Skip to content

Commit e6ca53a

Browse files
Merge pull request #251936 from MicrosoftDocs/alexbuckgit/docutune-autopr-20230918-155458-2352445-ignore-build
[BULK] - DocuTune - Rebranding of Azure Active Directory to Microsoft Entra (part 38)
2 parents 8f9195e + 2f876dc commit e6ca53a

8 files changed

+32
-31
lines changed

articles/active-directory/managed-identities-azure-resources/tutorial-vm-windows-access-storage.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ This tutorial shows you how to use a system-assigned managed identity for a Wind
3030
> * Get an access and use it to call Azure Storage
3131
3232
> [!NOTE]
33-
> Azure Active Directory authentication for Azure Storage is in public preview.
33+
> Microsoft Entra authentication for Azure Storage is in public preview.
3434
3535
## Prerequisites
3636

@@ -96,7 +96,7 @@ This section shows how to grant your VM access to an Azure Storage container. Yo
9696

9797
## Access data 
9898

99-
Azure Storage natively supports Azure AD authentication, so it can directly accept access tokens obtained using a managed identity. This approach uses Azure Storage's integration with Azure AD, and is different from supplying credentials on the connection string.
99+
Azure Storage natively supports Microsoft Entra authentication, so it can directly accept access tokens obtained using a managed identity. This approach uses Azure Storage's integration with Microsoft Entra ID, and is different from supplying credentials on the connection string.
100100

101101
Here's a .NET code example of opening a connection to Azure Storage. The example uses an access token and then reads the contents of the file you created earlier. This code must run on the VM to be able to access the VM's managed identity endpoint. .NET Framework 4.6 or higher is required to use the access token method. Replace the value of `<URI to blob file>` accordingly. You can obtain this value by navigating to file you created and uploaded to blob storage and copying the **URL** under **Properties** the **Overview** page.
102102

@@ -184,4 +184,4 @@ The response contains the contents of the file:
184184
In this tutorial, you learned how enable a Windows VM's system-assigned identity to access Azure Storage. To learn more about Azure Storage, see:
185185

186186
> [!div class="nextstepaction"]
187-
> [Azure Storage](../../storage/common/storage-introduction.md)
187+
> [Azure Storage](../../storage/common/storage-introduction.md)

articles/active-directory/managed-identities-azure-resources/tutorial-windows-vm-access-arm.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ ms.collection: M365-identity-device-management
2121

2222
[!INCLUDE [preview-notice](../../../includes/active-directory-msi-preview-notice.md)]
2323

24-
This tutorial shows you how to access the Azure Resource Manager API using a Windows virtual machine with system-assigned managed identity enabled. Managed identities for Azure resources are automatically managed by Azure and enable you to authenticate to services that support Azure AD authentication without needing to insert credentials into your code. You learn how to:
24+
This tutorial shows you how to access the Azure Resource Manager API using a Windows virtual machine with system-assigned managed identity enabled. Managed identities for Azure resources are automatically managed by Azure and enable you to authenticate to services that support Microsoft Entra authentication without needing to insert credentials into your code. You learn how to:
2525

2626
> [!div class="checklist"]
2727
> * Grant your VM access to a Resource Group in Azure Resource Manager
@@ -43,7 +43,7 @@ This tutorial shows you how to access the Azure Resource Manager API using a Win
4343

4444
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
4545

46-
Using managed identities for Azure resources, your application can get access tokens to authenticate to resources that support Azure AD authentication. The Azure Resource Manager API supports Azure AD authentication. We grant this VM's identity access to a resource in Azure Resource Manager, in this case a Resource Group. We assign the [Reader](../../role-based-access-control/built-in-roles.md#reader) role to the managed-identity at the scope of the resource group.
46+
Using managed identities for Azure resources, your application can get access tokens to authenticate to resources that support Microsoft Entra authentication. The Azure Resource Manager API supports Microsoft Entra authentication. We grant this VM's identity access to a resource in Azure Resource Manager, in this case a Resource Group. We assign the [Reader](../../role-based-access-control/built-in-roles.md#reader) role to the managed-identity at the scope of the resource group.
4747

4848
1. Sign in to the [Azure portal](https://portal.azure.com) with your administrator account.
4949
1. Navigate to the tab for **Resource Groups**.
@@ -70,7 +70,7 @@ You'll need to use **PowerShell** in this portion. If you don’t have **PowerS
7070
```
7171
7272
> [!NOTE]
73-
> The value of the "resource" parameter must be an exact match for what is expected by Azure AD. When using the Azure Resource Manager resource ID, you must include the trailing slash on the URI.
73+
> The value of the "resource" parameter must be an exact match for what is expected by Microsoft Entra ID. When using the Azure Resource Manager resource ID, you must include the trailing slash on the URI.
7474
7575
Next, extract the full response, which is stored as a JavaScript Object Notation (JSON) formatted string in the $response object.
7676

articles/active-directory/managed-identities-azure-resources/tutorial-windows-vm-access-cosmos-db.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ Next, add a data collection in the Azure Cosmos DB account that you can query in
6161

6262
## Grant access
6363

64-
This section shows how to grant Windows VM system-assigned managed identity access to the Azure Cosmos DB account access keys. Azure Cosmos DB does not natively support Azure AD authentication. However, you can use a system-assigned managed identity to retrieve an Azure Cosmos DB access key from Resource Manager, and use the key to access Azure Cosmos DB. In this step, you grant your Windows VM system-assigned managed identity access to the keys to the Azure Cosmos DB account.
64+
This section shows how to grant Windows VM system-assigned managed identity access to the Azure Cosmos DB account access keys. Azure Cosmos DB does not natively support Microsoft Entra authentication. However, you can use a system-assigned managed identity to retrieve an Azure Cosmos DB access key from Resource Manager, and use the key to access Azure Cosmos DB. In this step, you grant your Windows VM system-assigned managed identity access to the keys to the Azure Cosmos DB account.
6565

6666
To grant the Windows VM system-assigned managed identity access to the Azure Cosmos DB account in Azure Resource Manager using PowerShell, update the following values:
6767

@@ -97,7 +97,7 @@ You need to install the latest version of [Azure CLI](/cli/azure/install-azure-c
9797
```
9898

9999
> [!NOTE]
100-
> The value of the "resource" parameter must be an exact match for what is expected by Azure AD. When using the Azure Resource Manager resource ID, you must include the trailing slash on the URI.
100+
> The value of the "resource" parameter must be an exact match for what is expected by Microsoft Entra ID. When using the Azure Resource Manager resource ID, you must include the trailing slash on the URI.
101101
102102
Next, extract the "Content" element, which is stored as a JavaScript Object Notation (JSON) formatted string in the $response object.
103103

articles/active-directory/managed-identities-azure-resources/tutorial-windows-vm-access-datalake.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ ms.collection: M365-identity-device-management
2121

2222
[!INCLUDE [preview-notice](../../../includes/active-directory-msi-preview-notice.md)]
2323

24-
This tutorial shows you how to use a system-assigned managed identity for a Windows virtual machine (VM) to access an Azure Data Lake Store. Managed identities are automatically managed by Azure. They enable your application to authenticate to services that support Azure AD authentication, without needing to insert credentials into your code.
24+
This tutorial shows you how to use a system-assigned managed identity for a Windows virtual machine (VM) to access an Azure Data Lake Store. Managed identities are automatically managed by Azure. They enable your application to authenticate to services that support Microsoft Entra authentication, without needing to insert credentials into your code.
2525

2626
In this article you learn how to:
2727

@@ -68,7 +68,7 @@ Your VM's system-assigned managed identity can now perform all operations on fil
6868

6969
## Access data
7070

71-
Azure Data Lake Store natively supports Azure AD authentication, so it can directly accept access tokens obtained using managed identities for Azure resources. To authenticate to the Data Lake Store filesystem, you send an access token issued by Azure AD to your Data Lake Store filesystem endpoint in an Authorization header. The header has the format "Bearer <ACCESS_TOKEN_VALUE>". To learn more about Data Lake Store support for Azure AD authentication, read [Authentication with Data Lake Store using Azure Active Directory](../../data-lake-store/data-lakes-store-authentication-using-azure-active-directory.md)
71+
Azure Data Lake Store natively supports Microsoft Entra authentication, so it can directly accept access tokens obtained using managed identities for Azure resources. To authenticate to the Data Lake Store filesystem, you send an access token issued by Microsoft Entra ID to your Data Lake Store filesystem endpoint in an Authorization header. The header has the format "Bearer <ACCESS_TOKEN_VALUE>". To learn more about Data Lake Store support for Microsoft Entra authentication, read [Authentication with Data Lake Store using Microsoft Entra ID](../../data-lake-store/data-lakes-store-authentication-using-azure-active-directory.md)
7272

7373
> [!NOTE]
7474
> The Data Lake Store filesystem client SDKs do not yet support managed identities for Azure resources. This tutorial will be updated when support is added to the SDK.
@@ -195,4 +195,4 @@ Using other Data Lake Store filesystem APIs you can append to files, download fi
195195
In this tutorial, you learned how to use a system-assigned managed identity for a Windows virtual machine to access an Azure Data Lake Store. To learn more about Azure Data Lake Store, see:
196196

197197
> [!div class="nextstepaction"]
198-
>[Azure Data Lake Store](../../data-lake-store/data-lake-store-overview.md)
198+
>[Azure Data Lake Store](../../data-lake-store/data-lake-store-overview.md)

articles/active-directory/managed-identities-azure-resources/tutorial-windows-vm-access-nonaad.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ ms.collection: M365-identity-device-management
2121

2222
[!INCLUDE [preview-notice](../../../includes/active-directory-msi-preview-notice.md)]
2323

24-
This tutorial shows you how a Windows virtual machine (VM) can use a system-assigned managed identity to access [Azure Key Vault](../../key-vault/general/overview.md). Key Vault makes it possible for your client application to use a secret to access resources not secured by Azure Active Directory (Azure AD). Managed identities are automatically managed by Azure. They enable you to authenticate to services that support Azure AD authentication, without including authentication information in your code.
24+
This tutorial shows you how a Windows virtual machine (VM) can use a system-assigned managed identity to access [Azure Key Vault](../../key-vault/general/overview.md). Key Vault makes it possible for your client application to use a secret to access resources not secured by Microsoft Entra ID. Managed identities are automatically managed by Azure. They enable you to authenticate to services that support Microsoft Entra authentication, without including authentication information in your code.
2525

2626
You learn how to:
2727

@@ -41,7 +41,7 @@ You learn how to:
4141

4242
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
4343

44-
This section shows how to grant your VM access to a secret stored in a Key Vault. When you use managed identities for Azure resources, your code can get access tokens to authenticate to resources that support Azure AD authentication.  However, not all Azure services support Azure AD authentication. To use managed identities for Azure resources with those services, store the service credentials in Azure Key Vault, and use the VM's managed identity to access Key Vault to retrieve the credentials.
44+
This section shows how to grant your VM access to a secret stored in a Key Vault. When you use managed identities for Azure resources, your code can get access tokens to authenticate to resources that support Microsoft Entra authentication.  However, not all Azure services support Microsoft Entra authentication. To use managed identities for Azure resources with those services, store the service credentials in Azure Key Vault, and use the VM's managed identity to access Key Vault to retrieve the credentials.
4545

4646
First, we need to create a Key Vault and grant our VM’s system-assigned managed identity access to the Key Vault.
4747

articles/active-directory/managed-identities-azure-resources/tutorial-windows-vm-access-sql.md

Lines changed: 14 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -18,12 +18,12 @@ ms.collection: M365-identity-device-management
1818
# Tutorial: Use a Windows VM system-assigned managed identity to access Azure SQL
1919

2020

21-
This tutorial shows you how to use a system-assigned identity for a Windows virtual machine (VM) to access Azure SQL Database. Managed Service Identities are automatically managed by Azure and enable you to authenticate to services that support Azure AD authentication, without needing to insert credentials into your code. You learn how to:
21+
This tutorial shows you how to use a system-assigned identity for a Windows virtual machine (VM) to access Azure SQL Database. Managed Service Identities are automatically managed by Azure and enable you to authenticate to services that support Microsoft Entra authentication, without needing to insert credentials into your code. You learn how to:
2222

2323
> [!div class="checklist"]
2424
>
2525
> * Grant your VM access to Azure SQL Database
26-
> * Enable Azure AD authentication
26+
> * Enable Microsoft Entra authentication
2727
> * Create a contained user in the database that represents the VM's system assigned identity
2828
> * Get an access token using the VM identity and use it to query Azure SQL Database
2929
@@ -41,36 +41,38 @@ To grant your VM access to a database in Azure SQL Database, you can use an exis
4141

4242
There are two steps to granting your VM access to a database:
4343

44-
1. Enable Azure AD authentication for the server.
44+
1. Enable Microsoft Entra authentication for the server.
4545
2. Create a **contained user** in the database that represents the VM's system-assigned identity.
4646

47-
### Enable Azure AD authentication
47+
<a name='enable-azure-ad-authentication'></a>
4848

49-
**To [configure Azure AD authentication](/azure/azure-sql/database/authentication-aad-configure):**
49+
### Enable Microsoft Entra authentication
50+
51+
**To [configure Microsoft Entra authentication](/azure/azure-sql/database/authentication-aad-configure):**
5052

5153
1. In the Azure portal, select **SQL servers** from the left-hand navigation.
52-
2. Select the SQL server to be enabled for Azure AD authentication.
54+
2. Select the SQL server to be enabled for Microsoft Entra authentication.
5355
3. In the **Settings** section of the blade, click **Active Directory admin**.
5456
4. In the command bar, click **Set admin**.
55-
5. Select an Azure AD user account to be made an administrator of the server, and click **Select.**
57+
5. Select a Microsoft Entra user account to be made an administrator of the server, and click **Select.**
5658
6. In the command bar, click **Save.**
5759

5860

5961
### Create contained user
6062

61-
This section shows how to create a contained user in the database that represents the VM's system assigned identity. For this step, you need [Microsoft SQL Server Management Studio](/sql/ssms/download-sql-server-management-studio-ssms) (SSMS). Before beginning, it may also be helpful to review the following articles for background on Azure AD integration:
63+
This section shows how to create a contained user in the database that represents the VM's system assigned identity. For this step, you need [Microsoft SQL Server Management Studio](/sql/ssms/download-sql-server-management-studio-ssms) (SSMS). Before beginning, it may also be helpful to review the following articles for background on Microsoft Entra integration:
6264

6365
- [Universal Authentication with SQL Database and Azure Synapse Analytics (SSMS support for MFA)](/azure/azure-sql/database/authentication-mfa-ssms-overview)
64-
- [Configure and manage Azure Active Directory authentication with SQL Database or Azure Synapse Analytics](/azure/azure-sql/database/authentication-aad-configure)
66+
- [Configure and manage Microsoft Entra authentication with SQL Database or Azure Synapse Analytics](/azure/azure-sql/database/authentication-aad-configure)
6567

66-
SQL DB requires unique Azure AD display names. With this, the Azure AD accounts such as users, groups and Service Principals (applications), and VM names enabled for managed identity must be uniquely defined in Azure AD regarding their display names. SQL DB checks the Azure AD display name during T-SQL creation of such users and if it isn't unique, the command fails requesting to provide a unique Azure AD display name for a given account.
68+
SQL DB requires unique Microsoft Entra ID display names. With this, the Microsoft Entra accounts such as users, groups and Service Principals (applications), and VM names enabled for managed identity must be uniquely defined in Microsoft Entra ID regarding their display names. SQL DB checks the Microsoft Entra ID display name during T-SQL creation of such users and if it isn't unique, the command fails requesting to provide a unique Microsoft Entra ID display name for a given account.
6769

6870
**To create a contained user:**
6971

7072
1. Start SQL Server Management Studio.
7173
2. In the **Connect to Server** dialog, Enter your server name in the **Server name** field.
7274
3. In the **Authentication** field, select **Active Directory - Universal with MFA support**.
73-
4. In the **User name** field, enter the name of the Azure AD account that you set as the server administrator, for example, [email protected]
75+
4. In the **User name** field, enter the name of the Microsoft Entra account that you set as the server administrator, for example, [email protected]
7476
5. Click **Options**.
7577
6. In the **Connect to database** field, enter the name of the non-system database you want to configure.
7678
7. Click **Connect**. Complete the sign-in process.
@@ -103,7 +105,7 @@ Code running in the VM can now get a token using its system-assigned managed ide
103105
104106
## Access data
105107
106-
This section shows how to get an access token using the VM's system-assigned managed identity and use it to call Azure SQL. Azure SQL natively supports Azure AD authentication, so it can directly accept access tokens obtained using managed identities for Azure resources. This method doesn't require supplying credentials on the connection string.
108+
This section shows how to get an access token using the VM's system-assigned managed identity and use it to call Azure SQL. Azure SQL natively supports Microsoft Entra authentication, so it can directly accept access tokens obtained using managed identities for Azure resources. This method doesn't require supplying credentials on the connection string.
107109
108110
Here's a .NET code example of opening a connection to SQL using Active Directory Managed Identity authentication. The code must run on the VM to be able to access the VM's system-assigned managed identity's endpoint. **.NET Framework 4.6.2** or higher or **.NET Core 3.1** or higher is required to use this method. Replace the values of AZURE-SQL-SERVERNAME and DATABASE accordingly and add a NuGet reference to the Microsoft.Data.SqlClient library.
109111

@@ -179,4 +181,3 @@ In this tutorial, you learned how to use a system-assigned managed identity to a
179181
180182
> [!div class="nextstepaction"]
181183
> [Azure SQL Database](/azure/azure-sql/database/sql-database-paas-overview)
182-

0 commit comments

Comments
 (0)