You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -37,9 +37,6 @@ A managed identity from Azure Active Directory (Azure AD) allows your runbook to
37
37
38
38
Managed identities are the recommended way to authenticate in your runbooks, and is the default authentication method for your Automation account.
39
39
40
-
> [!NOTE]
41
-
> When you create an Automation account, the option to create a Run As account is no longer available. However, we continue to support a RunAs account for existing and new Automation accounts. You can [create a Run As account](create-run-as-account.md) in your Automation account from the Azure portal or by using PowerShell.
42
-
43
40
Here are some of the benefits of using managed identities:
44
41
45
42
- Using a managed identity instead of the Automation Run As account simplifies management. You don't have to renew the certificate used by a Run As account.
@@ -68,7 +65,7 @@ Run As accounts in Azure Automation provide authentication for managing Azure Re
68
65
- Azure Run As Account
69
66
- Azure Classic Run As Account
70
67
71
-
To create or renew a Run As account, permissions are needed at three levels:
68
+
To renew a Run As account, permissions are needed at three levels:
72
69
73
70
- Subscription,
74
71
- Azure Active Directory (Azure AD), and
@@ -82,11 +79,11 @@ You need the `Microsoft.Authorization/*/Write` permission. This permission is ob
To configure or renew Classic Run As accounts, you must have the Co-administrator role at the subscription level. To learn more about classic subscription permissions, see [Azure classic subscription administrators](../role-based-access-control/classic-administrators.md#add-a-co-administrator).
82
+
To renew Classic Run As accounts, you must have the Co-administrator role at the subscription level. To learn more about classic subscription permissions, see [Azure classic subscription administrators](../role-based-access-control/classic-administrators.md#add-a-co-administrator).
86
83
87
84
### Azure AD permissions
88
85
89
-
To be able to create or renew the service principal, you need to be a member of one of the following Azure AD built-in roles:
86
+
To renew the service principal, you need to be a member of one of the following Azure AD built-in roles:
@@ -105,40 +102,24 @@ To learn more about the Azure Resource Manager and Classic deployment models, se
105
102
>[!NOTE]
106
103
>Azure Cloud Solution Provider (CSP) subscriptions support only the Azure Resource Manager model. Non-Azure Resource Manager services are not available in the program. When you are using a CSP subscription, the Azure Classic Run As account is not created, but the Azure Run As account is created. To learn more about CSP subscriptions, see [Available services in CSP subscriptions](/azure/cloud-solution-provider/overview/azure-csp-available-services).
107
104
108
-
When you create an Automation account, the Run As account is created by default at the same time with a self-signed certificate. If you chose not to create it along with the Automation account, it can be created individually at a later time. An Azure Classic Run As Account is optional, and is created separately if you need to manage classic resources.
109
-
110
-
> [!NOTE]
111
-
> Azure Automation does not automatically create the Run As account. It has been replaced by using managed identities.
112
-
113
-
If you want to use a certificate issued by your enterprise or third-party certification authority (CA) instead of the default self-signed certificate, can use the [PowerShell script to create a Run As account](create-run-as-account.md#powershell-script-to-create-a-run-as-account) option for your Run As and Classic Run As accounts.
When you create a Run As account, it performs the following tasks:
120
-
121
-
* Creates an Azure AD application with a self-signed certificate, creates a service principal account for the application in Azure AD, and assigns the [Contributor](../role-based-access-control/built-in-roles.md#contributor) role for the account in your current subscription. You can change the certificate setting to [Reader](../role-based-access-control/built-in-roles.md#reader) or any other role. For more information, see [Role-based access control in Azure Automation](automation-role-based-access-control.md).
122
-
123
-
* Creates an Automation certificate asset named `AzureRunAsCertificate` in the specified Automation account. The certificate asset holds the certificate private key that the Azure AD application uses.
124
-
125
-
* Creates an Automation connection asset named `AzureRunAsConnection` in the specified Automation account. The connection asset holds the application ID, tenant ID, subscription ID, and certificate thumbprint.
109
+
Run As Account consists of the following components:
110
+
- An Azure AD application with a self-signed certificate, and a service principal account for the application in Azure AD, which is assigned the [Contributor](../role-based-access-control/built-in-roles.md#contributor) role for the account in your current subscription. You can change the certificate setting to [Reader](../role-based-access-control/built-in-roles.md#reader) or any other role. For more information, see [Role-based access control in Azure Automation](automation-role-based-access-control.md).
111
+
- An Automation certificate asset named `AzureRunAsCertificate` in the specified Automation account. The certificate asset holds the certificate private key that the Azure AD application uses.
112
+
- An Automation connection asset named `AzureRunAsConnection` in the specified Automation account. The connection asset holds the application ID, tenant ID, subscription ID, and certificate thumbprint.
126
113
127
114
### Azure Classic Run As account
128
115
129
-
> [!IMPORTANT]
130
-
> Azure Automation Run As Account will retire on September 30, 2023 and will be replaced with Managed Identities. Before that date, you'll need to start migrating your runbooks to use [managed identities](automation-security-overview.md#managed-identities). For more information, see [migrating from an existing Run As accounts to managed identity](https://learn.microsoft.com/azure/automation/migrate-run-as-accounts-managed-identity?tabs=run-as-account#sample-scripts) to start migrating the runbooks from Run As account to managed identities before 30 September 2023.
131
-
132
-
When you create an Azure Classic Run As account, it performs the following tasks:
116
+
Azure Classic Run As Account consists of the following components:
117
+
- A management certificate in the subscription.
118
+
- An Automation certificate asset named `AzureClassicRunAsCertificate` in the specified Automation account. The certificate asset holds the certificate private key used by the management certificate.
119
+
- An Automation connection asset named `AzureClassicRunAsConnection` in the specified Automation account. The connection asset holds the subscription name, subscription ID, and certificate asset name.
133
120
134
121
> [!NOTE]
135
-
> You must be a co-administrator on the subscription to create or renew this type of Run As account.
136
-
137
-
* Creates a management certificate in the subscription.
138
-
139
-
* Creates an Automation certificate asset named `AzureClassicRunAsCertificate` in the specified Automation account. The certificate asset holds the certificate private key used by the management certificate.
140
-
141
-
* Creates an Automation connection asset named `AzureClassicRunAsConnection` in the specified Automation account. The connection asset holds the subscription name, subscription ID, and certificate asset name.
122
+
> You must be a co-administrator on the subscription to renew this type of Run As account.
Copy file name to clipboardExpand all lines: articles/automation/delete-run-as-account.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Delete an Azure Automation Run As account
3
3
description: This article tells how to delete a Run As account with PowerShell or from the Azure portal.
4
4
services: automation
5
5
ms.subservice: process-automation
6
-
ms.date: 01/06/2021
6
+
ms.date: 04/12/2023
7
7
ms.topic: conceptual
8
8
---
9
9
@@ -26,8 +26,9 @@ Run As accounts in Azure Automation provide authentication for managing resource
26
26
27
27

28
28
29
-
5. While the account is being deleted, you can track the progress under **Notifications** from the menu.
29
+
5. While the account is being deleted, you can track the progress under **Notifications** from the menu. Run As accounts can't be restored after deletion.
30
30
31
31
## Next steps
32
32
33
-
To recreate your Run As or Classic Run As account, see [Create Run As accounts](create-run-as-account.md).
Copy file name to clipboardExpand all lines: articles/automation/manage-run-as-account.md
+1-22Lines changed: 1 addition & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Manage an Azure Automation Run As account
3
3
description: This article tells how to manage your Azure Automation Run As account with PowerShell or from the Azure portal.
4
4
services: automation
5
-
ms.date: 08/02/2021
5
+
ms.date: 04/12/2023
6
6
ms.topic: conceptual
7
7
---
8
8
@@ -161,30 +161,9 @@ You can allow Azure Automation to verify if Key Vault and your Run As account se
161
161
162
162
You can use the [Extend-AutomationRunAsAccountRoleAssignmentToKeyVault.ps1](https://aka.ms/AA5hugb) script in the PowerShell Gallery to grant your Run As account permissions to Key Vault. See [Assign a Key Vault access policy](../key-vault/general/assign-access-policy-powershell.md) for more details on setting permissions on Key Vault.
163
163
164
-
## Resolve misconfiguration issues for Run As accounts
165
-
166
-
Some configuration items necessary for a Run As or Classic Run As account might have been deleted or created improperly during initial setup. Possible instances of misconfiguration include:
167
-
168
-
* Certificate asset
169
-
* Connection asset
170
-
* Run As account removed from the Contributor role
171
-
* Service principal or application in Azure AD
172
-
173
-
For such misconfiguration instances, the Automation account detects the changes and displays a status of *Incomplete* on the Run As Accounts properties pane for the account.
174
-
175
-
:::image type="content" source="media/manage-run-as-account/automation-account-run-as-config-incomplete.png" alt-text="Incomplete Run As account configuration.":::
176
-
177
-
When you select the Run As account, the account properties pane displays the following error message:
178
-
179
-
```text
180
-
The Run As account is incomplete. Either one of these was deleted or not created - Azure Active Directory Application, Service Principal, Role, Automation Certificate asset, Automation Connect asset - or the Thumbprint is not identical between Certificate and Connection. Please delete and then re-create the Run As Account.
181
-
```
182
-
183
-
You can quickly resolve these Run As account issues by [deleting](delete-run-as-account.md) and [re-creating](create-run-as-account.md) the Run As account.
184
164
185
165
## Next steps
186
166
187
167
*[Application Objects and Service Principal Objects](../active-directory/develop/app-objects-and-service-principals.md).
188
168
*[Certificates overview for Azure Cloud Services](../cloud-services/cloud-services-certs-create.md).
189
-
* To create or re-create a Run As account, see [Create a Run As account](create-run-as-account.md).
190
169
* If you no longer need to use a Run As account, see [Delete a Run As account](delete-run-as-account.md).
0 commit comments