Skip to content

Commit d3ccad6

Browse files
Merge pull request #239384 from barclayn/2023-test-02
freshness review
2 parents 13cc429 + 1feac3f commit d3ccad6

File tree

8 files changed

+18
-19
lines changed

8 files changed

+18
-19
lines changed

articles/active-directory/managed-identities-azure-resources/how-to-managed-identity-regional-move.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.subservice: msi
99
ms.topic: how-to
1010
ms.tgt_pltfrm: na
1111
ms.workload: identity
12-
ms.date: 04/26/2022
12+
ms.date: 05/25/2023
1313
ms.author: barclayn
1414
ms.custom: subject-moving-resources
1515
#Customer intent: As an Azure administrator, I want to move a solution using managed identities from one Azure region to another one.
@@ -20,7 +20,7 @@ ms.custom: subject-moving-resources
2020

2121
There are situations in which you'd want to move your existing user-assigned managed identities from one region to another. For example, you may need to move a solution that uses user-assigned managed identities to another region. You may also want to move an existing identity to another region as part of disaster recovery planning, and testing.
2222

23-
Moving User-assigned managed identities across Azure regions is not supported. You can however, recreate a user-assigned managed identity in the target region.
23+
Moving User-assigned managed identities across Azure regions isn't supported. You can however, recreate a user-assigned managed identity in the target region.
2424

2525
## Prerequisites
2626

articles/active-directory/managed-identities-azure-resources/how-to-use-vm-sdk.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.subservice: msi
1212
ms.topic: how-to
1313
ms.tgt_pltfrm: na
1414
ms.workload: identity
15-
ms.date: 01/11/2022
15+
ms.date: 05/23/2023
1616
ms.author: barclayn
1717
ms.collection: M365-identity-device-management
1818
---

articles/active-directory/managed-identities-azure-resources/qs-configure-cli-windows-vmss.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.subservice: msi
1111
ms.topic: quickstart
1212
ms.tgt_pltfrm: na
1313
ms.workload: identity
14-
ms.date: 01/11/2022
14+
ms.date: 05/25/2023
1515
ms.author: barclayn
1616
ms.collection: M365-identity-device-management
1717
ms.custom: mode-api, devx-track-azurecli
@@ -25,6 +25,7 @@ ms.devlang: azurecli
2525
Managed identities for Azure resources provide Azure services with an automatically managed identity in Azure Active Directory. You can use this identity to authenticate to any service that supports Azure AD authentication, without having credentials in your code.
2626

2727
In this article, you learn how to perform the following managed identities for Azure resources operations on an Azure virtual machine scale set, using the Azure CLI:
28+
2829
- Enable and disable the system-assigned managed identity on an Azure virtual machine scale set
2930
- Add and remove a user-assigned managed identity on an Azure virtual machine scale set
3031

@@ -169,13 +170,13 @@ This section walks you through creation of a virtual machine scale set and assig
169170
170171
### Remove a user-assigned managed identity from an Azure virtual machine scale set
171172
172-
To [remove](/cli/azure/vmss/identity#az-vmss-identity-remove) a user-assigned managed identity from a virtual machine scale set use `az vmss identity remove`. If this is the only user-assigned managed identity assigned to the virtual machine scale set, `UserAssigned` will be removed from the identity type value. Be sure to replace the `<RESOURCE GROUP>` and `<VIRTUAL MACHINE SCALE SET NAME>` parameter values with your own values. The `<USER ASSIGNED IDENTITY>` will be the user-assigned managed identity's `name` property, which can be found in the identity section of the virtual machine scale set using `az vmss identity show`:
173+
To [remove](/cli/azure/vmss/identity#az-vmss-identity-remove) a user-assigned managed identity from a virtual machine scale set use `az vmss identity remove`. If this is the only user-assigned managed identity assigned to the virtual machine scale set, `UserAssigned` is removed from the identity type value. Be sure to replace the `<RESOURCE GROUP>` and `<VIRTUAL MACHINE SCALE SET NAME>` parameter values with your own values. The `<USER ASSIGNED IDENTITY>` is the user-assigned managed identity's `name` property, which can be found in the identity section of the virtual machine scale set using `az vmss identity show`:
173174
174175
```azurecli-interactive
175176
az vmss identity remove -g <RESOURCE GROUP> -n <VIRTUAL MACHINE SCALE SET NAME> --identities <USER ASSIGNED IDENTITY>
176177
```
177178

178-
If your virtual machine scale set does not have a system-assigned managed identity and you want to remove all user-assigned managed identities from it, use the following command:
179+
If your virtual machine scale set doesn't have a system-assigned managed identity and you want to remove all user-assigned managed identities from it, use the following command:
179180

180181
> [!NOTE]
181182
> The value `none` is case sensitive. It must be lowercase.

articles/active-directory/managed-identities-azure-resources/qs-configure-rest-vm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.subservice: msi
1111
ms.topic: quickstart
1212
ms.tgt_pltfrm: na
1313
ms.workload: identity
14-
ms.date: 01/11/2022
14+
ms.date: 05/25/2023
1515
ms.author: barclayn
1616
ms.collection: M365-identity-device-management
1717
ms.custom: mode-api, devx-track-azurecli

articles/active-directory/managed-identities-azure-resources/qs-configure-rest-vmss.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.subservice: msi
1111
ms.topic: quickstart
1212
ms.tgt_pltfrm: na
1313
ms.workload: identity
14-
ms.date: 01/11/2022
14+
ms.date: 05/25/2023
1515
ms.author: barclayn
1616
ms.collection: M365-identity-device-management
1717
ms.custom: mode-api, devx-track-azurecli
@@ -20,8 +20,6 @@ ms.devlang: azurecli
2020

2121
# Configure managed identities for Azure resources on a virtual machine scale set using REST API calls
2222

23-
[!INCLUDE [preview-notice](../../../includes/active-directory-msi-preview-notice.md)]
24-
2523
Managed identities for Azure resources provide Azure services with an automatically managed system identity in Azure Active Directory. You can use this identity to authenticate to any service that supports Azure AD authentication, without having credentials in your code.
2624

2725
In this article, using CURL to make calls to the Azure Resource Manager REST endpoint, you learn how to perform the following managed identities for Azure resources operations on a virtual machine scale set:

articles/active-directory/managed-identities-azure-resources/tutorial-linux-vm-access-arm.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ ms.custom: mode-other, devx-track-arm-template
2121

2222
[!INCLUDE [preview-notice](../../../includes/active-directory-msi-preview-notice.md)]
2323

24-
This quickstart shows you how to use a system-assigned identity for a Linux virtual machine (VM) to access the Azure Resource Manager API. Managed identities for Azure resources are automatically managed by Azure and enable you to authenticate to services that support Azure AD authentication without needing to insert credentials into your code.
24+
This quickstart shows you how to use a system-assigned managed identity as a Linux virtual machine (VM)'s identity to access the Azure Resource Manager API. Managed identities for Azure resources are automatically managed by Azure and enable you to authenticate to services that support Azure AD authentication without needing to insert credentials into your code.
2525
You learn how to:
2626

2727
> [!div class="checklist"]
@@ -30,14 +30,14 @@ You learn how to:
3030
3131
## Prerequisites
3232

33-
- An understanding of Managed identities. If you're not familiar with the managed identities for Azure resources feature, see this [overview](overview.md).
33+
- An understanding of Managed identities. If you're not familiar with managed identities, see this [overview](overview.md).
3434
- An Azure account, [sign up for a free account](https://azure.microsoft.com/free/).
3535
- You also need a Linux Virtual machine that has system assigned managed identities enabled. If you have a VM but need to enable [system assigned managed identities](qs-configure-portal-windows-vm.md) you can do it in the identity section of the virtual machine's properties.
3636
- If you need to create a virtual machine for this tutorial, you can follow the article titled [Create a Linux virtual machine with the Azure portal](../../virtual-machines/linux/quick-create-portal.md#create-virtual-machine)
3737

3838
## Grant access
3939

40-
Using managed identities for Azure resources, your code can get access tokens to authenticate to resources that support Azure AD authentication. The Azure Resource Manager API supports Azure AD authentication. First, we need to grant this VM's identity access to a resource in Azure Resource Manager, in this case, the Resource Group in which the VM is contained.
40+
When you use managed identities for Azure resources, your code can get access tokens to authenticate to resources that support Azure AD authentication. The Azure Resource Manager API supports Azure AD authentication. First, we need to grant this VM's identity access to a resource in Azure Resource Manager, in this case, the Resource Group in which the VM is contained.
4141

4242
1. Sign in to the [Azure portal](https://portal.azure.com) with your administrator account.
4343
1. Navigate to the tab for **Resource Groups**.
@@ -54,7 +54,7 @@ Using managed identities for Azure resources, your code can get access tokens to
5454

5555
## Get an access token using the VM's system-assigned managed identity and use it to call Resource Manager
5656

57-
To complete these steps, you'll need an SSH client. If you're using Windows, you can use the SSH client in the [Windows Subsystem for Linux](/windows/wsl/about). If you need assistance configuring your SSH client's keys, see [How to Use SSH keys with Windows on Azure](../../virtual-machines/linux/ssh-from-windows.md), or [How to create and use an SSH public and private key pair for Linux VMs in Azure](../../virtual-machines/linux/mac-create-ssh-keys.md).
57+
To complete these steps, you need an SSH client. If you're using Windows, you can use the SSH client in the [Windows Subsystem for Linux](/windows/wsl/about). If you need assistance configuring your SSH client's keys, see [How to Use SSH keys with Windows on Azure](../../virtual-machines/linux/ssh-from-windows.md), or [How to create and use an SSH public and private key pair for Linux VMs in Azure](../../virtual-machines/linux/mac-create-ssh-keys.md).
5858

5959
1. In the portal, navigate to your Linux VM and in the **Overview**, select **Connect**.  
6060
2. **Connect** to the VM with the SSH client of your choice. 

articles/active-directory/managed-identities-azure-resources/tutorial-linux-vm-access-datalake.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.subservice: msi
1212
ms.topic: tutorial
1313
ms.tgt_pltfrm: na
1414
ms.workload: identity
15-
ms.date: 01/11/2022
15+
ms.date: 05/25/2023
1616
ms.author: barclayn
1717
ms.collection: M365-identity-device-management
1818
---
@@ -43,12 +43,12 @@ In Data Lake Store, create a new folder and grant our Linux VM system-assigned m
4343
2. Select the Data Lake Store instance that you want to use.
4444
3. Select **Data Explorer** on the command bar.
4545
4. The root folder of the Data Lake Store instance is selected. Select **Access** on the command bar.
46-
5. Select **Add**. In the **Select** box, enter the name of your VM--for example, **DevTestVM**. Select your VM from the search results, and then click **Select**.
47-
6. Click **Select Permissions**. Select **Read** and **Execute**, add to **This folder**, and add as **An access permission only**. Select **Ok**. The permission should be added successfully.
46+
5. Select **Add**. In the **Select** box, enter the name of your VM--for example, **DevTestVM**. Select your VM from the search results, and then select **Select**.
47+
6. Select **Select Permissions**. Select **Read** and **Execute**, add to **This folder**, and add as **An access permission only**. Select **Ok**. The permission should be added successfully.
4848
7. Close the **Access** pane.
4949
8. For this tutorial, create a new folder. Select **New Folder** on the command bar, and give the new folder a name--for example **TestFolder**. Select **Ok**.
5050
9. Select the folder that you created, and then select **Access** on the command bar.
51-
10. Similar to step 5, select **Add**. In the **Select** box, enter the name of your VM. Select your VM from the search results, and then click **Select**.
51+
10. Similar to step 5, select **Add**. In the **Select** box, enter the name of your VM. Select your VM from the search results, and then select **Select**.
5252
11. Similar to step 6, select **Select Permissions**. Select **Read**, **Write**, and **Execute**, add to **This folder**, and add as **An access permission entry and a default permission entry**. Select **Ok**. The permission should be added successfully.
5353

5454
Managed identities for Azure resources can now perform all operations on files in the folder that you created. For more information on managing access to Data Lake Store, see [Access Control in Data Lake Store](../../data-lake-store/data-lake-store-access-control.md).

articles/active-directory/verifiable-credentials/issuer-openid.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: decentralized-identity
77
ms.subservice: verifiable-credentials
88
ms.workload: identity
99
ms.topic: conceptual
10-
ms.date: 04/01/2021
10+
ms.date: 05/25/2023
1111
ms.author: barclayn
1212
# Customer intent: As a developer I am looking for information on how to enable my users to control their own information
1313
---

0 commit comments

Comments
 (0)