You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/how-to-connect-group-writeback-v2.md
+13-2Lines changed: 13 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,7 +52,18 @@ It's recommended that you follow the [swing migration](how-to-upgrade-previous-v
52
52
>[!NOTE]
53
53
> If you are using an older build of group writeback in Azure AD Connect, the M365 groups being written back as universal distribution groups, will continue to be written back. The new version of group writeback is backwards compatible.
54
54
55
-
## Enable group writeback using Azure AD Connect
55
+
## Enable group writeback
56
+
Enabling group writeback's new features is a two step process. One step is done via Azure AD Connect. This step enables the original group writeback features. The second one is done using PowerShell and enables the new writeback features once the original features are enabled. To enable group writeback complete the steps in the table below
57
+
58
+
Steps|Description|
59
+
|-----|-----|
60
+
|[Enable group writeback using Azure AD Connect](#enable-group-writeback-using-azure-ad-connect)|Enables group writeback with the original features included in Azure AD Connect. That is, it will writeback M365 groups as distribution groups. This option is **only** available if you have Exchange present in your on-premises Active Directory.|
61
+
|[Enabling group writeback using PowerShell](#enable-group-writeback-using-powershell)|Enables the new group writeback features outlined in this article.
62
+
63
+
>[!NOTE]
64
+
>You must enable group writeback via Azure AD Connect before enabling group writeback via PowerShell to receive the new features outlined in this article. You must do both and in the correct order.
65
+
66
+
### Enable group writeback using Azure AD Connect
56
67
57
68
To enable group writeback, use the following steps:
58
69
@@ -86,7 +97,7 @@ To enable group writeback, use the following steps:
86
97
87
98
For more information on configuring the Microsoft 365 groups, see [Configure Microsoft 365 Groups with on-premises Exchange hybrid](/exchange/hybrid-deployment/set-up-microsoft-365-groups#enable-group-writeback-in-azure-ad-connect).
Copy file name to clipboardExpand all lines: articles/active-directory/managed-identities-azure-resources/how-to-assign-app-role-managed-identity-powershell.md
Managed identities for Azure resources provide Azure services with an identity in Azure Active Directory. They work without needing credentials in your code. Azure services use this identity to authenticate to services that support Azure AD authentication. Application roles provide a form of role-based access control, and allow a service to implement authorization rules.
24
24
25
25
> [!NOTE]
26
-
> The tokens which your application receives are cached by the underlying infrastructure, which means that any changes to the managed identity's roles can take significant time to take effect. For more information, see [Limitation of using managed identities for authorization](managed-identity-best-practice-recommendations.md#limitation-of-using-managed-identities-for-authorization).
26
+
> The tokens that your application receives are cached by the underlying infrastructure, which means that any changes to the managed identity's roles can take significant time to take effect. For more information, see [Limitation of using managed identities for authorization](managed-identity-best-practice-recommendations.md#limitation-of-using-managed-identities-for-authorization).
27
27
28
28
In this article, you learn how to assign a managed identity to an application role exposed by another application using Azure AD PowerShell.
29
29
@@ -33,40 +33,50 @@ In this article, you learn how to assign a managed identity to an application ro
33
33
- If you don't already have an Azure account, [sign up for a free account](https://azure.microsoft.com/free/) before continuing.
34
34
- To run the example scripts, you have two options:
35
35
- Use the [Azure Cloud Shell](../../cloud-shell/overview.md), which you can open using the **Try It** button on the top-right corner of code blocks.
36
-
- Run scripts locally by installing the latest version of [the Az PowerShell module](/powershell/azure/install-az-ps) and the [Microsoft Graph PowerShell SDK](/powershell/microsoftgraph/get-started).
36
+
- Run scripts locally by installing the latest version of [the Az PowerShell module](/powershell/azure/install-az-ps). You can also use the [Microsoft Graph PowerShell SDK](/powershell/microsoftgraph/get-started).
37
37
38
38
## Assign a managed identity access to another application's app role
39
39
40
40
1. Enable managed identity on an Azure resource, [such as an Azure VM](qs-configure-powershell-windows-vm.md).
41
41
42
42
1. Find the object ID of the managed identity's service principal.
43
43
44
-
**For a system-assigned managed identity**, you can find the object ID on the Azure portal on the resource's **Identity** page. You can also use the following PowerShell script to find the object ID. You'll need the resource ID of the resource you created in step 1, which is available in the Azure portal on the resource's **Properties** page.
44
+
**For a system-assigned managed identity**, you can find the object ID on the Azure portal on the resource's **Identity** page. You can also use the following PowerShell script to find the object ID. You'll need the resource ID of the resource you created in step 1, which is available in the Azure portal on the resource's **Properties** page.
**For a user-assigned managed identity**, you can find the managed identity's object ID on the Azure portal on the resource's **Overview** page. You can also use the following PowerShell script to find the object ID. You'll need the resource ID of the user-assigned managed identity.
51
+
**For a user-assigned managed identity**, you can find the managed identity's object ID on the Azure portal on the resource's **Overview** page. You can also use the following PowerShell script to find the object ID. You'll need the resource ID of the user-assigned managed identity.
1. Create a new application registration to represent the service that your managed identity will send a request to. If the API or service that exposes the app role grant to the managed identity already has a service principal in your Azure AD tenant, skip this step. For example, if you want to grant the managed identity access to the Microsoft Graph API, you can skip this step.
59
59
60
60
1. Find the object ID of the service application's service principal. You can find this using the Azure portal. Go to Azure Active Directory and open the **Enterprise applications** page, then find the application and look for the **Object ID**. You can also find the service principal's object ID by its display name using the following PowerShell script:
> Display names for applications are not unique, so you should verify that you obtain the correct application's service principal.
68
78
69
-
1. Add an [app role](../develop/howto-add-app-roles-in-azure-ad-apps.md) to the application you created in step 3. You can create the role using the Azure portal or using Microsoft Graph. For example, you could add an app role like this:
79
+
1. Add an [app role](../develop/howto-add-app-roles-in-azure-ad-apps.md) to the application you created in step 3. You can create the role using the Azure portal or by using Microsoft Graph. For example, you could add an app role like this:
70
80
71
81
```json
72
82
{
@@ -88,6 +98,18 @@ In this article, you learn how to assign a managed identity to an application ro
88
98
89
99
Execute the following PowerShell command to add the role assignment:
90
100
101
+
# [Azure PowerShell](#tab/azurepowershell)
102
+
103
+
```powershell
104
+
New-AzureADServiceAppRoleAssignment `
105
+
-ObjectId $managedIdentityObjectId `
106
+
-Id $appRoleId `
107
+
-PrincipalId $managedIdentityObjectId `
108
+
-ResourceId $serverServicePrincipalObjectId
109
+
```
110
+
111
+
# [Microsoft Graph](#tab/microsoftgraph)
112
+
91
113
```powershell
92
114
New-MgServicePrincipalAppRoleAssignment `
93
115
-ServicePrincipalId $managedIdentityObjectId `
@@ -96,10 +118,51 @@ In this article, you learn how to assign a managed identity to an application ro
96
118
-AppRoleId $appRoleId
97
119
```
98
120
121
+
---
122
+
99
123
## Complete script
100
124
101
125
This example script shows how to assign an Azure web app's managed identity to an app role.
102
126
127
+
# [Azure PowerShell](#tab/azurepowershell)
128
+
129
+
```powershell
130
+
# Install the module. This step requires you to be an administrator on your machine.
131
+
# Install-Module AzureAD
132
+
133
+
# Your tenant ID (in the Azure portal, under Azure Active Directory > Overview).
134
+
$tenantID = '<tenant-id>'
135
+
136
+
# The name of your web app, which has a managed identity that should be assigned to the server app's app role.
Copy file name to clipboardExpand all lines: articles/aks/security-controls-policy.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Azure Policy Regulatory Compliance controls for Azure Kubernetes Service (AKS)
3
3
description: Lists Azure Policy Regulatory Compliance controls available for Azure Kubernetes Service (AKS). These built-in policy definitions provide common approaches to managing the compliance of your Azure resources.
0 commit comments