Skip to content

Commit bcc28ee

Browse files
committed
added the Retierment info
1 parent db11ac5 commit bcc28ee

7 files changed

+39
-0
lines changed

articles/automation/automation-hrw-run-runbooks.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,11 @@ ms.custom: devx-track-azurepowershell
1010

1111
# Run Automation runbooks on a Hybrid Runbook Worker
1212

13+
> [!IMPORTANT]
14+
> Azure Automation Run As Account will retire on September 16, 2025 and will be replaced with Managed Identities.
15+
While we continue to support Run As account for both existing and new Automation accounts from the Azure portal and PowerShell, we recommend you to switch to [Managed identities](/automation-security-overview.md#managed-identities) for runbook authentication. For more information, see [migrating from an existing Run As accounts to managed identity](/migrate-run-as-accounts-managed-identity?tabs=ua-managed-identity#sample-scripts).
16+
17+
1318
Runbooks that run on a [Hybrid Runbook Worker](automation-hybrid-runbook-worker.md) typically manage resources on the local computer or against resources in the local environment where the worker is deployed. Runbooks in Azure Automation typically manage resources in the Azure cloud. Even though they are used differently, runbooks that run in Azure Automation and runbooks that run on a Hybrid Runbook Worker are identical in structure.
1419

1520
When you author a runbook to run on a Hybrid Runbook Worker, you should edit and test the runbook on the machine that hosts the worker. The host machine has all the PowerShell modules and network access required to manage the local resources. Once you test the runbook on the Hybrid Runbook Worker machine, you can then upload it to the Azure Automation environment, where it can be run on the worker.

articles/automation/automation-security-guidelines.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,11 @@ ms.topic: conceptual
99

1010
# Security best practices in Azure Automation
1111

12+
> [!IMPORTANT]
13+
> Azure Automation Run As Account will retire on September 16, 2025 and will be replaced with Managed Identities.
14+
While we continue to support Run As account for both existing and new Automation accounts from the Azure portal and PowerShell, we recommend you to switch to [Managed identities](/automation-security-overview.md#managed-identities) for runbook authentication. For more information, see [migrating from an existing Run As accounts to managed identity](/migrate-run-as-accounts-managed-identity?tabs=ua-managed-identity#sample-scripts).
15+
16+
1217
This article details the best practices to securely execute the automation jobs.
1318
[Azure Automation](./overview.md) provides you the platform to orchestrate frequent, time consuming, error-prone infrastructure management and operational tasks, as well as mission-critical operations. This service allows you to execute scripts, known as automation runbooks seamlessly across cloud and hybrid environments.
1419

articles/automation/automation-security-overview.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,10 +11,15 @@ ms.custom: devx-track-azurepowershell
1111

1212
# Azure Automation account authentication overview
1313

14+
> [!IMPORTANT]
15+
> Azure Automation Run As Account will retire on September 16, 2025 and will be replaced with Managed Identities.
16+
While we continue to support Run As account for both existing and new Automation accounts from the Azure portal and PowerShell, we recommend you to switch to [Managed identities](/automation-security-overview.md#managed-identities) for runbook authentication. For more information, see [migrating from an existing Run As accounts to managed identity](/migrate-run-as-accounts-managed-identity?tabs=ua-managed-identity#sample-scripts).
17+
1418
Azure Automation allows you to automate tasks against resources in Azure, on-premises, and with other cloud providers such as Amazon Web Services (AWS). You can use runbooks to automate your tasks, or a Hybrid Runbook Worker if you have business or operational processes to manage outside of Azure. Working in any one of these environments require permissions to securely access the resources with the minimal rights required.
1519

1620
This article covers authentication scenarios supported by Azure Automation and tells how to get started based on the environment or environments that you need to manage.
1721

22+
1823
## Automation account
1924

2025
When you start Azure Automation for the first time, you must create at least one Automation account. Automation accounts allow you to isolate your Automation resources, runbooks, assets, and configurations from the resources of other accounts. You can use Automation accounts to separate resources into separate logical environments or delegated responsibilities. For example, you might use one account for development, another for production, and another for your on-premises environment. Or you might dedicate an Automation account to manage operating system updates across all of your machines with [Update Management](update-management/overview.md).

articles/automation/create-run-as-account.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,11 @@ ms.topic: conceptual
99

1010
# How to create an Azure Automation Run As account
1111

12+
> [!IMPORTANT]
13+
> Azure Automation Run As Account will retire on September 16, 2025 and will be replaced with Managed Identities.
14+
While we continue to support Run As account for both existing and new Automation accounts from the Azure portal and PowerShell, we recommend you to switch to [Managed identities](/automation-security-overview.md#managed-identities) for runbook authentication. For more information, see [migrating from an existing Run As accounts to managed identity](/migrate-run-as-accounts-managed-identity?tabs=ua-managed-identity#sample-scripts).
15+
16+
1217
Run As accounts in Azure Automation provide authentication for managing resources on the Azure Resource Manager or Azure Classic deployment model using Automation runbooks and other Automation features. This article describes how to create a Run As or Classic Run As account from the Azure portal or Azure PowerShell.
1318

1419
When you create the Run As or Classic Run As account in the Azure portal, by default it uses a self-signed certificate. If you want to use a certificate issued by your enterprise or third-party certification authority (CA), can use the [PowerShell script to create a Run As account](#powershell-script-to-create-a-run-as-account).

articles/automation/delete-run-as-account.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,11 @@ ms.topic: conceptual
99

1010
# Delete an Azure Automation Run As account
1111

12+
> [!IMPORTANT]
13+
> Azure Automation Run As Account will retire on September 16, 2025 and will be replaced with Managed Identities.
14+
While we continue to support Run As account for both existing and new Automation accounts from the Azure portal and PowerShell, we recommend you to switch to [Managed identities](/automation-security-overview.md#managed-identities) for runbook authentication. For more information, see [migrating from an existing Run As accounts to managed identity](/migrate-run-as-accounts-managed-identity?tabs=ua-managed-identity#sample-scripts).
15+
16+
1217
Run As accounts in Azure Automation provide authentication for managing resources on the Azure Resource Manager or Azure Classic deployment model using Automation runbooks and other Automation features. This article describes how to delete a Run As or Classic Run As account. When you perform this action, the Automation account is retained. After you delete the Run As account, you can re-create it in the Azure portal or with the provided PowerShell script.
1318

1419
## Delete a Run As or Classic Run As account

articles/automation/manage-run-as-account.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,12 @@ ms.custom: devx-track-azurepowershell
1010

1111
# Manage an Azure Automation Run As account
1212

13+
> [!IMPORTANT]
14+
> Azure Automation Run As Account will retire on September 16, 2025 and will be replaced with Managed Identities.
15+
While we continue to support Run As account for both existing and new Automation accounts from the Azure portal and PowerShell, we recommend you to switch to [Managed identities](/automation-security-overview.md#managed-identities) for runbook authentication. For more information, see [migrating from an existing Run As accounts to managed identity](/migrate-run-as-accounts-managed-identity?tabs=ua-managed-identity#sample-scripts).
16+
17+
18+
1319
Run As accounts in Azure Automation provide authentication for managing resources on the Azure Resource Manager or Azure Classic deployment model using Automation runbooks and other Automation features.
1420

1521
In this article we cover how to manage a Run as or Classic Run As account, including:

articles/automation/whats-new.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,14 @@ Azure Automation receives improvements on an ongoing basis. To stay up to date w
2222
This page is updated monthly, so revisit it regularly. If you're looking for items older than six months, you can find them in [Archive for What's new in Azure Automation](whats-new-archive.md).
2323

2424

25+
## July 2022
26+
27+
### Support for Run As accounts
28+
29+
**Type:** Plan for change
30+
31+
Azure Automation Run As Account will retire on September 16, 2025 and will be replaced with Managed Identities. We recommend you to switch to Managed identities for runbook authentication. For more information, see [migrating from an existing Run As accounts to managed identity](/azure/automation/migrate-run-as-accounts-managed-identity?tabs=ua-managed-identity#sample-scripts).
32+
2533
## March 2022
2634

2735
### Forward diagnostic audit data to Azure Monitor logs

0 commit comments

Comments
 (0)