Skip to content

Commit 5d7e881

Browse files
committed
added a note
1 parent 4bc956c commit 5d7e881

File tree

2 files changed

+7
-3
lines changed

2 files changed

+7
-3
lines changed

articles/automation/automation-security-guidelines.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Azure Automation security guidelines, security best practices Automation
33
description: This article helps you with the guidelines that Azure Automation offers to ensure a secured configuration of Automation account, Hybrid Runbook worker role, authentication certificate and identities, network isolation and policies.
44
services: automation
55
ms.subservice: shared-capabilities
6-
ms.date: 09/09/2024
6+
ms.date: 12/03/2024
77
ms.topic: overview
88
ms.service: azure-automation
99
---
@@ -48,6 +48,8 @@ This section guides you in configuring your Automation account securely.
4848

4949
1. [Unregister](./extension-based-hybrid-runbook-worker-install.md?tabs=windows#delete-a-hybrid-runbook-worker) any unused or non-responsive hybrid workers.
5050

51+
1. We strongly recommend that you never configure Hybrid Worker extension on a Virtual machine hosting domain controller. Security best practices don't advise such a setup due to the high-risk nature of exposing domain controllers to potential attack vectors via Azure Automation jobs. Domain controllers should be highly secured and isolated from non-essential services to prevent unauthorized access and maintain the integrity of the Active Directory Domain Services (ADDS) environment.
52+
5153
### Authentication certificate and identities
5254

5355
1. For runbook authentication, we recommend that you use [Managed identities](./automation-security-overview.md#managed-identities) instead of Run As accounts. The Run As accounts are an administrative overhead and we plan to deprecate them. A managed identity from Microsoft Entra ID allows your runbook to easily access other Microsoft Entra protected resources such as Azure Key Vault. The identity is managed by the Azure platform and does not require you to provision or rotate any secrets. For more information about managed identities in Azure Automation, see [Managed identities for Azure Automation](./automation-security-overview.md#managed-identities)

articles/automation/extension-based-hybrid-runbook-worker-install.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article provides information about deploying the extension-bas
44
services: automation
55
ms.subservice: process-automation
66
ms.custom: devx-track-azurepowershell, devx-track-azurecli, devx-track-bicep, linux-related-content
7-
ms.date: 11/29/2024
7+
ms.date: 12/03/2024
88
ms.topic: how-to
99
#Customer intent: As a developer, I want to learn about extension so that I can efficiently deploy Hybrid Runbook Workers.
1010
ms.service: azure-automation
@@ -62,7 +62,9 @@ Azure Automation stores and manages runbooks and then delivers them to one or mo
6262
| PowerShell Core | To run PowerShell runbooks, PowerShell Core needs to be installed. For instructions, see [Installing PowerShell Core on Linux](/powershell/scripting/install/installing-powershell-core-on-linux) | 6.0.0 |
6363

6464
> [!NOTE]
65-
> Hybrid Runbook Worker is currently not supported for Virtual Machine Scale Sets (VMSS).
65+
> - Hybrid Runbook Worker is currently not supported for Virtual Machine Scale Sets (VMSS).
66+
>
67+
> - We strongly recommend that you never configure Hybrid Worker extension on a Virtual machine hosting domain controller. Security best practices don't advise such a setup due to the high-risk nature of exposing domain controllers to potential attack vectors via Azure Automation jobs. Domain controllers should be highly secured and isolated from non-essential services to prevent unauthorized access and maintain the integrity of the Active Directory Domain Services (ADDS) environment.
6668
6769

6870
### Permissions for Hybrid worker credentials

0 commit comments

Comments
 (0)