Skip to content

Commit d218a35

Browse files
authored
Merge pull request #202926 from barclayn/vc-what-new-update
minor edits
2 parents 3ec3dc2 + da2001d commit d218a35

File tree

2 files changed

+22
-11
lines changed

2 files changed

+22
-11
lines changed

articles/active-directory/managed-identities-azure-resources/qs-configure-powershell-windows-vm.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,13 +3,13 @@ title: Configure managed identities on an Azure VM using PowerShell - Azure AD
33
description: Step-by-step instructions for configuring managed identities for Azure resources on an Azure VM using PowerShell.
44
services: active-directory
55
author: barclayn
6-
manager: karenhoran
6+
manager: rkarlin
77
ms.service: active-directory
88
ms.subservice: msi
99
ms.topic: quickstart
1010
ms.tgt_pltfrm: na
1111
ms.workload: identity
12-
ms.date: 01/11/2022
12+
ms.date: 06/24/2022
1313
ms.author: barclayn
1414
ms.collection: M365-identity-device-management
1515
ms.custom: devx-track-azurepowershell, mode-api
@@ -35,7 +35,7 @@ In this article, using PowerShell, you learn how to perform the following manage
3535

3636
## System-assigned managed identity
3737

38-
In this section, you will learn how to enable and disable the system-assigned managed identity using Azure PowerShell.
38+
In this section, you'll learn how to enable and disable the system-assigned managed identity using Azure PowerShell.
3939

4040
### Enable system-assigned managed identity during creation of an Azure VM
4141

@@ -129,7 +129,7 @@ To assign a user-assigned identity to a VM, your account needs the [Virtual Mach
129129
130130
To assign a user-assigned identity to a VM, your account needs the [Virtual Machine Contributor](../../role-based-access-control/built-in-roles.md#virtual-machine-contributor) and [Managed Identity Operator](../../role-based-access-control/built-in-roles.md#managed-identity-operator) role assignments. No other Azure AD directory role assignments are required.
131131
132-
1. Create a user-assigned managed identity using the [New-AzUserAssignedIdentity](/powershell/module/az.managedserviceidentity/new-azuserassignedidentity) cmdlet. Note the `Id` in the output because you will need this in the next step.
132+
1. Create a user-assigned managed identity using the [New-AzUserAssignedIdentity](/powershell/module/az.managedserviceidentity/new-azuserassignedidentity) cmdlet. Note the `Id` in the output because you'll need this information in the next step.
133133
134134
> [!IMPORTANT]
135135
> Creating user-assigned managed identities only supports alphanumeric, underscore and hyphen (0-9 or a-z or A-Z, \_ or -) characters. Additionally, name should be limited from 3 to 128 character length for the assignment to VM/VMSS to work properly. For more information, see [FAQs and known issues](known-issues.md)
@@ -157,7 +157,7 @@ If your VM has multiple user-assigned managed identities, you can remove all but
157157
$vm = Get-AzVm -ResourceGroupName myResourceGroup -Name myVm
158158
Update-AzVm -ResourceGroupName myResourceGroup -VirtualMachine $vm -IdentityType UserAssigned -IdentityID <USER ASSIGNED IDENTITY NAME>
159159
```
160-
If your VM does not have a system-assigned managed identity and you want to remove all user-assigned managed identities from it, use the following command:
160+
If your VM doesn't have a system-assigned managed identity and you want to remove all user-assigned managed identities from it, use the following command:
161161

162162
```azurepowershell-interactive
163163
$vm = Get-AzVm -ResourceGroupName myResourceGroup -Name myVm

articles/active-directory/verifiable-credentials/whats-new.md

Lines changed: 17 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ manager: rkarlin
66
ms.service: decentralized-identity
77
ms.subservice: verifiable-credentials
88
ms.topic: reference
9-
ms.date: 06/24/2022
9+
ms.date: 06/27/2022
1010
ms.custom: references_regions
1111
ms.author: barclayn
1212

@@ -22,11 +22,22 @@ This article lists the latest features, improvements, and changes in the Microso
2222

2323
## June 2022
2424

25-
In June, we introduced a set of new preview features:
26-
- Web as a new, default, trust system that users' can choose when [onboarding](verifiable-credentials-configure-tenant.md#set-up-verifiable-credentials) a tenant. Web means your tenant uses [did:web](https://w3c-ccg.github.io/did-method-web/) as its trust system. ION is still available.
27-
- [Quickstarts](how-to-use-quickstart.md) as a new way to create Managed Credentials. Managed Credentials no longer use of Azure Storage to store the Display & Rules JSON definitions. You need to migrate your Azure Storage based credentials to become Managed Credentials and we'll provide instructions shortly.
28-
- Managed Credential [Quickstart for Verifiable Credentials of type VerifiedEmployee](how-to-use-quickstart-verifiedemployee.md) with directory based claims from your tenant.
29-
- Updated documentation that describes the different ways to use the [Quickstarts](how-to-use-quickstart.md) and a [Rules and Display definition model](rules-and-display-definitions-model.md).
25+
- We are adding support for the [did:web](https://w3c-ccg.github.io/did-method-web/) method. Any new tenant that starts using the Verifiable Credentials Service after June 14, 2022 will have Web as a new, default, trust system when [onboarding](verifiable-credentials-configure-tenant.md#set-up-verifiable-credentials). VC Administrators can still choose to use ION when setting a tenant. If you want to use did:web instead of ION or viceversa, you will need to [reconfigure your tenant](verifiable-credentials-faq.md?#how-do-i-reset-the-azure-ad-verifiable-credentials-service).
26+
- We are rolling out several features to improve the overall experience of creating verifiable credentials in the Entra Verified ID platform:
27+
- Introducing Managed Credentials, Managed Credentials are verifiable credentials that no longer use of Azure Storage to store the [display & rules JSON definitions](rules-and-display-definitions-model.md). Their display and rule definitions are different from earlier versions.
28+
- Create Managed Credentials using the [new quickstart experience](how-to-use-quickstart.md).
29+
- Administrators can create a Verified Employee Managed Credential using the [new quick start](how-to-use-quickstart-verifiedemployee.md). The Verified Employee is a verifiable credential of type verifiedEmployee that is based on a pre-defined set of claims from your tenant's Azure Active Directory.
30+
31+
>[!IMPORTANT]
32+
> You need to migrate your Azure Storage based credentials to become Managed Credentials. We'll soon provide migration instructions.
33+
34+
- We made the following updates to our docs:
35+
- (new) [Current supported open standards for Microsoft Entra Verified ID](verifiable-credentials-standards.md).
36+
- (new) [How to create verifiable credentials for ID token hint](how-to-use-quickstart.md).
37+
- (new) [How to create verifiable credentials for ID token](how-to-use-quickstart-idtoken.md).
38+
- (new) [How to create verifiable credentials for self-asserted claims](how-to-use-quickstart-selfissued.md).
39+
- (new) [Rules and Display definition model specification](rules-and-display-definitions-model.md).
40+
- (new) [Creating an Azure AD tenant for development](how-to-create-a-free-developer-account.md).
3041

3142
## May 2022
3243

0 commit comments

Comments
 (0)