Skip to content

Commit 0fdcc6d

Browse files
committed
Fixing build errors
1 parent be83fc6 commit 0fdcc6d

File tree

2 files changed

+13
-12
lines changed

2 files changed

+13
-12
lines changed

articles/automation/manage-runas-account.md

Lines changed: 12 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -23,8 +23,8 @@ Azure Automation uses two types of Run As accounts:
2323
* Azure Run As account
2424
* Azure Classic Run As account
2525

26-
>[!NOTE]Azure Cloud Solution Provider (CSP) subscriptions
27-
> support only the Azure Resource Manager model. Non-Azure Resource Manager services are not available in the program. When you are using a CSP subscription, the Azure Classic Run As account is not created, but the Azure Run As account is created. To learn more about CSP subscriptions, see [Available services in CSP subscriptions](https://docs.microsoft.com/azure/cloud-solution-provider/overview/azure-csp-available-services).
26+
>[!NOTE]
27+
>Azure Cloud Solution Provider (CSP) subscriptions support only the Azure Resource Manager model. Non-Azure Resource Manager services are not available in the program. When you are using a CSP subscription, the Azure Classic Run As account is not created, but the Azure Run As account is created. To learn more about CSP subscriptions, see [Available services in CSP subscriptions](https://docs.microsoft.com/azure/cloud-solution-provider/overview/azure-csp-available-services).
2828
2929
### Run As account
3030

@@ -304,8 +304,8 @@ Save the script on your computer using the filename **New-RunAsAccount.ps1**.
304304
}
305305
```
306306

307-
> [!NOTE]
308-
> **Add-AzAccount** and **Add-AzureRMAccount** are aliases for [Connect-AzAccount](https://docs.microsoft.com/powershell/module/az.accounts/connect-azaccount?view=azps-3.5.0). You can use these cmdlets or you can [update your modules](automation-update-azure-modules.md) in your Automation account to the latest versions. You might need to update your modules even if you have just created a new Automation account.
307+
>[!NOTE]
308+
>**Add-AzAccount** and **Add-AzureRMAccount** are aliases for [Connect-AzAccount](https://docs.microsoft.com/powershell/module/az.accounts/connect-azaccount?view=azps-3.5.0). You can use these cmdlets or you can [update your modules](automation-update-azure-modules.md) in your Automation account to the latest versions. You might need to update your modules even if you have just created a new Automation account.
309309
310310
### Execute the PowerShell script
311311

@@ -370,10 +370,11 @@ The self-signed certificate that you have created for the Run As account expires
370370

371371
When you renew the self-signed certificate, the current valid certificate is retained to ensure that any runbooks that are queued up or actively running, and that authenticate with the Run As account, aren't negatively affected. The certificate remains valid until its expiration date.
372372

373-
> [!NOTE] If you think that the Run As account has been compromised, > you can delete and re-create the self-signed certificate.
373+
>[!NOTE]
374+
>If you think that the Run As account has been compromised, you can delete and re-create the self-signed certificate.
374375
375-
> [!NOTE]
376-
> If you have configured your Run As account to use a certificate issued by your enterprise certificate authority and you use the option to renew a self-signed certificate option, the enterprise certificate is replaced by a self-signed certificate.
376+
>[!NOTE]
377+
>If you have configured your Run As account to use a certificate issued by your enterprise certificate authority and you use the option to renew a self-signed certificate option, the enterprise certificate is replaced by a self-signed certificate.
377378
378379
Use the following steps to renew the self-signed certificate.
379380

@@ -396,8 +397,8 @@ Use the following steps to renew the self-signed certificate.
396397
To renew certificates automatically, you can use an automation runbook. This script on [GitHub](https://github.com/ikanni/PowerShellScripts/blob/master/AzureAutomation/RunAsAccount/GrantPermissionToRunAsAccountAADApplication-ToRenewCertificateItself-CreateSchedule.ps1) enables this functionality in your
397398
Automation account.
398399

399-
> [!NOTE]
400-
> You need to be a Global Administrator or Company Administrator in Azure AD to execute the script.
400+
>[!NOTE]
401+
>You must be a Global Administrator or Company Administrator in Azure AD to execute the script.
401402
402403
This script creates a weekly schedule to renew Run As account certificates. It adds an **Update-AutomationRunAsCredential** runbook to your Automation account. You can view the runbook code on GitHub, in the script [Update-AutomationRunAsCredential.ps1](https://github.com/azureautomation/runbooks/blob/master/Utility/ARM/Update-AutomationRunAsCredential.ps1). You can use the PowerShell code in the file to renew certificates manually, as needed.
403404

@@ -431,8 +432,8 @@ Use the following steps to test the renewal process immediately.
431432

432433
To control the targeting of Automation against resources in Azure, you can run the [Update-AutomationRunAsAccountRoleAssignments.ps1](https://aka.ms/AA5hug8) script. This script changes your existing Run As account service principal to create and use a custom role definition. The role has permissions for all resources except [Key Vault](https://docs.microsoft.com/azure/key-vault/).
433434

434-
> [!IMPORTANT]
435-
> After you run the **Update-AutomationRunAsAccountRoleAssignments.ps1** script, runbooks that access Key Vault through the use of Run As accounts no longer work. Before running the script, you should review runbooks in your account for calls to Azure Key Vault. To enable access to Key Vault from Azure Automation runbooks, you must [add the Run As account to Key Vault's permissions](#add-permissions-to-key-vault).
435+
>[!IMPORTANT]
436+
>After you run the **Update-AutomationRunAsAccountRoleAssignments.ps1** script, runbooks that access Key Vault through the use of Run As accounts no longer work. Before running the script, you should review runbooks in your account for calls to Azure Key Vault. To enable access to Key Vault from Azure Automation runbooks, you must [add the Run As account to Key Vault's permissions](#add-permissions-to-key-vault).
436437
437438
If you need to restrict further what the Run As service principal can do, you can add other resource types to the **NotActions** element of the custom role definition. The following example restricts access to `Microsoft.Compute/*`. If you add this resource type to **NotActions** for the role definition, the role will not be able to access any Compute resource. To learn more about role definitions, see [Understand role definitions for Azure resources](../role-based-access-control/role-definitions.md).
438439

articles/automation/troubleshoot/start-stop-vm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -197,7 +197,7 @@ This issue can be caused by an improperly configured or expired Run As Account.
197197

198198
To check your Run As account is properly configured, go to your Automation Account in the Azure portal and select **Run as accounts** under **Account Settings**. Here you will see the status of your run as accounts, if a Run As Account is improperly configured or expired the status will show this.
199199

200-
If your Run As account is [misconfigured](../manage-runas-account.md#misconfiguration), you should delete and recreate your Run As Account.
200+
If your Run As account is misconfigured, you should delete and re-create your Run As account. See [Manage Azure Automation Run As accounts](../manage-runas-account.md).
201201

202202
If the certificate is expired for your Run As Account, follow the steps listed at [Self-signed certificate renewal](../manage-runas-account.md#cert-renewal) to renew the certificate.
203203

0 commit comments

Comments
 (0)