You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-monitor/app/azure-ad-authentication.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -238,7 +238,7 @@ is included starting with beta version [opencensus-ext-azure 1.1b0](https://pypi
238
238
239
239
Construct the appropriate [credentials](/python/api/overview/azure/identity-readme#credentials) and pass them into the constructor of the Azure Monitor exporter. Make sure your connection string is set up with the instrumentation key and ingestion endpoint of your resource.
240
240
241
-
The following types of authentication are supported by the `Opencensus` Azure Monitor exporters. We recommend using managed identities in production environments.
241
+
The `OpenCensus`` Azure Monitor exporters support these authentication types. We recommend using managed identities in production environments.
242
242
243
243
#### System-assigned managed identity
244
244
@@ -310,19 +310,19 @@ You can disable local authentication by using the Azure portal or Azure Policy o
310
310
311
311
1. From your Application Insights resource, select **Properties** under the **Configure** heading in the menu on the left. Select **Enabled (click to change)** if the local authentication is enabled.
312
312
313
-
:::image type="content" source="./media/azure-ad-authentication/enabled.png" alt-text="Screenshot that shows Properties under the Configure section and the Enabled (click to change) local authentication button.":::
313
+
:::image type="content" source="./media/azure-ad-authentication/enabled.png" alt-text="Screenshot that shows Properties under the Configure section and the Enabled (select to change) local authentication button.":::
314
314
315
315
1. Select **Disabled** and apply changes.
316
316
317
317
:::image type="content" source="./media/azure-ad-authentication/disable.png" alt-text="Screenshot that shows local authentication with the Enabled/Disabled button.":::
318
318
319
319
1. After your resource has disabled local authentication, you'll see the corresponding information in the **Overview** pane.
320
320
321
-
:::image type="content" source="./media/azure-ad-authentication/overview.png" alt-text="Screenshot that shows the Overview tab with the Disabled (click to change) local authentication button.":::
321
+
:::image type="content" source="./media/azure-ad-authentication/overview.png" alt-text="Screenshot that shows the Overview tab with the Disabled (select to change) local authentication button.":::
322
322
323
323
### Azure Policy
324
324
325
-
Azure Policy for `DisableLocalAuth`will deny users the ability to create a new Application Insights resource without this property set to `true`. The policy name is `Application Insights components should block non-AAD auth ingestion`.
325
+
Azure Policy for `DisableLocalAuth`denies users the ability to create a new Application Insights resource without this property set to `true`. The policy name is `Application Insights components should block non-AAD auth ingestion`.
326
326
327
327
To apply this policy definition to your subscription, [create a new policy assignment and assign the policy](../../governance/policy/assign-policy-portal.md).
328
328
@@ -432,7 +432,7 @@ The following example shows the Azure Resource Manager template you can use to c
432
432
433
433
### Token audience
434
434
435
-
When developing a custom client to obtain an access token from Azure AD for the purpose of submitting telemetry to Application Insights, refer to the table provided below to determine the appropriate audience string for your particular host environment.
435
+
When developing a custom client to obtain an access token from Azure AD for submitting telemetry to Application Insights, refer to the following table to determine the appropriate audience string for your particular host environment.
436
436
437
437
| Azure cloud version | Token audience value |
438
438
| --- | --- |
@@ -444,15 +444,15 @@ If you're using sovereign clouds, you can find the audience information in the c
Please note that the audience parameter, AADAudience, may vary depending on your specific environment.
447
+
The audience parameter, AADAudience, may vary depending on your specific environment.
448
448
449
449
## Troubleshooting
450
450
451
451
This section provides distinct troubleshooting scenarios and steps that you can take to resolve an issue before you raise a support ticket.
452
452
453
453
### Ingestion HTTP errors
454
454
455
-
The ingestion service will return specific errors, regardless of the SDK language. Network traffic can be collected by using a tool such as Fiddler. You should filter traffic to the ingestion endpoint set in the connection string.
455
+
The ingestion service returns specific errors, regardless of the SDK language. Network traffic can be collected by using a tool such as Fiddler. You should filter traffic to the ingestion endpoint set in the connection string.
456
456
457
457
#### HTTP/1.1 400 Authentication not supported
458
458
@@ -510,7 +510,7 @@ You can inspect network traffic by using a tool like Fiddler. To enable the traf
510
510
511
511
Or add the following JVM args while running your application: `-Djava.net.useSystemProxies=true -Dhttps.proxyHost=localhost -Dhttps.proxyPort=8888`
512
512
513
-
If Azure AD is enabled in the agent, outbound traffic will include the HTTP header `Authorization`.
513
+
If Azure AD is enabled in the agent, outbound traffic includes the HTTP header `Authorization`.
514
514
515
515
#### 401 Unauthorized
516
516
@@ -529,7 +529,7 @@ If the following WARN message is seen in the log file `WARN c.m.a.TelemetryChann
529
529
If you're using Fiddler, you might see the response header `HTTP/1.1 403 Forbidden - provided credentials do not grant the access to ingest the telemetry into the component`.
530
530
531
531
The root cause might be one of the following reasons:
532
-
- You've created the resource with system-assigned managed identity enabled or you might have associated the user-assigned identity with the resource but forgot to add the Monitoring Metrics Publisher role to the resource (if using SAMI) or user-assigned identity (if using UAMI).
532
+
- You've created the resource with a system-assigned managed identity or associated a user-assigned identity with it. However, you might have forgotten to add the Monitoring Metrics Publisher role to the resource (if using SAMI) or the user-assigned identity (if using UAMI).
533
533
- You've provided the right credentials to get the access tokens, but the credentials don't belong to the right Application Insights resource. Make sure you see your resource (VM or app service) or user-assigned identity with Monitoring Metrics Publisher roles in your Application Insights resource.
534
534
535
535
#### Invalid Tenant ID
@@ -544,7 +544,7 @@ If the following exception is seen in the log file `com.microsoft.aad.msal4j.Msa
544
544
545
545
If the following exception is seen in the log file `com.microsoft.aad.msal4j.MsalServiceException: Application with identifier <CLIENT_ID> was not found in the directory`, it indicates the agent wasn't successful in acquiring the access token. The probable reason is that you've provided an invalid or the wrong client ID in your client secret configuration
546
546
547
-
This scenario can occur if the application hasn't been installed by the administrator of the tenant or consented to by any user in the tenant. You might have sent your authentication request to the wrong tenant.
547
+
If the administrator hasn't installed the application or no user in the tenant has consented to it, this scenario occurs. You may have sent your authentication request to the wrong tenant.
0 commit comments