Skip to content

Commit e80478e

Browse files
committed
minor edits
1 parent 58bd6b2 commit e80478e

7 files changed

+27
-30
lines changed

articles/active-directory/managed-identities-azure-resources/how-to-view-managed-identity-activity.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,15 +4,14 @@ description: Step-by-step instructions for viewing the activities made to manage
44
services: active-directory
55
documentationcenter: ''
66
author: barclayn
7-
manager: karenhoran
7+
manager: rkarlin
88
editor: ''
9-
109
ms.service: active-directory
1110
ms.subservice: msi
1211
ms.topic: how-to
1312
ms.tgt_pltfrm: na
1413
ms.workload: identity
15-
ms.date: 01/11/2022
14+
ms.date: 06/24/2022
1615
ms.author: barclayn
1716
ms.collection: M365-identity-device-management
1817
---

articles/active-directory/managed-identities-azure-resources/how-to-view-managed-identity-service-principal-cli.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Step-by-step instructions for viewing the service principal of a ma
44
services: active-directory
55
documentationcenter: ''
66
author: barclayn
7-
manager: karenhoran
7+
manager: rkarlin
88
editor: ''
99

1010
ms.service: active-directory
@@ -44,4 +44,4 @@ az ad sp list --display-name <Azure resource name>
4444

4545
## Next steps
4646

47-
For more information on managing Azure AD service principals using Azure CLI, see [az ad sp](/cli/azure/ad/sp).
47+
For more information on managing Azure AD service principals, see [Azure CLI ad sp](/cli/azure/ad/sp).

articles/active-directory/managed-identities-azure-resources/how-to-view-managed-identity-service-principal-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.subservice: msi
1212
ms.topic: how-to
1313
ms.tgt_pltfrm: na
1414
ms.workload: identity
15-
ms.date: 02/23/2022
15+
ms.date: 06/24/2022
1616
ms.author: barclayn
1717
ms.collection: M365-identity-device-management
1818
---

articles/active-directory/managed-identities-azure-resources/overview.md

Lines changed: 8 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -4,15 +4,15 @@ description: An overview of the managed identities for Azure resources.
44
services: active-directory
55
documentationcenter:
66
author: barclayn
7-
manager: karenhoran
7+
manager: rkarlin
88
editor:
99
ms.assetid: 0232041d-b8f5-4bd2-8d11-27999ad69370
1010
ms.service: active-directory
1111
ms.subservice: msi
1212
ms.devlang:
1313
ms.topic: overview
1414
ms.custom: mvc
15-
ms.date: 01/25/2022
15+
ms.date: 06/24/2022
1616
ms.author: barclayn
1717
ms.collection: M365-identity-device-management
1818

@@ -21,21 +21,19 @@ ms.collection: M365-identity-device-management
2121

2222
# What are managed identities for Azure resources?
2323

24-
A common challenge for developers is the management of secrets, credentials, certificates, keys etc used to secure communication between services. Managed identities eliminate the need for developers to manage these credentials.
24+
A common challenge for developers is the management of secrets, credentials, certificates, and keys used to secure communication between services. Managed identities eliminate the need for developers to manage these credentials.
2525

2626
While developers can securely store the secrets in [Azure Key Vault](../../key-vault/general/overview.md), services need a way to access Azure Key Vault. Managed identities provide an automatically managed identity in Azure Active Directory for applications to use when connecting to resources that support Azure Active Directory (Azure AD) authentication. Applications can use managed identities to obtain Azure AD tokens without having to manage any credentials.
2727

2828
The following video shows how you can use managed identities:</br>
2929

3030
> [!VIDEO https://docs.microsoft.com/Shows/On-NET/Using-Azure-Managed-identities/player?format=ny]
3131
32-
33-
3432
Here are some of the benefits of using managed identities:
3533

3634
- You don't need to manage credentials. Credentials aren’t even accessible to you.
3735
- You can use managed identities to authenticate to any resource that supports [Azure AD authentication](../authentication/overview-authentication.md), including your own applications.
38-
- Managed identities can be used without any additional cost.
36+
- Managed identities can be used at no extra cost.
3937

4038
> [!NOTE]
4139
> Managed identities for Azure resources is the new name for the service formerly known as Managed Service Identity (MSI).
@@ -64,11 +62,12 @@ The following table shows the differences between the two types of managed ident
6462

6563
## How can I use managed identities for Azure resources?
6664

67-
For using Managed identities, you have should do the following:
65+
You can use managed identities by following the steps below:
66+
6867
1. Create a managed identity in Azure. You can choose between system-assigned managed identity or user-assigned managed identity.
69-
2. In case of user-assigned managed identity, assign the managed identity to the "source" Azure Resource, such as an Azure Logic App or an Azure Web App.
68+
2. When working with a user-assigned managed identity, assign the managed identity to the "source" Azure Resource, such as an Azure Logic App or an Azure Web App.
7069
3. Authorize the managed identity to have access to the "target" service.
71-
4. Use the managed identity to perform access. For this, you can use the Azure SDK with the Azure.Identity library. Some "source" resources offer connectors that know how to use Managed identities for the connections. In that case you simply use the identity as a feature of that "source" resource.
70+
4. Use the managed identity to access a resource. In this step, you can use the Azure SDK with the Azure.Identity library. Some "source" resources offer connectors that know how to use Managed identities for the connections. In that case, you use the identity as a feature of that "source" resource.
7271

7372

7473
## What Azure services support the feature?<a name="which-azure-services-support-managed-identity"></a>

articles/active-directory/managed-identities-azure-resources/qs-configure-powershell-windows-vmss.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,14 +4,14 @@ description: Step-by-step instructions for configuring a system and user-assigne
44
services: active-directory
55
documentationcenter:
66
author: barclayn
7-
manager: karenhoran
7+
manager: rkarlin
88
editor:
99
ms.service: active-directory
1010
ms.subservice: msi
1111
ms.topic: quickstart
1212
ms.tgt_pltfrm: na
1313
ms.workload: identity
14-
ms.date: 01/11/2022
14+
ms.date: 06/24/2022
1515
ms.author: barclayn
1616
ms.collection: M365-identity-device-management
1717
ms.custom: devx-track-azurepowershell, mode-api
@@ -122,7 +122,7 @@ If your virtual machine scale set has multiple user-assigned managed identities,
122122
```azurepowershell-interactive
123123
Update-AzVmss -ResourceGroupName myResourceGroup -Name myVmss -IdentityType UserAssigned -IdentityID "<USER ASSIGNED IDENTITY NAME>"
124124
```
125-
If your virtual machine scale set does not have a system-assigned managed identity and you want to remove all user-assigned managed identities from it, use the following command:
125+
If your virtual machine scale set doesn't have a system-assigned managed identity and you want to remove all user-assigned managed identities from it, use the following command:
126126

127127
```azurepowershell-interactive
128128
Update-AzVmss -ResourceGroupName myResourceGroup -Name myVmss -IdentityType None

articles/active-directory/managed-identities-azure-resources/tutorial-linux-vm-access-storage-sas.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,15 +4,14 @@ description: Tutorial showing how to use a Linux VM system-assigned managed iden
44
services: active-directory
55
documentationcenter: ''
66
author: barclayn
7-
manager: karenhoran
8-
editor: daveba
7+
manager: rkarlin
98
ms.custom: subject-rbac-steps
109
ms.service: active-directory
1110
ms.subservice: msi
1211
ms.topic: tutorial
1312
ms.tgt_pltfrm: na
1413
ms.workload: identity
15-
ms.date: 02/17/2022
14+
ms.date: 06/24/2022
1615
ms.author: barclayn
1716
ms.collection: M365-identity-device-management
1817
---
@@ -225,7 +224,7 @@ Response:
225224
226225
## Next steps
227226
228-
In this tutorial, you learned how to use a Linux VM system-assigned managed identity to access Azure Storage using a SAS credential. To learn more about Azure Storage SAS see:
227+
In this tutorial, you learned how to use a Linux VM system-assigned managed identity to access Azure Storage using a SAS credential. To learn more about Azure Storage SAS, see:
229228
230229
> [!div class="nextstepaction"]
231230
>[Using shared access signatures (SAS)](../../storage/common/storage-sas-overview.md)

articles/active-directory/managed-identities-azure-resources/tutorial-vm-managed-identities-cosmos.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,12 @@
22
title: Use managed identities from a virtual machine to access Cosmos DB
33
description: Learn how to use managed identities with Windows VMs using the Azure portal, CLI, PowerShell, Azure Resource Manager template
44
author: barclayn
5-
manager: karenhoran
5+
manager: rkarlin
66
ms.service: active-directory
77
ms.subservice: msi
88
ms.workload: integration
99
ms.topic: tutorial
10-
ms.date: 01/11/2022
10+
ms.date: 06/24/2022
1111
ms.author: barclayn
1212
ms.custom: ep-miar
1313
ms.tool: azure-cli, azure-powershell
@@ -28,7 +28,7 @@ In this article, we set up a virtual machine to use managed identities to connec
2828

2929
## Create a resource group
3030

31-
Create a resource group called **mi-test**. We will use this resource group for all resources used in this tutorial.
31+
Create a resource group called **mi-test**. We'll use this resource group for all resources used in this tutorial.
3232

3333
- [Create a resource group using the Azure portal](../../azure-resource-manager/management/manage-resource-groups-portal.md#create-resource-groups)
3434
- [Create a resource group using the CLI](../../azure-resource-manager/management/manage-resource-groups-cli.md#create-resource-groups)
@@ -81,7 +81,7 @@ New-AzVm `
8181

8282
# [Azure CLI](#tab/azure-cli)
8383

84-
Create a VM using [az vm create](/cli/azure/vm/#az-vm-create). The following example creates a VM named *myVM* with a system-assigned managed identity, as requested by the `--assign-identity` parameter. The `--admin-username` and `--admin-password` parameters specify the administrative user name and password account for virtual machine sign-in. Update these values as appropriate for your environment:
84+
Create a VM using [Azure CLI vm create command](/cli/azure/vm/#az-vm-create). The following example creates a VM named *myVM* with a system-assigned managed identity, as requested by the `--assign-identity` parameter. The `--admin-username` and `--admin-password` parameters specify the administrative user name and password account for virtual machine sign-in. Update these values as appropriate for your environment:
8585

8686
```azurecli-interactive
8787
az vm create --resource-group myResourceGroup --name myVM --image win2016datacenter --generate-ssh-keys --assign-identity --admin-username azureuser --admin-password myPassword12
@@ -126,7 +126,7 @@ The steps below show you how to create a virtual machine with a user-assigned ma
126126

127127
# [Portal](#tab/azure-portal)
128128

129-
Today, the Azure portal does not support assigning a user-assigned managed identity during the creation of a VM. You should create a virtual machine and then assign a user assigned managed identity to it.
129+
Today, the Azure portal doesn't support assigning a user-assigned managed identity during the creation of a VM. You should create a virtual machine and then assign a user assigned managed identity to it.
130130

131131
[Configure managed identities for Azure resources on a VM using the Azure portal](qs-configure-portal-windows-vm.md#user-assigned-managed-identity)
132132

@@ -211,7 +211,7 @@ Under the resources element, add the following entry to assign a user-assigned m
211211

212212
## Create a Cosmos DB account
213213

214-
Now that we have a VM with either a user-assigned managed identity or a system-assigned managed identity we need a Cosmos DB account available where you have administrative rights. If you need to create a Cosmos DB account for this tutorial the [Cosmos DB quickstart](../..//cosmos-db/sql/create-cosmosdb-resources-portal.md) provides detailed steps on how to do that.
214+
Now that we have a VM with either a user-assigned managed identity or a system-assigned managed identity we need a Cosmos DB account available where you have administrative rights. If you need to create a Cosmos DB account for this tutorial, the [Cosmos DB quickstart](../..//cosmos-db/sql/create-cosmosdb-resources-portal.md) provides detailed steps on how to do that.
215215

216216
>[!NOTE]
217217
> Managed identities may be used to access any Azure resource that supports Azure Active Directory authentication. This tutorial assumes that your Cosmos DB account will be configured as shown below.
@@ -259,7 +259,7 @@ New-AzCosmosDBSqlRoleAssignment -AccountName $accountName `
259259

260260
When the role assignment step completes, you should see results similar to the ones shown below.
261261

262-
:::image type="content" source="media/how-to-manage-identities-vm-cosmos/results-role-assignment.png" alt-text="This shows the results of the role assignment.":::
262+
:::image type="content" source="media/how-to-manage-identities-vm-cosmos/results-role-assignment.png" alt-text="screenshot shows the results of the role assignment.":::
263263

264264
# [Azure CLI](#tab/azure-cli)
265265

@@ -297,7 +297,7 @@ Getting access to Cosmos using managed identities may be achieved using the Azur
297297

298298
The ManagedIdentityCredential class attempts to authentication using a managed identity assigned to the deployment environment. The [DefaultAzureCredential](/dotnet/api/overview/azure/identity-readme) class goes through different authentication options in order. The second authentication option that DefaultAzureCredential attempts is Managed identities.
299299

300-
In the example shown below you create a database, a container, an item in the container, and read back the newly created item using the virtual machine's system assigned managed identity. If you want to use a user-assigned managed identity, you need to specify the user-assigned managed identity by specifying the managed identity's client ID.
300+
In the example shown below, you create a database, a container, an item in the container, and read back the newly created item using the virtual machine's system assigned managed identity. If you want to use a user-assigned managed identity, you need to specify the user-assigned managed identity by specifying the managed identity's client ID.
301301

302302
```csharp
303303
string userAssignedClientId = "<your managed identity client Id>";

0 commit comments

Comments
 (0)