Skip to content

Commit b184e38

Browse files
committed
Reverting GUID AppId updates
1 parent e075023 commit b184e38

File tree

6 files changed

+16
-16
lines changed

6 files changed

+16
-16
lines changed

articles/communication-services/quickstarts/manage-teams-identity.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ The service principal of the Contoso application in the Fabrikam tenant is creat
107107
You can see that the status of the Communication Services Teams.ManageCalls and Teams.ManageChats permissions are *Granted for {Directory_name}*.
108108

109109

110-
If you run into the issue "The app is trying to access a service '00001111-aaaa-2222-bbbb-3333cccc4444'(Azure Communication Services) that your organization '{GUID}' lacks a service principal for. Contact your IT Admin to review the configuration of your service subscriptions or consent to the application to create the required service principal." your Microsoft Entra tenant lacks a service principal for the Azure Communication Services application. To fix this issue, use PowerShell as a Microsoft Entra administrator to connect to your tenant. Replace `Tenant_ID` with an ID of your Microsoft Entra tenancy.
110+
If you run into the issue "The app is trying to access a service '1fd5118e-2576-4263-8130-9503064c837a'(Azure Communication Services) that your organization '{GUID}' lacks a service principal for. Contact your IT Admin to review the configuration of your service subscriptions or consent to the application to create the required service principal." your Microsoft Entra tenant lacks a service principal for the Azure Communication Services application. To fix this issue, use PowerShell as a Microsoft Entra administrator to connect to your tenant. Replace `Tenant_ID` with an ID of your Microsoft Entra tenancy.
111111

112112
You will require **Application.ReadWrite.All** as shown below.
113113

@@ -125,7 +125,7 @@ Install-Module Microsoft.Graph
125125
Then execute the following command to add a service principal to your tenant. Do not modify the GUID of the App ID.
126126

127127
```script
128-
New-MgServicePrincipal -AppId "00001111-aaaa-2222-bbbb-3333cccc4444"
128+
New-MgServicePrincipal -AppId "1fd5118e-2576-4263-8130-9503064c837a"
129129
```
130130

131131

articles/communications-gateway/connect-operator-connect.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22
title: Connect Azure Communications Gateway to Operator Connect or Teams Phone Mobile
33
description: After deploying Azure Communications Gateway, you can configure it to connect to the Operator Connect and Teams Phone Mobile environments.
4-
author: GemmaWakeford
5-
ms.author: gwakeford
4+
author: rcdun
5+
ms.author: rdunstan
66
ms.service: azure-communications-gateway
77
ms.topic: integration
88
ms.date: 03/22/2024
@@ -90,7 +90,7 @@ To add the Project Synergy application:
9090
1. Run the following cmdlet, replacing *`<TenantID>`* with the tenant ID you noted down in step 5.
9191
```powershell
9292
Connect-AzureAD -TenantId "<TenantID>"
93-
New-AzureADServicePrincipal -AppId 00001111-aaaa-2222-bbbb-3333cccc4444 -DisplayName "Operator Connect"
93+
New-AzureADServicePrincipal -AppId eb63d611-525e-4a31-abd7-0cb33f679599 -DisplayName "Operator Connect"
9494
```
9595
9696
## Assign an Admin user to the Project Synergy application
@@ -161,7 +161,7 @@ Do the following steps in the tenant that contains your Project Synergy applicat
161161
1. Run the following PowerShell commands. These commands add the following roles for Azure Communications Gateway: `TrunkManagement.Read`, `TrunkManagement.Write`, `partnerSettings.Read`, `NumberManagement.Read`, `NumberManagement.Write`, `Data.Read`, `Data.Write`.
162162
```powershell
163163
# Get the Service Principal ID for Project Synergy (Operator Connect)
164-
$projectSynergyApplicationId = "00001111-aaaa-2222-bbbb-3333cccc4444"
164+
$projectSynergyApplicationId = "eb63d611-525e-4a31-abd7-0cb33f679599"
165165
$projectSynergyEnterpriseApplication = Get-MgServicePrincipal -Filter "AppId eq '$projectSynergyApplicationId'" # "Application.Read.All"
166166
167167
# Required Operator Connect - Project Synergy Roles
@@ -170,7 +170,7 @@ Do the following steps in the tenant that contains your Project Synergy applicat
170170
$partnerSettingsRead = "d6b0de4a-aab5-4261-be1b-0e1800746fb2"
171171
$numberManagementRead = "130ecbe2-d1e6-4bbd-9a8d-9a7a909b876e"
172172
$numberManagementWrite = "752b4e79-4b85-4e33-a6ef-5949f0d7d553"
173-
$dataRead = "00001111-aaaa-2222-bbbb-3333cccc4444"
173+
$dataRead = "eb63d611-525e-4a31-abd7-0cb33f679599"
174174
$dataWrite = "98d32f93-eaa7-4657-b443-090c23e69f27"
175175
$requiredRoles = $trunkManagementRead, $trunkManagementWrite, $partnerSettingsRead, $numberManagementRead, $numberManagementWrite, $dataRead, $dataWrite
176176
@@ -223,13 +223,13 @@ Go to the [Operator Connect homepage](https://operatorconnect.microsoft.com/) an
223223
224224
You must enable Azure Communications Gateway within the Operator Connect or Teams Phone Mobile environment. This process requires configuring your environment with two Application IDs:
225225
- The Application ID of the system-assigned managed identity that you found in [Find the Application ID for your Azure Communication Gateway resource](#find-the-application-id-for-your-azure-communication-gateway-resource). This Application ID allows Azure Communications Gateway to use the roles that you set up in [Set up application roles for Azure Communications Gateway](#set-up-application-roles-for-azure-communications-gateway).
226-
- A standard Application ID for an automatically created AzureCommunicationsGateway enterprise application. This ID is always `11112222-bbbb-3333-cccc-4444dddd5555`.
226+
- A standard Application ID for an automatically created AzureCommunicationsGateway enterprise application. This ID is always `8502a0ec-c76d-412f-836c-398018e2312b`.
227227
228228
To add the Application IDs:
229229
230230
1. Log into the [Operator Connect portal](https://operatorconnect.microsoft.com/operator/configuration).
231231
1. Add a new **Application Id** for the Application ID that you found for the managed identity.
232-
1. Add a second **Application Id** for the value `11112222-bbbb-3333-cccc-4444dddd5555`.
232+
1. Add a second **Application Id** for the value `8502a0ec-c76d-412f-836c-398018e2312b`.
233233
234234
## Register your deployment's domain name in Microsoft Entra
235235

articles/confidential-computing/quick-create-confidential-vm-arm.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -170,7 +170,7 @@ Use this example to create a custom parameter file for a Linux-based confidentia
170170
171171
```Powershell
172172
Connect-Graph -Tenant "your tenant ID" Application.ReadWrite.All
173-
New-MgServicePrincipal -AppId 00001111-aaaa-2222-bbbb-3333cccc4444 -DisplayName "Confidential VM Orchestrator"
173+
New-MgServicePrincipal -AppId bf7b6499-ff71-4aa2-97a4-f372087be7f0 -DisplayName "Confidential VM Orchestrator"
174174
```
175175
176176
1. Set up your Azure key vault. For how to use an Azure Key Vault Managed HSM instead, see the next step.
@@ -194,7 +194,7 @@ Use this example to create a custom parameter file for a Linux-based confidentia
194194
1. Give `Confidential VM Orchestrator` permissions to `get` and `release` the key vault.
195195
196196
```azurecli-interactive
197-
$cvmAgent = az ad sp show --id "00001111-aaaa-2222-bbbb-3333cccc4444" | Out-String | ConvertFrom-Json
197+
$cvmAgent = az ad sp show --id "bf7b6499-ff71-4aa2-97a4-f372087be7f0" | Out-String | ConvertFrom-Json
198198
az keyvault set-policy --name $KeyVault --object-id $cvmAgent.Id --key-permissions get release
199199
```
200200
@@ -210,7 +210,7 @@ Use this example to create a custom parameter file for a Linux-based confidentia
210210
1. Give `Confidential VM Orchestrator` permissions to managed HSM.
211211
212212
```azurecli-interactive
213-
$cvmAgent = az ad sp show --id "00001111-aaaa-2222-bbbb-3333cccc4444" | Out-String | ConvertFrom-Json
213+
$cvmAgent = az ad sp show --id "bf7b6499-ff71-4aa2-97a4-f372087be7f0" | Out-String | ConvertFrom-Json
214214
az keyvault role assignment create --hsm-name $hsm --assignee $cvmAgent.Id --role "Managed HSM Crypto Service Release User" --scope /keys/$KeyName
215215
```
216216

articles/confidential-computing/quick-create-confidential-vm-azure-cli.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -86,15 +86,15 @@ To create a confidential [disk encryption set](/azure/virtual-machines/linux/dis
8686
For this step you need to be a Global Admin or you need to have the User Access Administrator RBAC role. [Install Microsoft Graph SDK](/powershell/microsoftgraph/installation) to execute the commands below.
8787
```Powershell
8888
Connect-Graph -Tenant "your tenant ID" Application.ReadWrite.All
89-
New-MgServicePrincipal -AppId 00001111-aaaa-2222-bbbb-3333cccc4444 -DisplayName "Confidential VM Orchestrator"
89+
New-MgServicePrincipal -AppId bf7b6499-ff71-4aa2-97a4-f372087be7f0 -DisplayName "Confidential VM Orchestrator"
9090
```
9191
2. Create an Azure Key Vault using the [az keyvault create](/cli/azure/keyvault) command. For the pricing tier, select Premium (includes support for HSM backed keys). Make sure that you have an owner role in this key vault.
9292
```azurecli-interactive
9393
az keyvault create -n keyVaultName -g myResourceGroup --enabled-for-disk-encryption true --sku premium --enable-purge-protection true --enable-rbac-authorization false
9494
```
9595
3. Give `Confidential VM Orchestrator` permissions to `get` and `release` the key vault.
9696
```Powershell
97-
$cvmAgent = az ad sp show --id "00001111-aaaa-2222-bbbb-3333cccc4444" | Out-String | ConvertFrom-Json
97+
$cvmAgent = az ad sp show --id "bf7b6499-ff71-4aa2-97a4-f372087be7f0" | Out-String | ConvertFrom-Json
9898
az keyvault set-policy --name keyVaultName --object-id $cvmAgent.Id --key-permissions get release
9999
```
100100
4. Create a key in the key vault using [az keyvault key create](/cli/azure/keyvault). For the key type, use RSA-HSM.

articles/confidential-computing/quick-create-confidential-vm-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ You can use the Azure portal to create a [confidential VM](confidential-vm-overv
2222

2323
```Powershell
2424
Connect-Graph -Tenant "your tenant ID" Application.ReadWrite.All
25-
New-MgServicePrincipal -AppId 00001111-aaaa-2222-bbbb-3333cccc4444 -DisplayName "Confidential VM Orchestrator"
25+
New-MgServicePrincipal -AppId bf7b6499-ff71-4aa2-97a4-f372087be7f0 -DisplayName "Confidential VM Orchestrator"
2626
```
2727
2828
## Create confidential VM

articles/connectors/connectors-integrate-security-operations-create-api-microsoft-graph-security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ To learn more about Microsoft Graph Security, see the [Microsoft Graph Security
3737
| Property | Value |
3838
|----------|-------|
3939
| **Application Name** | `MicrosoftGraphSecurityConnector` |
40-
| **Application ID** | `00001111-aaaa-2222-bbbb-3333cccc4444` |
40+
| **Application ID** | `c4829704-0edc-4c3d-a347-7c4a67586f3c` |
4141
|||
4242

4343
To grant consent for the connector, your Microsoft Entra tenant administrator can follow either these steps:

0 commit comments

Comments
 (0)