Skip to content

Commit 973bab0

Browse files
authored
Merge pull request #184652 from barclayn/mi-cleanup
status and ad support
2 parents 0246633 + 5a75d57 commit 973bab0

File tree

43 files changed

+117
-117
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

43 files changed

+117
-117
lines changed

articles/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.subservice: msi
1010
ms.devlang:
1111
ms.topic: how-to
1212
ms.workload: identity
13-
ms.date: 06/08/2021
13+
ms.date: 01/11/2022
1414
ms.author: barclayn
1515
zone_pivot_groups: identity-mi-methods
1616
---

articles/active-directory/managed-identities-azure-resources/how-managed-identities-work-vm.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: How managed identities for Azure resources work with with Azure virtual machines
2+
title: How managed identities for Azure resources work with Azure virtual machines
33
description: Description of managed identities for Azure resources work with Azure virtual machines.
44
services: active-directory
55
documentationcenter:
@@ -12,7 +12,7 @@ ms.subservice: msi
1212
ms.devlang:
1313
ms.topic: conceptual
1414
ms.custom: mvc
15-
ms.date: 06/11/2020
15+
ms.date: 01/11/2022
1616
ms.author: barclayn
1717
ms.collection: M365-identity-device-management
1818
---

articles/active-directory/managed-identities-azure-resources/how-to-use-vm-sdk.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.subservice: msi
1212
ms.topic: how-to
1313
ms.tgt_pltfrm: na
1414
ms.workload: identity
15-
ms.date: 06/07/2021
15+
ms.date: 01/11/2022
1616
ms.author: barclayn
1717
ms.collection: M365-identity-device-management
1818
---

articles/active-directory/managed-identities-azure-resources/how-to-use-vm-sign-in.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.subservice: msi
1111
ms.topic: how-to
1212
ms.tgt_pltfrm: na
1313
ms.workload: identity
14-
ms.date: 01/29/2021
14+
ms.date: 01/11/2022
1515
ms.author: barclayn
1616
ms.collection: M365-identity-device-management
1717
ms.custom: devx-track-azurepowershell

articles/active-directory/managed-identities-azure-resources/how-to-use-vm-token.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Use managed identities on a virtual machine to acquire access token - Azure AD
3-
description: Step by step instructions and examples for using managed identities for Azure resources on a virtual machines to acquire an OAuth access token.
3+
description: Step-by-step instructions and examples for using managed identities for Azure resources on virtual machines to acquire an OAuth access token.
44
services: active-directory
55
documentationcenter:
66
author: barclayn
@@ -12,7 +12,7 @@ ms.subservice: msi
1212
ms.topic: how-to
1313
ms.tgt_pltfrm: na
1414
ms.workload: identity
15-
ms.date: 04/12/2021
15+
ms.date: 01/11/2022
1616
ms.author: barclayn
1717
ms.collection: M365-identity-device-management
1818
---
@@ -21,7 +21,7 @@ ms.collection: M365-identity-device-management
2121

2222
[!INCLUDE [preview-notice](../../../includes/active-directory-msi-preview-notice.md)]
2323

24-
Managed identities for Azure resources provides Azure services with an automatically managed identity in Azure Active Directory. You can use this identity to authenticate to any service that supports Azure AD authentication, without having credentials in your code.
24+
Managed identities for Azure resources provide Azure services with an automatically managed identity in Azure Active Directory. You can use this identity to authenticate to any service that supports Azure AD authentication, without having credentials in your code.
2525

2626
This article provides various code and script examples for token acquisition, as well as guidance on important topics such as handling token expiration and HTTP errors.
2727

@@ -70,7 +70,7 @@ GET 'http://169.254.169.254/metadata/identity/oauth2/token?api-version=2018-02-0
7070
| ------- | ----------- |
7171
| `GET` | The HTTP verb, indicating you want to retrieve data from the endpoint. In this case, an OAuth access token. |
7272
| `http://169.254.169.254/metadata/identity/oauth2/token` | The managed identities for Azure resources endpoint for the Instance Metadata Service. |
73-
| `api-version` | A query string parameter, indicating the API version for the IMDS endpoint. Please use API version `2018-02-01` or greater. |
73+
| `api-version` | A query string parameter, indicating the API version for the IMDS endpoint. Use API version `2018-02-01` or greater. |
7474
| `resource` | A query string parameter, indicating the App ID URI of the target resource. It also appears in the `aud` (audience) claim of the issued token. This example requests a token to access Azure Resource Manager, which has an App ID URI of `https://management.azure.com/`. |
7575
| `Metadata` | An HTTP request header field, required by managed identities for Azure resources as a mitigation against Server Side Request Forgery (SSRF) attack. This value must be set to "true", in all lower case. |
7676
| `object_id` | (Optional) A query string parameter, indicating the object_id of the managed identity you would like the token for. Required, if your VM has multiple user-assigned managed identities.|
@@ -338,7 +338,7 @@ The managed identities for Azure resources endpoint signals errors via the statu
338338
| 404 Not found. | IMDS endpoint is updating. | Retry with Exponential Backoff. See guidance below. |
339339
| 429 Too many requests. | IMDS Throttle limit reached. | Retry with Exponential Backoff. See guidance below. |
340340
| 4xx Error in request. | One or more of the request parameters was incorrect. | Do not retry. Examine the error details for more information. 4xx errors are design-time errors.|
341-
| 5xx Transient error from service. | The managed identities for Azure resources sub-system or Azure Active Directory returned a transient error. | It is safe to retry after waiting for at least 1 second. If you retry too quickly or too often, IMDS and/or Azure AD may return a rate limit error (429).|
341+
| 5xx Transient error from service. | The managed identities for Azure resources subsystem or Azure Active Directory returned a transient error. | It is safe to retry after waiting for at least 1 second. If you retry too quickly or too often, IMDS and/or Azure AD may return a rate limit error (429).|
342342
| timeout | IMDS endpoint is updating. | Retry with Exponential Backoff. See guidance below. |
343343

344344
If an error occurs, the corresponding HTTP response body contains JSON with the error details:
@@ -362,7 +362,7 @@ This section documents the possible error responses. A "200 OK" status is a succ
362362
| | access_denied | The resource owner or authorization server denied the request. | |
363363
| | unsupported_response_type | The authorization server does not support obtaining an access token using this method. | |
364364
| | invalid_scope | The requested scope is invalid, unknown, or malformed. | |
365-
| 500 Internal server error | unknown | Failed to retrieve token from the Active directory. For details see logs in *\<file path\>* | Verify that managed identities for Azure resources has been enabled on the VM. See [Configure managed identities for Azure resources on a VM using the Azure portal](qs-configure-portal-windows-vm.md) if you need assistance with VM configuration.<br><br>Also verify that your HTTP GET request URI is formatted correctly, particularly the resource URI specified in the query string. See the "Sample request" in the preceding REST section for an example, or [Azure services that support Azure AD authentication](./services-support-managed-identities.md) for a list of services and their respective resource IDs.
365+
| 500 Internal server error | unknown | Failed to retrieve token from the Active directory. For details see logs in *\<file path\>* | Verify that managed identities for Azure resources is enabled on the VM. See [Configure managed identities for Azure resources on a VM using the Azure portal](qs-configure-portal-windows-vm.md) if you need assistance with VM configuration.<br><br>Also verify that your HTTP GET request URI is formatted correctly, particularly the resource URI specified in the query string. See the "Sample request" in the preceding REST section for an example, or [Azure services that support Azure AD authentication](./services-support-managed-identities.md) for a list of services and their respective resource IDs.
366366

367367
> [!IMPORTANT]
368368
> - IMDS is not intended to be used behind a proxy and doing so is unsupported. For examples of how to bypass proxies, refer to the [Azure Instance Metadata Samples](https://github.com/microsoft/azureimds).

articles/active-directory/managed-identities-azure-resources/how-to-view-managed-identity-activity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.subservice: msi
1212
ms.topic: how-to
1313
ms.tgt_pltfrm: na
1414
ms.workload: identity
15-
ms.date: 08/26/2021
15+
ms.date: 01/11/2022
1616
ms.author: barclayn
1717
ms.collection: M365-identity-device-management
1818
---

articles/active-directory/managed-identities-azure-resources/how-to-view-managed-identity-service-principal-cli.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,15 +12,15 @@ ms.subservice: msi
1212
ms.topic: how-to
1313
ms.tgt_pltfrm: na
1414
ms.workload: identity
15-
ms.date: 09/30/2020
15+
ms.date: 01/11/2022
1616
ms.author: barclayn
1717
ms.collection: M365-identity-device-management
1818
ms.custom: devx-track-azurecli
1919
---
2020

2121
# View the service principal of a managed identity using Azure CLI
2222

23-
Managed identities for Azure resources provides Azure services with an automatically managed identity in Azure Active Directory. You can use this identity to authenticate to any service that supports Azure AD authentication without having credentials in your code.
23+
Managed identities for Azure resources provide Azure services with an automatically managed identity in Azure Active Directory. You can use this identity to authenticate to any service that supports Azure AD authentication without having credentials in your code.
2424

2525
In this article, you learn how to view the service principal of a managed identity using Azure CLI.
2626

articles/active-directory/managed-identities-azure-resources/how-to-view-managed-identity-service-principal-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.collection: M365-identity-device-management
1919

2020
# View the service principal of a managed identity in the Azure portal
2121

22-
Managed identities for Azure resources provides Azure services with an automatically managed identity in Azure Active Directory. You can use this identity to authenticate to any service that supports Azure AD authentication, without having credentials in your code.
22+
Managed identities provide Azure services with an automatically managed identity in Azure Active Directory. You can use this identity to authenticate to any service that supports Azure AD authentication, without having credentials in your code.
2323

2424
In this article, you learn how to view the service principal of a managed identity using the Azure portal.
2525

articles/active-directory/managed-identities-azure-resources/how-to-view-managed-identity-service-principal-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.subservice: msi
1212
ms.topic: how-to
1313
ms.tgt_pltfrm: na
1414
ms.workload: identity
15-
ms.date: 09/30/2020
15+
ms.date: 01/11/2022
1616
ms.author: barclayn
1717
ms.collection: M365-identity-device-management
1818
ms.custom: devx-track-azurepowershell

articles/active-directory/managed-identities-azure-resources/howto-assign-access-cli.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.subservice: msi
1212
ms.topic: how-to
1313
ms.tgt_pltfrm: na
1414
ms.workload: identity
15-
ms.date: 01/29/2021
15+
ms.date: 01/11/2022
1616
ms.author: barclayn
1717
ms.collection: M365-identity-device-management
1818
ms.custom: devx-track-azurecli

0 commit comments

Comments
 (0)