Skip to content

Commit 5da4ed6

Browse files
committed
Merge branch 'main' into release-updatecenterv2-publicpreview
2 parents a2ea256 + 5034484 commit 5da4ed6

File tree

768 files changed

+4102
-3457
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

768 files changed

+4102
-3457
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -216,6 +216,11 @@
216216
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",
217217
"redirect_document_id": false
218218
},
219+
{
220+
"source_path_from_root": "/articles/azure-monitor/visualize/workbooks-sample-links.md",
221+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-samples",
222+
"redirect_document_id": false
223+
},
219224
{
220225
"source_path_from_root": "/articles/azure-monitor/visualize/view-designer-conversion-access.md",
221226
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",

articles/active-directory/hybrid/how-to-connect-group-writeback-v2.md

Lines changed: 13 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,18 @@ It's recommended that you follow the [swing migration](how-to-upgrade-previous-v
5252
>[!NOTE]
5353
> If you are using an older build of group writeback in Azure AD Connect, the M365 groups being written back as universal distribution groups, will continue to be written back. The new version of group writeback is backwards compatible.
5454
55-
## Enable group writeback using Azure AD Connect
55+
## Enable group writeback
56+
Enabling group writeback's new features is a two step process. One step is done via Azure AD Connect. This step enables the original group writeback features. The second one is done using PowerShell and enables the new writeback features once the original features are enabled. To enable group writeback complete the steps in the table below
57+
58+
Steps|Description|
59+
|-----|-----|
60+
|[Enable group writeback using Azure AD Connect](#enable-group-writeback-using-azure-ad-connect)|Enables group writeback with the original features included in Azure AD Connect. That is, it will writeback M365 groups as distribution groups. This option is **only** available if you have Exchange present in your on-premises Active Directory.|
61+
|[Enabling group writeback using PowerShell](#enable-group-writeback-using-powershell)|Enables the new group writeback features outlined in this article.
62+
63+
>[!NOTE]
64+
>You must enable group writeback via Azure AD Connect before enabling group writeback via PowerShell to receive the new features outlined in this article. You must do both and in the correct order.
65+
66+
### Enable group writeback using Azure AD Connect
5667

5768
To enable group writeback, use the following steps:
5869

@@ -86,7 +97,7 @@ To enable group writeback, use the following steps:
8697
8798
For more information on configuring the Microsoft 365 groups, see [Configure Microsoft 365 Groups with on-premises Exchange hybrid](/exchange/hybrid-deployment/set-up-microsoft-365-groups#enable-group-writeback-in-azure-ad-connect).
8899
89-
## Enabling group writeback using PowerShell
100+
### Enable group writeback using PowerShell
90101
91102
To enable group writeback via PowerShell:
92103

articles/active-directory/managed-identities-azure-resources/how-to-assign-app-role-managed-identity-powershell.md

Lines changed: 78 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ ms.custom: devx-track-azurepowershell
2323
Managed identities for Azure resources provide Azure services with an identity in Azure Active Directory. They work without needing credentials in your code. Azure services use this identity to authenticate to services that support Azure AD authentication. Application roles provide a form of role-based access control, and allow a service to implement authorization rules.
2424

2525
> [!NOTE]
26-
> The tokens which your application receives are cached by the underlying infrastructure, which means that any changes to the managed identity's roles can take significant time to take effect. For more information, see [Limitation of using managed identities for authorization](managed-identity-best-practice-recommendations.md#limitation-of-using-managed-identities-for-authorization).
26+
> The tokens that your application receives are cached by the underlying infrastructure, which means that any changes to the managed identity's roles can take significant time to take effect. For more information, see [Limitation of using managed identities for authorization](managed-identity-best-practice-recommendations.md#limitation-of-using-managed-identities-for-authorization).
2727
2828
In this article, you learn how to assign a managed identity to an application role exposed by another application using Azure AD PowerShell.
2929

@@ -33,40 +33,50 @@ In this article, you learn how to assign a managed identity to an application ro
3333
- If you don't already have an Azure account, [sign up for a free account](https://azure.microsoft.com/free/) before continuing.
3434
- To run the example scripts, you have two options:
3535
- Use the [Azure Cloud Shell](../../cloud-shell/overview.md), which you can open using the **Try It** button on the top-right corner of code blocks.
36-
- Run scripts locally by installing the latest version of [the Az PowerShell module](/powershell/azure/install-az-ps) and the [Microsoft Graph PowerShell SDK](/powershell/microsoftgraph/get-started).
36+
- Run scripts locally by installing the latest version of [the Az PowerShell module](/powershell/azure/install-az-ps). You can also use the [Microsoft Graph PowerShell SDK](/powershell/microsoftgraph/get-started).
3737

3838
## Assign a managed identity access to another application's app role
3939

4040
1. Enable managed identity on an Azure resource, [such as an Azure VM](qs-configure-powershell-windows-vm.md).
4141

4242
1. Find the object ID of the managed identity's service principal.
4343

44-
**For a system-assigned managed identity**, you can find the object ID on the Azure portal on the resource's **Identity** page. You can also use the following PowerShell script to find the object ID. You'll need the resource ID of the resource you created in step 1, which is available in the Azure portal on the resource's **Properties** page.
44+
**For a system-assigned managed identity**, you can find the object ID on the Azure portal on the resource's **Identity** page. You can also use the following PowerShell script to find the object ID. You'll need the resource ID of the resource you created in step 1, which is available in the Azure portal on the resource's **Properties** page.
4545

46-
```powershell
47-
$resourceIdWithManagedIdentity = '/subscriptions/{my subscription ID}/resourceGroups/{my resource group name}/providers/Microsoft.Compute/virtualMachines/{my virtual machine name}'
48-
(Get-AzResource -ResourceId $resourceIdWithManagedIdentity).Identity.PrincipalId
49-
```
46+
```powershell
47+
$resourceIdWithManagedIdentity = '/subscriptions/{my subscription ID}/resourceGroups/{my resource group name}/providers/Microsoft.Compute/virtualMachines/{my virtual machine name}'
48+
(Get-AzResource -ResourceId $resourceIdWithManagedIdentity).Identity.PrincipalId
49+
```
5050
51-
**For a user-assigned managed identity**, you can find the managed identity's object ID on the Azure portal on the resource's **Overview** page. You can also use the following PowerShell script to find the object ID. You'll need the resource ID of the user-assigned managed identity.
51+
**For a user-assigned managed identity**, you can find the managed identity's object ID on the Azure portal on the resource's **Overview** page. You can also use the following PowerShell script to find the object ID. You'll need the resource ID of the user-assigned managed identity.
5252
53-
```powershell
54-
$userManagedIdentityResourceId = '/subscriptions/{my subscription ID}/resourceGroups/{my resource group name}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{my managed identity name}'
55-
(Get-AzResource -ResourceId $userManagedIdentityResourceId).Properties.PrincipalId
56-
```
53+
```powershell
54+
$userManagedIdentityResourceId = '/subscriptions/{my subscription ID}/resourceGroups/{my resource group name}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{my managed identity name}'
55+
(Get-AzResource -ResourceId $userManagedIdentityResourceId).Properties.PrincipalId
56+
```
5757
5858
1. Create a new application registration to represent the service that your managed identity will send a request to. If the API or service that exposes the app role grant to the managed identity already has a service principal in your Azure AD tenant, skip this step. For example, if you want to grant the managed identity access to the Microsoft Graph API, you can skip this step.
5959
6060
1. Find the object ID of the service application's service principal. You can find this using the Azure portal. Go to Azure Active Directory and open the **Enterprise applications** page, then find the application and look for the **Object ID**. You can also find the service principal's object ID by its display name using the following PowerShell script:
6161
62+
# [Azure PowerShell](#tab/azurepowershell)
63+
64+
```powershell
65+
$serverServicePrincipalObjectId = (Get-AzureADServicePrincipal -Filter "DisplayName eq '$applicationName'").ObjectId
66+
```
67+
68+
# [Microsoft Graph](#tab/microsoftgraph)
69+
6270
```powershell
6371
$serverServicePrincipalObjectId = (Get-MgServicePrincipal -Filter "DisplayName eq '$applicationName'").Id
6472
```
6573
74+
---
75+
6676
> [!NOTE]
6777
> Display names for applications are not unique, so you should verify that you obtain the correct application's service principal.
6878
69-
1. Add an [app role](../develop/howto-add-app-roles-in-azure-ad-apps.md) to the application you created in step 3. You can create the role using the Azure portal or using Microsoft Graph. For example, you could add an app role like this:
79+
1. Add an [app role](../develop/howto-add-app-roles-in-azure-ad-apps.md) to the application you created in step 3. You can create the role using the Azure portal or by using Microsoft Graph. For example, you could add an app role like this:
7080
7181
```json
7282
{
@@ -88,6 +98,18 @@ In this article, you learn how to assign a managed identity to an application ro
8898
8999
Execute the following PowerShell command to add the role assignment:
90100
101+
# [Azure PowerShell](#tab/azurepowershell)
102+
103+
```powershell
104+
New-AzureADServiceAppRoleAssignment `
105+
-ObjectId $managedIdentityObjectId `
106+
-Id $appRoleId `
107+
-PrincipalId $managedIdentityObjectId `
108+
-ResourceId $serverServicePrincipalObjectId
109+
```
110+
111+
# [Microsoft Graph](#tab/microsoftgraph)
112+
91113
```powershell
92114
New-MgServicePrincipalAppRoleAssignment `
93115
-ServicePrincipalId $managedIdentityObjectId `
@@ -96,10 +118,51 @@ In this article, you learn how to assign a managed identity to an application ro
96118
-AppRoleId $appRoleId
97119
```
98120
121+
---
122+
99123
## Complete script
100124
101125
This example script shows how to assign an Azure web app's managed identity to an app role.
102126
127+
# [Azure PowerShell](#tab/azurepowershell)
128+
129+
```powershell
130+
# Install the module. This step requires you to be an administrator on your machine.
131+
# Install-Module AzureAD
132+
133+
# Your tenant ID (in the Azure portal, under Azure Active Directory > Overview).
134+
$tenantID = '<tenant-id>'
135+
136+
# The name of your web app, which has a managed identity that should be assigned to the server app's app role.
137+
$webAppName = '<web-app-name>'
138+
$resourceGroupName = '<resource-group-name-containing-web-app>'
139+
140+
# The name of the server app that exposes the app role.
141+
$serverApplicationName = '<server-application-name>' # For example, MyApi
142+
143+
# The name of the app role that the managed identity should be assigned to.
144+
$appRoleName = '<app-role-name>' # For example, MyApi.Read.All
145+
146+
# Look up the web app's managed identity's object ID.
147+
$managedIdentityObjectId = (Get-AzWebApp -ResourceGroupName $resourceGroupName -Name $webAppName).identity.principalid
148+
149+
Connect-AzureAD -TenantId $tenantID
150+
151+
# Look up the details about the server app's service principal and app role.
152+
$serverServicePrincipal = (Get-AzureADServicePrincipal -Filter "DisplayName eq '$serverApplicationName'")
153+
$serverServicePrincipalObjectId = $serverServicePrincipal.Id
154+
$appRoleId = ($serverServicePrincipal.AppRoles | Where-Object {$_.Value -eq $appRoleName }).Id
155+
156+
# Assign the managed identity access to the app role.
157+
New-AzureADServiceAppRoleAssignment `
158+
-ObjectId $managedIdentityObjectId `
159+
-Id $appRoleId `
160+
-PrincipalId $managedIdentityObjectId `
161+
-ResourceId $serverServicePrincipalObjectId
162+
```
163+
164+
# [Microsoft Graph](#tab/microsoftgraph)
165+
103166
```powershell
104167
# Install the module.
105168
# Install-Module Microsoft.Graph -Scope CurrentUser
@@ -135,6 +198,8 @@ New-MgServicePrincipalAppRoleAssignment `
135198
-AppRoleId $appRoleId
136199
```
137200

201+
---
202+
138203
## Next steps
139204

140205
- [Managed identity for Azure resources overview](overview.md)

articles/aks/security-controls-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Azure Policy Regulatory Compliance controls for Azure Kubernetes Service (AKS)
33
description: Lists Azure Policy Regulatory Compliance controls available for Azure Kubernetes Service (AKS). These built-in policy definitions provide common approaches to managing the compliance of your Azure resources.
4-
ms.date: 06/16/2022
4+
ms.date: 07/06/2022
55
ms.topic: sample
66
ms.service: container-service
77
ms.custom: subject-policy-compliancecontrols

0 commit comments

Comments
 (0)