Skip to content

Commit 4ee2e35

Browse files
committed
added info
1 parent 0f1a7e3 commit 4ee2e35

File tree

6 files changed

+54
-6
lines changed

6 files changed

+54
-6
lines changed

articles/automation/automation-managed-identity-faq.md

Lines changed: 17 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,14 +15,29 @@ This Microsoft FAQ is a list of commonly asked questions when you're migrating f
1515

1616
## How long will you support Run As account?
1717

18-
Automation Run As account will be supported for the next one year until **September 30, 2023**. While we continue to support existing users, we recommend all new users to use Managed identities as the preferred way of runbook authentication. Existing users can still create the Run As account, see the account properties and renew the certificate upon expiration till **May 30, 2023**. After this date, you won't be able to create a Run As account from the Azure portal. You will still be able to create a Run As account through [PowerShell script](/azure/automation/create-run-as-account#create-account-using-powershell) until the supported time of one year.
18+
Automation Run As account will be supported for the next one year until **September 30, 2023**. While we continue to support existing users, we recommend all new users to use Managed identities as the preferred way of runbook authentication. Existing users can still create the Run As account, see the account properties and renew the certificate upon expiration till **January 30, 2023**. After this date, you won't be able to create a Run As account from the Azure portal. You will still be able to create a Run As account through [PowerShell script](/azure/automation/create-run-as-account#create-account-using-powershell) until the supported time of one year. You can [use this script](/script) to renew the certificate post **January 30, 2023** until **September 30, 2023**.
19+
20+
21+
## Will existing runbooks that use the Run As account be able to authenticate?
22+
Yes, they will be able to authenticate and there will be no impact to the existing runbooks using Run As account.
23+
24+
## How can I renew the existing Run as accounts post January 30, 2023 when portal support to renew the account to removed?
25+
You can [use this script](/script) to renew the Run As account certificate post January 30, 2023 until September 30, 2023.
26+
27+
## Can Run As account still be created post September 30, 2023 when Run As account will retire?
28+
Yes, you can still create the Run As account using the [PowerShell script](/script) However, this would be an unsupported scenario.
29+
30+
## Can Run As accounts still be renewed post September 30, 2023 when Run As account will retire?
31+
You can [use this script](/script) to renew the Run As account certificate post September 30, 2023 when Run As account will retire. However, it would be an unsupported scenario.
32+
33+
## Will the runbooks that still use the Run As account be able to authenticate even after September 30, 2023?
34+
Yes, the runbooks will be able to authenticate until the Run As account certificate expires.
1935

2036
## What is Managed Identity?
2137
Managed identities provide an automatically managed identity in Azure Active Directory for applications to use when connecting to resources that support Azure Active Directory (Azure AD) authentication. Applications can use managed identities to obtain Azure AD tokens without managing credentials, secrets, certificates or keys.
2238

2339
For more information about managed identities in Azure AD, see [Managed identities for Azure resources](/azure/active-directory/managed-identities-azure-resources/overview).
2440

25-
2641
## What can I do with a Managed identity in Automation accounts?
2742
An Azure Automation managed identity from Azure Active Directory (Azure AD) allows your runbook to access other Azure AD-protected resources easily. This identity is managed by the Azure platform and doesn't require you to provision or rotate any secrets. Key benefits are:
2843
- You can use managed identities to authenticate to any Azure service that supports Azure AD authentication.
51 KB
Loading
51 KB
Loading
74.5 KB
Loading
74.5 KB
Loading

articles/automation/migrate-run-as-accounts-managed-identity.md

Lines changed: 37 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,9 +13,11 @@ ms.custom: devx-track-azurepowershell
1313
> [!IMPORTANT]
1414
> Azure Automation Run As Account will retire on **September 30, 2023**, and there will be no support provided beyond this date. From now through **September 30, 2023**, you can continue to use the Azure Automation Run As Account. However, we recommend you to transition to [managed identities](/automation-security-overview.md#managed-identities) before **September 30, 2023**. See the official announcement here.
1515
16+
See the [frequently asked questions](/automation/automation-managed-identity.md) for more information about migration cadence and support timeline for Run As account creation and certificate renewal.
17+
1618
Run As accounts in Azure Automation provide authentication for managing Azure Resource Manager resources or resources deployed on the classic deployment model. Whenever a Run As account is created, an Azure AD application is registered, and a self-signed certificate will be generated which will be valid for one year. This adds an overhead of renewing the certificate every year before it expires to prevent the Automation account to stop working.
1719

18-
Automation accounts can now be configured to use [Managed Identity](/automation/automation-security-overview#managed-identities) which is the default option when an Automation account is created. With this feature, Automation account can authenticate to Azure resources without the need to exchange any credentials, hence removing the overhead of renewing the certificate or managing the service principal.
20+
Automation accounts can now be configured to use [Managed Identity](/automation/automation-security-overview.md#managed-identities) which is the default option when an Automation account is created. With this feature, Automation account can authenticate to Azure resources without the need to exchange any credentials, hence removing the overhead of renewing the certificate or managing the service principal.
1921

2022
Managed identity can be [system assigned]( /automation/enable-managed-identity-or-automation) or [user assigned](/automation/add-user-assigned-identity). However, when a new Automation account is created, a system assigned managed identity is enabled.
2123

@@ -154,8 +156,42 @@ foreach ($ResourceGroup in $ResourceGroups)
154156
```
155157
---
156158

159+
## Graphical runbooks
160+
161+
You can test the managed identity to verify if the Graphical runbook is working as expected by creating a copy of your production runbook to use the managed identity and updating your test graphical runbook code to authenticate by using the managed identity. You can add this functionality to a graphical runbook by adding `Connect-AzAccount` cmdlet.
162+
163+
To ensure that a graphical runbook that uses Run As account use managed identities, you must replace, Run As connection that uses `AzureRunAsConnection`
164+
and connection asset that internally uses PowerShell `Get-AutomationConnection` cmdlet.
165+
166+
:::image type="content" source="./media/migrate-run-as-account-managed-identity/edit-graphical-runbook-inline.png" alt-text="Screenshot of edit graphical runbook." lightbox="./media/migrate-run-as-account-managed-identity/edit-graphical-expanded.png":::
167+
168+
169+
Activity to connect to Azure that uses `Connect-AzAccount` to add the authenticated Run As account for use in the runbook with `Connect-AzAccount` activity from the `Az.Accounts` cmdlet that uses the PowerShell code to connect to identity.
170+
171+
:::image type="content" source="./media/migrate-run-as-account-managed-identity/add-functionality-inline.png" alt-text="Screenshot of add functionality to graphical runbook." lightbox="./media/migrate-run-as-account-managed-identity/add-functionality-expanded.png":::
172+
173+
174+
```powershell-interactive
175+
try
176+
{
177+
Write-Output ("Logging in to Azure...")
178+
Connect-AzAccount -Identity
179+
}
180+
catch {
181+
Write-Error -Message $_.Exception
182+
throw $_.Exception
183+
}
184+
```
185+
186+
For example, in the runbook `Start Azure V2 VMs` in the runbook gallery, you must replace `Get Run As Connection` and `Connect to Azure` activities with `Connect-AzAccount` cmdlet activity.
187+
188+
For more information, see sample runbook name *AzureAutomationTutorialWithIdentityGraphical* that you created with the Automation account.
189+
190+
157191
## Next steps
158192

193+
- Review the Frequently asked questions for [Migrating to Managed Identities](automation-managed-identity-faq.md).
194+
159195
- If your runbooks aren't completing successfully, review [Troubleshoot Azure Automation managed identity issues](troubleshoot/managed-identity.md).
160196

161197
- Learn more about system assigned managed identity, see [Using a system-assigned managed identity for an Azure Automation account](enable-managed-identity-for-automation.md)
@@ -164,7 +200,4 @@ foreach ($ResourceGroup in $ResourceGroups)
164200

165201
- For an overview of Azure Automation account security, see [Automation account authentication overview](automation-security-overview.md).
166202

167-
- Review the Frequently asked questions for [Migrating to Managed Identities](automation-managed-identity-faq.md).
168-
169-
170203

0 commit comments

Comments
 (0)