Skip to content

Commit 656fc04

Browse files
committed
adding Thomas' updates
1 parent 3f9b29f commit 656fc04

8 files changed

+34
-26
lines changed

articles/azure-stack/azure-stack-extension-host-prepare.md

Lines changed: 25 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: azure-stack
55
keywords:
66
author: mattbriggs
77
ms.author: mabrigg
8-
ms.date: 08/28/2018
8+
ms.date: 08/29/2018
99
ms.topic: article
1010
ms.service: azure-stack
1111
ms.reviewer: thoroet
@@ -24,8 +24,8 @@ The table shows the new namespaces and the associated certificates:
2424

2525
| Deployment Folder | Required certificate subject and subject alternative names (SAN) | Scope (per region) | SubDomain namespace |
2626
|-----------------------|------------------------------------------------------------------|-----------------------|------------------------------|
27-
| Admin extension host | *.adminhosting.<region>.<fqdn> (Wildcard SSL Certificates) | Admin extension host | adminhosting.<region>.<fqdn> |
28-
| Public extension host | *.hosting.<region>.<fqdn> (Wildcard SSL Certificates) | Public extension host | hosting.<region>.<fqdn> |
27+
| Admin extension host | *.adminhosting.\<region>.\<fqdn> (Wildcard SSL Certificates) | Admin extension host | adminhosting.\<region>.\<fqdn> |
28+
| Public extension host | *.hosting.\<region>.\<fqdn> (Wildcard SSL Certificates) | Public extension host | hosting.\<region>.\<fqdn> |
2929

3030
The detailed certificate requirements can be found in the [Azure Stack public key infrastructure certificate requirements](azure-stack-pki-certs.md) article.
3131

@@ -38,7 +38,7 @@ The Azure Stack Readiness Checker Tool provides the ability to create a certific
3838
3939
## Validate new certificates
4040

41-
1. Open PowerShell with elevated permission on the hardware lifecycle host or the Privileged Access Workstation.
41+
1. Open PowerShell with elevated permission on the hardware lifecycle host or the Azure Stack management workstation.
4242
2. Run the following cmdlet to install the Azure Stack Readiness Checker tool.
4343
```PowerShell
4444
Install-Module -Name Microsoft.AzureStack.ReadinessChecker
@@ -48,22 +48,26 @@ The Azure Stack Readiness Checker Tool provides the ability to create a certific
4848
```PowerShell
4949
New-Item C:\Certificates -ItemType Directory
5050
51-
$directories = 'ACSBlob','ACSQueue','ACSTable','ADFS','Admin Portal','ARM Admin','ARM Public','Graph','KeyVault','KeyVaultInternal','Public Portal', 'Admin extension host', 'Public extension host'
51+
$directories = 'ACSBlob','ACSQueue','ACSTable','Admin Portal','ARM Admin','ARM Public','KeyVault','KeyVaultInternal','Public Portal', 'Admin extension host', 'Public extension host'
5252
5353
$destination = 'c:\certificates'
5454
5555
$directories | % { New-Item -Path (Join-Path $destination $PSITEM) -ItemType Directory -Force}
5656
```
5757
58-
4. Place your certificate(s) in the appropriate directories.
59-
5. Run the following cmdlets to start the certificate check:
58+
> [!Note]
59+
> If you deploy with Azure Active Directory Federated Services (AD FS) the following directories must be added to **$directories** in the script: `ADFS`, `Graph`.
60+
61+
4. Run the following cmdlets to start the certificate check:
6062
6163
```PowerShell
6264
$pfxPassword = Read-Host -Prompt "Enter PFX Password" -AsSecureString
6365
6466
Start-AzsReadinessChecker -CertificatePath c:\certificates -pfxPassword $pfxPassword -RegionName east -FQDN azurestack.contoso.com -IdentitySystem AAD -ExtensionHostFeature $true
6567
```
6668
69+
5. Place your certificate(s) in the appropriate directories.
70+
6771
6. Check the output and all certificates pass all tests.
6872
6973
@@ -74,35 +78,36 @@ Use a computer that can connect to the Azure Stack privileged endpoint for the n
7478
1. Use a computer that can connect to the Azure Stack privileged endpoint for the next steps. Make sure you access to the new certificate files from that computer.
7579
2. Open PowerShell ISE to execute the next script blocks
7680
3. Import the certificate for hosting endpoint. Adjust the script to match your environment.
77-
4. Import the certificate for hosting endpoint. Adjust the script to match your environment.
81+
7882
```PowerShell
79-
[Byte[]] $HostingCertContent = [Byte[]](Get-Content <File path of hosting certificate> -Encoding Byte)
83+
$CertPassword = ConvertTo-SecureString "***" -AsPlainText -Force
84+
85+
$CloudAdminCred = Get-Credential -UserName <Privileged endpoint credentials> -Message "Enter the cloud domain credentials to access the privileged endpoint."
86+
87+
[Byte[]] $AdminHostingCertContent = [Byte[]](Get-Content c:\certificate\myadminhostingcertificate.pfx -Encoding Byte)
8088
8189
Invoke-Command -ComputeName <PrivilegedEndpoint computer name> `
8290
-Credential $CloudAdminCred `
8391
-ConfigurationName "PrivilegedEndpoint" `
84-
-ArgumentList @($HostingCertContent, $CertPassword) `
92+
-ArgumentList @($AdminHostingCertContent, $CertPassword) `
8593
-ScriptBlock {
86-
param($HostingCertContent, $CertPassword)
87-
Import-UserHostingServiceCert $HostingCertContent $certPassword
94+
param($AdminHostingCertContent, $CertPassword)
95+
Import-AdminHostingServiceCert $AdminHostingCertContent $certPassword
8896
}
8997
```
98+
9099
5. Import the certificate for the Admin hosting endpoint.
91100
92101
```PowerShell
93-
$CertPassword = ConvertTo-SecurString "***" -AsPlainText -Force
94-
95-
$CloudAdminCred = Get-Credential -UserName <Privileged endpoint credentials> -Message "Enter the cloud domain credentials to access the privileged endpoint."
96-
97-
[Byte[]] $AdminHostingCertContent = [Byte[]](Get-Content <File path of Admin hosting certificate> -Encoding Byte)
102+
[Byte[]] $HostingCertContent = [Byte[]](Get-Content c:\certificate\myadminhostingcertificate.pfx -Encoding Byte)
98103
99104
Invoke-Command -ComputeName <PrivilegedEndpoint computer name> `
100105
-Credential $CloudAdminCred `
101106
-ConfigurationName "PrivilegedEndpoint" `
102-
-ArgumentList @($AdminHostingCertContent, $CertPassword) `
107+
-ArgumentList @($HostingCertContent, $CertPassword) `
103108
-ScriptBlock {
104-
param($AdminHostingCertContent, $CertPassword)
105-
Import-AdminHostingServiceCert $AdminHostingCertContent $certPassword
109+
param($HostingCertContent, $CertPassword)
110+
Import-UserHostingServiceCert $HostingCertContent $certPassword
106111
}
107112
```
108113

articles/azure-stack/azure-stack-get-pki-certs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.workload: na
1313
pms.tgt_pltfrm: na
1414
ms.devlang: na
1515
ms.topic: article
16-
ms.date: 05/18/2018
16+
ms.date: 08/29/2018
1717
ms.author: mabrigg
1818
ms.reviewer: ppacent
1919
---

articles/azure-stack/azure-stack-integrate-endpoints.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,14 +6,15 @@ author: jeffgilb
66
manager: femila
77
ms.service: azure-stack
88
ms.topic: article
9-
ms.date: 08/02/2018
9+
ms.date: 08/29/2018
1010

1111
ms.author: jeffgilb
1212
ms.reviewer: wamota
1313
keywords:
1414
---
1515

1616
# Azure Stack datacenter integration - Publish endpoints
17+
1718
Azure Stack sets up virtual IP addresses (VIPs) for its infrastructure roles. These VIPs are allocated from the public IP address pool. Each VIP is secured with an access control list (ACL) in the software-defined network layer. ACLs are also used across the physical switches (TORs and BMC) to further harden the solution. A DNS entry is created for each endpoint in the external DNS zone that specified at deployment time.
1819

1920

articles/azure-stack/azure-stack-pki-certs.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.workload: na
1313
pms.tgt_pltfrm: na
1414
ms.devlang: na
1515
ms.topic: article
16-
ms.date: 06/07/2018
16+
ms.date: 08/29/2018
1717
ms.author: mabrigg
1818
ms.reviewer: ppacent
1919

@@ -73,6 +73,8 @@ For your deployment, the [region] and [externalfqdn] values must match the regio
7373
| ACSQueue | *.queue.&lt;region>.&lt;fqdn><br>(Wildcard SSL Certificate) | Queue Storage | queue.&lt;region>.&lt;fqdn> |
7474
| KeyVault | *.vault.&lt;region>.&lt;fqdn><br>(Wildcard SSL Certificate) | Key Vault | vault.&lt;region>.&lt;fqdn> |
7575
| KeyVaultInternal | *.adminvault.&lt;region>.&lt;fqdn><br>(Wildcard SSL Certificate) | Internal Keyvault | adminvault.&lt;region>.&lt;fqdn> |
76+
| Admin Extension Host | *.adminhosting.\<region>.\<fqdn> (Wildcard SSL Certificates) | Admin Extension Host | adminhosting.\<region>.\<fqdn> |
77+
| Public Extension Host | *.hosting.\<region>.\<fqdn> (Wildcard SSL Certificates) | Public Extension Host | hosting.\<region>.\<fqdn> |
7678

7779
If you deploy Azure Stack using the Azure AD deployment mode, you only need to request the certificates listed in previous table. However, if you deploy Azure Stack using the AD FS deployment mode, you must also request the certificates described in the following table:
7880

articles/azure-stack/azure-stack-validate-pki-certs.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.workload: na
1212
pms.tgt_pltfrm: na
1313
ms.devlang: na
1414
ms.topic: article
15-
ms.date: 05/24/2018
15+
ms.date: 08/29/2018
1616
ms.author: mabrigg
1717
ms.reviewer: ppacent
1818
---
@@ -71,7 +71,7 @@ Use these steps to prepare and to validate the Azure Stack PKI certificates for
7171
````PowerShell
7272
New-Item C:\Certificates -ItemType Directory
7373
74-
$directories = 'ACSBlob','ACSQueue','ACSTable','ADFS','Admin Portal','ARM Admin','ARM Public','Graph','KeyVault','KeyVaultInternal','Public Portal', ,'Admin Extension Host','Public Extension Host'
74+
$directories = 'ACSBlob','ACSQueue','ACSTable','ADFS','Admin Portal','ARM Admin','ARM Public','Graph','KeyVault','KeyVaultInternal','Public Portal','Admin Extension Host','Public Extension Host'
7575
7676
$destination = 'c:\certificates'
7777

articles/azure-stack/user/azure-stack-metrics-azure-data.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ For an introduction, overview, and how to get started with Azure Monitor, see th
2727

2828
![Azure Stack Monitor blade](./media/azure-stack-metrics-azure-data/azs-monitor.png)
2929

30-
Azure Monitor is the platform service that provides a single source for monitoring Azure resources. With Azure Monitor, you can visualize, query, route, archive, and otherwise take action on the metrics and logs coming from resources in Azure. You can work with this data by using the Azure Stack admin portal, Monitor PowerShell Cmdlets, Cross-Platform CLI, or Azure Monitor REST APIs. For the specific connectivity supported by Azure Stack, see [How to consume monitoring data from Azure Stack](azure-stack-metrics-supported.md)
30+
Azure Monitor is the platform service that provides a single source for monitoring Azure resources. With Azure Monitor, you can visualize, query, route, archive, and otherwise take action on the metrics and logs coming from resources in Azure. You can work with this data by using the Azure Stack admin portal, Monitor PowerShell Cmdlets, Cross-Platform CLI, or Azure Monitor REST APIs. For the specific connectivity supported by Azure Stack, see [How to consume monitoring data from Azure Stack](azure-stack-metrics-monitor.md)
3131

3232
> [!Note]
3333
Metrics and diagnostic logs are not available for the Azure Stack Development Kit.
16.1 KB
Loading
5.68 KB
Loading

0 commit comments

Comments
 (0)