Skip to content

Commit 97290f3

Browse files
authored
Merge pull request #188464 from SGSneha/14Feb-Automationkeys
Added info on manage automation account keys
2 parents 0fda30b + 70397b4 commit 97290f3

File tree

6 files changed

+43
-1
lines changed

6 files changed

+43
-1
lines changed

articles/automation/automation-create-standalone-account.md

Lines changed: 43 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ Review your new Automation account.
8585

8686
:::image type="content" source="./media/automation-create-standalone-account/automation-account-overview.png" alt-text="Automation account overview page":::
8787

88-
When the Automation account is successfully created, several resources are automatically created for you. After creation, these runbooks can be safely deleted if you do not wish to keep them. The managed identities can be used to authenticate to your account in a runbook, and should be left unless you create another one or do not require them. The following table summarizes resources for the account.
88+
When the Automation account is successfully created, several resources are automatically created for you. After creation, these runbooks can be safely deleted if you do not wish to keep them. The managed identities can be used to authenticate to your account in a runbook, and should be left unless you create another one or do not require them. The Automation access keys are also created during Automation account creation. The following table summarizes resources for the account.
8989

9090
|Resource |Description |
9191
|------||------|
@@ -96,6 +96,48 @@ When the Automation account is successfully created, several resources are autom
9696
> [!NOTE]
9797
> The tutorial runbooks have not been updated to authenticate using a managed identity. Review the [Using system-assigned identity](enable-managed-identity-for-automation.md#assign-role-to-a-system-assigned-managed-identity) or [Using user-assigned identity](add-user-assigned-identity.md#assign-a-role-to-a-user-assigned-managed-identity) to learn how to grant the managed identity access to resources and configure your runbooks to authenticate using either type of managed identity.
9898
99+
## Manage Automation account keys
100+
101+
When you create an Automation account, Azure generates two 512-bit automation account access keys for that account. These keys are shared access keys that are used as registration keys for registering [DSC nodes](/azure/automation/automation-dsc-onboarding#use-dsc-metaconfiguration-to-register-hybrid-machines) as well as [Windows](/azure/automation/automation-windows-hrw-install#manual-deployment) and [Linux](/azure/automation/automation-linux-hrw-install#manually-run-powershell-commands) Hybrid runbook workers. These keys are only used while registering DSC nodes and Hybrid workers. Existing machines configured as DSC nodes or hybrid workers won’t be affected after rotation of these keys.
102+
103+
### View Automation account keys
104+
105+
To view and copy your Automation account access keys, follow these steps:
106+
1. In the [Azure portal](https://portal.azure.com/), go to your Automation account.
107+
1. Under **Account Settings**, select **Keys** to view your Automation account's primary and secondary access keys.
108+
You can use any of the two keys to access your Automation account. However, we recommend that you use the first key and reserve the use of second key.
109+
110+
:::image type="content" source="./media/automation-create-standalone-account/automation-demo-keys-inline.png" alt-text="Automation Keys page" lightbox="./media/automation-create-standalone-account/automation-demo-keys-expanded.png" :::
111+
112+
### Manually rotate access keys
113+
114+
We recommend that you rotate your access keys periodically to keep the Automation account secure. As you have two access keys, you can rotate them using Azure portal or Azure PowerShell cmdlet.
115+
116+
Choose a client
117+
118+
# [Azure portal](#tab/azureportal)
119+
120+
Follow these steps:
121+
1. Go to your Automation account in [Azure portal](https://portal.azure.com/).
122+
1. Under **Account Settings**, select **Keys**.
123+
1. Select **Regenerate primary** to regenerate the primary access key for your Automation account.
124+
1. Select the **Regenerate secondary** to regenerate the secondary access key.
125+
:::image type="content" source="./media/automation-create-standalone-account/regenerate-keys.png" alt-text="Regenerate keys":::
126+
127+
# [Azure PowerShell](#tab/azurepowershell)
128+
129+
Run the [New-AzAutomationKey](/powershell/module/az.automation/new-azautomationkey) command to regenerate the primary access key, as shown in the following example:
130+
131+
```azurepowershell
132+
New-AzAutomationKey -KeyType Primary -ResourceGroup <ResourceGroup> -AutomationAccountName <AutomationAccount>
133+
```
134+
---
135+
136+
### View registration URL
137+
The DSC node registers with the State Configuration service using the registration URL and authenticates using a registration access key along with the Automation Account access keys.
138+
139+
:::image type="content" source="./media/automation-create-standalone-account/automation-demo-keys-url-inline.png" alt-text="Screenshot of Automation Keys and URL" lightbox="./media/automation-create-standalone-account/automation-demo-keys-url-expanded.png" :::
140+
99141
## Next steps
100142

101143
* To get started with PowerShell runbooks, see [Tutorial: Create a PowerShell runbook](./learn/powershell-runbook-managed-identity.md).
32.4 KB
Loading
32.4 KB
Loading
32.3 KB
Loading
32.3 KB
Loading
42.2 KB
Loading

0 commit comments

Comments
 (0)