You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities.md
Copy file name to clipboardExpand all lines: articles/active-directory/managed-identities-azure-resources/how-to-use-vm-token.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Use managed identities on a virtual machine to acquire access token - Azure AD
3
-
description: Step by step instructions and examples for using managed identities for Azure resources on a virtual machines to acquire an OAuth access token.
3
+
description: Step-by-step instructions and examples for using managed identities for Azure resources on virtual machines to acquire an OAuth access token.
Managed identities for Azure resources provides Azure services with an automatically managed identity in Azure Active Directory. You can use this identity to authenticate to any service that supports Azure AD authentication, without having credentials in your code.
24
+
Managed identities for Azure resources provide Azure services with an automatically managed identity in Azure Active Directory. You can use this identity to authenticate to any service that supports Azure AD authentication, without having credentials in your code.
25
25
26
26
This article provides various code and script examples for token acquisition, as well as guidance on important topics such as handling token expiration and HTTP errors.
27
27
@@ -70,7 +70,7 @@ GET 'http://169.254.169.254/metadata/identity/oauth2/token?api-version=2018-02-0
70
70
| ------- | ----------- |
71
71
|`GET`| The HTTP verb, indicating you want to retrieve data from the endpoint. In this case, an OAuth access token. |
72
72
|`http://169.254.169.254/metadata/identity/oauth2/token`| The managed identities for Azure resources endpoint for the Instance Metadata Service. |
73
-
|`api-version`| A query string parameter, indicating the API version for the IMDS endpoint. Please use API version `2018-02-01` or greater. |
73
+
|`api-version`| A query string parameter, indicating the API version for the IMDS endpoint. Use API version `2018-02-01` or greater. |
74
74
|`resource`| A query string parameter, indicating the App ID URI of the target resource. It also appears in the `aud` (audience) claim of the issued token. This example requests a token to access Azure Resource Manager, which has an App ID URI of `https://management.azure.com/`. |
75
75
|`Metadata`| An HTTP request header field, required by managed identities for Azure resources as a mitigation against Server Side Request Forgery (SSRF) attack. This value must be set to "true", in all lower case. |
76
76
|`object_id`| (Optional) A query string parameter, indicating the object_id of the managed identity you would like the token for. Required, if your VM has multiple user-assigned managed identities.|
@@ -338,7 +338,7 @@ The managed identities for Azure resources endpoint signals errors via the statu
Copy file name to clipboardExpand all lines: articles/active-directory/managed-identities-azure-resources/how-to-view-managed-identity-service-principal-cli.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,15 +12,15 @@ ms.subservice: msi
12
12
ms.topic: how-to
13
13
ms.tgt_pltfrm: na
14
14
ms.workload: identity
15
-
ms.date: 09/30/2020
15
+
ms.date: 01/11/2022
16
16
ms.author: barclayn
17
17
ms.collection: M365-identity-device-management
18
18
ms.custom: devx-track-azurecli
19
19
---
20
20
21
21
# View the service principal of a managed identity using Azure CLI
22
22
23
-
Managed identities for Azure resources provides Azure services with an automatically managed identity in Azure Active Directory. You can use this identity to authenticate to any service that supports Azure AD authentication without having credentials in your code.
23
+
Managed identities for Azure resources provide Azure services with an automatically managed identity in Azure Active Directory. You can use this identity to authenticate to any service that supports Azure AD authentication without having credentials in your code.
24
24
25
25
In this article, you learn how to view the service principal of a managed identity using Azure CLI.
Copy file name to clipboardExpand all lines: articles/active-directory/managed-identities-azure-resources/how-to-view-managed-identity-service-principal-portal.md
# View the service principal of a managed identity in the Azure portal
21
21
22
-
Managed identities for Azure resources provides Azure services with an automatically managed identity in Azure Active Directory. You can use this identity to authenticate to any service that supports Azure AD authentication, without having credentials in your code.
22
+
Managed identities provide Azure services with an automatically managed identity in Azure Active Directory. You can use this identity to authenticate to any service that supports Azure AD authentication, without having credentials in your code.
23
23
24
24
In this article, you learn how to view the service principal of a managed identity using the Azure portal.
Copy file name to clipboardExpand all lines: articles/active-directory/managed-identities-azure-resources/how-to-view-managed-identity-service-principal-powershell.md
0 commit comments