You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/communication-services/quickstarts/manage-teams-identity.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -107,7 +107,7 @@ The service principal of the Contoso application in the Fabrikam tenant is creat
107
107
You can see that the status of the Communication Services Teams.ManageCalls and Teams.ManageChats permissions are *Granted for {Directory_name}*.
108
108
109
109
110
-
If you run into the issue "The app is trying to access a service '1fd5118e-2576-4263-8130-9503064c837a'(Azure Communication Services) that your organization '{GUID}' lacks a service principal for. Contact your IT Admin to review the configuration of your service subscriptions or consent to the application to create the required service principal." your Microsoft Entra tenant lacks a service principal for the Azure Communication Services application. To fix this issue, use PowerShell as a Microsoft Entra administrator to connect to your tenant. Replace `Tenant_ID` with an ID of your Microsoft Entra tenancy.
110
+
If you run into the issue "The app is trying to access a service '00001111-aaaa-2222-bbbb-3333cccc4444'(Azure Communication Services) that your organization '{GUID}' lacks a service principal for. Contact your IT Admin to review the configuration of your service subscriptions or consent to the application to create the required service principal." your Microsoft Entra tenant lacks a service principal for the Azure Communication Services application. To fix this issue, use PowerShell as a Microsoft Entra administrator to connect to your tenant. Replace `Tenant_ID` with an ID of your Microsoft Entra tenancy.
111
111
112
112
You will require **Application.ReadWrite.All** as shown below.
## Assign an Admin user to the Project Synergy application
@@ -161,7 +161,7 @@ Do the following steps in the tenant that contains your Project Synergy applicat
161
161
1. Run the following PowerShell commands. These commands add the following roles for Azure Communications Gateway: `TrunkManagement.Read`, `TrunkManagement.Write`, `partnerSettings.Read`, `NumberManagement.Read`, `NumberManagement.Write`, `Data.Read`, `Data.Write`.
162
162
```powershell
163
163
# Get the Service Principal ID for Project Synergy (Operator Connect)
@@ -223,13 +223,13 @@ Go to the [Operator Connect homepage](https://operatorconnect.microsoft.com/) an
223
223
224
224
You must enable Azure Communications Gateway within the Operator Connect or Teams Phone Mobile environment. This process requires configuring your environment with two Application IDs:
225
225
- The Application ID of the system-assigned managed identity that you found in [Find the Application ID for your Azure Communication Gateway resource](#find-the-application-id-for-your-azure-communication-gateway-resource). This Application ID allows Azure Communications Gateway to use the roles that you set up in [Set up application roles for Azure Communications Gateway](#set-up-application-roles-for-azure-communications-gateway).
226
-
- A standard Application ID for an automatically created AzureCommunicationsGateway enterprise application. This ID is always `8502a0ec-c76d-412f-836c-398018e2312b`.
226
+
- A standard Application ID for an automatically created AzureCommunicationsGateway enterprise application. This ID is always `11112222-bbbb-3333-cccc-4444dddd5555`.
227
227
228
228
To add the Application IDs:
229
229
230
230
1. Log into the [Operator Connect portal](https://operatorconnect.microsoft.com/operator/configuration).
231
231
1. Add a new **Application Id** for the Application ID that you found for the managed identity.
232
-
1. Add a second **Application Id** for the value `8502a0ec-c76d-412f-836c-398018e2312b`.
232
+
1. Add a second **Application Id** for the value `11112222-bbbb-3333-cccc-4444dddd5555`.
233
233
234
234
## Register your deployment's domain name in Microsoft Entra
Copy file name to clipboardExpand all lines: articles/confidential-computing/quick-create-confidential-vm-azure-cli.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -86,15 +86,15 @@ To create a confidential [disk encryption set](/azure/virtual-machines/linux/dis
86
86
For this step you need to be a Global Admin or you need to have the User Access Administrator RBAC role. [Install Microsoft Graph SDK](/powershell/microsoftgraph/installation) to execute the commands below.
New-MgServicePrincipal -AppId bf7b6499-ff71-4aa2-97a4-f372087be7f0 -DisplayName "Confidential VM Orchestrator"
89
+
New-MgServicePrincipal -AppId 00001111-aaaa-2222-bbbb-3333cccc4444 -DisplayName "Confidential VM Orchestrator"
90
90
```
91
91
2. Create an Azure Key Vault using the [az keyvault create](/cli/azure/keyvault) command. For the pricing tier, select Premium (includes support for HSM backed keys). Make sure that you have an owner role in this key vault.
Copy file name to clipboardExpand all lines: articles/container-apps/manage-secrets.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -179,7 +179,7 @@ When you create a container app, secrets are defined using the `--secrets` param
179
179
180
180
- The parameter accepts a space-delimited set of name/value pairs.
181
181
- Each pair is delimited by an equals sign (`=`).
182
-
- To specify a Key Vault reference, use the format `<SECRET_NAME>=keyvaultref:<KEY_VAULT_SECRET_URI>,identityref:<MANAGED_IDENTITY_ID>`. For example, `queue-connection-string=keyvaultref:https://mykeyvault.vault.azure.net/secrets/queuereader,identityref:/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/my-resource-group/providers/Microsoft.ManagedIdentity/userAssignedIdentities/my-identity`.
182
+
- To specify a Key Vault reference, use the format `<SECRET_NAME>=keyvaultref:<KEY_VAULT_SECRET_URI>,identityref:<MANAGED_IDENTITY_ID>`. For example, `queue-connection-string=keyvaultref:https://mykeyvault.vault.azure.net/secrets/queuereader,identityref:/subscriptions/ffffffff-eeee-dddd-cccc-bbbbbbbbbbb0/resourcegroups/my-resource-group/providers/Microsoft.ManagedIdentity/userAssignedIdentities/my-identity`.
Copy file name to clipboardExpand all lines: articles/cost-management-billing/manage/assign-roles-azure-service-principals.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -72,10 +72,10 @@ Later in this article, you give permission to the Microsoft Entra app to act by
72
72
73
73
| Role | Actions allowed | Role definition ID |
74
74
| --- | --- | --- |
75
-
| EnrollmentReader | Enrollment readers can view data at the enrollment, department, and account scopes. The data contains charges for all of the subscriptions under the scopes, including across tenants. Can view the Azure Prepayment (previously called monetary commitment) balance associated with the enrollment. |24f8edb6-1668-4659-b5e2-40bb5f3a7d7e|
76
-
| EA purchaser | Purchase reservation orders and view reservation transactions. It has all the permissions of EnrollmentReader, which have all the permissions of DepartmentReader. It can view usage and charges across all accounts and subscriptions. Can view the Azure Prepayment (previously called monetary commitment) balance associated with the enrollment. |da6647fb-7651-49ee-be91-c43c4877f0c4|
75
+
| EnrollmentReader | Enrollment readers can view data at the enrollment, department, and account scopes. The data contains charges for all of the subscriptions under the scopes, including across tenants. Can view the Azure Prepayment (previously called monetary commitment) balance associated with the enrollment. |aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e|
76
+
| EA purchaser | Purchase reservation orders and view reservation transactions. It has all the permissions of EnrollmentReader, which have all the permissions of DepartmentReader. It can view usage and charges across all accounts and subscriptions. Can view the Azure Prepayment (previously called monetary commitment) balance associated with the enrollment. |bbbb1b1b-cc2c-dd3d-ee4e-ffffff5f5f5f|
77
77
| DepartmentReader | Download the usage details for the department they administer. Can view the usage and charges associated with their department. | db609904-a47f-4794-9be8-9bd86fbffd8a |
78
-
| SubscriptionCreator | Create new subscriptions in the given scope of Account. |a0bcee42-bf30-4d1b-926a-48d21664ef71|
78
+
| SubscriptionCreator | Create new subscriptions in the given scope of Account. |cccc2c2c-dd3d-ee4e-ff5f-aaaaaa6a6a6a|
79
79
80
80
- An EnrollmentReader role can be assigned to a service principal only by a user who has an enrollment writer role. The EnrollmentReader role assigned to a service principal isn't shown in the Azure portal. It gets created by programmatic means and is only for programmatic use.
81
81
- A DepartmentReader role can be assigned to a service principal only by a user who has an enrollment writer or department writer role.
@@ -110,11 +110,11 @@ A service principal can have only one role.
110
110
| --- | --- |
111
111
|`properties.principalId`| It's the value of Object ID. See [Find your service principal and tenant IDs](#find-your-service-principal-and-tenant-ids). |
112
112
|`properties.principalTenantId`| See [Find your service principal and tenant IDs](#find-your-service-principal-and-tenant-ids). |
## Assign the department reader role to the service principal
134
134
@@ -204,11 +204,11 @@ Now you can use the service principal to automatically access EA APIs. The servi
204
204
| --- | --- |
205
205
|`properties.principalId`| It's the value of Object ID. See [Find your service principal and tenant IDs](#find-your-service-principal-and-tenant-ids). |
206
206
|`properties.principalTenantId`| See [Find your service principal and tenant IDs](#find-your-service-principal-and-tenant-ids). |
0 commit comments