Skip to content

Commit 0133afc

Browse files
authored
Merge pull request #221983 from MicrosoftDocs/main
Publish to live, Tuesday 4 AM PST, 12/20
2 parents f50cabd + 5684825 commit 0133afc

File tree

83 files changed

+1431
-4491
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

83 files changed

+1431
-4491
lines changed

.openpublishing.redirection.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27728,6 +27728,26 @@
2772827728
"redirect_url": "/azure/backup/sap-hana-db-about",
2772927729
"redirect_document_id": false
2773027730
},
27731+
{
27732+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/high-availability-guide.md",
27733+
"redirect_url": "/azure/virtual-machines/workloads/sap/sap-high-availability-guide-wsfc-shared-disk",
27734+
"redirect_document_id": false
27735+
},
27736+
{
27737+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/sap-high-availability-guide.md",
27738+
"redirect_url": "/azure/virtual-machines/workloads/sap/sap-high-availability-guide-wsfc-shared-disk",
27739+
"redirect_document_id": false
27740+
},
27741+
{
27742+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/high-availability-multi-sid.md",
27743+
"redirect_url": "/azure/virtual-machines/workloads/sap/sap-ascs-ha-multi-sid-wsfc-shared-disk",
27744+
"redirect_document_id": false
27745+
},
27746+
{
27747+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/sap-high-availability-multi-sid.md",
27748+
"redirect_url": "/azure/virtual-machines/workloads/sap/sap-ascs-ha-multi-sid-wsfc-shared-disk",
27749+
"redirect_document_id": false
27750+
},
2773127751
{
2773227752
"source_path_from_root": "/articles/migrate/how-to-scale-assessment.md",
2773327753
"redirect_url": "scale-hyper-v-assessment",

articles/active-directory/develop/howto-create-self-signed-certificate.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.custom: scenarios:getting-started, engagement-fy23
1818

1919
# Create a self-signed public certificate to authenticate your application
2020

21-
Azure Active Directory (Azure AD) supports two types of authentication for service principals: **password-based authentication** (app secret) and **certificate-based authentication**. While app secrets can easily be created in the Azure portal, they're long-lived, and not as secure as certificates. It's therefore recommended that your application uses a certificate rather than a secret.
21+
Azure Active Directory (Azure AD) supports two types of authentication for service principals: **password-based authentication** (app secret) and **certificate-based authentication**. While app secrets can easily be created in the Azure portal or using a Microsoft API like Microsoft Graph, they're long-lived, and not as secure as certificates. It's therefore recommended that your application uses a certificate rather than a secret.
2222

2323
For testing, you can use a self-signed public certificate instead of a Certificate Authority (CA)-signed certificate. In this how-to, you'll use Windows PowerShell to create and export a self-signed certificate.
2424

@@ -27,9 +27,9 @@ For testing, you can use a self-signed public certificate instead of a Certifica
2727
2828
While creating the certificate using PowerShell, you can specify parameters like cryptographic and hash algorithms, certificate validity period, and domain name. The certificate can then be exported with or without its private key depending on your application needs.
2929

30-
The application that initiates the authentication session requires the private key while the application that confirms the authentication requires the public key. So, if you're authenticating from your PowerShell desktop app to Azure AD, you only export the public key (*.cer* file) and upload it to the Azure portal. The PowerShell app uses the private key from your local certificate store to initiate authentication and obtain access tokens for Microsoft Graph.
30+
The application that initiates the authentication session requires the private key while the application that confirms the authentication requires the public key. So, if you're authenticating from your PowerShell desktop app to Azure AD, you only export the public key (*.cer* file) and upload it to the Azure portal. The PowerShell app uses the private key from your local certificate store to initiate authentication and obtain access tokens for calling Microsoft APIs like Microsoft Graph.
3131

32-
Your application may also be running from another machine, such as Azure Automation. In this scenario, you export the public and private key pair from your local certificate store, upload the public key to the Azure portal, and the private key (a *.pfx* file) to Azure Automation. Your application running in Azure Automation will use the private key to initiate authentication and obtain access tokens for Microsoft Graph.
32+
Your application may also be running from another machine, such as Azure Automation. In this scenario, you export the public and private key pair from your local certificate store, upload the public key to the Azure portal, and the private key (a *.pfx* file) to Azure Automation. Your application running in Azure Automation will use the private key to initiate authentication and obtain access tokens for calling Microsoft APIs like Microsoft Graph.
3333

3434
This article uses the `New-SelfSignedCertificate` PowerShell cmdlet to create the self-signed certificate and the `Export-Certificate` cmdlet to export it to a location that is easily accessible. These cmdlets are built-in to modern versions of Windows (Windows 8.1 and greater, and Windows Server 2012R2 and greater). The self-signed certificate will have the following configuration:
3535

@@ -54,7 +54,9 @@ $cert = New-SelfSignedCertificate -Subject "CN=$certname" -CertStoreLocation "Ce
5454
5555
```
5656

57-
The `$cert` variable in the previous command stores your certificate in the current session and allows you to export it. The command below exports the certificate in *.cer* format. You can also export it in other formats supported on the Azure portal including *.pem* and *.crt*.
57+
The `$cert` variable in the previous command stores your certificate in the current session and allows you to export it.
58+
59+
The command below exports the certificate in *.cer* format. You can also export it in other formats supported on the Azure portal including *.pem* and *.crt*.
5860

5961
```powershell
6062

0 commit comments

Comments
 (0)