You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/managed-identities-azure-resources/qs-configure-powershell-windows-vm.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,13 +3,13 @@ title: Configure managed identities on an Azure VM using PowerShell - Azure AD
3
3
description: Step-by-step instructions for configuring managed identities for Azure resources on an Azure VM using PowerShell.
4
4
services: active-directory
5
5
author: barclayn
6
-
manager: karenhoran
6
+
manager: rkarlin
7
7
ms.service: active-directory
8
8
ms.subservice: msi
9
9
ms.topic: quickstart
10
10
ms.tgt_pltfrm: na
11
11
ms.workload: identity
12
-
ms.date: 01/11/2022
12
+
ms.date: 06/24/2022
13
13
ms.author: barclayn
14
14
ms.collection: M365-identity-device-management
15
15
ms.custom: devx-track-azurepowershell, mode-api
@@ -35,7 +35,7 @@ In this article, using PowerShell, you learn how to perform the following manage
35
35
36
36
## System-assigned managed identity
37
37
38
-
In this section, you will learn how to enable and disable the system-assigned managed identity using Azure PowerShell.
38
+
In this section, you'll learn how to enable and disable the system-assigned managed identity using Azure PowerShell.
39
39
40
40
### Enable system-assigned managed identity during creation of an Azure VM
41
41
@@ -129,7 +129,7 @@ To assign a user-assigned identity to a VM, your account needs the [Virtual Mach
129
129
130
130
To assign a user-assigned identity to a VM, your account needs the [Virtual Machine Contributor](../../role-based-access-control/built-in-roles.md#virtual-machine-contributor) and [Managed Identity Operator](../../role-based-access-control/built-in-roles.md#managed-identity-operator) role assignments. No other Azure AD directory role assignments are required.
131
131
132
-
1. Create a user-assigned managed identity using the [New-AzUserAssignedIdentity](/powershell/module/az.managedserviceidentity/new-azuserassignedidentity) cmdlet. Note the `Id` in the output because you will need this in the next step.
132
+
1. Create a user-assigned managed identity using the [New-AzUserAssignedIdentity](/powershell/module/az.managedserviceidentity/new-azuserassignedidentity) cmdlet. Note the `Id` in the output because you'll need this information in the next step.
133
133
134
134
> [!IMPORTANT]
135
135
> Creating user-assigned managed identities only supports alphanumeric, underscore and hyphen (0-9 or a-z or A-Z, \_ or -) characters. Additionally, name should be limited from 3 to 128 character length for the assignment to VM/VMSS to work properly. For more information, see [FAQs and known issues](known-issues.md)
@@ -157,7 +157,7 @@ If your VM has multiple user-assigned managed identities, you can remove all but
If your VM does not have a system-assigned managed identity and you want to remove all user-assigned managed identities from it, use the following command:
160
+
If your VM doesn't have a system-assigned managed identity and you want to remove all user-assigned managed identities from it, use the following command:
Copy file name to clipboardExpand all lines: articles/active-directory/verifiable-credentials/whats-new.md
+17-6Lines changed: 17 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ manager: rkarlin
6
6
ms.service: decentralized-identity
7
7
ms.subservice: verifiable-credentials
8
8
ms.topic: reference
9
-
ms.date: 06/24/2022
9
+
ms.date: 06/27/2022
10
10
ms.custom: references_regions
11
11
ms.author: barclayn
12
12
@@ -22,11 +22,22 @@ This article lists the latest features, improvements, and changes in the Microso
22
22
23
23
## June 2022
24
24
25
-
In June, we introduced a set of new preview features:
26
-
- Web as a new, default, trust system that users' can choose when [onboarding](verifiable-credentials-configure-tenant.md#set-up-verifiable-credentials) a tenant. Web means your tenant uses [did:web](https://w3c-ccg.github.io/did-method-web/) as its trust system. ION is still available.
27
-
-[Quickstarts](how-to-use-quickstart.md) as a new way to create Managed Credentials. Managed Credentials no longer use of Azure Storage to store the Display & Rules JSON definitions. You need to migrate your Azure Storage based credentials to become Managed Credentials and we'll provide instructions shortly.
28
-
- Managed Credential [Quickstart for Verifiable Credentials of type VerifiedEmployee](how-to-use-quickstart-verifiedemployee.md) with directory based claims from your tenant.
29
-
- Updated documentation that describes the different ways to use the [Quickstarts](how-to-use-quickstart.md) and a [Rules and Display definition model](rules-and-display-definitions-model.md).
25
+
- We are adding support for the [did:web](https://w3c-ccg.github.io/did-method-web/) method. Any new tenant that starts using the Verifiable Credentials Service after June 14, 2022 will have Web as a new, default, trust system when [onboarding](verifiable-credentials-configure-tenant.md#set-up-verifiable-credentials). VC Administrators can still choose to use ION when setting a tenant. If you want to use did:web instead of ION or viceversa, you will need to [reconfigure your tenant](verifiable-credentials-faq.md?#how-do-i-reset-the-azure-ad-verifiable-credentials-service).
26
+
- We are rolling out several features to improve the overall experience of creating verifiable credentials in the Entra Verified ID platform:
27
+
- Introducing Managed Credentials, Managed Credentials are verifiable credentials that no longer use of Azure Storage to store the [display & rules JSON definitions](rules-and-display-definitions-model.md). Their display and rule definitions are different from earlier versions.
28
+
- Create Managed Credentials using the [new quickstart experience](how-to-use-quickstart.md).
29
+
- Administrators can create a Verified Employee Managed Credential using the [new quick start](how-to-use-quickstart-verifiedemployee.md). The Verified Employee is a verifiable credential of type verifiedEmployee that is based on a pre-defined set of claims from your tenant's Azure Active Directory.
30
+
31
+
>[!IMPORTANT]
32
+
> You need to migrate your Azure Storage based credentials to become Managed Credentials. We'll soon provide migration instructions.
33
+
34
+
- We made the following updates to our docs:
35
+
- (new) [Current supported open standards for Microsoft Entra Verified ID](verifiable-credentials-standards.md).
36
+
- (new) [How to create verifiable credentials for ID token hint](how-to-use-quickstart.md).
37
+
- (new) [How to create verifiable credentials for ID token](how-to-use-quickstart-idtoken.md).
38
+
- (new) [How to create verifiable credentials for self-asserted claims](how-to-use-quickstart-selfissued.md).
39
+
- (new) [Rules and Display definition model specification](rules-and-display-definitions-model.md).
40
+
- (new) [Creating an Azure AD tenant for development](how-to-create-a-free-developer-account.md).
0 commit comments