Skip to content

Commit 5272e60

Browse files
authored
Merge pull request #288622 from meganbradley/meganbradley/docutune-autopr-20241017-141414-2380127-ignore-build
[BULK] - DocuTune remediation - Sensitive terms with GUIDs (part 11)
2 parents fdb6b63 + da80bed commit 5272e60

20 files changed

+163
-163
lines changed

articles/communication-services/quickstarts/manage-teams-identity.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ The service principal of the Contoso application in the Fabrikam tenant is creat
107107
You can see that the status of the Communication Services Teams.ManageCalls and Teams.ManageChats permissions are *Granted for {Directory_name}*.
108108

109109

110-
If you run into the issue "The app is trying to access a service '1fd5118e-2576-4263-8130-9503064c837a'(Azure Communication Services) that your organization '{GUID}' lacks a service principal for. Contact your IT Admin to review the configuration of your service subscriptions or consent to the application to create the required service principal." your Microsoft Entra tenant lacks a service principal for the Azure Communication Services application. To fix this issue, use PowerShell as a Microsoft Entra administrator to connect to your tenant. Replace `Tenant_ID` with an ID of your Microsoft Entra tenancy.
110+
If you run into the issue "The app is trying to access a service '00001111-aaaa-2222-bbbb-3333cccc4444'(Azure Communication Services) that your organization '{GUID}' lacks a service principal for. Contact your IT Admin to review the configuration of your service subscriptions or consent to the application to create the required service principal." your Microsoft Entra tenant lacks a service principal for the Azure Communication Services application. To fix this issue, use PowerShell as a Microsoft Entra administrator to connect to your tenant. Replace `Tenant_ID` with an ID of your Microsoft Entra tenancy.
111111

112112
You will require **Application.ReadWrite.All** as shown below.
113113

@@ -125,7 +125,7 @@ Install-Module Microsoft.Graph
125125
Then execute the following command to add a service principal to your tenant. Do not modify the GUID of the App ID.
126126

127127
```script
128-
New-MgServicePrincipal -AppId "1fd5118e-2576-4263-8130-9503064c837a"
128+
New-MgServicePrincipal -AppId "00001111-aaaa-2222-bbbb-3333cccc4444"
129129
```
130130

131131

articles/communication-services/quickstarts/sms/receive-sms.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ The `SMSReceived` event generated when an SMS is sent to an Azure Communication
2727
```json
2828
[{
2929
"id": "Incoming_20200918002745d29ebbea-3341-4466-9690-0a03af35228e",
30-
"topic": "/subscriptions/50ad1522-5c2c-4d9a-a6c8-67c11ecb75b8/resourcegroups/acse2e/providers/microsoft.communication/communicationservices/{communication-services-resource-name}",
30+
"topic": "/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourcegroups/acse2e/providers/microsoft.communication/communicationservices/{communication-services-resource-name}",
3131
"subject": "/phonenumber/15555555555",
3232
"data": {
3333
"MessageId": "Incoming_20200918002745d29ebbea-3341-4466-9690-0a03af35228e",

articles/communications-gateway/connect-operator-connect.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ To add the Project Synergy application:
9090
1. Run the following cmdlet, replacing *`<TenantID>`* with the tenant ID you noted down in step 5.
9191
```powershell
9292
Connect-AzureAD -TenantId "<TenantID>"
93-
New-AzureADServicePrincipal -AppId eb63d611-525e-4a31-abd7-0cb33f679599 -DisplayName "Operator Connect"
93+
New-AzureADServicePrincipal -AppId 00001111-aaaa-2222-bbbb-3333cccc4444 -DisplayName "Operator Connect"
9494
```
9595
9696
## Assign an Admin user to the Project Synergy application
@@ -161,7 +161,7 @@ Do the following steps in the tenant that contains your Project Synergy applicat
161161
1. Run the following PowerShell commands. These commands add the following roles for Azure Communications Gateway: `TrunkManagement.Read`, `TrunkManagement.Write`, `partnerSettings.Read`, `NumberManagement.Read`, `NumberManagement.Write`, `Data.Read`, `Data.Write`.
162162
```powershell
163163
# Get the Service Principal ID for Project Synergy (Operator Connect)
164-
$projectSynergyApplicationId = "eb63d611-525e-4a31-abd7-0cb33f679599"
164+
$projectSynergyApplicationId = "00001111-aaaa-2222-bbbb-3333cccc4444"
165165
$projectSynergyEnterpriseApplication = Get-MgServicePrincipal -Filter "AppId eq '$projectSynergyApplicationId'" # "Application.Read.All"
166166
167167
# Required Operator Connect - Project Synergy Roles
@@ -170,7 +170,7 @@ Do the following steps in the tenant that contains your Project Synergy applicat
170170
$partnerSettingsRead = "d6b0de4a-aab5-4261-be1b-0e1800746fb2"
171171
$numberManagementRead = "130ecbe2-d1e6-4bbd-9a8d-9a7a909b876e"
172172
$numberManagementWrite = "752b4e79-4b85-4e33-a6ef-5949f0d7d553"
173-
$dataRead = "eb63d611-525e-4a31-abd7-0cb33f679599"
173+
$dataRead = "00001111-aaaa-2222-bbbb-3333cccc4444"
174174
$dataWrite = "98d32f93-eaa7-4657-b443-090c23e69f27"
175175
$requiredRoles = $trunkManagementRead, $trunkManagementWrite, $partnerSettingsRead, $numberManagementRead, $numberManagementWrite, $dataRead, $dataWrite
176176
@@ -223,13 +223,13 @@ Go to the [Operator Connect homepage](https://operatorconnect.microsoft.com/) an
223223
224224
You must enable Azure Communications Gateway within the Operator Connect or Teams Phone Mobile environment. This process requires configuring your environment with two Application IDs:
225225
- The Application ID of the system-assigned managed identity that you found in [Find the Application ID for your Azure Communication Gateway resource](#find-the-application-id-for-your-azure-communication-gateway-resource). This Application ID allows Azure Communications Gateway to use the roles that you set up in [Set up application roles for Azure Communications Gateway](#set-up-application-roles-for-azure-communications-gateway).
226-
- A standard Application ID for an automatically created AzureCommunicationsGateway enterprise application. This ID is always `8502a0ec-c76d-412f-836c-398018e2312b`.
226+
- A standard Application ID for an automatically created AzureCommunicationsGateway enterprise application. This ID is always `11112222-bbbb-3333-cccc-4444dddd5555`.
227227
228228
To add the Application IDs:
229229
230230
1. Log into the [Operator Connect portal](https://operatorconnect.microsoft.com/operator/configuration).
231231
1. Add a new **Application Id** for the Application ID that you found for the managed identity.
232-
1. Add a second **Application Id** for the value `8502a0ec-c76d-412f-836c-398018e2312b`.
232+
1. Add a second **Application Id** for the value `11112222-bbbb-3333-cccc-4444dddd5555`.
233233
234234
## Register your deployment's domain name in Microsoft Entra
235235

articles/confidential-computing/quick-create-confidential-vm-arm.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -170,7 +170,7 @@ Use this example to create a custom parameter file for a Linux-based confidentia
170170
171171
```Powershell
172172
Connect-Graph -Tenant "your tenant ID" Application.ReadWrite.All
173-
New-MgServicePrincipal -AppId bf7b6499-ff71-4aa2-97a4-f372087be7f0 -DisplayName "Confidential VM Orchestrator"
173+
New-MgServicePrincipal -AppId 00001111-aaaa-2222-bbbb-3333cccc4444 -DisplayName "Confidential VM Orchestrator"
174174
```
175175
176176
1. Set up your Azure key vault. For how to use an Azure Key Vault Managed HSM instead, see the next step.
@@ -194,7 +194,7 @@ Use this example to create a custom parameter file for a Linux-based confidentia
194194
1. Give `Confidential VM Orchestrator` permissions to `get` and `release` the key vault.
195195
196196
```azurecli-interactive
197-
$cvmAgent = az ad sp show --id "bf7b6499-ff71-4aa2-97a4-f372087be7f0" | Out-String | ConvertFrom-Json
197+
$cvmAgent = az ad sp show --id "00001111-aaaa-2222-bbbb-3333cccc4444" | Out-String | ConvertFrom-Json
198198
az keyvault set-policy --name $KeyVault --object-id $cvmAgent.Id --key-permissions get release
199199
```
200200
@@ -210,7 +210,7 @@ Use this example to create a custom parameter file for a Linux-based confidentia
210210
1. Give `Confidential VM Orchestrator` permissions to managed HSM.
211211
212212
```azurecli-interactive
213-
$cvmAgent = az ad sp show --id "bf7b6499-ff71-4aa2-97a4-f372087be7f0" | Out-String | ConvertFrom-Json
213+
$cvmAgent = az ad sp show --id "00001111-aaaa-2222-bbbb-3333cccc4444" | Out-String | ConvertFrom-Json
214214
az keyvault role assignment create --hsm-name $hsm --assignee $cvmAgent.Id --role "Managed HSM Crypto Service Release User" --scope /keys/$KeyName
215215
```
216216

articles/confidential-computing/quick-create-confidential-vm-azure-cli.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -86,15 +86,15 @@ To create a confidential [disk encryption set](/azure/virtual-machines/linux/dis
8686
For this step you need to be a Global Admin or you need to have the User Access Administrator RBAC role. [Install Microsoft Graph SDK](/powershell/microsoftgraph/installation) to execute the commands below.
8787
```Powershell
8888
Connect-Graph -Tenant "your tenant ID" Application.ReadWrite.All
89-
New-MgServicePrincipal -AppId bf7b6499-ff71-4aa2-97a4-f372087be7f0 -DisplayName "Confidential VM Orchestrator"
89+
New-MgServicePrincipal -AppId 00001111-aaaa-2222-bbbb-3333cccc4444 -DisplayName "Confidential VM Orchestrator"
9090
```
9191
2. Create an Azure Key Vault using the [az keyvault create](/cli/azure/keyvault) command. For the pricing tier, select Premium (includes support for HSM backed keys). Make sure that you have an owner role in this key vault.
9292
```azurecli-interactive
9393
az keyvault create -n keyVaultName -g myResourceGroup --enabled-for-disk-encryption true --sku premium --enable-purge-protection true --enable-rbac-authorization false
9494
```
9595
3. Give `Confidential VM Orchestrator` permissions to `get` and `release` the key vault.
9696
```Powershell
97-
$cvmAgent = az ad sp show --id "bf7b6499-ff71-4aa2-97a4-f372087be7f0" | Out-String | ConvertFrom-Json
97+
$cvmAgent = az ad sp show --id "00001111-aaaa-2222-bbbb-3333cccc4444" | Out-String | ConvertFrom-Json
9898
az keyvault set-policy --name keyVaultName --object-id $cvmAgent.Id --key-permissions get release
9999
```
100100
4. Create a key in the key vault using [az keyvault key create](/cli/azure/keyvault). For the key type, use RSA-HSM.

articles/confidential-computing/quick-create-confidential-vm-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ You can use the Azure portal to create a [confidential VM](confidential-vm-overv
2222

2323
```Powershell
2424
Connect-Graph -Tenant "your tenant ID" Application.ReadWrite.All
25-
New-MgServicePrincipal -AppId bf7b6499-ff71-4aa2-97a4-f372087be7f0 -DisplayName "Confidential VM Orchestrator"
25+
New-MgServicePrincipal -AppId 00001111-aaaa-2222-bbbb-3333cccc4444 -DisplayName "Confidential VM Orchestrator"
2626
```
2727
2828
## Create confidential VM

articles/connectors/connectors-integrate-security-operations-create-api-microsoft-graph-security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ To learn more about Microsoft Graph Security, see the [Microsoft Graph Security
3737
| Property | Value |
3838
|----------|-------|
3939
| **Application Name** | `MicrosoftGraphSecurityConnector` |
40-
| **Application ID** | `c4829704-0edc-4c3d-a347-7c4a67586f3c` |
40+
| **Application ID** | `00001111-aaaa-2222-bbbb-3333cccc4444` |
4141
|||
4242

4343
To grant consent for the connector, your Microsoft Entra tenant administrator can follow either these steps:

articles/container-apps/manage-secrets.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -179,7 +179,7 @@ When you create a container app, secrets are defined using the `--secrets` param
179179

180180
- The parameter accepts a space-delimited set of name/value pairs.
181181
- Each pair is delimited by an equals sign (`=`).
182-
- To specify a Key Vault reference, use the format `<SECRET_NAME>=keyvaultref:<KEY_VAULT_SECRET_URI>,identityref:<MANAGED_IDENTITY_ID>`. For example, `queue-connection-string=keyvaultref:https://mykeyvault.vault.azure.net/secrets/queuereader,identityref:/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/my-resource-group/providers/Microsoft.ManagedIdentity/userAssignedIdentities/my-identity`.
182+
- To specify a Key Vault reference, use the format `<SECRET_NAME>=keyvaultref:<KEY_VAULT_SECRET_URI>,identityref:<MANAGED_IDENTITY_ID>`. For example, `queue-connection-string=keyvaultref:https://mykeyvault.vault.azure.net/secrets/queuereader,identityref:/subscriptions/ffffffff-eeee-dddd-cccc-bbbbbbbbbbb0/resourcegroups/my-resource-group/providers/Microsoft.ManagedIdentity/userAssignedIdentities/my-identity`.
183183

184184
```azurecli-interactive
185185
az containerapp create \

articles/cost-management-billing/manage/assign-roles-azure-service-principals.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -72,10 +72,10 @@ Later in this article, you give permission to the Microsoft Entra app to act by
7272

7373
| Role | Actions allowed | Role definition ID |
7474
| --- | --- | --- |
75-
| EnrollmentReader | Enrollment readers can view data at the enrollment, department, and account scopes. The data contains charges for all of the subscriptions under the scopes, including across tenants. Can view the Azure Prepayment (previously called monetary commitment) balance associated with the enrollment. | 24f8edb6-1668-4659-b5e2-40bb5f3a7d7e |
76-
| EA purchaser | Purchase reservation orders and view reservation transactions. It has all the permissions of EnrollmentReader, which have all the permissions of DepartmentReader. It can view usage and charges across all accounts and subscriptions. Can view the Azure Prepayment (previously called monetary commitment) balance associated with the enrollment. | da6647fb-7651-49ee-be91-c43c4877f0c4 |
75+
| EnrollmentReader | Enrollment readers can view data at the enrollment, department, and account scopes. The data contains charges for all of the subscriptions under the scopes, including across tenants. Can view the Azure Prepayment (previously called monetary commitment) balance associated with the enrollment. | aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e |
76+
| EA purchaser | Purchase reservation orders and view reservation transactions. It has all the permissions of EnrollmentReader, which have all the permissions of DepartmentReader. It can view usage and charges across all accounts and subscriptions. Can view the Azure Prepayment (previously called monetary commitment) balance associated with the enrollment. | bbbb1b1b-cc2c-dd3d-ee4e-ffffff5f5f5f |
7777
| DepartmentReader | Download the usage details for the department they administer. Can view the usage and charges associated with their department. | db609904-a47f-4794-9be8-9bd86fbffd8a |
78-
| SubscriptionCreator | Create new subscriptions in the given scope of Account. | a0bcee42-bf30-4d1b-926a-48d21664ef71 |
78+
| SubscriptionCreator | Create new subscriptions in the given scope of Account. | cccc2c2c-dd3d-ee4e-ff5f-aaaaaa6a6a6a |
7979

8080
- An EnrollmentReader role can be assigned to a service principal only by a user who has an enrollment writer role. The EnrollmentReader role assigned to a service principal isn't shown in the Azure portal. It gets created by programmatic means and is only for programmatic use.
8181
- A DepartmentReader role can be assigned to a service principal only by a user who has an enrollment writer or department writer role.
@@ -110,11 +110,11 @@ A service principal can have only one role.
110110
| --- | --- |
111111
| `properties.principalId` | It's the value of Object ID. See [Find your service principal and tenant IDs](#find-your-service-principal-and-tenant-ids). |
112112
| `properties.principalTenantId` | See [Find your service principal and tenant IDs](#find-your-service-principal-and-tenant-ids). |
113-
| `properties.roleDefinitionId` | `/providers/Microsoft.Billing/billingAccounts/{BillingAccountName}/billingRoleDefinitions/24f8edb6-1668-4659-b5e2-40bb5f3a7d7e` |
113+
| `properties.roleDefinitionId` | `/providers/Microsoft.Billing/billingAccounts/{BillingAccountName}/billingRoleDefinitions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e` |
114114

115115
The billing account name is the same parameter that you used in the API parameters. It's the enrollment ID that you see in the Azure portal.
116116

117-
Notice that `24f8edb6-1668-4659-b5e2-40bb5f3a7d7e` is a billing role definition ID for an EnrollmentReader.
117+
Notice that `aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e` is a billing role definition ID for an EnrollmentReader.
118118

119119
1. Select **Run** to start the command.
120120

@@ -128,7 +128,7 @@ Now you can use the service principal to automatically access EA APIs. The servi
128128

129129
For the EA purchaser role, use the same steps for the enrollment reader. Specify the `roleDefinitionId`, using the following example:
130130

131-
`"/providers/Microsoft.Billing/billingAccounts/1111111/billingRoleDefinitions/ da6647fb-7651-49ee-be91-c43c4877f0c4"`
131+
`"/providers/Microsoft.Billing/billingAccounts/1111111/billingRoleDefinitions/ bbbb1b1b-cc2c-dd3d-ee4e-ffffff5f5f5f"`
132132

133133
## Assign the department reader role to the service principal
134134

@@ -204,11 +204,11 @@ Now you can use the service principal to automatically access EA APIs. The servi
204204
| --- | --- |
205205
| `properties.principalId` | It's the value of Object ID. See [Find your service principal and tenant IDs](#find-your-service-principal-and-tenant-ids). |
206206
| `properties.principalTenantId` | See [Find your service principal and tenant IDs](#find-your-service-principal-and-tenant-ids). |
207-
| `properties.roleDefinitionId` | `/providers/Microsoft.Billing/billingAccounts/{BillingAccountID}/enrollmentAccounts/{enrollmentAccountID}/billingRoleDefinitions/a0bcee42-bf30-4d1b-926a-48d21664ef71` |
207+
| `properties.roleDefinitionId` | `/providers/Microsoft.Billing/billingAccounts/{BillingAccountID}/enrollmentAccounts/{enrollmentAccountID}/billingRoleDefinitions/cccc2c2c-dd3d-ee4e-ff5f-aaaaaa6a6a6a` |
208208

209209
The billing account name is the same parameter that you used in the API parameters. It's the enrollment ID that you see in the Azure portal.
210210

211-
The billing role definition ID of `a0bcee42-bf30-4d1b-926a-48d21664ef71` is for the subscription creator role.
211+
The billing role definition ID of `cccc2c2c-dd3d-ee4e-ff5f-aaaaaa6a6a6a` is for the subscription creator role.
212212

213213
1. Select **Run** to start the command.
214214

0 commit comments

Comments
 (0)