You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/managed-identities-azure-resources/how-to-view-managed-identity-service-principal-portal.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.subservice: msi
12
12
ms.topic: how-to
13
13
ms.tgt_pltfrm: na
14
14
ms.workload: identity
15
-
ms.date: 09/30/2020
15
+
ms.date: 02/23/2022
16
16
ms.author: barclayn
17
17
ms.collection: M365-identity-device-management
18
18
---
@@ -36,9 +36,9 @@ In this article, you learn how to view the service principal of a managed identi
36
36
37
37
This procedure demonstrates how to view the service principal of a VM with system assigned identity enabled (the same steps apply for an application).
38
38
39
-
1.Click**Azure Active Directory** and then click**Enterprise applications**.
40
-
2. Under **Application Type**, choose **All Applications** and then click**Apply**.
41
-
3. In the search filter box, type the name of the Azure resource that has managed identity enabled or choose it from the list presented.
39
+
1.Select**Azure Active Directory** and then select**Enterprise applications**.
40
+
2. Under **Application Type**, choose **All Applications** and then select**Apply**.
41
+
3. In the search filter box, type the name of the Azure resource that has managed identities enabled or choose it from the list.
42
42
43
43

# Known issues with managed identities for Azure resources
23
23
24
24
This article discusses a couple of issues around managed identities and how to address them. Common questions about managed identities are documented in our [frequently asked questions](managed-identities-faq.md) article.
25
25
## VM fails to start after being moved
26
26
27
-
If you move a VM in a running state from a resource group or subscription, it continues to run during the move. However, after the move, if the VM is stopped and restarted, it will fail to start. This issue happens because the VM is not updating the reference to the managed identities for Azure resources identity and continues to point to it in the old resource group.
27
+
If you move a VM in a running state from a resource group or subscription, it continues to run during the move. However, after the move, if the VM is stopped and restarted, it fails to start. This issue happens because the VM doesn't update the managed identity reference and it continues to use an outdated URI.
28
28
29
29
**Workaround**
30
30
@@ -46,7 +46,7 @@ az vm update -n <VM Name> -g <Resource Group> --remove tags.fixVM
46
46
47
47
## Transferring a subscription between Azure AD directories
48
48
49
-
Managed identities do not get updated when a subscription is moved/transferred to another directory. As a result, any existent system-assigned or user-assigned managed identities will be broken.
49
+
Managed identities don't get updated when a subscription is moved/transferred to another directory. As a result, any existent system-assigned or user-assigned managed identities will be broken.
50
50
51
51
Workaround for managed identities in a subscription that has been moved to another directory:
Copy file name to clipboardExpand all lines: articles/active-directory/managed-identities-azure-resources/managed-identities-faq.md
+14-13Lines changed: 14 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.devlang:
12
12
ms.topic: conceptual
13
13
ms.tgt_pltfrm:
14
14
ms.workload: identity
15
-
ms.date: 01/11/2022
15
+
ms.date: 02/23/2022
16
16
ms.author: barclayn
17
17
---
18
18
@@ -36,9 +36,9 @@ az resource list --query "[?identity.type=='SystemAssigned'].{Name:name, princi
36
36
### Which Azure RBAC permissions are required to use a managed identity on a resource?
37
37
38
38
- System-assigned managed identity: You need write permissions over the resource. For example, for virtual machines you need `Microsoft.Compute/virtualMachines/write`. This action is included in resource specific built-in roles like [Virtual Machine Contributor](../../role-based-access-control/built-in-roles.md#virtual-machine-contributor).
39
-
- Assigning user-assigned managed identities to resources: You need write permissions over the resource. For example, for virtual machines you need `Microsoft.Compute/virtualMachines/write`. You will also need `Microsoft.ManagedIdentity/userAssignedIdentities/*/assign/action` action over the user-assigned identity. This action is included in the [Managed Identity Operator](../../role-based-access-control/built-in-roles.md#managed-identity-operator) built-in role.
39
+
- Assigning user-assigned managed identities to resources: You need write permissions over the resource. For example, for virtual machines you need `Microsoft.Compute/virtualMachines/write`. You'll also need `Microsoft.ManagedIdentity/userAssignedIdentities/*/assign/action` action over the user-assigned identity. This action is included in the [Managed Identity Operator](../../role-based-access-control/built-in-roles.md#managed-identity-operator) built-in role.
40
40
- Managing user-assigned identities: To create or delete user-assigned managed identities, you need the [Managed Identity Contributor](../../role-based-access-control/built-in-roles.md#managed-identity-contributor) role assignment.
41
-
- Managing role assignments for managed identities: You need the [Owner](../../role-based-access-control/built-in-roles.md#all) or [User Access Administrator](../../role-based-access-control/built-in-roles.md#all) role assignment over the resource to which you're granting access. You will need the [Reader](../../role-based-access-control/built-in-roles.md#all) role assignment to the resource with a system-assigned identity, or to the user-assigned identity that is being given the role assignment. If you do not have read access, you can search by "User, group, or service principal" to find the identity's backing service principal, instead of searching by managed identity while adding the role assignment. [Read more about assigning Azure roles](../../role-based-access-control/role-assignments-portal.md).
41
+
- Managing role assignments for managed identities: You need the [Owner](../../role-based-access-control/built-in-roles.md#all) or [User Access Administrator](../../role-based-access-control/built-in-roles.md#all) role assignment over the resource to which you're granting access. You'll need the [Reader](../../role-based-access-control/built-in-roles.md#all) role assignment to the resource with a system-assigned identity, or to the user-assigned identity that is being given the role assignment. If you don't have read access, you can search by "User, group, or service principal" to find the identity's backing service principal, instead of searching by managed identity while adding the role assignment. [Read more about assigning Azure roles](../../role-based-access-control/role-assignments-portal.md).
42
42
43
43
### How do I prevent the creation of user-assigned managed identities?
44
44
@@ -85,7 +85,7 @@ At this point, any attempt to create a user-assigned managed identity in the res
85
85
86
86
### Do managed identities have a backing app object?
87
87
88
-
No. Managed identities and Azure AD App Registrations are not the same thing in the directory.
88
+
No. Managed identities and Azure AD App Registrations aren't the same thing in the directory.
89
89
90
90
App registrations have two components: An Application Object + A Service Principal Object.
91
91
Managed Identities for Azure resources have only one of those components: A Service Principal Object.
@@ -97,19 +97,19 @@ Managed identities don't have an application object in the directory, which is w
97
97
> [!NOTE]
98
98
> How managed identities authenticate is an internal implementation detail that is subject to change without notice.
99
99
100
-
Managed identities use certificate-based authentication. Each managed identity’s credential has an expiration of 90 days and it is rolled after 45 days.
100
+
Managed identities use certificate-based authentication. Each managed identity’s credential has an expiration of 90 days and it's rolled after 45 days.
101
101
102
102
### What identity will IMDS default to if don't specify the identity in the request?
103
103
104
104
- If system assigned managed identity is enabled and no identity is specified in the request, Azure Instance Metadata Service (IMDS) defaults to the system assigned managed identity.
105
-
- If system assigned managed identity is not enabled, and only one user assigned managed identity exists, IMDS defaults to that single user assigned managed identity.
106
-
- If system assigned managed identity is not enabled, and multiple user assigned managed identities exist, then you are required to specify a managed identity in the request.
105
+
- If system assigned managed identity isn't enabled, and only one user assigned managed identity exists, IMDS defaults to that single user assigned managed identity.
106
+
- If system assigned managed identity isn't enabled, and multiple user assigned managed identities exist, then you are required to specify a managed identity in the request.
107
107
108
108
## Limitations
109
109
110
110
### Can the same managed identity be used across multiple regions?
111
111
112
-
In short, yes you can use user assigned managed identities in more than one Azure region. The longer answer is that while user assigned managed identities are created as regional resources the associated [service principal](../develop/app-objects-and-service-principals.md#service-principal-object) (SP) created in Azure AD is available globally. The service principal can be used from any Azure region and its availability is dependent on the availability of Azure AD. For example, if you created a user assigned managed identity in the South-Central region and that region becomes unavailable this issue only impacts [control plane](../../azure-resource-manager/management/control-plane-and-data-plane.md) activities on the managed identity itself. The activities performed by any resources already configured to use the managed identities would not be impacted.
112
+
In short, yes you can use user assigned managed identities in more than one Azure region. The longer answer is that while user assigned managed identities are created as regional resources the associated [service principal](../develop/app-objects-and-service-principals.md#service-principal-object) (SP) created in Azure AD is available globally. The service principal can be used from any Azure region and its availability is dependent on the availability of Azure AD. For example, if you created a user assigned managed identity in the South-Central region and that region becomes unavailable this issue only impacts [control plane](../../azure-resource-manager/management/control-plane-and-data-plane.md) activities on the managed identity itself. The activities performed by any resources already configured to use the managed identities wouldn't be impacted.
113
113
114
114
### Does managed identities for Azure resources work with Azure Cloud Services?
115
115
@@ -118,17 +118,18 @@ No, there are no plans to support managed identities for Azure resources in Azur
118
118
119
119
### What is the security boundary of managed identities for Azure resources?
120
120
121
-
The security boundary of the identity is the resource to which it is attached to. For example, the security boundary for a Virtual Machine with managed identities for Azure resources enabled, is the Virtual Machine. Any code running on that VM, is able to call the managed identities for Azure resources endpoint and request tokens. It is the similar experience with other resources that support managed identities for Azure resources.
121
+
The security boundary of the identity is the resource to which it's attached. For example, the security boundary for a virtual machine with managed identities for Azure resources enabled, is the virtual machine. Any code running on that VM, is able to call the managed identities endpoint and request tokens. The experience is similar experience when working with other resources that support managed identities.
122
122
123
123
### Will managed identities be recreated automatically if I move a subscription to another directory?
124
124
125
125
No. If you move a subscription to another directory, you have to manually re-create them and grant Azure role assignments again.
126
+
126
127
- For system assigned managed identities: disable and re-enable.
127
128
- For user assigned managed identities: delete, re-create, and attach them again to the necessary resources (for example, virtual machines)
128
129
129
130
### Can I use a managed identity to access a resource in a different directory/tenant?
130
131
131
-
No. Managed identities do not currently support cross-directory scenarios.
132
+
No. Managed identities don't currently support cross-directory scenarios.
132
133
133
134
### Are there any rate limits that apply to managed identities?
134
135
@@ -141,11 +142,11 @@ Managed identities limits have dependencies on Azure service limits, Azure Insta
141
142
142
143
### Is it possible to move a user-assigned managed identity to a different resource group/subscription?
143
144
144
-
Moving a user-assigned managed identity to a different resource group is not supported.
145
+
Moving a user-assigned managed identity to a different resource group isn't supported.
145
146
146
-
### Are tokens cached after they are issued for a managed identity?
147
+
### Are managed identities tokens cached?
147
148
148
-
Managed identity tokens are cached by the underlying Azure infrastructure for performance and resiliency purposes: the back-end services for managed identities maintain a cache per resource URI for around 24 hours. This means that it can take several hours for changes to a managed identity's permissions to take effect, for example. Today, it is not possible to force a managed identity's token to be refreshed before its expiry. For more information, see [Limitation of using managed identities for authorization](managed-identity-best-practice-recommendations.md#limitation-of-using-managed-identities-for-authorization).
149
+
Managed identity tokens are cached by the underlying Azure infrastructure for performance and resiliency purposes: the back-end services for managed identities maintain a cache per resource URI for around 24 hours. It can take several hours for changes to a managed identity's permissions to take effect, for example. Today, it is not possible to force a managed identity's token to be refreshed before its expiry. For more information, see [Limitation of using managed identities for authorization](managed-identity-best-practice-recommendations.md#limitation-of-using-managed-identities-for-authorization).
0 commit comments