You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/quickstart-v2-windows-desktop.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -67,7 +67,7 @@ In this quickstart, you'll learn how to write a Windows desktop .NET (WPF) appli
67
67
68
68
#### Step 2: Download your Visual Studio project
69
69
70
-
[Download the Visual Studio project](https://github.com/Azure-Samples/active-directory-dotnet-desktop-msgraph-v2/archive/msal3x.zip)
70
+
[Download the Visual Studio project](https://github.com/Azure-Samples/active-directory-dotnet-desktop-msgraph-v2/archive/msal3x.zip) ([View Project on Github](https://github.com/Azure-Samples/active-directory-dotnet-desktop-msgraph-v2/))
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/end-user-experiences.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.subservice: app-mgmt
9
9
ms.workload: identity
10
10
ms.topic: conceptual
11
-
ms.date: 11/09/2018
11
+
ms.date: 05/03/2019
12
12
ms.author: celested
13
13
ms.reviewer: arvindh
14
14
ms.collection: M365-identity-device-management
@@ -48,7 +48,9 @@ Most federated applications that support SAML 2.0, WS-Federation, or OpenID conn
48
48
## Direct sign-on links
49
49
Azure AD also supports direct single sign-on links to individual applications that support password-based single sign-on, linked single sign-on, and any form of federated single sign-on.
50
50
51
-
These links are specifically crafted URLs that send a user through the Azure AD sign-in process for a specific application without requiring the user launch them from the Azure AD access panel or Office 365. These **User access URLs** can be found under the properties of available enterprise applications under Azure Active Directory in the Azure portal.
51
+
These links are specifically crafted URLs that send a user through the Azure AD sign-in process for a specific application without requiring the user launch them from the Azure AD access panel or Office 365. These **User access URLs** can be found under the properties of available enterprise applications. In the Azure portal, select **Azure Active Directory** > **Enterprise applications**. Select the application, and then select **Properties**.
52
+
53
+

52
54
53
55
These links can be copied and pasted anywhere you want to provide a sign-in link to the selected application. This could be in an email, or in any custom web-based portal that you have set up for user application access. Here's an example of an Azure AD direct single sign-on URL for Twitter:
Copy file name to clipboardExpand all lines: articles/aks/limit-egress-traffic.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -59,7 +59,7 @@ In AKS, there are two sets of ports and addresses:
59
59
* The [optional recommended addresses and ports for AKS clusters](#optional-recommended-addresses-and-ports-for-aks-clusters) aren't required for all scenarios, but integration with other services such as Azure Monitor won't work correctly. Review this list of optional ports and FQDNs, and authorize any of the services and components used in your AKS cluster.
60
60
61
61
> [!NOTE]
62
-
> Limiting egress traffic only works on new AKS clusters created after you enable the feature flag registration. You can't limit egress traffic on an existing AKS cluster created before the feature flag was registered.
62
+
> Limiting egress traffic only works on new AKS clusters created after you enable the feature flag registration. For existing clusters, [perform a cluster upgrade operation][aks-upgrade] using the `az aks upgrade` command before you limit the egress traffic.
63
63
64
64
## Required ports and addresses for AKS clusters
65
65
@@ -115,3 +115,4 @@ In this article, you learned what ports and addresses to allow if you restrict e
title: Grant access to create Azure Enterprise subscriptions| Microsoft Docs
3
3
description: Learn how to give a user or service principal the ability to programmatically create Azure Enterprise subscriptions.
4
4
services: azure-resource-manager
5
-
author: adpick
6
-
manager: adpick
5
+
author: jureid
6
+
manager: jureid
7
7
editor: ''
8
8
9
9
ms.assetid:
@@ -12,8 +12,8 @@ ms.devlang: na
12
12
ms.topic: conceptual
13
13
ms.tgt_pltfrm: na
14
14
ms.workload: na
15
-
ms.date: 06/05/2018
16
-
ms.author: adpick
15
+
ms.date: 04/09/2019
16
+
ms.author: jureid
17
17
---
18
18
19
19
# Grant access to create Azure Enterprise subscriptions (preview)
@@ -22,14 +22,118 @@ As an Azure customer on [Enterprise Agreement (EA)](https://azure.microsoft.com/
22
22
23
23
To create a subscription, see [Programmatically create Azure Enterprise subscriptions (preview)](programmatically-create-subscription.md).
24
24
25
-
## Delegate access to an enrollment account using RBAC
25
+
## Grant subscription creation access to a user or group
26
26
27
-
To give another user or service principal the ability to create subscriptions against a specific account, [give them an RBAC Owner role at the scope of the enrollment account](../active-directory/role-based-access-control-manage-access-rest.md). The following example gives a user in the tenant with `principalId`of `<userObjectId>` (for [email protected]) an Owner role on the enrollment account. To find the enrollment account ID and principal ID, see [Programmatically create Azure Enterprise subscriptions (preview)](programmatically-create-subscription.md).
27
+
To create subscriptions under an enrollment account, users must have the [RBAC Owner role](../role-based-access-control/built-in-roles.md#owner) on that account. You can grant a user or a group of users the RBAC Owner role on an enrollment account by following these steps:
28
28
29
-
# [REST](#tab/rest)
29
+
### 1. Get the object ID of the enrollment account you want to grant access to
30
+
31
+
To grant others the RBAC Owner role on an enrollment account, you must either be the Account Owner or an RBAC Owner of the account.
32
+
33
+
### [REST](#tab/rest)
34
+
35
+
Request to list all enrollment accounts you have access to:
36
+
37
+
```json
38
+
GET https://management.azure.com/providers/Microsoft.Billing/enrollmentAccounts?api-version=2018-03-01-preview
39
+
```
40
+
41
+
Azure responds with a list of all enrollment accounts you have access to:
Use the `principalName` property to identify the account that you want to grant RBAC Owner access to. Copy the `name` of that account. For example, if you wanted to grant RBAC Owner access to the [email protected] enrollment account, you'd copy ```747ddfe5-xxxx-xxxx-xxxx-xxxxxxxxxxxx```. This is the object ID of the enrollment account. Paste this value somewhere so that you can use it in the next step as `enrollmentAccountObjectId`.
67
+
68
+
### [PowerShell](#tab/azure-powershell)
69
+
70
+
Open [Azure Cloud Shell](https://shell.azure.com/) and select PowerShell.
71
+
72
+
Use the [Get-AzEnrollmentAccount](/powershell/module/az.billing/get-azenrollmentaccount) cmdlet to list all enrollment accounts you have access to.
73
+
74
+
```azurepowershell-interactive
75
+
Get-AzEnrollmentAccount
76
+
```
77
+
78
+
Azure responds with a list of enrollment accounts you have access to:
Use the `principalName` property to identify the account you want to grant RBAC Owner access to. Copy the `ObjectId` of that account. For example, if you wanted to grant RBAC Owner access to the [email protected] enrollment account, you'd copy ```747ddfe5-xxxx-xxxx-xxxx-xxxxxxxxxxxx```. Paste this object ID somewhere so that you can use it in the next step as the `enrollmentAccountObjectId`.
87
+
88
+
### [Azure CLI](#tab/azure-cli)
89
+
90
+
Use the [az billing enrollment-account list](https://aka.ms/EASubCreationPublicPreviewCLI) command to list all enrollment accounts you have access to.
91
+
92
+
```azurecli-interactive
93
+
az billing enrollment-account list
94
+
```
95
+
96
+
Azure responds with a list of enrollment accounts you have access to:
Use the `principalName` property to identify the account that you want to grant RBAC Owner access to. Copy the `name` of that account. For example, if you wanted to grant RBAC Owner access to the [email protected] enrollment account, you'd copy ```747ddfe5-xxxx-xxxx-xxxx-xxxxxxxxxxxx```. This is the object ID of the enrollment account. Paste this value somewhere so that you can use it in the next step as `enrollmentAccountObjectId`.
117
+
118
+
<aid="userObjectId"></a>
119
+
120
+
### 2. Get object ID of the user or group you want to give the RBAC Owner role to
121
+
122
+
1. In the Azure portal, search on **Azure Active Directory**.
123
+
1. If you want to grant a user access, click on **Users** in the menu on the left. If you want to grant access to a group, click **Groups**.
124
+
1. Select the User or Group you want to give the RBAC Owner role to.
125
+
1. If you selected a User, you'll find the object ID in the Profile page. If you selected a Group, the object ID will be in the Overview page. Copy the **ObjectID** by clicking the icon to the right of the text box. Paste this somewhere so that you can use it in the next step as `userObjectId`.
126
+
127
+
### 3. Grant the user or group the RBAC Owner role on the enrollment account
128
+
129
+
Using the values you collected in the first two steps, grant the user or group the RBAC Owner role on the enrollment account.
130
+
131
+
### [REST](#tab/rest-2)
132
+
133
+
Run the following command, replacing ```<enrollmentAccountObjectId>``` with the `name` you copied in the first step (```747ddfe5-xxxx-xxxx-xxxx-xxxxxxxxxxxx```). Replace ```<userObjectId>``` with the object ID you copied from the second step.
30
134
31
135
```json
32
-
PUT https://management.azure.com/providers/Microsoft.Billing/enrollmentAccounts/747ddfe5-xxxx-xxxx-xxxx-xxxxxxxxxxxx/providers/Microsoft.Authorization/roleAssignments/<roleAssignmentGuid>?api-version=2015-07-01
136
+
PUT https://management.azure.com/providers/Microsoft.Billing/enrollmentAccounts/<enrollmentAccountObjectId>/providers/Microsoft.Authorization/roleAssignments/<roleAssignmentGuid>?api-version=2015-07-01
33
137
34
138
{
35
139
"properties": {
@@ -58,27 +162,27 @@ When the Owner role is successfully assigned at the enrollment account scope, Az
Use the [New-AzRoleAssignment](../active-directory/role-based-access-control-manage-access-powershell.md)to give another user Owner access to your enrollment account.
169
+
Run the following [New-AzRoleAssignment](../active-directory/role-based-access-control-manage-access-powershell.md)command, replacing ```<enrollmentAccountObjectId>``` with the `ObjectId` collected in the first step (```747ddfe5-xxxx-xxxx-xxxx-xxxxxxxxxxxx```). Replace ```<userObjectId>``` with the object ID collected in the second step.
Use the [az role assignment create](../active-directory/role-based-access-control-manage-access-azure-cli.md)to give another user Owner access to your enrollment account.
177
+
Run the following [az role assignment create](../active-directory/role-based-access-control-manage-access-azure-cli.md)command, replacing ```<enrollmentAccountObjectId>``` with the `name` you copied in the first step (```747ddfe5-xxxx-xxxx-xxxx-xxxxxxxxxxxx```). Replace ```<userObjectId>``` with the object ID collected in the second step.
74
178
75
-
```azurecli-interactive
76
-
az role assignment create --role Owner --assignee-object-id <userObjectId> --scope /providers/Microsoft.Billing/enrollmentAccounts/747ddfe5-xxxx-xxxx-xxxx-xxxxxxxxxxxx
179
+
```azurecli-interactive
180
+
az role assignment create --role Owner --assignee-object-id <userObjectId> --scope /providers/Microsoft.Billing/enrollmentAccounts/<enrollmentAccountObjectId>
77
181
```
78
182
79
183
----
80
184
81
-
Once a user becomes an RBAC Owner for your enrollment account, they can programmatically create subscriptions under it. A subscription created by a delegated user still has the original Account Owner as Service Admin, but it also has the delegated user as an Owner by default.
185
+
Once a user becomes an RBAC Owner for your enrollment account, they can [programmatically create subscriptions](programmatically-create-subscription.md) under it. A subscription created by a delegated user still has the original Account Owner as Service Admin, but it also has the delegated user as an RBAC Owner by default.
82
186
83
187
## Audit who created subscriptions using activity logs
84
188
@@ -91,7 +195,6 @@ To track the subscriptions created via this API, use the [Tenant Activity Log AP
91
195
GET "/providers/Microsoft.Insights/eventtypes/management/values?api-version=2015-04-01&$filter=eventTimestamp ge '{greaterThanTimeStamp}' and eventTimestamp le '{lessThanTimestamp}' and eventChannels eq 'Operation' and resourceProvider eq 'Microsoft.Subscription'"
92
196
```
93
197
94
-
> [!NOTE]
95
198
> To conveniently call this API from the command line, try [ARMClient](https://github.com/projectkudu/ARMClient).
0 commit comments