Skip to content

Commit d310ef5

Browse files
authored
Merge pull request #223530 from MicrosoftDocs/main
1/10 AM Publish
2 parents e12b28f + d9e4e0f commit d310ef5

File tree

82 files changed

+638
-420
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

82 files changed

+638
-420
lines changed

articles/active-directory-b2c/configure-tokens.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ The following values are set in the previous example:
9494

9595
- **token_lifetime_secs** - Access token lifetimes (seconds). The default is 3,600 (1 hour). The minimum is 300 (5 minutes). The maximum is 86,400 (24 hours).
9696
- **id_token_lifetime_secs** - ID token lifetimes (seconds). The default is 3,600 (1 hour). The minimum is 300 (5 minutes). The maximum is 86,400 (24 hours).
97-
- **refresh_token_lifetime_secs** Refresh token lifetimes (seconds). The default is 120,9600 (14 days). The minimum is 86,400 (24 hours). The maximum is 7,776,000 (90 days).
97+
- **refresh_token_lifetime_secs** Refresh token lifetimes (seconds). The default is 1,209,600 (14 days). The minimum is 86,400 (24 hours). The maximum is 7,776,000 (90 days).
9898
- **rolling_refresh_token_lifetime_secs** - Refresh token sliding window lifetime (seconds). The default is 7,776,000 (90 days). The minimum is 86,400 (24 hours). The maximum is 31,536,000 (365 days). If you don't want to enforce a sliding window lifetime, set the value of `allow_infinite_rolling_refresh_token` to `true`.
9999
- **allow_infinite_rolling_refresh_token** - Refresh token sliding window lifetime never expires.
100100

@@ -238,4 +238,4 @@ When using the [OAuth 2.0 authorization code flow](authorization-code-flow.md),
238238
## Next steps
239239

240240
- Learn more about how to [request access tokens](access-tokens.md).
241-
- Learn how to build [Resilience through developer best practices](../active-directory/fundamentals/resilience-b2c-developer-best-practices.md?bc=%2fazure%2factive-directory-b2c%2fbread%2ftoc.json&toc=%2fazure%2factive-directory-b2c%2fTOC.json).
241+
- Learn how to build [Resilience through developer best practices](../active-directory/fundamentals/resilience-b2c-developer-best-practices.md?bc=%2fazure%2factive-directory-b2c%2fbread%2ftoc.json&toc=%2fazure%2factive-directory-b2c%2fTOC.json).

articles/active-directory/authentication/concept-authentication-oath-tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ Some OATH TOTP hardware tokens are programmable, meaning they don't come with a
3030

3131
## OATH hardware tokens (Preview)
3232

33-
Azure AD supports the use of OATH-TOTP SHA-1 tokens that refresh codes every 30 or 60 seconds. Customers can purchase these tokens from the vendor of their choice.
33+
Azure AD supports the use of OATH-TOTP SHA-1 tokens that refresh codes every 30 or 60 seconds. Customers can purchase these tokens from the vendor of their choice. Hardware OATH tokens are available for users with an Azure AD Premium P1 or P2 license.
3434

3535
OATH TOTP hardware tokens typically come with a secret key, or seed, pre-programmed in the token. These keys must be input into Azure AD as described in the following steps. Secret keys are limited to 128 characters, which may not be compatible with all tokens. The secret key can only contain the characters *a-z* or *A-Z* and digits *2-7*, and must be encoded in *Base32*.
3636

articles/active-directory/devices/concept-azure-ad-join.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Any organization can deploy Azure AD joined devices no matter the size or indust
2626
| | Applicable to all users in an organization |
2727
| **Device ownership** | Organization |
2828
| **Operating Systems** | All Windows 11 and Windows 10 devices except Home editions |
29-
| | [Windows Server 2019 Virtual Machines running in Azure](howto-vm-sign-in-azure-ad-windows.md) (Server core isn't supported) |
29+
| | [Windows Server 2019 and newer Virtual Machines running in Azure](howto-vm-sign-in-azure-ad-windows.md) (Server core isn't supported) |
3030
| **Provisioning** | Self-service: Windows Out of Box Experience (OOBE) or Settings |
3131
| | Bulk enrollment |
3232
| | Windows Autopilot |

articles/active-directory/devices/hybrid-azuread-join-manual.md

Lines changed: 0 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -96,30 +96,6 @@ The **$scp.Keywords** output shows the Azure AD tenant information. Here's an ex
9696
azureADId:72f988bf-86f1-41af-91ab-2d7cd011db47
9797
```
9898

99-
If the service connection point doesn't exist, you can create it by running the `Initialize-ADSyncDomainJoinedComputerSync` cmdlet on your Azure AD Connect server. Enterprise admin credentials are required to run this cmdlet.
100-
101-
The `Initialize-ADSyncDomainJoinedComputerSync` cmdlet:
102-
103-
* Creates the service connection point in the Active Directory forest that Azure AD Connect is connected to.
104-
* Requires you to specify the `AdConnectorAccount` parameter. This account is configured as the Active Directory connector account in Azure AD Connect.
105-
106-
107-
The following script shows an example for using the cmdlet. In this script, `$aadAdminCred = Get-Credential` requires you to type a user name. Provide the user name in the user principal name (UPN) format (`[email protected]`).
108-
109-
```PowerShell
110-
Import-Module -Name "C:\Program Files\Microsoft Azure Active Directory Connect\AdPrep\AdSyncPrep.psm1";
111-
112-
$aadAdminCred = Get-Credential;
113-
114-
Initialize-ADSyncDomainJoinedComputerSync –AdConnectorAccount [connector account name] -AzureADCredentials $aadAdminCred;
115-
```
116-
117-
The `Initialize-ADSyncDomainJoinedComputerSync` cmdlet:
118-
119-
* Uses the Active Directory PowerShell module and Active Directory Domain Services (AD DS) tools. These tools rely on Active Directory Web Services running on a domain controller. Active Directory Web Services is supported on domain controllers running Windows Server 2008 R2 and later.
120-
* Is only supported by the MSOnline PowerShell module version 1.1.166.0. To download this module, use [this link](https://www.powershellgallery.com/packages/MSOnline/1.1.166.0).
121-
* If the AD DS tools aren't installed, `Initialize-ADSyncDomainJoinedComputerSync` will fail. You can install the AD DS tools through Server Manager under **Features** > **Remote Server Administration Tools** > **Role Administration Tools**.
122-
12399
### Set up issuance of claims
124100

125101
In a federated Azure AD configuration, devices rely on AD FS or an on-premises federation service from a Microsoft partner to authenticate to Azure AD. Devices authenticate to get an access token to register against the Azure Active Directory Device Registration Service (Azure DRS).

articles/active-directory/reports-monitoring/concept-usage-insights-report.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.topic: conceptual
99
ms.workload: identity
1010
ms.subservice: report-monitor
11-
ms.date: 11/23/2022
11+
ms.date: 01/10/2023
1212
ms.author: sarahlipsey
1313
ms.reviewer: besiler
1414
---
@@ -44,7 +44,9 @@ There are currently three reports available in Azure AD Usage & insights. All th
4444

4545
### Azure AD application activity (preview)
4646

47-
The **Azure AD application activity (preview)** report shows the list of applications with one or more sign-in attempts. Any application activity during the selected date range appears in the report. It's possible that activity for a deleted application may appear in the report, if the activity took place during the selected date range and before the application was deleted. The report allows you to sort by the number of successful sign-ins, failed sign-ins, and the success rate.
47+
The **Azure AD application activity (preview)** report shows the list of applications with one or more sign-in attempts. Any application activity during the selected date range appears in the report. The report allows you to sort by the number of successful sign-ins, failed sign-ins, and the success rate.
48+
49+
It's possible that activity for a deleted application may appear in the report if the activity took place during the selected date range and before the application was deleted. Other scenarios could include a user attempting to sign in to an application that doesn't have a service principal associated with the app. For these types of scenarios, you may need to review the audit logs or sign-in logs to investigate further.
4850

4951
Select the **View sign in activity** link for an application to view more details. The sign-in graph per application counts interactive user sign-ins. The details of any sign-in failures appears below the table.
5052

articles/active-directory/verifiable-credentials/issuance-request-api.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -30,10 +30,10 @@ The Request Service REST API issuance request supports the following HTTP method
3030

3131
The Request Service REST API issuance request requires the following HTTP headers:
3232

33-
| Method |Value |
33+
| Name |Value |
3434
|---------|---------|
3535
|`Authorization`| Attach the access token as a bearer token to the authorization header in an HTTP request. For example, `Authorization: Bearer <token>`.|
36-
|`Content-Type`| `Application/json`|
36+
|`Content-Type`| `application/json`|
3737

3838
Construct an HTTP POST request to the Request Service REST API.
3939

@@ -46,18 +46,18 @@ The following HTTP request demonstrates a request to the Request Service REST AP
4646
```http
4747
POST https://verifiedid.did.msidentity.com/v1.0/verifiableCredentials/createIssuanceRequest
4848
Content-Type: application/json
49-
Authorization: Bearer <token>
49+
Authorization: Bearer <token>
5050
5151
{
52-
"includeQRCode": true,
53-
"callback": {
54-
"url": "https://wwww.contoso.com/vc/callback",
55-
"state": "Aaaabbbb11112222",
56-
"headers": {
57-
"api-key": "an-api-key-can-go-here"
58-
   }
59-
},
60-
...
52+
"includeQRCode": true,
53+
"callback": {
54+
"url": "https://wwww.contoso.com/vc/callback",
55+
"state": "Aaaabbbb11112222",
56+
"headers": {
57+
"api-key": "an-api-key-can-go-here"
58+
}
59+
},
60+
...
6161
}
6262
```
6363

@@ -182,7 +182,7 @@ When your app receives the response, the app needs to present the QR code to the
182182

183183
## Error response
184184

185-
If there is an error with the request, an [error responses](error-codes.md) will be returned and should be handled appropriately by the app.
185+
If there is an error with the request, an [error response](error-codes.md) will be returned and should be handled appropriately by the app.
186186

187187
## Callback events
188188

articles/analysis-services/analysis-services-logging.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -160,7 +160,7 @@ In the query builder, expand **LogManagement** > **AzureDiagnostics**. AzureDiag
160160

161161
#### Example 1
162162

163-
The following query returns durations for each query end/refresh end event for a model database and server. If scaled out, the results are broken out by replica because the replica number is included in ServerName_s. Grouping by RootActivityId_g reduces the row count retrieved from the Azure Diagnostics REST API and helps stay within the limits as described in [Log Analytics Rate limits](https://dev.loganalytics.io/documentation/Using-the-API/Limits).
163+
The following query returns durations for each query end/refresh end event for a model database and server. If scaled out, the results are broken out by replica because the replica number is included in ServerName_s. Grouping by RootActivityId_g reduces the row count retrieved from the Azure Diagnostics REST API and helps stay within the limits as described in Log Analytics Rate limits.
164164

165165
```Kusto
166166
let window = AzureDiagnostics

articles/automation/TOC.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,8 @@
4343
href: /powershell/dsc/overview
4444
- name: Automation network configuration details
4545
href: automation-network-configuration.md
46+
- name: Azure Automation extension for Visual Studio Code
47+
href: automation-runbook-authoring.md
4648
- name: Security
4749
items:
4850
- name: Security controls by Azure Policy
@@ -98,6 +100,8 @@
98100
href: delete-run-as-account.md
99101
- name: Manage Run As account
100102
href: manage-runas-account.md
103+
- name: Use Automation extension for Visual Studio Code
104+
href: how-to/runbook-authoring-extension-for-vscode.md
101105
- name: Configure authentication with Amazon Web Services
102106
href: automation-config-aws-account.md
103107
- name: Configure authentication with Azure AD
Lines changed: 79 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,79 @@
1+
---
2+
title: Runbook authoring using VS code in Azure Automation
3+
description: This article provides an overview authoring runbooks in Azure Automation using the visual studio code.
4+
services: automation
5+
ms.subservice: process-automation
6+
ms.date: 01/10/2023
7+
ms.topic: conceptual
8+
ms.custom: devx-track-azurepowershell
9+
---
10+
11+
# Runbook authoring through VS Code in Azure Automation
12+
13+
This article explains about the Visual Studio extension that you can use to create and manage runbooks.
14+
15+
Azure Automation provides a new extension from VS Code to create and manage runbooks. Using this extension, you can perform all runbook management operations such as, creating and editing runbooks, triggering a job, tracking recent jobs output, linking a schedule, asset management, and local debugging.
16+
17+
## Prerequisites
18+
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
19+
- [Visual Studio Code](https://code.visualstudio.com/).
20+
- PowerShell modules and Python packages used by runbook must be locally installed on the machine to run the runbook locally.
21+
22+
## Supported operating systems
23+
24+
The test matrix includes the following operating systems:
25+
1. **Windows Server 2022** with Windows PowerShell 5.1 and PowerShell Core 7.2.7
26+
1. **Windows Server 2019** with Windows PowerShell 5.1 and PowerShell Core 7.2.7
27+
1. **macOS 11** with PowerShell Core 7.2.7
28+
1. **Ubuntu** 20.04 with PowerShell Core 7.2.7
29+
30+
>[!NOTE]
31+
>- The extension should work anywhere in VS Code and it supports [PowerShell 7.2 or higher](https://learn.microsoft.com/powershell/scripting/install/PowerShell-Support-Lifecycle?view=powershell-7.3). For Windows PowerShell, only version 5.1 is supported.
32+
>- PowerShell Core 6 is end-of-life and not supported.
33+
34+
35+
## Key Features
36+
37+
- **Simplified onboarding** – You can sign in using an Azure account in a simple and secure way.
38+
- **Multiple languages** - Supports all Automation runtime stack such as PowerShell 5, PowerShell 7, Python 2, and Python 3 Runbooks.
39+
- **Supportability**- Supports test execution of job, publishing Automation job and triggering job in Azure and Hybrid workers. You can execute runbooks locally.
40+
- Supports Python positional parameters and PowerShell parameters to trigger job.
41+
- **Webhooks simplified** – You can create a webhook, start a job through a webhook in simpler way. Also, support to link a schedule to a Runbook.
42+
- **Manage Automation Assets** – You can perform create, update, and delete operation against assets including certificates, variables, credentials, and connections.
43+
- **View properties** – You can view the properties and select Hybrid worker group to execute hybrid jobs and view the recent last 10 jobs executed.
44+
- **Debug locally** - You can debug the PowerShell scripts locally.
45+
- **Runbook comparison** - You can compare the local runbook to the published or the draft runbook copy.
46+
47+
## Key Features of v1.0.8
48+
49+
- **Local directory configuration settings** - You can define the working directory that you want to save runbooks locally.
50+
- **Change Directory:Base Path** - You use the changed directory path when you reopen Visual Studio code IDE. To change the directory using the Command Palette, use **Ctrl+Shift+P -> select Change Directory**. To change the base path from extension configuration settings, select **Manage** icon in the activity bar on the left and go to **Settings > Extensions > Azure Automation > Directory:Base Path**.
51+
- **Change Directory:Folder Structure** - You can change the local directory folder structure from *vscodeAutomation/accHash* to *subscription/resourceGroup/automationAccount*. Select **Manage** icon in the activity bar on the left and go to **Settings > Extensions > Azure Automation > Directory:Folder Structure**. You can change the default configuration setting from *vscodeAutomation/accHash* to *subscription/resourceGroupe/automationAccount* format.
52+
>[!NOTE]
53+
>If your automation account is integrated with source control you can provide the runbook folder path of your GitHub repo as the directory path. For example: changing directory to *C:\abc* would store runbooks in *C:\abc\vscodeAutomation..* or *C:\abc//subscriptionName//resourceGroupName//automationAccountName//runbookname.ps1*.
54+
- **Runbook management operations** - You can create runbook, fetch draft runbook, fetch published runbook, open local runbook in the editor, compare local runbook with a published or draft runbook copy, upload as draft, publish runbook, and delete runbook from your Automation account.
55+
- **Runbook execution operations** - You can run a local version of Automation jobs such as, Start Automation jobs, Start Automation test job, view job outputs and run local version of the PowerShell Runbook in debug mode by allowing you to add breakpoints in the script.
56+
>[!NOTE]
57+
> Currently, we support the use of internal cmdlets like `Get-AutomationVariable` only with non-encrypted assets.
58+
59+
- **Work with schedules, assets and webhooks** - You can view the properties of a schedule, delete schedule, link schedule to link a schedule to a runbook.
60+
- **Add webhook** - You can add a webhook to the runbook.
61+
- **Update properties of assets** - You can create, update, view properties of assets such as Certificates, Connections, Credentials, Variables and Deletion of assets from the extension.
62+
63+
64+
## Limitations
65+
Currently, the following features aren't supported:
66+
67+
- Creation of new schedules.
68+
- Adding new Certificates in Assets.
69+
- Upload Modules (PowerShell and Python) packages from the extension.
70+
- Auto-sync of local runbooks to Azure Automation account. You will have to perform the operation to **Fetch** or **Publish** runbook.
71+
- Management of Hybrid worker groups.
72+
- Graphical runbook and workflows.
73+
- For Python, we don't provide any debug options. We recommend that you install any debugger extension in your Python script.
74+
- Currently, we support only the unencrypted assets in local run.
75+
76+
## Next steps
77+
78+
- For Runbook management operations and to test runbook and jobs, see [Use Azure Automation extension for Visual Studio Code](../automation/how-to/runbook-authoring-extension-for-vscode.md)
79+
89.9 KB
Loading

0 commit comments

Comments
 (0)