You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Quickstart: Create and publish an Azure Managed Application definition
@@ -261,7 +261,7 @@ To learn more, see [Get started with CreateUiDefinition](create-uidefinition-ove
261
261
262
262
Add the two files to a package file named _app.zip_. The two files must be at the root level of the _.zip_ file. If the files are in a folder, when you create the managed application definition, you receive an error that states the required files aren't present.
263
263
264
-
Upload _app.zip_ to an Azure storage account so you can use it when you deploy the managed application's definition. The storage account name must be globally unique across Azure and the length must be 3-24 characters with only lowercase letters and numbers. In the `Name` parameter, replace the placeholder `demostorageaccount` with your unique storage account name.
264
+
Upload _app.zip_ to an Azure storage account so you can use it when you deploy the managed application's definition. The storage account name must be globally unique across Azure and the length must be 3-24 characters with only lowercase letters and numbers. In the command, replace the placeholder `<demostorageaccount>` including the angle brackets (`<>`), with your unique storage account name.
@@ -308,7 +308,7 @@ The command opens your default browser and prompts you to sign in to Azure. For
308
308
az group create --name packageStorageGroup --location westus3
309
309
310
310
az storage account create \
311
-
--name demostorageaccount \
311
+
--name <demostorageaccount> \
312
312
--resource-group packageStorageGroup \
313
313
--location westus3 \
314
314
--sku Standard_LRS \
@@ -321,13 +321,13 @@ After you add the role to the storage account, it takes a few minutes to become
321
321
322
322
```azurecli
323
323
az storage container create \
324
-
--account-name demostorageaccount \
324
+
--account-name <demostorageaccount> \
325
325
--name appcontainer \
326
326
--auth-mode login \
327
327
--public-access blob
328
328
329
329
az storage blob upload \
330
-
--account-name demostorageaccount \
330
+
--account-name <demostorageaccount> \
331
331
--container-name appcontainer \
332
332
--auth-mode login \
333
333
--name "app.zip" \
@@ -404,12 +404,12 @@ The next step is to select a user, security group, or application for managing t
404
404
405
405
# [PowerShell](#tab/azure-powershell)
406
406
407
-
This example uses a security group, and your Azure Active Directory account should be a member of the group. To get the group's object ID, replace the placeholder `managedAppDemo` with your group's name. You use this variable's value when you deploy the managed application definition.
407
+
This example uses a security group, and your Azure Active Directory account should be a member of the group. To get the group's object ID, replace the placeholder `<managedAppDemo>` including the angle brackets (`<>`), with your group's name. You use this variable's value when you deploy the managed application definition.
408
408
409
409
To create a new Azure Active Directory group, go to [Manage Azure Active Directory groups and group membership](../../active-directory/fundamentals/how-to-manage-groups.md).
Next, get the role definition ID of the Azure built-in role you want to grant access to the user, group, or application. You use this variable's value when you deploy the managed application definition.
This example uses a security group, and your Azure Active Directory account should be a member of the group. To get the group's object ID, replace the placeholder `managedAppDemo` with your group's name. You use this variable's value when you deploy the managed application definition.
423
+
This example uses a security group, and your Azure Active Directory account should be a member of the group. To get the group's object ID, replace the placeholder `<managedAppDemo>` including the angle brackets (`<>`), with your group's name. You use this variable's value when you deploy the managed application definition.
424
424
425
425
To create a new Azure Active Directory group, go to [Manage Azure Active Directory groups and group membership](../../active-directory/fundamentals/how-to-manage-groups.md).
426
426
427
427
```azurecli
428
-
principalid=$(az ad group show --group managedAppDemo --query id --output tsv)
428
+
principalid=$(az ad group show --group <managedAppDemo> --query id --output tsv)
429
429
```
430
430
431
431
Next, get the role definition ID of the Azure built-in role you want to grant access to the user, group, or application. You use this variable's value when you deploy the managed application definition.
@@ -485,11 +485,11 @@ Create a resource group for your managed application definition.
485
485
az group create --name appDefinitionGroup --location westus3
486
486
```
487
487
488
-
In the `blob` command's `account-name` parameter, replace the placeholder `demostorageaccount` with your unique storage account name. The `blob` command creates a variable to store the URL for the package _.zip_ file. That variable is used in the command that creates the managed application definition.
488
+
In the `blob` command's `account-name` parameter, replace the placeholder `<demostorageaccount>` including the angle brackets (`<>`), with your unique storage account name. The `blob` command creates a variable to store the URL for the package _.zip_ file. That variable is used in the command that creates the managed application definition.
# Quickstart: Bring your own storage to create and publish an Azure Managed Application definition
@@ -262,7 +262,7 @@ To learn more, go to [Get started with CreateUiDefinition](create-uidefinition-o
262
262
263
263
Add the two files to a package file named _app.zip_. The two files must be at the root level of the _.zip_ file. If the files are in a folder, when you create the managed application definition, you receive an error that states the required files aren't present.
264
264
265
-
Upload _app.zip_ to an Azure storage account so you can use it when you deploy the managed application's definition. The storage account name must be globally unique across Azure and the length must be 3-24 characters with only lowercase letters and numbers. In the `Name` parameter, replace the placeholder `demostorageaccount` with your unique storage account name.
265
+
Upload _app.zip_ to an Azure storage account so you can use it when you deploy the managed application's definition. The storage account name must be globally unique across Azure and the length must be 3-24 characters with only lowercase letters and numbers. In the command, replace the placeholder `<demostorageaccount>` including the angle brackets (`<>`), with your unique storage account name.
az group create --name packageStorageGroup --location westus3
300
300
301
301
az storage account create \
302
-
--name demostorageaccount \
302
+
--name <demostorageaccount> \
303
303
--resource-group packageStorageGroup \
304
304
--location westus3 \
305
305
--sku Standard_LRS \
@@ -312,13 +312,13 @@ After you add the role to the storage account, it takes a few minutes to become
312
312
313
313
```azurecli
314
314
az storage container create \
315
-
--account-name demostorageaccount \
315
+
--account-name <demostorageaccount> \
316
316
--name appcontainer \
317
317
--auth-mode login \
318
318
--public-access blob
319
319
320
320
az storage blob upload \
321
-
--account-name demostorageaccount \
321
+
--account-name <demostorageaccount> \
322
322
--container-name appcontainer \
323
323
--auth-mode login \
324
324
--name "app.zip" \
@@ -331,7 +331,7 @@ Use the following command to store the package file's URI in a variable named `p
331
331
332
332
```azurecli
333
333
packageuri=$(az storage blob url \
334
-
--account-name demostorageaccount \
334
+
--account-name <demostorageaccount> \
335
335
--container-name appcontainer \
336
336
--auth-mode login \
337
337
--name app.zip --output tsv)
@@ -350,7 +350,7 @@ You store your managed application definition in your own storage account so tha
350
350
351
351
Create the storage account for your managed application definition. The storage account name must be globally unique across Azure and the length must be 3-24 characters with only lowercase letters and numbers.
352
352
353
-
This example creates a new resource group named `byosDefinitionStorageGroup`. In the `Name` parameter, replace the placeholder `definitionstorage` with your unique storage account name.
353
+
This example creates a new resource group named `byosDefinitionStorageGroup`. In the command, replace the placeholder `<definitionstorage>` including the angle brackets (`<>`), with your unique storage account name.
Use the following command to store the storage account's resource ID in a variable named `storageid`. You use the variable's value when you deploy the managed application definition.
az group create --name byosDefinitionStorageGroup --location westus3
378
378
379
379
az storage account create \
380
-
--name definitionstorage \
380
+
--name <definitionstorage> \
381
381
--resource-group byosDefinitionStorageGroup \
382
382
--location westus3 \
383
383
--sku Standard_LRS \
@@ -387,7 +387,7 @@ az storage account create \
387
387
Use the following command to store the storage account's resource ID in a variable named `storageid`. You use the variable's value to set up the storage account's role assignment and when you deploy the managed application definition.
388
388
389
389
```azurecli
390
-
storageid=$(az storage account show --resource-group byosDefinitionStorageGroup --name definitionstorage --query id --output tsv)
390
+
storageid=$(az storage account show --resource-group byosDefinitionStorageGroup --name <definitionstorage> --query id --output tsv)
391
391
```
392
392
393
393
---
@@ -430,20 +430,20 @@ The _Appliance Resource Provider_ is a service principal in your Azure Active Di
430
430
431
431
The next step is to select a user, security group, or application for managing the resources for the customer. This identity has permissions on the managed resource group according to the assigned role. The role can be any Azure built-in role like Owner or Contributor.
432
432
433
-
This example uses a security group, and your Azure Active Directory account should be a member of the group. To get the group's object ID, replace the placeholder `managedAppDemo` with your group's name. You use the variable's value when you deploy the managed application definition.
433
+
This example uses a security group, and your Azure Active Directory account should be a member of the group. To get the group's object ID, replace the placeholder `<managedAppDemo>` including the angle brackets (`<>`), with your group's name. You use the variable's value when you deploy the managed application definition.
434
434
435
435
To create a new Azure Active Directory group, go to [Manage Azure Active Directory groups and group membership](../../active-directory/fundamentals/how-to-manage-groups.md).
"value": "{placeholder for managed application name}"
534
+
"value": "<placeholder for managed application name>"
535
535
},
536
536
"definitionStorageResourceID": {
537
-
"value": "{placeholder for you storage account ID}"
537
+
"value": "<placeholder for you storage account ID>"
538
538
},
539
539
"packageFileUri": {
540
-
"value": "{placeholder for the packageFileUri}"
540
+
"value": "<placeholder for the packageFileUri>"
541
541
},
542
542
"principalId": {
543
-
"value": "{placeholder for principalid value}"
543
+
"value": "<placeholder for principalid value>"
544
544
},
545
545
"roleId": {
546
-
"value": "{placeholder for roleid value}"
546
+
"value": "<placeholder for roleid value>"
547
547
}
548
548
}
549
549
}
@@ -559,9 +559,9 @@ The following table describes the parameter values for the managed application d
559
559
|`principalId`| The publishers Principal ID that needs permissions to manage resources in the managed resource group. Use your `principalid` variable's value. |
560
560
|`roleId`| Role ID for permissions to the managed resource group. For example Owner, Contributor, Reader. Use your `roleid` variable's value. |
561
561
562
-
To get your variable values from the command prompt:
563
-
- Azure PowerShell: type `$variableName` to display the value.
564
-
- Azure CLI: type `echo $variableName` to display the value.
562
+
To get your variable values:
563
+
- Azure PowerShell: In PowerShell, type `$variableName` to display a variable's value.
564
+
- Azure CLI: In Bash, type `echo $variableName` to display a variable's value.
565
565
566
566
## Deploy the definition
567
567
@@ -597,12 +597,12 @@ az deployment group create \
597
597
598
598
During deployment, the template's `storageAccountId` property uses your storage account's resource ID and creates a new container with the case-sensitive name `applicationdefinitions`. The files from the _.zip_ package you specified during the deployment are stored in the new container.
599
599
600
-
You can use the following commands to verify that the managed application definition files are saved in your storage account's container. In the `Name` parameter, replace the placeholder `definitionstorage` with your unique storage account name.
600
+
You can use the following commands to verify that the managed application definition files are saved in your storage account's container. In the command, replace the placeholder `<definitionstorage>` including the angle brackets (`<>`), with your unique storage account name.
0 commit comments