You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-arc/servers/agent-release-notes-archive.md
+23Lines changed: 23 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,6 +19,29 @@ The Azure Connected Machine agent receives improvements on an ongoing basis. Thi
19
19
- Known issues
20
20
- Bug fixes
21
21
22
+
## Version 1.36 - November 2023
23
+
24
+
Download for [Windows](https://download.microsoft.com/download/5/e/9/5e9081ed-2ee2-4b3a-afca-a8d81425bcce/AzureConnectedMachineAgent.msi) or [Linux](manage-agent.md#installing-a-specific-version-of-the-agent)
25
+
26
+
### Known issues
27
+
28
+
The Windows Admin Center in Azure feature is incompatible with Azure Connected Machine agent version 1.36. Upgrade to version 1.37 or later to use this feature.
29
+
30
+
### New features
31
+
32
+
-[azcmagent show](azcmagent-show.md) now reports extended security license status on Windows Server 2012 server machines.
33
+
- Introduced a new [proxy bypass](manage-agent.md#proxy-bypass-for-private-endpoints) option, `ArcData`, that covers the SQL Server enabled by Azure Arc endpoints. This enables you to use a private endpoint with Azure Arc-enabled servers with the public endpoints for SQL Server enabled by Azure Arc.
34
+
- The [CPU limit for extension operations](agent-overview.md#agent-resource-governance) on Linux is now 30%. This increase helps improve reliability of extension install, upgrade, and uninstall operations.
35
+
- Older extension manager and machine configuration agent logs are automatically zipped to reduce disk space requirements.
36
+
- New executable names for the extension manager (`gc_extension_service`) and machine configuration (`gc_arc_service`) agents on Windows to help you distinguish the two services. For more information, see [Windows agent installation details](./agent-overview.md#windows-agent-installation-details).
37
+
38
+
### Bug fixes
39
+
40
+
-[azcmagent connect](azcmagent-connect.md) now uses the latest API version when creating the Azure Arc-enabled server resource to ensure Azure policies targeting new properties can take effect.
41
+
- Upgraded the OpenSSL library and PowerShell runtime shipped with the agent to include the latest security fixes.
42
+
- Fixed an issue that could prevent the agent from reporting the correct product type on Windows machines.
43
+
- Improved handling of upgrades when the previously installed extension version wasn't in a successful state.
44
+
22
45
## Version 1.35 - October 2023
23
46
24
47
Download for [Windows](https://download.microsoft.com/download/e/7/0/e70b1753-646e-4aea-bac4-40187b5128b0/AzureConnectedMachineAgent.msi) or [Linux](manage-agent.md#installing-a-specific-version-of-the-agent)
Copy file name to clipboardExpand all lines: articles/azure-arc/servers/agent-release-notes.md
+23-23Lines changed: 23 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,6 +16,29 @@ The Azure Connected Machine agent receives improvements on an ongoing basis. To
16
16
17
17
This page is updated monthly, so revisit it regularly. If you're looking for items older than six months, you can find them in [archive for What's new with Azure Connected Machine agent](agent-release-notes-archive.md).
18
18
19
+
## Version 1.41 - May 2024
20
+
21
+
### New features
22
+
23
+
- Certificate-based authentication is now supported when using a service principal to connect or disconnect the agent. For more information, see [authentication options for the azcmagent CLI](azcmagent-connect.md#authentication-options).
24
+
-[azcmagent check](azcmagent-check.md) now allows you to also check for the endpoints used by the SQL Server enabled by Azure Arc extension using the new `--extensions` flag. This can help you troubleshoot networking issues for both the OS and SQL management components. You can try this out by running `azcmagent check --extensions sql --location eastus` on a server, either before or after it is connected to Azure Arc.
25
+
26
+
### Fixed
27
+
28
+
- Fixed a memory leak in the Hybrid Instance Metadata service
29
+
- Better handling when IPv6 local loopback is disabled
30
+
- Improved reliability when upgrading extensions
31
+
- Improved reliability when enforcing CPU limits on Linux extensions
32
+
- PowerShell telemetry is now disabled by default for the extension manager and policy services
33
+
- The extension manager and policy services now support OpenSSL 3
34
+
- Colors are now disabled in the onboarding progress bar when the `--no-color` flag is used
35
+
- Improved detection and reporting for Windows machines that have custom [logon as a service rights](prerequisites.md#local-user-logon-right-for-windows-systems) configured.
36
+
- Improved accuracy when obtaining system metadata on Windows:
37
+
- VMUUID is now obtained from the Win32 API
38
+
- Physical memory is now checked using WMI
39
+
- Fixed an issue that could prevent the region selector in the [Windows GUI installer](onboard-windows-server.md) from loading
40
+
- Fixed permissions issues that could prevent the "himds" service from accessing necessary directories on Windows
41
+
19
42
## Version 1.40 - April 2024
20
43
21
44
Download for [Windows](https://download.microsoft.com/download/2/1/0/210f77ca-e069-412b-bd94-eac02a63255d/AzureConnectedMachineAgent.msi) or [Linux](manage-agent.md#installing-a-specific-version-of-the-agent)
@@ -93,29 +116,6 @@ Download for [Windows](https://download.microsoft.com/download/f/6/4/f64c574f-d3
93
116
- Removed the scheduled tasks for automatic agent upgrades (introduced in agent version 1.30). We'll reintroduce this functionality when the automatic upgrade mechanism is available.
94
117
- Resolved [Azure Connected Machine Agent Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35624)
95
118
96
-
## Version 1.36 - November 2023
97
-
98
-
Download for [Windows](https://download.microsoft.com/download/5/e/9/5e9081ed-2ee2-4b3a-afca-a8d81425bcce/AzureConnectedMachineAgent.msi) or [Linux](manage-agent.md#installing-a-specific-version-of-the-agent)
99
-
100
-
### Known issues
101
-
102
-
The Windows Admin Center in Azure feature is incompatible with Azure Connected Machine agent version 1.36. Upgrade to version 1.37 or later to use this feature.
103
-
104
-
### New features
105
-
106
-
-[azcmagent show](azcmagent-show.md) now reports extended security license status on Windows Server 2012 server machines.
107
-
- Introduced a new [proxy bypass](manage-agent.md#proxy-bypass-for-private-endpoints) option, `ArcData`, that covers the SQL Server enabled by Azure Arc endpoints. This enables you to use a private endpoint with Azure Arc-enabled servers with the public endpoints for SQL Server enabled by Azure Arc.
108
-
- The [CPU limit for extension operations](agent-overview.md#agent-resource-governance) on Linux is now 30%. This increase helps improve reliability of extension install, upgrade, and uninstall operations.
109
-
- Older extension manager and machine configuration agent logs are automatically zipped to reduce disk space requirements.
110
-
- New executable names for the extension manager (`gc_extension_service`) and machine configuration (`gc_arc_service`) agents on Windows to help you distinguish the two services. For more information, see [Windows agent installation details](./agent-overview.md#windows-agent-installation-details).
111
-
112
-
### Bug fixes
113
-
114
-
-[azcmagent connect](azcmagent-connect.md) now uses the latest API version when creating the Azure Arc-enabled server resource to ensure Azure policies targeting new properties can take effect.
115
-
- Upgraded the OpenSSL library and PowerShell runtime shipped with the agent to include the latest security fixes.
116
-
- Fixed an issue that could prevent the agent from reporting the correct product type on Windows machines.
117
-
- Improved handling of upgrades when the previously installed extension version wasn't in a successful state.
118
-
119
119
## Next steps
120
120
121
121
- Before evaluating or enabling Azure Arc-enabled servers across multiple hybrid machines, review [Connected Machine agent overview](agent-overview.md) to understand requirements, technical details about the agent, and deployment methods.
Specifies the Azure cloud instance. Must be used with the `--location` flag. If the machine is already connected to Azure Arc, the default value is the cloud to which the agent is already connected. Otherwise, the default value is "AzureCloud".
49
+
Specifies the Azure cloud instance. Must be used with the `--location` flag. If the machine is already connected to Azure Arc, the default value is the cloud to which the agent is already connected. Otherwise, the default value is AzureCloud.
43
50
44
51
Supported values:
45
52
46
53
* AzureCloud (public regions)
47
54
* AzureUSGovernment (Azure US Government regions)
48
55
* AzureChinaCloud (Microsoft Azure operated by 21Vianet regions)
49
56
57
+
`-e`, `--extensions`
58
+
59
+
Includes extra checks for extension endpoints to help validate end-to-end scenario readiness. This flag is available in agent version 1.41 and later.
60
+
61
+
Supported values:
62
+
63
+
* all (checks all supported extension endpoints)
64
+
* sql (SQL Server enabled by Azure Arc)
65
+
50
66
`-l`, `--location`
51
67
52
68
The Azure region to check connectivity with. If the machine is already connected to Azure Arc, the current region is selected as the default.
There are 4 ways to provide authentication credentials to the Azure connected machine agent. Choose one authentication option and replace the `[authentication]` section in the usage syntax with the recommended flags.
44
+
There are four ways to provide authentication credentials to the Azure connected machine agent. Choose one authentication option and replace the `[authentication]` section in the usage syntax with the recommended flags.
45
45
46
46
### Interactive browser login (Windows-only)
47
47
48
-
This option is the default on Windows operating systems with a desktop experience. It login page opens in your default web browser. This option might be required if your organization has configured conditional access policies that require you to log in from trusted machines.
48
+
This option is the default on Windows operating systems with a desktop experience. It login page opens in your default web browser. This option might be required if your organization configured conditional access policies that require you to log in from trusted machines.
49
49
50
50
No flag is required to use the interactive browser login.
51
51
@@ -55,11 +55,19 @@ This option generates a code that you can use to log in on a web browser on anot
55
55
56
56
To authenticate with a device code, use the `--use-device-code` flag. If the account you're logging in with and the subscription where you're registering the server aren't in the same tenant, you must also provide the tenant ID for the subscription with `--tenant-id [tenant]`.
57
57
58
-
### Service principal
58
+
### Service principal with secret
59
59
60
-
Service principals allow you to authenticate non-interactively and are often used for at-scale deployments where the same script is run across multiple servers. It's recommended that you provide service principal information via a configuration file (see `--config`) to avoid exposing the secret in any console logs. The service principal should also be dedicated for Arc onboarding and have as few permissions as possible, to limit the impact of a stolen credential.
60
+
Service principals allow you to authenticate non-interactively and are often used for at-scale deployments where the same script is run across multiple servers. Microsoft recommends providing service principal information via a configuration file (see `--config`) to avoid exposing the secret in any console logs. The service principal should also be dedicated for Arc onboarding and have as few permissions as possible, to limit the impact of a stolen credential.
61
61
62
-
To authenticate with a service principal, provide the service principal's application ID, secret, and tenant ID: `--service-principal-id [appid] --service-principal-secret [secret] --tenant-id [tenantid]`
62
+
To authenticate with a service principal using a secret, provide the service principal's application ID, secret, and tenant ID: `--service-principal-id [appid] --service-principal-secret [secret] --tenant-id [tenantid]`
63
+
64
+
### Service principal with certificate
65
+
66
+
Certificate-based authentication is a more secure way to authenticate using service principals. The agent accepts both PCKS #12 (.PFX) files and ASCII-encoded files (such as .PEM) that contain both the private and public keys. The certificate must be available on the local disk and the user running the `azcmagent` command needs read access to the file. Password-protected PFX files are not supported.
67
+
68
+
To authenticate with a service principal using a certificate, provide the service principal's application ID, tenant ID, and path to the certificate file: `--service-principal-id [appId] --service-principal-cert [pathToPEMorPFXfile] --tenant-id [tenantid]`
69
+
70
+
For more information, see [create a service principal for RBAC with certificate-based authentication](/cli/azure/azure-cli-sp-tutorial-3).
63
71
64
72
### Access token
65
73
@@ -128,11 +136,15 @@ Sample value: FileServer01
128
136
129
137
`-i`, `--service-principal-id`
130
138
131
-
Specifies the application ID of the service principal used to create the Azure Arc-enabled server resource in Azure. Must be used with the `--service-principal-secret` and `--tenant-id` flags. For more information, see [authentication options](#authentication-options).
139
+
Specifies the application ID of the service principal used to create the Azure Arc-enabled server resource in Azure. Must be used with the `--tenant-id` and either the `--service-principal-secret` or `--service-principal-cert` flags. For more information, see [authentication options](#authentication-options).
140
+
141
+
`--service-principal-cert`
142
+
143
+
Specifies the path to a service principal certificate file. Must be used with the `--service-principal-id` and `--tenant-id` flags. The certificate must include a private key and can be in a PKCS #12 (.PFX) or ASCII-encoded text (.PEM, .CRT) format. Password-protected PFX files are not supported. For more information, see [authentication options](#authentication-options).
132
144
133
145
`-p`, `--service-principal-secret`
134
146
135
-
Specifies the service principal secret. Must be used with the `--service-principal-id` and `--tenant-id` flags. To avoid exposing the secret in console logs, it's recommended to pass in the service principal secret in a configuration file. For more information, see [authentication options](#authentication-options).
147
+
Specifies the service principal secret. Must be used with the `--service-principal-id` and `--tenant-id` flags. To avoid exposing the secret in console logs, Microsoft recommended providing the service principal secret in a configuration file. For more information, see [authentication options](#authentication-options).
0 commit comments