You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/devices/howto-vm-sign-in-azure-ad-linux.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -231,7 +231,7 @@ az role assignment create \
231
231
```
232
232
233
233
> [!NOTE]
234
-
> If your Azure AD domain and logon username domain don't match, you must specify the object ID of your user account by using `--assignee-object-id`, not just the username for `--assignee`. You can obtain the object ID for your user account by using [az ad user list](/cli/azure/ad/user#az-ad-user-list).
234
+
> If your Azure AD domain and login username domain don't match, you must specify the object ID of your user account by using `--assignee-object-id`, not just the username for `--assignee`. You can obtain the object ID for your user account by using [az ad user list](/cli/azure/ad/user#az-ad-user-list).
235
235
236
236
For more information on how to use Azure RBAC to manage access to your Azure subscription resources, see [Steps to assign an Azure role](../../role-based-access-control/role-assignments-steps.md).
237
237
@@ -262,7 +262,7 @@ You can enforce Conditional Access policies that are enabled with Azure AD login
262
262
The application that appears in the Conditional Access policy is called *Azure Linux VM Sign-In*.
263
263
264
264
> [!NOTE]
265
-
> Conditional Access policy enforcement that requires device compliance or hybrid Azure AD join on the device running the SSH client works only with the Azure CLI running on Windows and macOS. It's not supported when you're using the Azure CLI on Linux or Azure Cloud Shell.
265
+
> Conditional Access policy enforcement that requires device compliance or hybrid Azure AD join on the device that's running the SSH client works only with the Azure CLI that's running on Windows and macOS. It's not supported when you're using the Azure CLI on Linux or Azure Cloud Shell.
266
266
267
267
### Missing application
268
268
@@ -326,7 +326,7 @@ az ssh vm -n myVM -g AzureADLinuxVM
326
326
327
327
## Log in by using the Azure AD service principal to SSH into the Linux VM
328
328
329
-
The Azure CLI supports authenticating with a service principal instead of a user account. Because service principals are account not tied to any particular user, customers can use them to SSH into a VM to support any automation scenarios they might have. The service principal must have VM Administrator or VM User rights assigned. Assign permissions at the subscription or resource group level.
329
+
The Azure CLI supports authenticating with a service principal instead of a user account. Because service principals aren't tied to any particular user, customers can use them to SSH into a VM to support any automation scenarios they might have. The service principal must have VM Administrator or VM User rights assigned. Assign permissions at the subscription or resource group level.
330
330
331
331
The following example will assign VM Administrator rights to the service principal at the resource group level. Replace the placeholders for service principal object ID, subscription ID, and resource group name.
332
332
@@ -508,7 +508,7 @@ Upgrading scale set instances to the latest model might resolve the problem, esp
508
508
509
509
### AllowGroups or DenyGroups statements in sshd_config cause the first login to fail for Azure AD users
510
510
511
-
If *sshd_config* contains either `AllowGroups` or `DenyGroups` statements, the first login fails for Azure AD users. If the statement was added after users already has a successful login, they can log in.
511
+
If *sshd_config* contains either `AllowGroups` or `DenyGroups` statements, the first login fails for Azure AD users. If the statement was added after users have already had a successful login, they can log in.
512
512
513
513
One solution is to remove `AllowGroups` and `DenyGroups` statements from *sshd_config*.
0 commit comments