host'
134140
}
135141
```
136142

137-
- `35e917a9-4d95-4062-9d97-5781291353b9` is the application ID of Azure Data Explorer dashboard service.
138-
- `388e2b3a-fdb8-4f0b-ae3e-0692ca9efc1c` is the user_impersonation permission.
143+
In the above code, `388e2b3a-fdb8-4f0b-ae3e-0692ca9efc1c` is the user_impersonation permission.
139144

140145
1. In the **Manifest**, save your changes.
141146
1. Select **API permissions** and validate you have a new entry: **RTD Metadata Service**.
142147
1. Under Microsoft Graph, add permissions for `People.Read`, `User.ReadBasic.All`, and `Group.Read.All`.
143148
1. In Azure PowerShell, add the following new service principal for the app:
144149

150+
> [!IMPORTANT]
151+
> Replace `<RTD Metadata Service - Application ID>` with the application ID of the **RTD Metadata Service** you got earlier.
152+
145153
```powershell
146-
New-MgServicePrincipal -AppId 35e917a9-4d95-4062-9d97-5781291353b9
154+
New-MgServicePrincipal -AppId <RTD Metadata Service - Application ID>
147155
```
148156

149157

@@ -158,7 +166,7 @@ To embed a dashboard, a trust relationship must be established between the host'
158166
> <iframe src="https://dataexplorer.azure.com/dashboards?[feature-flags]" />
159167
> ```
160168
>
161-
> where `[feature-flags]` is:
169+
> The `[feature-flags]` is:
162170
>
163171
> ```html
164172
> "f-IFrameAuth": true,
@@ -189,7 +197,7 @@ A feature flag can be used in the URL as a query parameter. To disable adding ot
189197
| f-ShowPersona | Show the user name from the settings menu, in the top-right corner. | true |
190198
| f-UseMeControl | Show the user's account information | true |
191199
| f-IFrameAuth | If true, the web explorer expects the iframe to handle authentication and provide a token via a message. This parameter is required for iframe scenarios. | false |
192-
| f-PersistAfterEachRun | Usually, browsers persist in the unload event. However, the unload event isn't always triggered when hosting in an iframe. This flag triggers the **persisting local state** event after each query run. This limits any data loss that may occur, to only affect new query text that has never run. | false |
200+
| f-PersistAfterEachRun | Usually, browsers persist in the `unload` event. However, the `unload` event isn't always triggered when hosting in an iframe. This flag triggers the **persisting local state** event after each query run. This limits any data loss that may occur, to only affect new query text that has never run. | false |
193201
| f-ShowSmoothIngestion | If true, show the ingestion wizard experience when right-clicking on a database | true |
194202
| f-RefreshConnection | If true, always refreshes the schema when loading the page and never depends on local storage | false |
195203
| f-ShowPageHeader | If true, shows the page header that includes the Azure Data Explorer title and settings | true |
@@ -205,7 +213,7 @@ A feature flag can be used in the URL as a query parameter. To disable adding ot
205213
| f-DisableDashboardDelete | IF true, hides the dashboard delete button | false |
206214
| f-DisableTileRefresh | IF true, disables tiles refresh button in a dashboard | false |
207215
| f-DisableDashboardAutoRefresh | IF true, disables tiles auto refresh in a dashboard | false |
208-
| f-DisableExploreQuery | IF true, disables the explore query button of the tiles | false |
216+
| f-DisableExploreQuery | IF true, disables the **Explore query** button of the tiles | false |
209217
| f-DisableCrossFiltering | IF true, disables the cross filtering feature in dashboards | false |
210218
| f-HideDashboardParametersBar | IF true, hides the parameters bar in a dashboard | false |
211219

data-explorer/kusto/management/graph/graph-model-create-or-alter.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ This command returns a table with the following columns:
105105

106106
|Name|CreationTime|ID|SnapshotsCount|Model|AuthorizedPrincipals|RetentionPolicy|
107107
|---|---|---|---|---|---|---|
108-
|SocialNetwork|2025-05-23 14:42:37.5128901|aaaaaaaa-0b0b-1c1c-2d2d-333333333333|0|model from above|[</br> {</br> "Type": "Microsoft Entra ID User",</br> "DisplayName": "Alex Johnson (upn: alex.johnson@contoso.com)",</br> "ObjectId": "aaaaaaaa-bbbb-cccc-1111-22222222222",</br> "FQN": "aaduser=aaaaaaaa-bbbb-cccc-1111-22222222222;aaaabbbb-0000-cccc-1111-dddd2222eeee",</br> "Notes": "",</br> "RoleAssignmentIdentifier": "a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1"</br> }</br>]|{</br> "SoftDeletePeriod": "3650.00:00:00"</br>}|
108+
|SocialNetwork|2025-05-23 14:42:37.5128901|aaaaaaaa-0b0b-1c1c-2d2d-333333333333|0|model from above|`[</br> {</br> "Type": "Microsoft Entra ID User",</br> "DisplayName": "Alex Johnson (upn: alex.johnson@contoso.com)",</br> "ObjectId": "aaaaaaaa-bbbb-cccc-1111-22222222222",</br> "FQN": "aaduser=aaaaaaaa-bbbb-cccc-1111-22222222222;aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb",</br> "Notes": "",</br> "RoleAssignmentIdentifier": "a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1"</br> }</br>]`|`{</br> "SoftDeletePeriod": "3650.00:00:00"</br>}`|
109109

110110
## Notes
111111

data-explorer/kusto/query/graph-exploration-basics.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -149,9 +149,9 @@ graph('BloodHound_Entra')
149149

150150
|node_id|labels|label_count|
151151
|---|---|---|
152-
|2|[<br> "AZBase",<br> "AZServicePrincipal"<br>]|2|
153-
|4|[<br> "AZBase",<br> "AZUser"<br>]|2|
154-
|5|[<br> "AZBase",<br> "AZUser"<br>]|2|
152+
|2|`[<br> "AZBase",<br> "AZServicePrincipal"<br>]`|2|
153+
|4|`[<br> "AZBase",<br> "AZUser"<br>]`|2|
154+
|5|`[<br> "AZBase",<br> "AZUser"<br>]`|2|
155155

156156
**Sample nodes by type**:
157157

@@ -172,8 +172,8 @@ graph('BloodHound_Entra')
172172

173173
|node_id|properties|
174174
|---|---|
175-
|5|{<br> "lastseen": "2025-08-11T09:21:19.002Z[UTC]",<br> "lastcollected": "2025-08-11T09:21:07.472380514Z[UTC]",<br> "enabled": true,<br> "displayname": "Jack Miller",<br> "name": "JMILLER@PHANTOMCORP.ONMICROSOFT.COM",<br> "tenantid": "6c12b0b0-b2cc-4a73-8252-0b94bfca2145",<br> "objectid": "9a20c327-8cc7-4425-9480-11fb734db194",<br> "onpremid": "",<br> "usertype": "Member",<br> "title": "",<br> "userprincipalname": "jmiller@phantomcorp.onmicrosoft.com",<br> "system_tags": "admin_tier_0",<br> "pwdlastset": "2021-06-16T17:51:03Z[UTC]",<br> "onpremsyncenabled": false,<br> "whencreated": "2021-06-16T17:29:16Z[UTC]",<br> "email": ""<br>}|
176-
|10|{<br> "lastseen": "2025-08-11T09:21:07.472380514Z[UTC]",<br> "onpremid": "",<br> "usertype": "Member",<br> "title": "",<br> "lastcollected": "2025-08-11T09:21:07.472380514Z[UTC]",<br> "enabled": true,<br> "userprincipalname": "cjackson@phantomcorp.onmicrosoft.com",<br> "system_tags": "admin_tier_0",<br> "displayname": "Chris Jackson",<br> "pwdlastset": "2022-07-19T15:18:49Z[UTC]",<br> "onpremsyncenabled": false,<br> "name": "CJACKSON@PHANTOMCORP.ONMICROSOFT.COM",<br> "tenantid": "6c12b0b0-b2cc-4a73-8252-0b94bfca2145",<br> "whencreated": "2022-07-19T15:01:55Z[UTC]",<br> "email": "cjackson@phantomcorp.onmicrosoft.com",<br> "objectid": "bfb6a9c2-f3c8-4b9c-9d09-2924d38895f7"<br>}|
175+
|5|`{<br> "lastseen": "2025-08-11T09:21:19.002Z[UTC]",<br> "lastcollected": "2025-08-11T09:21:07.472380514Z[UTC]",<br> "enabled": true,<br> "displayname": "Jack Miller",<br> "name": "JMILLER@PHANTOMCORP.ONMICROSOFT.COM",<br> "tenantid": "aaaabbbb-0000-cccc-1111-dddd2222eeee",<br> "objectid": "aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb",<br> "onpremid": "",<br> "usertype": "Member",<br> "title": "",<br> "userprincipalname": "jmiller@phantomcorp.onmicrosoft.com",<br> "system_tags": "admin_tier_0",<br> "pwdlastset": "2021-06-16T17:51:03Z[UTC]",<br> "onpremsyncenabled": false,<br> "whencreated": "2021-06-16T17:29:16Z[UTC]",<br> "email": ""<br>}`|
176+
|10|`{<br> "lastseen": "2025-08-11T09:21:07.472380514Z[UTC]",<br> "onpremid": "",<br> "usertype": "Member",<br> "title": "",<br> "lastcollected": "2025-08-11T09:21:07.472380514Z[UTC]",<br> "enabled": true,<br> "userprincipalname": "cjackson@phantomcorp.onmicrosoft.com",<br> "system_tags": "admin_tier_0",<br> "displayname": "Chris Jackson",<br> "pwdlastset": "2022-07-19T15:18:49Z[UTC]",<br> "onpremsyncenabled": false,<br> "name": "CJACKSON@PHANTOMCORP.ONMICROSOFT.COM",<br> "tenantid": "aaaabbbb-0000-cccc-1111-dddd2222eeee",<br> "whencreated": "2022-07-19T15:01:55Z[UTC]",<br> "email": "cjackson@phantomcorp.onmicrosoft.com",<br> "objectid": "bbbbbbbb-1111-2222-3333-cccccccccccc"<br>}`|
177177

178178
### Edge analysis
179179

@@ -280,9 +280,9 @@ graph('LDBC_Financial')
280280

281281
|node_id|node_labels|out_degree|
282282
|---|---|---|
283-
|Account::236720455413661980|[<br> "ACCOUNT"<br>]|384|
284-
|Account::56576470318842045|[<br> "ACCOUNT"<br>]|106|
285-
|Account::4890627720347648300|[<br> "ACCOUNT"<br>]|81|
283+
|Account::236720455413661980|`[<br> "ACCOUNT"<br>]`|384|
284+
|Account::56576470318842045|`[<br> "ACCOUNT"<br>]`|106|
285+
|Account::4890627720347648300|`[<br> "ACCOUNT"<br>]`|81|
286286

287287
### Relationship pattern analysis
288288

@@ -340,7 +340,7 @@ graph('BloodHound_Entra')
340340

341341
|schema_properties|
342342
|---|
343-
|{<br> "onpremsyncenabled": "bool",<br> "system_tags": "string",<br> "lastcollected": "string",<br> "pwdlastset": "string",<br> "usertype": "string",<br> "userprincipalname": "string",<br> "email": "string",<br> "tenantid": "guid",<br> "name": "string",<br> "lastseen": "string",<br> "displayname": "string",<br> "enabled": "bool",<br> "title": "string",<br> "onpremid": "string",<br> "objectid": "guid",<br> "whencreated": "string"<br>}|
343+
|`{<br> "onpremsyncenabled": "bool",<br> "system_tags": "string",<br> "lastcollected": "string",<br> "pwdlastset": "string",<br> "usertype": "string",<br> "userprincipalname": "string",<br> "email": "string",<br> "tenantid": "guid",<br> "name": "string",<br> "lastseen": "string",<br> "displayname": "string",<br> "enabled": "bool",<br> "title": "string",<br> "onpremid": "string",<br> "objectid": "guid",<br> "whencreated": "string"<br>}`|
344344

345345
**Find all properties of all nodes by label**:
346346

@@ -367,9 +367,9 @@ graph('LDBC_SNB_Interactive')
367367

368368
|label|properties|
369369
|---|---|
370-
|TAGCLASS|[<br> "id",<br> "node_id",<br> "lbl",<br> "name",<br> "url"<br>]|
371-
|TAG|[<br> "id",<br> "node_id",<br> "lbl",<br> "name",<br> "url"<br>]|
372-
|FORUM|[<br> "id",<br> "creationDate",<br> "node_id",<br> "lbl",<br> "title"<br>]|
370+
|TAGCLASS|`[<br> "id",<br> "node_id",<br> "lbl",<br> "name",<br> "url"<br>]`|
371+
|TAG|`[<br> "id",<br> "node_id",<br> "lbl",<br> "name",<br> "url"<br>]`|
372+
|FORUM|`[<br> "id",<br> "creationDate",<br> "node_id",<br> "lbl",<br> "title"<br>]`|
373373

374374
**Find all properties of all edges by label**:
375375

@@ -396,9 +396,9 @@ graph('BloodHound_AD')
396396

397397
|label|properties|
398398
|---|---|
399-
|GetChangesAll|[<br> "id",<br> "lbl",<br> "src",<br> "dst",<br> "properties",<br> "lastseen"<br>]|
400-
|OwnsRaw|[<br> "id",<br> "lbl",<br> "src",<br> "dst",<br> "properties",<br> "lastseen"<br>]|
401-
|AddKeyCredentialLink|[<br> "id",<br> "lbl",<br> "src",<br> "dst",<br> "properties",<br> "lastseen"<br>]|
399+
|GetChangesAll|`[<br> "id",<br> "lbl",<br> "src",<br> "dst",<br> "properties",<br> "lastseen"<br>]`|
400+
|OwnsRaw|`[<br> "id",<br> "lbl",<br> "src",<br> "dst",<br> "properties",<br> "lastseen"<br>]`|
401+
|AddKeyCredentialLink|`[<br> "id",<br> "lbl",<br> "src",<br> "dst",<br> "properties",<br> "lastseen"<br>]`|
402402

403403
**Find nodes with specific property values**:
404404

0 commit comments

Comments
 (0)