Skip to content

Commit 5678a02

Browse files
committed
reports-monitoring-tutorial-ownership-103122
1 parent 0e919f6 commit 5678a02

File tree

2 files changed

+11
-11
lines changed

2 files changed

+11
-11
lines changed

articles/active-directory/reports-monitoring/tutorial-access-api-with-certificates.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -20,13 +20,13 @@ ms.custom: has-adal-ref
2020

2121
# Tutorial: Get data using the Azure Active Directory reporting API with certificates
2222

23-
The [Azure Active Directory (Azure AD) reporting APIs](concept-reporting-api.md) provide you with programmatic access to the data through a set of REST-based APIs. You can call these APIs from a variety of programming languages and tools. If you want to access the Azure AD Reporting API without user intervention, you must configure your access to use certificates.
23+
The [Azure Active Directory (Azure AD) reporting APIs](concept-reporting-api.md) provide you with programmatic access to the data through a set of REST-based APIs. You can call these APIs from various programming languages and tools. If you want to access the Azure AD Reporting API without user intervention, you must configure your access to use certificates.
2424

2525
In this tutorial, you learn how to use a test certificate to access the MS Graph API for reporting. We don't recommend using test certificates in a production environment.
2626

2727
## Prerequisites
2828

29-
1. To access sign-in data, make sure you have an Azure AD tenant with a premium (P1/P2) license. See [Getting started with Azure Active Directory Premium](../fundamentals/active-directory-get-started-premium.md) to upgrade your Azure AD edition. Note that if you did not have any activities data prior to the upgrade, it will take a couple of days for the data to show up in the reports after you upgrade to a premium license.
29+
1. To access sign-in data, make sure you have an Azure AD tenant with a premium (P1/P2) license. See [Getting started with Azure Active Directory Premium](../fundamentals/active-directory-get-started-premium.md) to upgrade your Azure AD edition. If you didn't have any activities data prior to the upgrade, it will take a couple of days for the data to show up in the reports after you upgrade to a premium license.
3030

3131
2. Create or switch to a user account in the **Global Administrator**, **Security Administrator**, **Security Reader** or **Report Reader** role for the tenant.
3232

@@ -35,8 +35,8 @@ In this tutorial, you learn how to use a test certificate to access the MS Graph
3535
4. Download and install [Azure AD PowerShell V2](https://github.com/Azure/azure-docs-powershell-azuread/blob/master/docs-conceptual/azureadps-2.0/install-adv2.md).
3636

3737
5. Install [MSCloudIdUtils](https://www.powershellgallery.com/packages/MSCloudIdUtils/). This module provides several utility cmdlets including:
38-
- The ADAL libraries needed for authentication
39-
- Access tokens from user, application keys, and certificates using ADAL
38+
- The Microsoft Authentication Library libraries needed for authentication
39+
- Access tokens from user, application keys, and certificates using Microsoft Authentication Library
4040
- Graph API handling paged results
4141

4242
6. If it's your first time using the module run **Install-MSCloudIdUtilsModule**, otherwise import it using the **Import-Module** PowerShell command. Your session should look similar to this screen:
@@ -59,11 +59,11 @@ In this tutorial, you learn how to use a test certificate to access the MS Graph
5959

6060
1. Go to the [Azure portal](https://portal.azure.com) > **Azure Active Directory** > **App registrations** and choose your application from the list.
6161

62-
2. Select **Certificates & secrets** under the **Manage** section on Application registration blade and select **Upload Certificate**.
62+
2. From the Application registration area, select **Certificates & secrets** under the **Manage** section, and then select **Upload Certificate**.
6363

6464
3. Select the certificate file from the previous step and select **Add**.
6565

66-
4. Note the Application ID, and the thumbprint of the certificate you just registered with your application. To find the thumbprint, from your application page in the portal, go to **Certificates & secrets** under **Manage** section. The thumbprint will be under the **Certificates** list.
66+
4. Note the Application ID, and the thumbprint of the certificate you registered with your application. To find the thumbprint, from your application page in the portal, go to **Certificates & secrets** under **Manage** section. The thumbprint will be under the **Certificates** list.
6767

6868
5. Open the application manifest in the inline manifest editor and verify the *keyCredentials* property is updated with your new certificate information as shown below -
6969

@@ -82,13 +82,13 @@ In this tutorial, you learn how to use a test certificate to access the MS Graph
8282

8383
![Screenshot shows a PowerShell window with a command that creates an access token.](./media/tutorial-access-api-with-certificates/getaccesstoken.png)
8484

85-
7. Use the access token in your PowerShell script to query the Graph API. Use the **Invoke-MSCloudIdMSGraphQuery** cmdlet from the MSCloudIDUtils to enumerate the signins and directoryAudits endpoint. This cmdlet handles multi-paged results, and sends those results to the PowerShell pipeline.
85+
7. Use the access token in your PowerShell script to query the Graph API. Use the **Invoke-MSCloudIdMSGraphQuery** cmdlet from the MSCloudIDUtils to enumerate the `signins` and `directoryAudits` endpoint. This cmdlet handles multi-paged results, and sends those results to the PowerShell pipeline.
8686

87-
8. Query the directoryAudits endpoint to retrieve the audit logs.
87+
8. Query the `directoryAudits` endpoint to retrieve the audit logs.
8888

8989
![Screenshot shows a PowerShell window with a command to query the directoryAudits endpoint using the access token from earlier in this procedure.](./media/tutorial-access-api-with-certificates/query-directoryAudits.png)
9090

91-
9. Query the signins endpoint to retrieve the sign-in logs.
91+
9. Query the `signins` endpoint to retrieve the sign-in logs.
9292

9393
![Screenshot shows a PowerShell window with a command to query the signins endpoint using the access token from earlier in this procedure.](./media/tutorial-access-api-with-certificates/query-signins.png)
9494

articles/active-directory/reports-monitoring/tutorial-log-analytics-wizard.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,8 +8,8 @@ ms.subservice: report-monitor
88
ms.topic: tutorial
99
ms.date: 10/31/2022
1010

11-
ms.author: shlipsey3
12-
author: srahlipsey
11+
ms.author: sarahlipsey
12+
author: shlipsey3
1313
manager: amycolannino
1414
ms.reviewer: sandeo
1515

0 commit comments

Comments
 (0)