Skip to content

Commit 66c68ec

Browse files
authored
Merge pull request #189481 from barclayn/mi-clarity-06
managed identities clarity edits
2 parents d83f9b1 + 82d23a2 commit 66c68ec

File tree

3 files changed

+21
-20
lines changed

3 files changed

+21
-20
lines changed

articles/active-directory/managed-identities-azure-resources/how-to-view-managed-identity-service-principal-portal.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.subservice: msi
1212
ms.topic: how-to
1313
ms.tgt_pltfrm: na
1414
ms.workload: identity
15-
ms.date: 09/30/2020
15+
ms.date: 02/23/2022
1616
ms.author: barclayn
1717
ms.collection: M365-identity-device-management
1818
---
@@ -36,9 +36,9 @@ In this article, you learn how to view the service principal of a managed identi
3636

3737
This procedure demonstrates how to view the service principal of a VM with system assigned identity enabled (the same steps apply for an application).
3838

39-
1. Click **Azure Active Directory** and then click **Enterprise applications**.
40-
2. Under **Application Type**, choose **All Applications** and then click **Apply**.
41-
3. In the search filter box, type the name of the Azure resource that has managed identity enabled or choose it from the list presented.
39+
1. Select **Azure Active Directory** and then select **Enterprise applications**.
40+
2. Under **Application Type**, choose **All Applications** and then select **Apply**.
41+
3. In the search filter box, type the name of the Azure resource that has managed identities enabled or choose it from the list.
4242

4343
![View managed identity service principal in portal](./media/how-to-view-managed-identity-service-principal-portal/view-managed-identity-service-principal-portal.png)
4444

articles/active-directory/managed-identities-azure-resources/known-issues.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,12 +19,12 @@ ms.collection: M365-identity-device-management
1919
ms.custom:
2020
---
2121

22-
# Known issues with Managed Identities
22+
# Known issues with managed identities for Azure resources
2323

2424
This article discusses a couple of issues around managed identities and how to address them. Common questions about managed identities are documented in our [frequently asked questions](managed-identities-faq.md) article.
2525
## VM fails to start after being moved
2626

27-
If you move a VM in a running state from a resource group or subscription, it continues to run during the move. However, after the move, if the VM is stopped and restarted, it will fail to start. This issue happens because the VM is not updating the reference to the managed identities for Azure resources identity and continues to point to it in the old resource group.
27+
If you move a VM in a running state from a resource group or subscription, it continues to run during the move. However, after the move, if the VM is stopped and restarted, it fails to start. This issue happens because the VM doesn't update the managed identity reference and it continues to use an outdated URI.
2828

2929
**Workaround**
3030

@@ -46,7 +46,7 @@ az vm update -n <VM Name> -g <Resource Group> --remove tags.fixVM
4646

4747
## Transferring a subscription between Azure AD directories
4848

49-
Managed identities do not get updated when a subscription is moved/transferred to another directory. As a result, any existent system-assigned or user-assigned managed identities will be broken.
49+
Managed identities don't get updated when a subscription is moved/transferred to another directory. As a result, any existent system-assigned or user-assigned managed identities will be broken.
5050

5151
Workaround for managed identities in a subscription that has been moved to another directory:
5252

articles/active-directory/managed-identities-azure-resources/managed-identities-faq.md

Lines changed: 14 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.devlang:
1212
ms.topic: conceptual
1313
ms.tgt_pltfrm:
1414
ms.workload: identity
15-
ms.date: 01/11/2022
15+
ms.date: 02/23/2022
1616
ms.author: barclayn
1717
---
1818

@@ -36,9 +36,9 @@ az resource list --query "[?identity.type=='SystemAssigned'].{Name:name, princi
3636
### Which Azure RBAC permissions are required to use a managed identity on a resource?
3737

3838
- System-assigned managed identity: You need write permissions over the resource. For example, for virtual machines you need `Microsoft.Compute/virtualMachines/write`. This action is included in resource specific built-in roles like [Virtual Machine Contributor](../../role-based-access-control/built-in-roles.md#virtual-machine-contributor).
39-
- Assigning user-assigned managed identities to resources: You need write permissions over the resource. For example, for virtual machines you need `Microsoft.Compute/virtualMachines/write`. You will also need `Microsoft.ManagedIdentity/userAssignedIdentities/*/assign/action` action over the user-assigned identity. This action is included in the [Managed Identity Operator](../../role-based-access-control/built-in-roles.md#managed-identity-operator) built-in role.
39+
- Assigning user-assigned managed identities to resources: You need write permissions over the resource. For example, for virtual machines you need `Microsoft.Compute/virtualMachines/write`. You'll also need `Microsoft.ManagedIdentity/userAssignedIdentities/*/assign/action` action over the user-assigned identity. This action is included in the [Managed Identity Operator](../../role-based-access-control/built-in-roles.md#managed-identity-operator) built-in role.
4040
- Managing user-assigned identities: To create or delete user-assigned managed identities, you need the [Managed Identity Contributor](../../role-based-access-control/built-in-roles.md#managed-identity-contributor) role assignment.
41-
- Managing role assignments for managed identities: You need the [Owner](../../role-based-access-control/built-in-roles.md#all) or [User Access Administrator](../../role-based-access-control/built-in-roles.md#all) role assignment over the resource to which you're granting access. You will need the [Reader](../../role-based-access-control/built-in-roles.md#all) role assignment to the resource with a system-assigned identity, or to the user-assigned identity that is being given the role assignment. If you do not have read access, you can search by "User, group, or service principal" to find the identity's backing service principal, instead of searching by managed identity while adding the role assignment. [Read more about assigning Azure roles](../../role-based-access-control/role-assignments-portal.md).
41+
- Managing role assignments for managed identities: You need the [Owner](../../role-based-access-control/built-in-roles.md#all) or [User Access Administrator](../../role-based-access-control/built-in-roles.md#all) role assignment over the resource to which you're granting access. You'll need the [Reader](../../role-based-access-control/built-in-roles.md#all) role assignment to the resource with a system-assigned identity, or to the user-assigned identity that is being given the role assignment. If you don't have read access, you can search by "User, group, or service principal" to find the identity's backing service principal, instead of searching by managed identity while adding the role assignment. [Read more about assigning Azure roles](../../role-based-access-control/role-assignments-portal.md).
4242

4343
### How do I prevent the creation of user-assigned managed identities?
4444

@@ -85,7 +85,7 @@ At this point, any attempt to create a user-assigned managed identity in the res
8585

8686
### Do managed identities have a backing app object?
8787

88-
No. Managed identities and Azure AD App Registrations are not the same thing in the directory.
88+
No. Managed identities and Azure AD App Registrations aren't the same thing in the directory.
8989

9090
App registrations have two components: An Application Object + A Service Principal Object.
9191
Managed Identities for Azure resources have only one of those components: A Service Principal Object.
@@ -97,19 +97,19 @@ Managed identities don't have an application object in the directory, which is w
9797
> [!NOTE]
9898
> How managed identities authenticate is an internal implementation detail that is subject to change without notice.
9999

100-
Managed identities use certificate-based authentication. Each managed identity’s credential has an expiration of 90 days and it is rolled after 45 days.
100+
Managed identities use certificate-based authentication. Each managed identity’s credential has an expiration of 90 days and it's rolled after 45 days.
101101

102102
### What identity will IMDS default to if don't specify the identity in the request?
103103

104104
- If system assigned managed identity is enabled and no identity is specified in the request, Azure Instance Metadata Service (IMDS) defaults to the system assigned managed identity.
105-
- If system assigned managed identity is not enabled, and only one user assigned managed identity exists, IMDS defaults to that single user assigned managed identity.
106-
- If system assigned managed identity is not enabled, and multiple user assigned managed identities exist, then you are required to specify a managed identity in the request.
105+
- If system assigned managed identity isn't enabled, and only one user assigned managed identity exists, IMDS defaults to that single user assigned managed identity.
106+
- If system assigned managed identity isn't enabled, and multiple user assigned managed identities exist, then you are required to specify a managed identity in the request.
107107

108108
## Limitations
109109

110110
### Can the same managed identity be used across multiple regions?
111111

112-
In short, yes you can use user assigned managed identities in more than one Azure region. The longer answer is that while user assigned managed identities are created as regional resources the associated [service principal](../develop/app-objects-and-service-principals.md#service-principal-object) (SP) created in Azure AD is available globally. The service principal can be used from any Azure region and its availability is dependent on the availability of Azure AD. For example, if you created a user assigned managed identity in the South-Central region and that region becomes unavailable this issue only impacts [control plane](../../azure-resource-manager/management/control-plane-and-data-plane.md) activities on the managed identity itself. The activities performed by any resources already configured to use the managed identities would not be impacted.
112+
In short, yes you can use user assigned managed identities in more than one Azure region. The longer answer is that while user assigned managed identities are created as regional resources the associated [service principal](../develop/app-objects-and-service-principals.md#service-principal-object) (SP) created in Azure AD is available globally. The service principal can be used from any Azure region and its availability is dependent on the availability of Azure AD. For example, if you created a user assigned managed identity in the South-Central region and that region becomes unavailable this issue only impacts [control plane](../../azure-resource-manager/management/control-plane-and-data-plane.md) activities on the managed identity itself. The activities performed by any resources already configured to use the managed identities wouldn't be impacted.
113113

114114
### Does managed identities for Azure resources work with Azure Cloud Services?
115115

@@ -118,17 +118,18 @@ No, there are no plans to support managed identities for Azure resources in Azur
118118

119119
### What is the security boundary of managed identities for Azure resources?
120120

121-
The security boundary of the identity is the resource to which it is attached to. For example, the security boundary for a Virtual Machine with managed identities for Azure resources enabled, is the Virtual Machine. Any code running on that VM, is able to call the managed identities for Azure resources endpoint and request tokens. It is the similar experience with other resources that support managed identities for Azure resources.
121+
The security boundary of the identity is the resource to which it's attached. For example, the security boundary for a virtual machine with managed identities for Azure resources enabled, is the virtual machine. Any code running on that VM, is able to call the managed identities endpoint and request tokens. The experience is similar experience when working with other resources that support managed identities.
122122

123123
### Will managed identities be recreated automatically if I move a subscription to another directory?
124124

125125
No. If you move a subscription to another directory, you have to manually re-create them and grant Azure role assignments again.
126+
126127
- For system assigned managed identities: disable and re-enable.
127128
- For user assigned managed identities: delete, re-create, and attach them again to the necessary resources (for example, virtual machines)
128129

129130
### Can I use a managed identity to access a resource in a different directory/tenant?
130131

131-
No. Managed identities do not currently support cross-directory scenarios.
132+
No. Managed identities don't currently support cross-directory scenarios.
132133

133134
### Are there any rate limits that apply to managed identities?
134135

@@ -141,11 +142,11 @@ Managed identities limits have dependencies on Azure service limits, Azure Insta
141142

142143
### Is it possible to move a user-assigned managed identity to a different resource group/subscription?
143144

144-
Moving a user-assigned managed identity to a different resource group is not supported.
145+
Moving a user-assigned managed identity to a different resource group isn't supported.
145146

146-
### Are tokens cached after they are issued for a managed identity?
147+
### Are managed identities tokens cached?
147148

148-
Managed identity tokens are cached by the underlying Azure infrastructure for performance and resiliency purposes: the back-end services for managed identities maintain a cache per resource URI for around 24 hours. This means that it can take several hours for changes to a managed identity's permissions to take effect, for example. Today, it is not possible to force a managed identity's token to be refreshed before its expiry. For more information, see [Limitation of using managed identities for authorization](managed-identity-best-practice-recommendations.md#limitation-of-using-managed-identities-for-authorization).
149+
Managed identity tokens are cached by the underlying Azure infrastructure for performance and resiliency purposes: the back-end services for managed identities maintain a cache per resource URI for around 24 hours. It can take several hours for changes to a managed identity's permissions to take effect, for example. Today, it is not possible to force a managed identity's token to be refreshed before its expiry. For more information, see [Limitation of using managed identities for authorization](managed-identity-best-practice-recommendations.md#limitation-of-using-managed-identities-for-authorization).
149150

150151
## Next steps
151152

0 commit comments

Comments
 (0)