Skip to content

Commit 3b915ff

Browse files
rmca14CelesteDG
andauthored
Apply suggestions from code review
Per request of @CelesteDG, acepting suggestions. Co-authored-by: Celeste de Guzman <[email protected]>
1 parent 7f34e99 commit 3b915ff

7 files changed

+17
-17
lines changed

includes/azure-stack-edge-gateway-deploy-virtual-machine-prerequisites.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,15 +30,15 @@ Make sure that you can use the following steps to access the device from your cl
3030
### [Az](#tab/Az)
3131
3232
```powershell
33-
login-AzAccount -EnvironmentName <Environment Name> -TenantId aaaabbbb-0000-cccc-1111-dddd2222eeee
33+
login-AzAccount -EnvironmentName <Environment Name> -TenantId c0257de7-538f-415c-993a-1b87a031879d
3434
```
3535
3636
To connect via Azure Resource Manager, provide the username *EdgeArmUser* and your password.
3737
3838
### [AzureRM](#tab/AzureRM)
3939
4040
```powershell
41-
login-AzureRMAccount -EnvironmentName <Environment Name> -TenantId aaaabbbb-0000-cccc-1111-dddd2222eeee
41+
login-AzureRMAccount -EnvironmentName <Environment Name> -TenantId c0257de7-538f-415c-993a-1b87a031879d
4242
```
4343
4444
To connect via Azure Resource Manager, provide the username *EdgeArmUser* and your password.

includes/azure-stack-edge-gateway-verify-azure-resource-manager-connection.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,13 +15,13 @@ Verify that your client can connect to the local Azure Resource Manager.
1515
### [Az](#tab/az)
1616

1717
```powershell
18-
login-AzAccount -EnvironmentName <Environment Name> -TenantId aaaabbbb-0000-cccc-1111-dddd2222eeee
18+
login-AzAccount -EnvironmentName <Environment Name> -TenantId c0257de7-538f-415c-993a-1b87a031879d
1919
```
2020
2121
### [AzureRM](#tab/azure-rm)
2222
2323
```powershell
24-
login-AzureRMAccount -EnvironmentName <Environment Name> -TenantId aaaabbbb-0000-cccc-1111-dddd2222eeee
24+
login-AzureRMAccount -EnvironmentName <Environment Name> -TenantId c0257de7-538f-415c-993a-1b87a031879d
2525
```
2626
2727
1. Provide the username `EdgeArmUser` and the password to connect via Azure Resource Manager. If you do not recall the password, [Reset the password for Azure Resource Manager](../articles/databox-online/azure-stack-edge-gpu-set-azure-resource-manager-password.md) and use this password to sign in.

includes/openvpn-azure-ad-tenant-multi-app.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -55,19 +55,19 @@ Register the VPN client in the Microsoft Entra tenant.
5555
Azure Government
5656
5757
```
58-
https://login.microsoftonline.us/common/oauth2/authorize?client_id=00001111-aaaa-2222-bbbb-3333cccc4444&response_type=code&redirect_uri=https://portal.azure.us&nonce=1234&prompt=admin_consent
58+
https://login.microsoftonline.us/common/oauth2/authorize?client_id=51bb15d4-3a4f-4ebf-9dca-40096fe32426&response_type=code&redirect_uri=https://portal.azure.us&nonce=1234&prompt=admin_consent
5959
````
6060
6161
Microsoft Cloud Germany
6262
6363
```
64-
https://login-us.microsoftonline.de/common/oauth2/authorize?client_id=11112222-bbbb-3333-cccc-4444dddd5555&response_type=code&redirect_uri=https://portal.microsoftazure.de&nonce=1234&prompt=admin_consent
64+
https://login-us.microsoftonline.de/common/oauth2/authorize?client_id=538ee9e6-310a-468d-afef-ea97365856a9&response_type=code&redirect_uri=https://portal.microsoftazure.de&nonce=1234&prompt=admin_consent
6565
````
6666
6767
Microsoft Azure operated by 21Vianet
6868
6969
```
70-
https://login.chinacloudapi.cn/common/oauth2/authorize?client_id=22223333-cccc-4444-dddd-5555eeee6666&response_type=code&redirect_uri=https://portal.azure.cn&nonce=1234&prompt=admin_consent
70+
https://login.chinacloudapi.cn/common/oauth2/authorize?client_id=49f817b6-84ae-4cc0-928c-73f27289b3aa&response_type=code&redirect_uri=https://portal.azure.cn&nonce=1234&prompt=admin_consent
7171
```
7272
7373
> [!NOTE]
@@ -111,9 +111,9 @@ In this step, you register additional applications for various users and groups.
111111
7. Click **Expose an API** then **+ Add a client application**. For **Client ID**, enter the following values depending on the cloud:
112112
113113
- Enter **41b23e61-6c1e-4545-b367-cd054e0ed4b4** for Azure **Public**
114-
- Enter **00001111-aaaa-2222-bbbb-3333cccc4444** for Azure **Government**
115-
- Enter **11112222-bbbb-3333-cccc-4444dddd5555** for Azure **Germany**
116-
- Enter **22223333-cccc-4444-dddd-5555eeee6666** for Azure **China 21Vianet**
114+
- Enter **51bb15d4-3a4f-4ebf-9dca-40096fe32426** for Azure **Government**
115+
- Enter **538ee9e6-310a-468d-afef-ea97365856a9** for Azure **Germany**
116+
- Enter **49f817b6-84ae-4cc0-928c-73f27289b3aa** for Azure **China 21Vianet**
117117
118118
8. Click **Add application**.
119119

includes/vpn-gateway-custom-audience-change.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ In the following steps, you add another authorized client application using the
1919

2020
:::image type="content" source="./media/vpn-gateway-custom-audience-change/change-add-client.png" alt-text="Screenshot shows the Expose an API page with Add a client application highlighted." lightbox="./media/vpn-gateway-custom-audience-change/change-add-client.png":::
2121
1. Select **+ Add a client application**.
22-
1. On the **Add a client application** pane, for **Client ID**, use the Azure Public Application ID for the Microsoft-registered Azure VPN Client app, `00001111-aaaa-2222-bbbb-3333cccc4444`.
22+
1. On the **Add a client application** pane, for **Client ID**, use the Azure Public Application ID for the Microsoft-registered Azure VPN Client app, `c632b3df-fb67-4d84-bdcf-b95ad541b5c8`.
2323
1. Make sure **Authorized scopes** is selected. Then, click **Add application**.
2424
1. On the **Expose an API** page, you'll now see both Client ID values listed. If you want to delete the previous version, click the value to open the **Edit a client application** page, and click **Delete**.
2525
1. On the **Overview** page, notice that the values haven't changed. If you've already configured your gateway and clients using the custom Application (client) ID shown for the gateway **Audience ID** field and your clients are already configured to use this custom value, you don't need to make any additional changes.

includes/vpn-gateway-custom-audience.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ In this section, you associate the Microsoft-registered Azure VPN Client applica
5858
1. On the **Expose an API** page, select **+ Add a client application**.
5959

6060
:::image type="content" source="./media/vpn-gateway-custom-audience/add-client-application.png" alt-text="Screenshot shows the Add a client application selected." lightbox="./media/vpn-gateway-custom-audience/add-client-application.png":::
61-
1. On the **Add a client application** pane, for **Client ID**, use the Azure Public Application ID for the Microsoft-registered Azure VPN Client app, `00001111-aaaa-2222-bbbb-3333cccc4444` unless you know you need a different value.
61+
1. On the **Add a client application** pane, for **Client ID**, use the Azure Public Application ID for the Microsoft-registered Azure VPN Client app, `c632b3df-fb67-4d84-bdcf-b95ad541b5c8` unless you know you need a different value.
6262

6363
:::image type="content" source="./media/vpn-gateway-custom-audience/authorized-scopes.png" alt-text="Screenshot shows the add a client application pane." lightbox="./media/vpn-gateway-custom-audience/authorized-scopes.png":::
6464
1. Make sure **Authorized scopes** is selected.

includes/vpn-gateway-entra-vpn-client-custom.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.topic: include
1313
> This step is necessary for P2S gateway configurations that use a custom audience value and your registered app is associated with the [Microsoft-registered Azure VPN Client app ID](../articles/vpn-gateway/point-to-site-entra-gateway.md). If this doesn't apply to your P2S gateway configuration, you can skip this step.
1414
1515
1. To modify the Azure VPN Client configuration .xml file, open the file using a text editor such as Notepad.
16-
1. Next, add the value for **applicationid** and save your changes. The following example shows the application ID value for ```00001111-aaaa-2222-bbbb-3333cccc4444```.
16+
1. Next, add the value for **applicationid** and save your changes. The following example shows the application ID value for ```c632b3df-fb67-4d84-bdcf-b95ad541b5c8```.
1717

1818
**Example**
1919

@@ -22,6 +22,6 @@ ms.topic: include
2222
<audience>{customAudienceID}</audience>
2323
<issuer>https://sts.windows.net/{tenant ID value}/</issuer>
2424
<tenant>https://login.microsoftonline.com/{tenant ID value}/</tenant>
25-
<applicationid>00001111-aaaa-2222-bbbb-3333cccc4444</applicationid>
25+
<applicationid>c632b3df-fb67-4d84-bdcf-b95ad541b5c8</applicationid>
2626
</aad>
2727
```

includes/vpn-gateway-vwan-azure-ad-tenant.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,19 +20,19 @@
2020
Azure Government
2121
2222
```
23-
https://login.microsoftonline.us/common/oauth2/authorize?client_id=00001111-aaaa-2222-bbbb-3333cccc4444&response_type=code&redirect_uri=https://portal.azure.us&nonce=1234&prompt=admin_consent
23+
https://login.microsoftonline.us/common/oauth2/authorize?client_id=51bb15d4-3a4f-4ebf-9dca-40096fe32426&response_type=code&redirect_uri=https://portal.azure.us&nonce=1234&prompt=admin_consent
2424
````
2525
2626
Microsoft Cloud Germany
2727
2828
```
29-
https://login-us.microsoftonline.de/common/oauth2/authorize?client_id=11112222-bbbb-3333-cccc-4444dddd5555&response_type=code&redirect_uri=https://portal.microsoftazure.de&nonce=1234&prompt=admin_consent
29+
https://login-us.microsoftonline.de/common/oauth2/authorize?client_id=538ee9e6-310a-468d-afef-ea97365856a9&response_type=code&redirect_uri=https://portal.microsoftazure.de&nonce=1234&prompt=admin_consent
3030
````
3131
3232
Microsoft Azure operated by 21Vianet
3333
3434
```
35-
https://login.chinacloudapi.cn/common/oauth2/authorize?client_id=22223333-cccc-4444-dddd-5555eeee6666&response_type=code&redirect_uri=https://portal.azure.cn&nonce=1234&prompt=admin_consent
35+
https://login.chinacloudapi.cn/common/oauth2/authorize?client_id=49f817b6-84ae-4cc0-928c-73f27289b3aa&response_type=code&redirect_uri=https://portal.azure.cn&nonce=1234&prompt=admin_consent
3636
```
3737
3838
> [!NOTE]

0 commit comments

Comments
 (0)