Skip to content

Commit da37d61

Browse files
Merge pull request #234238 from SnehaSudhirG/12Apr-RemoveRunAs
removed reference of RunAs accounts
2 parents 3779a82 + 9b7efc0 commit da37d61

File tree

4 files changed

+19
-60
lines changed

4 files changed

+19
-60
lines changed

articles/automation/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -90,8 +90,6 @@
9090
href: troubleshoot/managed-identity.md
9191
- name: Run As account
9292
items:
93-
- name: Create Run As account
94-
href: create-run-as-account.md
9593
- name: Delete Run As account
9694
href: delete-run-as-account.md
9795
- name: Manage Run As account

articles/automation/automation-security-overview.md

Lines changed: 14 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article provides an overview of Azure Automation account authe
44
keywords: automation security, secure automation; automation authentication
55
services: automation
66
ms.subservice: process-automation
7-
ms.date: 03/07/2023
7+
ms.date: 04/12/2023
88
ms.topic: conceptual
99
ms.custom: devx-track-azurepowershell
1010
---
@@ -37,9 +37,6 @@ A managed identity from Azure Active Directory (Azure AD) allows your runbook to
3737

3838
Managed identities are the recommended way to authenticate in your runbooks, and is the default authentication method for your Automation account.
3939

40-
> [!NOTE]
41-
> When you create an Automation account, the option to create a Run As account is no longer available. However, we continue to support a RunAs account for existing and new Automation accounts. You can [create a Run As account](create-run-as-account.md) in your Automation account from the Azure portal or by using PowerShell.
42-
4340
Here are some of the benefits of using managed identities:
4441

4542
- Using a managed identity instead of the Automation Run As account simplifies management. You don't have to renew the certificate used by a Run As account.
@@ -68,7 +65,7 @@ Run As accounts in Azure Automation provide authentication for managing Azure Re
6865
- Azure Run As Account
6966
- Azure Classic Run As Account
7067

71-
To create or renew a Run As account, permissions are needed at three levels:
68+
To renew a Run As account, permissions are needed at three levels:
7269

7370
- Subscription,
7471
- Azure Active Directory (Azure AD), and
@@ -82,11 +79,11 @@ You need the `Microsoft.Authorization/*/Write` permission. This permission is ob
8279
- [Owner](../role-based-access-control/built-in-roles.md#owner)
8380
- [User Access Administrator](../role-based-access-control/built-in-roles.md#user-access-administrator)
8481

85-
To configure or renew Classic Run As accounts, you must have the Co-administrator role at the subscription level. To learn more about classic subscription permissions, see [Azure classic subscription administrators](../role-based-access-control/classic-administrators.md#add-a-co-administrator).
82+
To renew Classic Run As accounts, you must have the Co-administrator role at the subscription level. To learn more about classic subscription permissions, see [Azure classic subscription administrators](../role-based-access-control/classic-administrators.md#add-a-co-administrator).
8683

8784
### Azure AD permissions
8885

89-
To be able to create or renew the service principal, you need to be a member of one of the following Azure AD built-in roles:
86+
To renew the service principal, you need to be a member of one of the following Azure AD built-in roles:
9087

9188
- [Application Administrator](../active-directory/roles/permissions-reference.md#application-administrator)
9289
- [Application Developer](../active-directory/roles/permissions-reference.md#application-developer)
@@ -95,7 +92,7 @@ Membership can be assigned to **ALL** users in the tenant at the directory level
9592

9693
### Automation account permissions
9794

98-
To be able to create or update the Automation account, you need to be a member of one of the following Automation account roles:
95+
To update the Automation account, you need to be a member of one of the following Automation account roles:
9996

10097
- [Owner](./automation-role-based-access-control.md#owner)
10198
- [Contributor](./automation-role-based-access-control.md#contributor)
@@ -105,40 +102,24 @@ To learn more about the Azure Resource Manager and Classic deployment models, se
105102
>[!NOTE]
106103
>Azure Cloud Solution Provider (CSP) subscriptions support only the Azure Resource Manager model. Non-Azure Resource Manager services are not available in the program. When you are using a CSP subscription, the Azure Classic Run As account is not created, but the Azure Run As account is created. To learn more about CSP subscriptions, see [Available services in CSP subscriptions](/azure/cloud-solution-provider/overview/azure-csp-available-services).
107104
108-
When you create an Automation account, the Run As account is created by default at the same time with a self-signed certificate. If you chose not to create it along with the Automation account, it can be created individually at a later time. An Azure Classic Run As Account is optional, and is created separately if you need to manage classic resources.
109-
110-
> [!NOTE]
111-
> Azure Automation does not automatically create the Run As account. It has been replaced by using managed identities.
112-
113-
If you want to use a certificate issued by your enterprise or third-party certification authority (CA) instead of the default self-signed certificate, can use the [PowerShell script to create a Run As account](create-run-as-account.md#powershell-script-to-create-a-run-as-account) option for your Run As and Classic Run As accounts.
114-
115105
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RWwtF3]
116106
117107
### Run As account
118108

119-
When you create a Run As account, it performs the following tasks:
120-
121-
* Creates an Azure AD application with a self-signed certificate, creates a service principal account for the application in Azure AD, and assigns the [Contributor](../role-based-access-control/built-in-roles.md#contributor) role for the account in your current subscription. You can change the certificate setting to [Reader](../role-based-access-control/built-in-roles.md#reader) or any other role. For more information, see [Role-based access control in Azure Automation](automation-role-based-access-control.md).
122-
123-
* Creates an Automation certificate asset named `AzureRunAsCertificate` in the specified Automation account. The certificate asset holds the certificate private key that the Azure AD application uses.
124-
125-
* Creates an Automation connection asset named `AzureRunAsConnection` in the specified Automation account. The connection asset holds the application ID, tenant ID, subscription ID, and certificate thumbprint.
109+
Run As Account consists of the following components:
110+
- An Azure AD application with a self-signed certificate, and a service principal account for the application in Azure AD, which is assigned the [Contributor](../role-based-access-control/built-in-roles.md#contributor) role for the account in your current subscription. You can change the certificate setting to [Reader](../role-based-access-control/built-in-roles.md#reader) or any other role. For more information, see [Role-based access control in Azure Automation](automation-role-based-access-control.md).
111+
- An Automation certificate asset named `AzureRunAsCertificate` in the specified Automation account. The certificate asset holds the certificate private key that the Azure AD application uses.
112+
- An Automation connection asset named `AzureRunAsConnection` in the specified Automation account. The connection asset holds the application ID, tenant ID, subscription ID, and certificate thumbprint.
126113

127114
### Azure Classic Run As account
128115

129-
> [!IMPORTANT]
130-
> Azure Automation Run As Account will retire on September 30, 2023 and will be replaced with Managed Identities. Before that date, you'll need to start migrating your runbooks to use [managed identities](automation-security-overview.md#managed-identities). For more information, see [migrating from an existing Run As accounts to managed identity](https://learn.microsoft.com/azure/automation/migrate-run-as-accounts-managed-identity?tabs=run-as-account#sample-scripts) to start migrating the runbooks from Run As account to managed identities before 30 September 2023.
131-
132-
When you create an Azure Classic Run As account, it performs the following tasks:
116+
Azure Classic Run As Account consists of the following components:
117+
- A management certificate in the subscription.
118+
- An Automation certificate asset named `AzureClassicRunAsCertificate` in the specified Automation account. The certificate asset holds the certificate private key used by the management certificate.
119+
- An Automation connection asset named `AzureClassicRunAsConnection` in the specified Automation account. The connection asset holds the subscription name, subscription ID, and certificate asset name.
133120

134121
> [!NOTE]
135-
> You must be a co-administrator on the subscription to create or renew this type of Run As account.
136-
137-
* Creates a management certificate in the subscription.
138-
139-
* Creates an Automation certificate asset named `AzureClassicRunAsCertificate` in the specified Automation account. The certificate asset holds the certificate private key used by the management certificate.
140-
141-
* Creates an Automation connection asset named `AzureClassicRunAsConnection` in the specified Automation account. The connection asset holds the subscription name, subscription ID, and certificate asset name.
122+
> You must be a co-administrator on the subscription to renew this type of Run As account.
142123
143124
## Service principal for Run As account
144125

articles/automation/delete-run-as-account.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Delete an Azure Automation Run As account
33
description: This article tells how to delete a Run As account with PowerShell or from the Azure portal.
44
services: automation
55
ms.subservice: process-automation
6-
ms.date: 01/06/2021
6+
ms.date: 04/12/2023
77
ms.topic: conceptual
88
---
99

@@ -26,8 +26,9 @@ Run As accounts in Azure Automation provide authentication for managing resource
2626

2727
![Delete Run As account](media/delete-run-as-account/automation-account-delete-run-as.png)
2828

29-
5. While the account is being deleted, you can track the progress under **Notifications** from the menu.
29+
5. While the account is being deleted, you can track the progress under **Notifications** from the menu. Run As accounts can't be restored after deletion.
3030

3131
## Next steps
3232

33-
To recreate your Run As or Classic Run As account, see [Create Run As accounts](create-run-as-account.md).
33+
- [Use system-assigned managed identity](enable-managed-identity-for-automation.md).
34+
- [Use user-assigned managed identity](add-user-assigned-identity.md).

articles/automation/manage-run-as-account.md

Lines changed: 1 addition & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Manage an Azure Automation Run As account
33
description: This article tells how to manage your Azure Automation Run As account with PowerShell or from the Azure portal.
44
services: automation
5-
ms.date: 08/02/2021
5+
ms.date: 04/12/2023
66
ms.topic: conceptual
77
---
88

@@ -161,30 +161,9 @@ You can allow Azure Automation to verify if Key Vault and your Run As account se
161161

162162
You can use the [Extend-AutomationRunAsAccountRoleAssignmentToKeyVault.ps1](https://aka.ms/AA5hugb) script in the PowerShell Gallery to grant your Run As account permissions to Key Vault. See [Assign a Key Vault access policy](../key-vault/general/assign-access-policy-powershell.md) for more details on setting permissions on Key Vault.
163163

164-
## Resolve misconfiguration issues for Run As accounts
165-
166-
Some configuration items necessary for a Run As or Classic Run As account might have been deleted or created improperly during initial setup. Possible instances of misconfiguration include:
167-
168-
* Certificate asset
169-
* Connection asset
170-
* Run As account removed from the Contributor role
171-
* Service principal or application in Azure AD
172-
173-
For such misconfiguration instances, the Automation account detects the changes and displays a status of *Incomplete* on the Run As Accounts properties pane for the account.
174-
175-
:::image type="content" source="media/manage-run-as-account/automation-account-run-as-config-incomplete.png" alt-text="Incomplete Run As account configuration.":::
176-
177-
When you select the Run As account, the account properties pane displays the following error message:
178-
179-
```text
180-
The Run As account is incomplete. Either one of these was deleted or not created - Azure Active Directory Application, Service Principal, Role, Automation Certificate asset, Automation Connect asset - or the Thumbprint is not identical between Certificate and Connection. Please delete and then re-create the Run As Account.
181-
```
182-
183-
You can quickly resolve these Run As account issues by [deleting](delete-run-as-account.md) and [re-creating](create-run-as-account.md) the Run As account.
184164

185165
## Next steps
186166

187167
* [Application Objects and Service Principal Objects](../active-directory/develop/app-objects-and-service-principals.md).
188168
* [Certificates overview for Azure Cloud Services](../cloud-services/cloud-services-certs-create.md).
189-
* To create or re-create a Run As account, see [Create a Run As account](create-run-as-account.md).
190169
* If you no longer need to use a Run As account, see [Delete a Run As account](delete-run-as-account.md).

0 commit comments

Comments
 (0)