Skip to content

Commit d7a782c

Browse files
368370 PowerShell rebrand
1 parent 9644265 commit d7a782c

File tree

1 file changed

+11
-12
lines changed

1 file changed

+11
-12
lines changed

articles/hdinsight/domain-joined/apache-domain-joined-architecture.md

Lines changed: 11 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Azure HDInsight architecture with Enterprise Security Package
33
description: Learn how to plan Azure HDInsight security with Enterprise Security Package.
44
ms.service: azure-hdinsight
55
ms.topic: conceptual
6-
ms.custom: hdinsightactive, has-azure-ad-ps-ref
6+
ms.custom: hdinsightactive, no-azure-ad-ps-ref
77
author: hareshg
88
ms.author: hgowrisankar
99
ms.reviewer: nijelsf
@@ -60,52 +60,51 @@ If you're using federation with Active Directory Federation Services (AD FS), yo
6060

6161
When you use on-premises Active Directory or Active Directory on IaaS VMs alone, without Microsoft Entra ID and Microsoft Entra Domain Services, isn't a supported configuration for HDInsight clusters with ESP.
6262

63-
[!INCLUDE [Azure AD PowerShell deprecation note](~/reusable-content/msgraph-powershell/includes/aad-powershell-deprecation-note.md)]
64-
6563
If you use federation and password hashes are synced correctly, but you're getting authentication failures, check if cloud password authentication is enabled for the PowerShell service principal. If not, you must set a [Home Realm Discovery (HRD) policy](../../active-directory/manage-apps/configure-authentication-for-federated-users-portal.md) for your Microsoft Entra tenant. To check and set the HRD policy:
6664

67-
1. Install the preview [Azure AD PowerShell module](/powershell/azure/active-directory/install-adv2).
65+
1. Install the [Microsoft.Entra](/powershell/module/microsoft.entra) and [Microsoft.Entra.Beta](/powershell/module/microsoft.entra.beta) modules.
6866

6967
```powershell
70-
Install-Module AzureAD
68+
Install-Module Microsoft.Entra
69+
Install-Module microsoft.Entra.Beta
7170
```
7271

7372
2. Connect using [Hybrid Identity Administrator](/entra/identity/role-based-access-control/permissions-reference#hybrid-identity-administrator)credentials.
7473

7574
```powershell
76-
Connect-AzureAD
75+
Connect-Entra -Scopes 'Application.ReadWrite.All'
7776
```
7877

7978
3. Check if the Microsoft Azure PowerShell service principal has already been created.
8079

8180
```powershell
82-
Get-AzureADServicePrincipal -SearchString "Microsoft Azure PowerShell"
81+
Get-EntraServicePrincipal -SearchString "Microsoft Azure PowerShell"
8382
```
8483

8584
4. If it doesn't exist, then create the service principal.
8685

8786
```powershell
88-
$powershellSPN = New-AzureADServicePrincipal -AppId 1950a258-227b-4e31-a9cf-717495945fc2
87+
$powershellSPN = New-EntraServicePrincipal -AppId 1950a258-227b-4e31-a9cf-717495945fc2
8988
```
9089

9190
5. Create and attach the policy to this service principal.
9291

9392
```powershell
9493
# Determine whether policy exists
95-
Get-AzureADPolicy | Where {$_.DisplayName -eq "EnableDirectAuth"}
94+
Get-EntraBetaPolicy | Where {$_.DisplayName -eq "EnableDirectAuth"}
9695
9796
# Create if not exists
98-
$policy = New-AzureADPolicy `
97+
$policy = New-EntraBetaPolicy `
9998
-Definition @('{"HomeRealmDiscoveryPolicy":{"AllowCloudPasswordValidation":true}}') `
10099
-DisplayName "EnableDirectAuth" `
101100
-Type "HomeRealmDiscoveryPolicy"
102101
103102
# Determine whether a policy for the service principal exist
104-
Get-AzureADServicePrincipalPolicy `
103+
Get-EntraBetaServicePrincipalPolicy `
105104
-Id $powershellSPN.ObjectId
106105
107106
# Add a service principal policy if not exist
108-
Add-AzureADServicePrincipalPolicy `
107+
Add-EntraBetaServicePrincipalPolicy `
109108
-Id $powershellSPN.ObjectId `
110109
-refObjectID $policy.ID
111110
```

0 commit comments

Comments
 (0)