Skip to content

Commit 8c7e38f

Browse files
committed
Environtment variable info
1 parent 5cfd659 commit 8c7e38f

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

articles/azure-monitor/app/azure-ad-authentication.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -238,7 +238,7 @@ is included starting with beta version [opencensus-ext-azure 1.1b0](https://pypi
238238

239239
Construct the appropriate [credentials](/python/api/overview/azure/identity-readme#credentials) and pass them into the constructor of the Azure Monitor exporter. Make sure your connection string is set up with the instrumentation key and ingestion endpoint of your resource.
240240

241-
The following types of authentication are supported by the `Opencensus` Azure Monitor exporters. We recommend using managed identities in production environments.
241+
The `OpenCensus`` Azure Monitor exporters support these authentication types. We recommend using managed identities in production environments.
242242

243243
#### System-assigned managed identity
244244

@@ -310,19 +310,19 @@ You can disable local authentication by using the Azure portal or Azure Policy o
310310

311311
1. From your Application Insights resource, select **Properties** under the **Configure** heading in the menu on the left. Select **Enabled (click to change)** if the local authentication is enabled.
312312

313-
:::image type="content" source="./media/azure-ad-authentication/enabled.png" alt-text="Screenshot that shows Properties under the Configure section and the Enabled (click to change) local authentication button.":::
313+
:::image type="content" source="./media/azure-ad-authentication/enabled.png" alt-text="Screenshot that shows Properties under the Configure section and the Enabled (select to change) local authentication button.":::
314314

315315
1. Select **Disabled** and apply changes.
316316

317317
:::image type="content" source="./media/azure-ad-authentication/disable.png" alt-text="Screenshot that shows local authentication with the Enabled/Disabled button.":::
318318

319319
1. After your resource has disabled local authentication, you'll see the corresponding information in the **Overview** pane.
320320

321-
:::image type="content" source="./media/azure-ad-authentication/overview.png" alt-text="Screenshot that shows the Overview tab with the Disabled (click to change) local authentication button.":::
321+
:::image type="content" source="./media/azure-ad-authentication/overview.png" alt-text="Screenshot that shows the Overview tab with the Disabled (select to change) local authentication button.":::
322322

323323
### Azure Policy
324324

325-
Azure Policy for `DisableLocalAuth` will deny users the ability to create a new Application Insights resource without this property set to `true`. The policy name is `Application Insights components should block non-AAD auth ingestion`.
325+
Azure Policy for `DisableLocalAuth` denies users the ability to create a new Application Insights resource without this property set to `true`. The policy name is `Application Insights components should block non-AAD auth ingestion`.
326326

327327
To apply this policy definition to your subscription, [create a new policy assignment and assign the policy](../../governance/policy/assign-policy-portal.md).
328328

@@ -432,7 +432,7 @@ The following example shows the Azure Resource Manager template you can use to c
432432

433433
### Token audience
434434

435-
When developing a custom client to obtain an access token from Azure AD for the purpose of submitting telemetry to Application Insights, refer to the table provided below to determine the appropriate audience string for your particular host environment.
435+
When developing a custom client to obtain an access token from Azure AD for submitting telemetry to Application Insights, refer to the following table to determine the appropriate audience string for your particular host environment.
436436

437437
| Azure cloud version | Token audience value |
438438
| --- | --- |
@@ -444,15 +444,15 @@ If you're using sovereign clouds, you can find the audience information in the c
444444

445445
_InstrumentationKey={profile.InstrumentationKey};IngestionEndpoint={ingestionEndpoint};LiveEndpoint={liveDiagnosticsEndpoint};AADAudience={aadAudience}_
446446

447-
Please note that the audience parameter, AADAudience, may vary depending on your specific environment.
447+
The audience parameter, AADAudience, may vary depending on your specific environment.
448448

449449
## Troubleshooting
450450

451451
This section provides distinct troubleshooting scenarios and steps that you can take to resolve an issue before you raise a support ticket.
452452

453453
### Ingestion HTTP errors
454454

455-
The ingestion service will return specific errors, regardless of the SDK language. Network traffic can be collected by using a tool such as Fiddler. You should filter traffic to the ingestion endpoint set in the connection string.
455+
The ingestion service returns specific errors, regardless of the SDK language. Network traffic can be collected by using a tool such as Fiddler. You should filter traffic to the ingestion endpoint set in the connection string.
456456

457457
#### HTTP/1.1 400 Authentication not supported
458458

@@ -510,7 +510,7 @@ You can inspect network traffic by using a tool like Fiddler. To enable the traf
510510

511511
Or add the following JVM args while running your application: `-Djava.net.useSystemProxies=true -Dhttps.proxyHost=localhost -Dhttps.proxyPort=8888`
512512

513-
If Azure AD is enabled in the agent, outbound traffic will include the HTTP header `Authorization`.
513+
If Azure AD is enabled in the agent, outbound traffic includes the HTTP header `Authorization`.
514514

515515
#### 401 Unauthorized
516516

@@ -529,7 +529,7 @@ If the following WARN message is seen in the log file `WARN c.m.a.TelemetryChann
529529
If you're using Fiddler, you might see the response header `HTTP/1.1 403 Forbidden - provided credentials do not grant the access to ingest the telemetry into the component`.
530530

531531
The root cause might be one of the following reasons:
532-
- You've created the resource with system-assigned managed identity enabled or you might have associated the user-assigned identity with the resource but forgot to add the Monitoring Metrics Publisher role to the resource (if using SAMI) or user-assigned identity (if using UAMI).
532+
- You've created the resource with a system-assigned managed identity or associated a user-assigned identity with it. However, you might have forgotten to add the Monitoring Metrics Publisher role to the resource (if using SAMI) or the user-assigned identity (if using UAMI).
533533
- You've provided the right credentials to get the access tokens, but the credentials don't belong to the right Application Insights resource. Make sure you see your resource (VM or app service) or user-assigned identity with Monitoring Metrics Publisher roles in your Application Insights resource.
534534

535535
#### Invalid Tenant ID
@@ -544,7 +544,7 @@ If the following exception is seen in the log file `com.microsoft.aad.msal4j.Msa
544544

545545
If the following exception is seen in the log file `com.microsoft.aad.msal4j.MsalServiceException: Application with identifier <CLIENT_ID> was not found in the directory`, it indicates the agent wasn't successful in acquiring the access token. The probable reason is that you've provided an invalid or the wrong client ID in your client secret configuration
546546

547-
This scenario can occur if the application hasn't been installed by the administrator of the tenant or consented to by any user in the tenant. You might have sent your authentication request to the wrong tenant.
547+
If the administrator hasn't installed the application or no user in the tenant has consented to it, this scenario occurs. You may have sent your authentication request to the wrong tenant.
548548

549549
### [Python](#tab/python)
550550

0 commit comments

Comments
 (0)