Skip to content

Commit 195f7ec

Browse files
authored
Merge pull request #234388 from MicrosoftDocs/main
4/13/2023 AM Publish
2 parents 50bf226 + 8cce7d3 commit 195f7ec

File tree

75 files changed

+1527
-354
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

75 files changed

+1527
-354
lines changed

articles/active-directory/fundamentals/whats-new-sovereign-clouds.md

Lines changed: 69 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,75 @@ Azure AD receives improvements on an ongoing basis. To stay up to date with the
2121

2222
This page is updated monthly, so revisit it regularly.
2323

24+
## March 2023
25+
26+
### General Availability - Provisioning Insights Workbook
27+
28+
**Type:** New feature
29+
**Service category:** Provisioning
30+
**Product capability:** Monitoring & Reporting
31+
32+
This new workbook makes it easier to investigate and gain insights into your provisioning workflows in a given tenant. This includes HR-driven provisioning, cloud sync, app provisioning, and cross-tenant sync.
33+
34+
Some key questions this workbook can help answer are:
35+
36+
- How many identities have been synced in a given time range?
37+
- How many create, delete, update, or other operations were performed?
38+
- How many operations were successful, skipped, or failed?
39+
- What specific identities failed? And what step did they fail on?
40+
- For any given user, what tenants / applications were they provisioned or deprovisioned to?
41+
42+
For more information, see: [Provisioning insights workbook](../app-provisioning/provisioning-workbook.md).
43+
44+
---
45+
46+
### General Availability - Follow Azure Active Directory best practices with recommendations
47+
48+
**Type:** New feature
49+
**Service category:** Reporting
50+
**Product capability:** Monitoring & Reporting
51+
52+
Azure Active Directory recommendations help you improve your tenant posture by surfacing opportunities to implement best practices. On a daily basis, Azure AD analyzes the configuration of your tenant. During this analysis, Azure Active Directory compares the data of a recommendation with the actual configuration of your tenant. If a recommendation is flagged as applicable to your tenant, the recommendation appears in the Recommendations section of the Azure Active Directory Overview.
53+
54+
This release includes our first three recommendations:
55+
56+
- Convert from per-user MFA to Conditional Access MFA
57+
- Migration applications from AD FS to Azure Active Directory
58+
- Minimize MFA prompts from known devices.
59+
60+
We're developing more recommendations, so stay tuned!
61+
62+
For more information, see:
63+
64+
- [What are Azure Active Directory recommendations?](../reports-monitoring/overview-recommendations.md).
65+
- [Use the Azure AD recommendations API to implement Azure AD best practices for your tenant](/graph/api/resources/recommendations-api-overview)
66+
67+
---
68+
69+
### General Availability - Improvements to Azure Active Directory Smart Lockout
70+
71+
**Type:** Changed feature
72+
**Service category:** Other
73+
**Product capability:** User Management
74+
75+
With a recent improvement, Smart Lockout now synchronizes the lockout state across Azure Active Directory data centers, so the total number of failed sign-in attempts allowed before an account is locked will match the configured lockout threshold.
76+
77+
For more information, see: [Protect user accounts from attacks with Azure Active Directory smart lockout](../authentication/howto-password-smart-lockout.md).
78+
79+
---
80+
81+
### General Availability- MFA events from ADFS and NPS adapter available in Sign-in logs
82+
83+
**Type:** Changed feature
84+
**Service category:** MFA
85+
**Product capability:** Identity Security & Protection
86+
87+
Customers with Cloud MFA activity from ADFS adapter, or NPS Extension, can now see these events in the Sign-in logs, rather than the legacy multi-factor authentication activity report. Not all attributes in the sign-in logs are populated for these events due to limited data from the on-premises components. Customers with ADFS using AD Health Connect and customers using NPS with the latest NPS extension installed will have a richer set of data in the events.
88+
89+
For more information, see: [Protect user accounts from attacks with Azure Active Directory smart lockout](../authentication/howto-password-smart-lockout.md).
90+
91+
---
92+
2493
## February 2023
2594

2695
### General Availability - Filter and transform group names in token claims configuration using regular expression

articles/automation/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -90,8 +90,6 @@
9090
href: troubleshoot/managed-identity.md
9191
- name: Run As account
9292
items:
93-
- name: Create Run As account
94-
href: create-run-as-account.md
9593
- name: Delete Run As account
9694
href: delete-run-as-account.md
9795
- name: Manage Run As account

articles/automation/automation-security-overview.md

Lines changed: 14 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article provides an overview of Azure Automation account authe
44
keywords: automation security, secure automation; automation authentication
55
services: automation
66
ms.subservice: process-automation
7-
ms.date: 03/07/2023
7+
ms.date: 04/12/2023
88
ms.topic: conceptual
99
ms.custom: devx-track-azurepowershell
1010
---
@@ -37,9 +37,6 @@ A managed identity from Azure Active Directory (Azure AD) allows your runbook to
3737

3838
Managed identities are the recommended way to authenticate in your runbooks, and is the default authentication method for your Automation account.
3939

40-
> [!NOTE]
41-
> When you create an Automation account, the option to create a Run As account is no longer available. However, we continue to support a RunAs account for existing and new Automation accounts. You can [create a Run As account](create-run-as-account.md) in your Automation account from the Azure portal or by using PowerShell.
42-
4340
Here are some of the benefits of using managed identities:
4441

4542
- Using a managed identity instead of the Automation Run As account simplifies management. You don't have to renew the certificate used by a Run As account.
@@ -68,7 +65,7 @@ Run As accounts in Azure Automation provide authentication for managing Azure Re
6865
- Azure Run As Account
6966
- Azure Classic Run As Account
7067

71-
To create or renew a Run As account, permissions are needed at three levels:
68+
To renew a Run As account, permissions are needed at three levels:
7269

7370
- Subscription,
7471
- Azure Active Directory (Azure AD), and
@@ -82,11 +79,11 @@ You need the `Microsoft.Authorization/*/Write` permission. This permission is ob
8279
- [Owner](../role-based-access-control/built-in-roles.md#owner)
8380
- [User Access Administrator](../role-based-access-control/built-in-roles.md#user-access-administrator)
8481

85-
To configure or renew Classic Run As accounts, you must have the Co-administrator role at the subscription level. To learn more about classic subscription permissions, see [Azure classic subscription administrators](../role-based-access-control/classic-administrators.md#add-a-co-administrator).
82+
To renew Classic Run As accounts, you must have the Co-administrator role at the subscription level. To learn more about classic subscription permissions, see [Azure classic subscription administrators](../role-based-access-control/classic-administrators.md#add-a-co-administrator).
8683

8784
### Azure AD permissions
8885

89-
To be able to create or renew the service principal, you need to be a member of one of the following Azure AD built-in roles:
86+
To renew the service principal, you need to be a member of one of the following Azure AD built-in roles:
9087

9188
- [Application Administrator](../active-directory/roles/permissions-reference.md#application-administrator)
9289
- [Application Developer](../active-directory/roles/permissions-reference.md#application-developer)
@@ -95,7 +92,7 @@ Membership can be assigned to **ALL** users in the tenant at the directory level
9592

9693
### Automation account permissions
9794

98-
To be able to create or update the Automation account, you need to be a member of one of the following Automation account roles:
95+
To update the Automation account, you need to be a member of one of the following Automation account roles:
9996

10097
- [Owner](./automation-role-based-access-control.md#owner)
10198
- [Contributor](./automation-role-based-access-control.md#contributor)
@@ -105,40 +102,24 @@ To learn more about the Azure Resource Manager and Classic deployment models, se
105102
>[!NOTE]
106103
>Azure Cloud Solution Provider (CSP) subscriptions support only the Azure Resource Manager model. Non-Azure Resource Manager services are not available in the program. When you are using a CSP subscription, the Azure Classic Run As account is not created, but the Azure Run As account is created. To learn more about CSP subscriptions, see [Available services in CSP subscriptions](/azure/cloud-solution-provider/overview/azure-csp-available-services).
107104
108-
When you create an Automation account, the Run As account is created by default at the same time with a self-signed certificate. If you chose not to create it along with the Automation account, it can be created individually at a later time. An Azure Classic Run As Account is optional, and is created separately if you need to manage classic resources.
109-
110-
> [!NOTE]
111-
> Azure Automation does not automatically create the Run As account. It has been replaced by using managed identities.
112-
113-
If you want to use a certificate issued by your enterprise or third-party certification authority (CA) instead of the default self-signed certificate, can use the [PowerShell script to create a Run As account](create-run-as-account.md#powershell-script-to-create-a-run-as-account) option for your Run As and Classic Run As accounts.
114-
115105
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RWwtF3]
116106
117107
### Run As account
118108

119-
When you create a Run As account, it performs the following tasks:
120-
121-
* Creates an Azure AD application with a self-signed certificate, creates a service principal account for the application in Azure AD, and assigns the [Contributor](../role-based-access-control/built-in-roles.md#contributor) role for the account in your current subscription. You can change the certificate setting to [Reader](../role-based-access-control/built-in-roles.md#reader) or any other role. For more information, see [Role-based access control in Azure Automation](automation-role-based-access-control.md).
122-
123-
* Creates an Automation certificate asset named `AzureRunAsCertificate` in the specified Automation account. The certificate asset holds the certificate private key that the Azure AD application uses.
124-
125-
* Creates an Automation connection asset named `AzureRunAsConnection` in the specified Automation account. The connection asset holds the application ID, tenant ID, subscription ID, and certificate thumbprint.
109+
Run As Account consists of the following components:
110+
- An Azure AD application with a self-signed certificate, and a service principal account for the application in Azure AD, which is assigned the [Contributor](../role-based-access-control/built-in-roles.md#contributor) role for the account in your current subscription. You can change the certificate setting to [Reader](../role-based-access-control/built-in-roles.md#reader) or any other role. For more information, see [Role-based access control in Azure Automation](automation-role-based-access-control.md).
111+
- An Automation certificate asset named `AzureRunAsCertificate` in the specified Automation account. The certificate asset holds the certificate private key that the Azure AD application uses.
112+
- An Automation connection asset named `AzureRunAsConnection` in the specified Automation account. The connection asset holds the application ID, tenant ID, subscription ID, and certificate thumbprint.
126113

127114
### Azure Classic Run As account
128115

129-
> [!IMPORTANT]
130-
> Azure Automation Run As Account will retire on September 30, 2023 and will be replaced with Managed Identities. Before that date, you'll need to start migrating your runbooks to use [managed identities](automation-security-overview.md#managed-identities). For more information, see [migrating from an existing Run As accounts to managed identity](https://learn.microsoft.com/azure/automation/migrate-run-as-accounts-managed-identity?tabs=run-as-account#sample-scripts) to start migrating the runbooks from Run As account to managed identities before 30 September 2023.
131-
132-
When you create an Azure Classic Run As account, it performs the following tasks:
116+
Azure Classic Run As Account consists of the following components:
117+
- A management certificate in the subscription.
118+
- An Automation certificate asset named `AzureClassicRunAsCertificate` in the specified Automation account. The certificate asset holds the certificate private key used by the management certificate.
119+
- An Automation connection asset named `AzureClassicRunAsConnection` in the specified Automation account. The connection asset holds the subscription name, subscription ID, and certificate asset name.
133120

134121
> [!NOTE]
135-
> You must be a co-administrator on the subscription to create or renew this type of Run As account.
136-
137-
* Creates a management certificate in the subscription.
138-
139-
* Creates an Automation certificate asset named `AzureClassicRunAsCertificate` in the specified Automation account. The certificate asset holds the certificate private key used by the management certificate.
140-
141-
* Creates an Automation connection asset named `AzureClassicRunAsConnection` in the specified Automation account. The connection asset holds the subscription name, subscription ID, and certificate asset name.
122+
> You must be a co-administrator on the subscription to renew this type of Run As account.
142123
143124
## Service principal for Run As account
144125

articles/automation/delete-run-as-account.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Delete an Azure Automation Run As account
33
description: This article tells how to delete a Run As account with PowerShell or from the Azure portal.
44
services: automation
55
ms.subservice: process-automation
6-
ms.date: 01/06/2021
6+
ms.date: 04/12/2023
77
ms.topic: conceptual
88
---
99

@@ -26,8 +26,9 @@ Run As accounts in Azure Automation provide authentication for managing resource
2626

2727
![Delete Run As account](media/delete-run-as-account/automation-account-delete-run-as.png)
2828

29-
5. While the account is being deleted, you can track the progress under **Notifications** from the menu.
29+
5. While the account is being deleted, you can track the progress under **Notifications** from the menu. Run As accounts can't be restored after deletion.
3030

3131
## Next steps
3232

33-
To recreate your Run As or Classic Run As account, see [Create Run As accounts](create-run-as-account.md).
33+
- [Use system-assigned managed identity](enable-managed-identity-for-automation.md).
34+
- [Use user-assigned managed identity](add-user-assigned-identity.md).

articles/automation/manage-run-as-account.md

Lines changed: 1 addition & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Manage an Azure Automation Run As account
33
description: This article tells how to manage your Azure Automation Run As account with PowerShell or from the Azure portal.
44
services: automation
5-
ms.date: 08/02/2021
5+
ms.date: 04/12/2023
66
ms.topic: conceptual
77
---
88

@@ -161,30 +161,9 @@ You can allow Azure Automation to verify if Key Vault and your Run As account se
161161

162162
You can use the [Extend-AutomationRunAsAccountRoleAssignmentToKeyVault.ps1](https://aka.ms/AA5hugb) script in the PowerShell Gallery to grant your Run As account permissions to Key Vault. See [Assign a Key Vault access policy](../key-vault/general/assign-access-policy-powershell.md) for more details on setting permissions on Key Vault.
163163

164-
## Resolve misconfiguration issues for Run As accounts
165-
166-
Some configuration items necessary for a Run As or Classic Run As account might have been deleted or created improperly during initial setup. Possible instances of misconfiguration include:
167-
168-
* Certificate asset
169-
* Connection asset
170-
* Run As account removed from the Contributor role
171-
* Service principal or application in Azure AD
172-
173-
For such misconfiguration instances, the Automation account detects the changes and displays a status of *Incomplete* on the Run As Accounts properties pane for the account.
174-
175-
:::image type="content" source="media/manage-run-as-account/automation-account-run-as-config-incomplete.png" alt-text="Incomplete Run As account configuration.":::
176-
177-
When you select the Run As account, the account properties pane displays the following error message:
178-
179-
```text
180-
The Run As account is incomplete. Either one of these was deleted or not created - Azure Active Directory Application, Service Principal, Role, Automation Certificate asset, Automation Connect asset - or the Thumbprint is not identical between Certificate and Connection. Please delete and then re-create the Run As Account.
181-
```
182-
183-
You can quickly resolve these Run As account issues by [deleting](delete-run-as-account.md) and [re-creating](create-run-as-account.md) the Run As account.
184164

185165
## Next steps
186166

187167
* [Application Objects and Service Principal Objects](../active-directory/develop/app-objects-and-service-principals.md).
188168
* [Certificates overview for Azure Cloud Services](../cloud-services/cloud-services-certs-create.md).
189-
* To create or re-create a Run As account, see [Create a Run As account](create-run-as-account.md).
190169
* If you no longer need to use a Run As account, see [Delete a Run As account](delete-run-as-account.md).

articles/azure-monitor/app/opencensus-python.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -206,9 +206,9 @@ import logging
206206
from opencensus.ext.azure.log_exporter import AzureEventHandler
207207

208208
logger = logging.getLogger(__name__)
209-
logger.addHandler(AzureLogHandler())
209+
logger.addHandler(AzureEventHandler())
210210
# Alternatively manually pass in the connection_string
211-
# logger.addHandler(AzureLogHandler(connection_string=<appinsights-connection-string>))
211+
# logger.addHandler(AzureEventHandler(connection_string=<appinsights-connection-string>))
212212

213213
logger.setLevel(logging.INFO)
214214
logger.info('Hello, World!')
@@ -519,7 +519,7 @@ Each of the Azure Monitor exporters supports configuration of securely sending t
519519

520520
You can view the telemetry data that was sent from your application through the **Logs (Analytics)** tab.
521521

522-
:::image type="content" source="./media/opencensus-python/0010-logs-query.png" lightbox="./media/opencensus-python/0010-logs-query.png" alt-text="Screenshot of the Overview pane with the Logs (Analytics) tab selected.":::
522+
![Screenshot of the Overview pane with the Logs (Analytics) tab selected.](./media/opencensus-python/0010-logs-query.png)
523523

524524
In the list under **Active**:
525525

articles/azure-monitor/app/resources-roles-access-control.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,9 @@
22
title: Resources, roles, and access control in Application Insights | Microsoft Docs
33
description: Owners, contributors and readers of your organization's insights.
44
ms.topic: conceptual
5-
ms.date: 02/14/2019
5+
ms.date: 04/13/2023
66
ms.custom: devx-track-azurepowershell
7-
ms.reviewer: jogrima
7+
ms.reviewer: cogoodson
88
---
99

1010
# Resources, roles, and access control in Application Insights

0 commit comments

Comments
 (0)