Skip to content

Commit 130b0ba

Browse files
authored
Merge pull request #235475 from MicrosoftDocs/main
Publish to live, Sunday 4 AM PST, 4/23
2 parents 9772c35 + e5c65d5 commit 130b0ba

File tree

131 files changed

+2218
-1494
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

131 files changed

+2218
-1494
lines changed

articles/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -4,13 +4,13 @@ description: Create user-assigned managed identities.
44
services: active-directory
55
author: barclayn
66
manager: amycolannino
7-
editor:
7+
editor:
88
ms.service: active-directory
99
ms.subservice: msi
1010
ms.topic: how-to
1111
ms.workload: identity
1212
ms.date: 03/08/2022
13-
ms.author: barclayn
13+
ms.author: barclayn
1414
ms.custom: devx-track-azurecli
1515
zone_pivot_groups: identity-mi-methods
1616
---
@@ -42,9 +42,9 @@ To create a user-assigned managed identity, your account needs the [Managed Iden
4242
- **Resource group**: Choose a resource group to create the user-assigned managed identity in, or select **Create new** to create a new resource group.
4343
- **Region**: Choose a region to deploy the user-assigned managed identity, for example, **West US**.
4444
- **Name**: Enter the name for your user-assigned managed identity, for example, UAI1.
45-
45+
4646
[!INCLUDE [ua-character-limit](~/includes/managed-identity-ua-character-limits.md)]
47-
47+
4848
:::image type="content" source="media/how-manage-user-assigned-managed-identities/create-user-assigned-managed-identity-portal.png" alt-text="Screenshot that shows the Create User Assigned Managed Identity pane.":::
4949

5050
1. Select **Review + create** to review the changes.
@@ -83,7 +83,7 @@ In some environments, administrators choose to limit who can manage user-assigne
8383
1. A list of the user-assigned managed identities for your subscription is returned. Select the user-assigned managed identity that you want to manage.
8484
1. Select **Access control (IAM)**.
8585
1. Choose **Add role assignment**.
86-
86+
8787
![Screenshot that shows the user-assigned managed identity access control screen](media/how-manage-user-assigned-managed-identities/role-assign.png)
8888

8989
1. In the **Add role assignment** pane, choose the role to assign and choose **Next**.
@@ -106,10 +106,10 @@ In this article, you learn how to create, list, delete, or assign a role to a us
106106

107107
[!INCLUDE [azure-cli-prepare-your-environment-no-header.md](~/articles/reusable-content/azure-cli/azure-cli-prepare-your-environment-no-header.md)]
108108

109-
> [!IMPORTANT]
110-
> To modify user permissions when you use an app service principal by using the CLI, you must provide the service principal more permissions in the Azure Active Directory Graph API because portions of the CLI perform GET requests against the Graph API. Otherwise, you might end up receiving an "Insufficient privileges to complete the operation" message. To do this step, go into the **App registration** in Azure AD, select your app, select **API permissions**, and scroll down and select **Azure Active Directory Graph**. From there, select **Application permissions**, and then add the appropriate permissions.
109+
> [!IMPORTANT]
110+
> To modify user permissions when you use an app service principal by using the CLI, you must provide the service principal more permissions in the Azure Active Directory Graph API because portions of the CLI perform GET requests against the Graph API. Otherwise, you might end up receiving an "Insufficient privileges to complete the operation" message. To do this step, go into the **App registration** in Azure AD, select your app, select **API permissions**, and scroll down and select **Azure Active Directory Graph**. From there, select **Application permissions**, and then add the appropriate permissions.
111111
112-
## Create a user-assigned managed identity
112+
## Create a user-assigned managed identity
113113

114114
To create a user-assigned managed identity, your account needs the [Managed Identity Contributor](../../role-based-access-control/built-in-roles.md#managed-identity-contributor) role assignment.
115115

@@ -182,7 +182,7 @@ To use Azure PowerShell locally for this article instead of using Cloud Shell:
182182
Connect-AzAccount
183183
```
184184
185-
1. Install the [latest version of PowerShellGet](/powershell/scripting/gallery/installing-psget#for-systems-with-powershell-50-or-newer-you-can-install-the-latest-powershellget).
185+
1. Install the [latest version of PowerShellGet](/powershell/gallery/powershellget/install-powershellget).
186186
187187
```azurepowershell
188188
Install-Module -Name PowerShellGet -AllowPrerelease
@@ -264,9 +264,9 @@ Resource Manager templates help you deploy new or modified resources defined by
264264
- Use a [custom template from Azure Marketplace](../../azure-resource-manager/templates/deploy-portal.md#deploy-resources-from-custom-template) to create a template from scratch or base it on an existing common or [quickstart template](https://azure.microsoft.com/resources/templates/).
265265
- Derive from an existing resource group by exporting a template. You can export them from either [the original deployment](../../azure-resource-manager/management/manage-resource-groups-portal.md#export-resource-groups-to-templates) or from the [current state of the deployment](../../azure-resource-manager/management/manage-resource-groups-portal.md#export-resource-groups-to-templates).
266266
- Use a local [JSON editor (such as VS Code)](../../azure-resource-manager/templates/quickstart-create-templates-use-the-portal.md), and then upload and deploy by using PowerShell or the Azure CLI.
267-
- Use the Visual Studio [Azure Resource Group project](../../azure-resource-manager/templates/create-visual-studio-deployment-project.md) to create and deploy a template.
267+
- Use the Visual Studio [Azure Resource Group project](../../azure-resource-manager/templates/create-visual-studio-deployment-project.md) to create and deploy a template.
268268

269-
## Create a user-assigned managed identity
269+
## Create a user-assigned managed identity
270270

271271
To create a user-assigned managed identity, your account needs the [Managed Identity Contributor](../../role-based-access-control/built-in-roles.md#managed-identity-contributor) role assignment.
272272

@@ -340,7 +340,7 @@ In this article, you learn how to create, list, and delete a user-assigned manag
340340
az account get-access-token
341341
```
342342
343-
## Create a user-assigned managed identity
343+
## Create a user-assigned managed identity
344344
345345
To create a user-assigned managed identity, your account needs the [Managed Identity Contributor](../../role-based-access-control/built-in-roles.md#managed-identity-contributor) role assignment.
346346
@@ -410,8 +410,8 @@ DELETE https://management.azure.com/subscriptions/80c696ff-5efa-4909-a64d-f1b616
410410
## Next steps
411411

412412
For information on how to assign a user-assigned managed identity to an Azure VM or virtual machine scale set by using CURL, see:
413-
- [Configure managed identities for Azure resources on an Azure VM using REST API calls](qs-configure-rest-vm.md#user-assigned-managed-identity)
413+
- [Configure managed identities for Azure resources on an Azure VM using REST API calls](qs-configure-rest-vm.md#user-assigned-managed-identity)
414414
- [Configure managed identities for Azure resources on a virtual machine scale set using REST API calls](qs-configure-rest-vmss.md#user-assigned-managed-identity)
415415

416416
Learn how to use [workload identity federation for managed identities](../develop/workload-identity-federation.md) to access Azure Active Directory (Azure AD) protected resources without managing secrets.
417-
::: zone-end
417+
::: zone-end

articles/active-directory/managed-identities-azure-resources/tutorial-windows-vm-ua-arm.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -5,29 +5,29 @@ services: active-directory
55
documentationcenter: ''
66
author: barclayn
77
manager: amycolannino
8-
editor:
8+
editor:
99
ms.service: active-directory
1010
ms.subservice: msi
1111
ms.topic: tutorial
1212
ms.tgt_pltfrm: na
1313
ms.workload: identity
1414
ms.date: 01/11/2022
1515
ms.author: barclayn
16-
ms.collection: M365-identity-device-management
16+
ms.collection: M365-identity-device-management
1717
ms.custom: devx-track-azurepowershell, devx-track-arm-template
1818
---
1919

2020
# Tutorial: Use a user-assigned managed identity on a Windows VM to access Azure Resource Manager
2121

22-
This tutorial explains how to create a user-assigned identity, assign it to a Windows Virtual Machine (VM), and then use that identity to access the Azure Resource Manager API. Managed Service Identities are automatically managed by Azure. They enable authentication to services that support Azure AD authentication, without needing to embed credentials into your code.
22+
This tutorial explains how to create a user-assigned identity, assign it to a Windows Virtual Machine (VM), and then use that identity to access the Azure Resource Manager API. Managed Service Identities are automatically managed by Azure. They enable authentication to services that support Azure AD authentication, without needing to embed credentials into your code.
2323

2424
You learn how to:
2525

2626
> [!div class="checklist"]
2727
> * Create a user-assigned managed identity
2828
> * Assign your user-assigned identity to your Windows VM
29-
> * Grant the user-assigned identity access to a Resource Group in Azure Resource Manager
30-
> * Get an access token using the user-assigned identity and use it to call Azure Resource Manager
29+
> * Grant the user-assigned identity access to a Resource Group in Azure Resource Manager
30+
> * Get an access token using the user-assigned identity and use it to call Azure Resource Manager
3131
> * Read the properties of a Resource Group
3232
3333
[!INCLUDE [az-powershell-update](../../../includes/updated-for-az.md)]
@@ -58,7 +58,7 @@ To use Azure PowerShell locally for this article (rather than using Cloud Shell)
5858
Connect-AzAccount
5959
```
6060
61-
1. Install the [latest version of PowerShellGet](/powershell/scripting/gallery/installing-psget#for-systems-with-powershell-50-or-newer-you-can-install-the-latest-powershellget).
61+
1. Install the [latest version of PowerShellGet](/powershell/gallery/powershellget/install-powershellget).
6262
6363
```azurepowershell
6464
Install-Module -Name PowerShellGet -AllowPrerelease
@@ -114,9 +114,9 @@ $vm = Get-AzVM -ResourceGroupName myResourceGroup -Name myVM
114114
Update-AzVM -ResourceGroupName TestRG -VM $vm -IdentityType "UserAssigned" -IdentityID "/subscriptions/<SUBSCRIPTIONID>/resourcegroups/myResourceGroupVM/providers/Microsoft.ManagedIdentity/userAssignedIdentities/ID1"
115115
```
116116

117-
## Grant access
117+
## Grant access
118118

119-
This section shows how to grant your user-assigned identity access to a Resource Group in Azure Resource Manager. Managed identities for Azure resources provide identities that your code can use to request access tokens to authenticate to resource APIs that support Azure AD authentication. In this tutorial, your code will access the Azure Resource Manager API.
119+
This section shows how to grant your user-assigned identity access to a Resource Group in Azure Resource Manager. Managed identities for Azure resources provide identities that your code can use to request access tokens to authenticate to resource APIs that support Azure AD authentication. In this tutorial, your code will access the Azure Resource Manager API.
120120

121121
Before your code can access the API, you need to grant the identity access to a resource in Azure Resource Manager. In this case, the Resource Group in which the VM is contained. Update the value for `<SUBSCRIPTION ID>` as appropriate for your environment.
122122

@@ -141,7 +141,7 @@ CanDelegate: False
141141

142142
## Access data
143143

144-
### Get an access token
144+
### Get an access token
145145

146146
For the remainder of the tutorial, you will work from the VM we created earlier.
147147

@@ -153,7 +153,7 @@ For the remainder of the tutorial, you will work from the VM we created earlier.
153153

154154
4. Now that you have created a **Remote Desktop Connection** with the virtual machine, open **PowerShell** in the remote session.
155155

156-
5. Using PowerShells `Invoke-WebRequest`, make a request to the local managed identities for Azure resources endpoint to get an access token for Azure Resource Manager. The `client_id` value is the value returned when you created the user-assigned managed identity.
156+
5. Using PowerShell's `Invoke-WebRequest`, make a request to the local managed identities for Azure resources endpoint to get an access token for Azure Resource Manager. The `client_id` value is the value returned when you created the user-assigned managed identity.
157157

158158
```azurepowershell
159159
$response = Invoke-WebRequest -Uri 'http://169.254.169.254/metadata/identity/oauth2/token?api-version=2018-02-01&client_id=af825a31-b0e0-471f-baea-96de555632f9&resource=https://management.azure.com/' -Method GET -Headers @{Metadata="true"}

0 commit comments

Comments
 (0)