You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/automation/automation-connections.md
+21-23Lines changed: 21 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Manage connections in Azure Automation
3
3
description: This article tells how to manage Azure Automation connections to external services or applications and how to work with them in runbooks.
4
4
services: automation
5
5
ms.subservice: shared-capabilities
6
-
ms.date: 12/22/2020
6
+
ms.date: 04/12/2023
7
7
ms.topic: conceptual
8
8
ms.custom: devx-track-azurepowershell
9
9
---
@@ -27,10 +27,8 @@ When you create a connection, you must specify a connection type. The connection
27
27
Azure Automation makes the following built-in connection types available:
28
28
29
29
*`Azure` - Represents a connection used to manage classic resources.
30
-
*`AzureServicePrincipal` - Represents a connection used by the Azure Run As account.
31
-
*`AzureClassicCertificate` - Represents a connection used by the classic Azure Run As account.
32
-
33
-
In most cases, you don't need to create a connection resource because it is created when you create a [Run As account](automation-security-overview.md).
30
+
*`AzureServicePrincipal` - Represents a connection used to manage resources in Azure using a service principal.
31
+
*`AzureClassicCertificate` - This connection type is used to manage resources in Azure that were created using the classic deployment model that doesn't support Service Principal authentication.
34
32
35
33
## PowerShell cmdlets to access connections
36
34
@@ -80,15 +78,15 @@ To create a new connection in the Azure portal:
80
78
81
79
Create a new connection with Windows PowerShell using the `New-AzAutomationConnection` cmdlet. This cmdlet has a `ConnectionFieldValues` parameter that expects a hashtable defining values for each of the properties defined by the connection type.
82
80
83
-
You can use the following example commands as an alternative to creating the Run As account from the portal to create a new connection asset.
81
+
You can use the following example commands to create a connection that can be used for authentication using Azure Service Principal.
When you create your Automation account, it includes several global modules by default, along with the connection type `AzureServicePrincipal` to create the `AzureRunAsConnection` connection asset. If you try to create a new connection asset to connect to a service or application with a different authentication method, the operation fails because the connection type is not already defined in your Automation account. For more information on creating your own connection type for a custom module, see [Add a connection type](#add-a-connection-type).
89
+
If you try to create a new connection asset to connect to a service or application with a different authentication method, the operation fails because the connection type is not already defined in your Automation account. For more information on creating your own connection type for a custom module, see [Add a connection type](#add-a-connection-type).
92
90
93
91
## Add a connection type
94
92
@@ -123,38 +121,38 @@ Retrieve a connection in a runbook or DSC configuration with the internal `Get-A
123
121
124
122
# [PowerShell](#tab/azure-powershell)
125
123
126
-
The following example shows how to use the Run As account to authenticate with Azure Resource Manager resources in your runbook. It uses a connection asset representing the Run As account, which references the certificate-based service principal.
124
+
The following example shows how to use a connection to authenticate with Azure Resource Manager resources in your runbook. It uses a connection asset, which references the certificate-based service principal.
@@ -183,7 +181,7 @@ You can add an activity for the internal `Get-AutomationConnection` cmdlet to a
183
181
184
182

185
183
186
-
The following image shows an example of using a connection object in a graphical runbook. This example uses the `Constant value` data set for the `Get RunAs Connection` activity, which uses a connection object for authentication. A [pipeline link](automation-graphical-authoring-intro.md#use-links-for-workflow) is used here since the `ServicePrincipalCertificate` parameter set is expecting a single object.
184
+
The following image shows an example of using a connection object in a graphical runbook.
description: This article teaches you the differences between PowerShell Workflow and PowerShell and concepts applicable to Automation runbooks.
4
4
services: automation
5
5
ms.subservice: process-automation
6
-
ms.date: 10/16/2022
6
+
ms.date: 04/12/2023
7
7
ms.topic: conceptual
8
8
ms.custom: devx-track-azurepowershell
9
9
---
@@ -153,7 +153,7 @@ For more information on using InlineScript, see [Running Windows PowerShell Comm
153
153
154
154
One advantage of Windows PowerShell Workflows is the ability to perform a set of commands in parallel instead of sequentially as with a typical script.
155
155
156
-
You can use the `Parallel` keyword to create a script block with multiple commands that run concurrently. This uses the following syntax shown below. In this case, Activity1 and Activity2 starts at the same time. Activity3 starts only after both Activity1 and Activity2 have completed.
156
+
You can use the `Parallel` keyword to create a script block with multiple commands that run concurrently. This uses the following syntax shown below. In this case, Activity1 and Activity2 start at the same time. Activity3 starts only after both Activity1 and Activity2 have completed.
157
157
158
158
```powershell
159
159
Parallel
@@ -286,7 +286,7 @@ workflow CreateTestVms
286
286
```
287
287
288
288
> [!NOTE]
289
-
> For non-graphical PowerShell runbooks, `Add-AzAccount` and `Add-AzureRMAccount` are aliases for [Connect-AzAccount](/powershell/module/az.accounts/connect-azaccount). You can use these cmdlets or you can [update your modules](automation-update-azure-modules.md) in your Automation account to the latest versions. You might need to update your modules even if you have just created a new Automation account. Use of these cmdlets is not required if you are authenticating using a Run As account configured with a service principal.
289
+
> For non-graphical PowerShell runbooks, `Add-AzAccount` and `Add-AzureRMAccount` are aliases for [Connect-AzAccount](/powershell/module/az.accounts/connect-azaccount). You can use these cmdlets or you can [update your modules](automation-update-azure-modules.md) in your Automation account to the latest versions. You might need to update your modules even if you have just created a new Automation account.
290
290
291
291
For more information about checkpoints, see [Adding Checkpoints to a Script Workflow](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/jj574114(v=ws.11)).
@@ -22,9 +22,6 @@ The sample template does the following steps:
22
22
* Links the Automation account to the Log Analytics workspace.
23
23
* Adds sample Automation runbooks to the account.
24
24
25
-
> [!NOTE]
26
-
> Creation of the Automation Run As account is not supported when you're using an ARM template. To create a Run As account manually from the portal or with PowerShell, see [Create Run As account](create-run-as-account.md).
27
-
28
25
If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
Copy file name to clipboardExpand all lines: articles/automation/quickstarts/dsc-configuration.md
+2-3Lines changed: 2 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: This article helps you get started configuring an Azure VM with Des
4
4
services: automation
5
5
ms.subservice: dsc
6
6
keywords: dsc, configuration, automation
7
-
ms.date: 09/01/2021
7
+
ms.date: 04/12/2023
8
8
ms.topic: quickstart
9
9
ms.custom: mvc, mode-other
10
10
---
@@ -18,7 +18,6 @@ By enabling Azure Automation State Configuration, you can manage and monitor the
18
18
To complete this quickstart, you need:
19
19
20
20
* An Azure subscription. If you don't have an Azure subscription, [create a free account](https://azure.microsoft.com/free/).
21
-
* An Azure Automation account. For instructions on creating an Azure Automation Run As account, see [Azure Run As Account](../manage-runas-account.md).
22
21
* An Azure Resource Manager virtual machine running Red Hat Enterprise Linux, CentOS, or Oracle Linux. For instructions on creating a VM, see [Create your first Linux virtual machine in the Azure portal](../../virtual-machines/linux/quick-create-portal.md)
23
22
24
23
## Sign in to Azure
@@ -33,7 +32,7 @@ There are many different methods to enable a machine for Automation State Config
33
32
1. From the left pane of the Automation account, select **State configuration (DSC)**.
34
33
2. Click **Add** to open the **VM select** page.
35
34
3. Find the virtual machine for which to enable DSC. You can use the search field and filter options to find a specific virtual machine.
36
-
4. Click on the virtual machine, and then click **Connect**
35
+
4. Click on the virtual machine, and then click **Connect**.
37
36
5. Select the DSC settings appropriate for the virtual machine. If you have already prepared a configuration, you can specify it as `Node Configuration Name`. You can set the [configuration mode](/powershell/dsc/managing-nodes/metaConfig) to control the configuration behavior for the machine.
38
37
6. Click **OK**. While the DSC extension is deployed to the virtual machine, the status reported is `Connecting`.
Copy file name to clipboardExpand all lines: articles/automation/source-control-integration.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Use source control integration in Azure Automation
3
3
description: This article tells you how to synchronize Azure Automation source control with other repositories.
4
4
services: automation
5
5
ms.subservice: process-automation
6
-
ms.date: 11/22/2021
6
+
ms.date: 04/12/2023
7
7
ms.topic: conceptual
8
8
ms.custom: devx-track-azurepowershell
9
9
---
@@ -36,7 +36,10 @@ Azure Automation supports three types of source control:
36
36
>
37
37
> :::image type="content" source="./media/source-control-integration/user-assigned-managed-identity.png" alt-text="Screenshot that displays the user-assigned Managed Identity.":::
38
38
>
39
-
> If you have both a Run As account and managed identity enabled, then managed identity is given preference. If you want to use a Run As account instead, you can [create an Automation variable](./shared-resources/variables.md) of BOOLEAN type named `AUTOMATION_SC_USE_RUNAS` with a value of `true`.
39
+
> If you have both a Run As account and managed identity enabled, then managed identity is given preference.
40
+
41
+
> [!Important]
42
+
> Azure Automation Run As Account will retire on **September 30, 2023** and will be replaced with Managed Identities. Before that date, you need to [migrate from a Run As account to Managed identities](migrate-run-as-accounts-managed-identity.md).
40
43
41
44
> [!NOTE]
42
45
> According to [this](/azure/devops/organizations/accounts/change-application-access-policies?view=azure-devops#application-connection-policies) Azure DevOps documentation, **Third-party application access via OAuth** policy is defaulted to **off** for all new organizations. So if you try to configure source control in Azure Automation with **Azure Devops (Git)** as source control type without enabling **Third-party application access via OAuth** under Policies tile of Organization Settings in Azure DevOps then you might get **SourceControl securityToken is invalid** error. Hence to avoid this error, make sure you first enable **Third-party application access via OAuth** under Policies tile of Organization Settings in Azure DevOps.
0 commit comments