Skip to content

Commit 88c1ffb

Browse files
authored
Merge pull request #101150 from MarkusVi/arturo114
arturo114
2 parents 0698844 + 23b7a64 commit 88c1ffb

File tree

1 file changed

+15
-1
lines changed

1 file changed

+15
-1
lines changed

articles/active-directory/managed-identities-azure-resources/tutorial-windows-vm-access-nonaad.md

Lines changed: 15 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,13 @@ You learn how to:
3535

3636
[!INCLUDE [msi-tut-prereqs](../../../includes/active-directory-msi-tut-prereqs.md)]
3737

38+
39+
## Enable
40+
41+
[!INCLUDE [msi-tut-enable](../../../includes/active-directory-msi-tut-enable.md)]
42+
43+
44+
3845
## Grant access  
3946

4047
This section shows how to grant your VM access to a Secret stored in a Key Vault. Using managed identities for Azure resources, your code can get access tokens to authenticate to resources that support Azure AD authentication.  However, not all Azure services support Azure AD authentication. To use managed identities for Azure resources with those services, store the service credentials in Azure Key Vault, and use the VM's managed identity to access Key Vault to retrieve the credentials. 
@@ -62,7 +69,7 @@ Next, add a secret to the Key Vault, so that later you can retrieve the secret u
6269
5. Leave the activation date and expiration date clear, and leave **Enabled** as **Yes**
6370
6. Click **Create** to create the secret. 
6471

65-
## Get an access token  
72+
## Access data  
6673

6774
This section shows how to get an access token using the VM identity and use it to retrieve the secret from the Key Vault. If you don’t have PowerShell 4.3.1 or greater installed, you'll need to [download and install the latest version](https://docs.microsoft.com/powershell/azure/overview).
6875

@@ -105,6 +112,13 @@ First, we use the VM’s system-assigned managed identity to get an access token
105112
106113
Once you’ve retrieved the secret from the Key Vault, you can use it to authenticate to a service that requires a name and password. 
107114
115+
116+
## Disable
117+
118+
[!INCLUDE [msi-tut-disable](../../../includes/active-directory-msi-tut-disable.md)]
119+
120+
121+
108122
## Next steps
109123
110124
In this tutorial, you learned how use a Windows VM system-assigned managed identity to access Azure Key Vault. To learn more about Azure Key Vault see:

0 commit comments

Comments
 (0)