Skip to content

Commit f3f09af

Browse files
Merge pull request #253420 from SnehaSudhirG/02Oct-AutomationRunAs
Removed References to Run As accounts as it is retired.
2 parents fae196b + 069aeac commit f3f09af

19 files changed

+43
-305
lines changed

.openpublishing.redirection.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7560,7 +7560,12 @@
75607560
},
75617561
{
75627562
"source_path_from_root": "/articles/automation/manage-runas-account.md",
7563-
"redirect_url": "/azure/automation/manage-run-as-account",
7563+
"redirect_url": "/azure/automation/migrate-run-as-accounts-managed-identity",
7564+
"redirect_document_id": false
7565+
},
7566+
{
7567+
"source_path_from_root": "/articles/automation/manage-run-as-account.md",
7568+
"redirect_url": "/azure/automation/migrate-run-as-accounts-managed-identity",
75647569
"redirect_document_id": false
75657570
},
75667571
{

articles/automation/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -103,8 +103,6 @@
103103
items:
104104
- name: Delete Run As account
105105
href: delete-run-as-account.md
106-
- name: Manage Run As account
107-
href: manage-runas-account.md
108106
- name: Migrate Run As account to managed identity
109107
href: migrate-run-as-accounts-managed-identity.md
110108
- name: FAQ on Migration to managed identity

articles/automation/automation-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article gives answers to frequently asked questions about Azur
44
services: automation
55
ms.topic: conceptual
66
ms.custom: devx-track-python
7-
ms.date: 08/25/2021
7+
ms.date: 10/03/2023
88
#Customer intent: As an implementer, I want answers to various questions.
99
---
1010

articles/automation/automation-graphical-authoring-intro.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,15 @@ title: Author graphical runbooks in Azure Automation
33
description: This article tells how to author a graphical runbook without working with code.
44
services: automation
55
ms.subservice: process-automation
6-
ms.date: 04/25/2023
6+
ms.date: 10/03/2023
77
ms.topic: conceptual
88
ms.custom:
99
---
1010

1111
# Author graphical runbooks in Azure Automation
1212

1313
> [!IMPORTANT]
14-
> Azure Automation Run As Account will retire on September 30, 2023 and will be replaced with Managed Identities. Before that date, you'll need to start migrating your runbooks to use [managed identities](automation-security-overview.md#managed-identities). For more information, see [migrating from an existing Run As accounts to managed identity](/azure/automation/migrate-run-as-accounts-managed-identity?tabs=run-as-account#sample-scripts) to start migrating the runbooks from Run As account to managed identities before 30 September 2023.
14+
> Azure Automation Run as accounts, including Classic Run as accounts have retired on **30 September 2023** and replaced with [Managed Identities](automation-security-overview.md#managed-identities). You would no longer be able to create or renew Run as accounts through the Azure portal. For more information, see [migrating from an existing Run As accounts to managed identity](migrate-run-as-accounts-managed-identity.md?tabs=run-as-account#sample-scripts).
1515
1616
All runbooks in Azure Automation are Windows PowerShell workflows. Graphical runbooks and graphical PowerShell Workflow runbooks generate PowerShell code that the Automation workers run but that you cannot view or modify. You can convert a graphical runbook to a graphical PowerShell Workflow runbook, and vice versa. However, you can't convert these runbooks to a textual runbook. Additionally, the Automation graphical editor can't import a textual runbook.
1717

@@ -416,5 +416,4 @@ You have the option to revert to the Published version of a runbook. This operat
416416

417417
* To get started with graphical runbooks, see [Tutorial: Create a graphical runbook](./learn/powershell-runbook-managed-identity.md).
418418
* To know more about runbook types and their advantages and limitations, see [Azure Automation runbook types](automation-runbook-types.md).
419-
* To understand how to authenticate using the Automation Run As account, see [Run As account](automation-security-overview.md#run-as-account).
420419
* For a PowerShell cmdlet reference, see [Az.Automation](/powershell/module/az.automation/#automation).

articles/automation/automation-security-guidelines.md

Lines changed: 2 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,14 @@ title: Azure Automation security guidelines, security best practices Automation
33
description: This article helps you with the guidelines that Azure Automation offers to ensure a secured configuration of Automation account, Hybrid Runbook worker role, authentication certificate and identities, network isolation and policies.
44
services: automation
55
ms.subservice: shared-capabilities
6-
ms.date: 02/16/2022
6+
ms.date: 10/03/2023
77
ms.topic: conceptual
88
---
99

1010
# Security best practices in Azure Automation
1111

1212
> [!IMPORTANT]
13-
> Azure Automation Run As Account will retire on September 30, 2023 and will be replaced with Managed Identities. Before that date, you'll need to start migrating your runbooks to use [managed identities](automation-security-overview.md#managed-identities). For more information, see [migrating from an existing Run As accounts to managed identity](migrate-run-as-accounts-managed-identity.md?tabs=run-as-account#sample-scripts) to start migrating the runbooks from Run As account to managed identities before 30 September 2023.
13+
> Azure Automation Run as accounts, including Classic Run as accounts have retired on **30 September 2023** and replaced with [Managed Identities](automation-security-overview.md#managed-identities). You would no longer be able to create or renew Run as accounts through the Azure portal. For more information, see [migrating from an existing Run As accounts to managed identity](migrate-run-as-accounts-managed-identity.md?tabs=run-as-account#sample-scripts).
1414
1515
This article details the best practices to securely execute the automation jobs.
1616
[Azure Automation](./overview.md) provides you the platform to orchestrate frequent, time consuming, error-prone infrastructure management and operational tasks, as well as mission-critical operations. This service allows you to execute scripts, known as automation runbooks seamlessly across cloud and hybrid environments.
@@ -57,12 +57,6 @@ This section guides you in configuring your Automation account securely.
5757

5858
Follow the [Managed identity best practice recommendations](../active-directory/managed-identities-azure-resources/managed-identity-best-practice-recommendations.md#choosing-system-or-user-assigned-managed-identities) for more details.
5959

60-
1. If you use Run As accounts as the authentication mechanism for your runbooks, ensure the following:
61-
- Track the service principals in your inventory. Service principals often have elevated permissions.
62-
- Delete any unused Run As accounts to minimize your exposed attack surface.
63-
- [Renew the Run As certificate](./manage-runas-account.md#cert-renewal) periodically.
64-
- Follow the RBAC guidelines to limit the permissions assigned to Run As account using this [script](./manage-runas-account.md#limit-run-as-account-permissions). Do not assign high privilege permissions like Contributor, Owner and so on.
65-
6660
1. Rotate the [Azure Automation keys](./automation-create-standalone-account.md?tabs=azureportal#manage-automation-account-keys) periodically. The key regeneration prevents future DSC or hybrid worker node registrations from using previous keys. We recommend to use the [Extension based hybrid workers](./automation-hybrid-runbook-worker.md) that use Azure AD authentication instead of Automation keys. Azure AD centralizes the control and management of identities and resource credentials.
6761

6862
### Data security

articles/automation/automation-security-overview.md

Lines changed: 5 additions & 72 deletions
Original file line numberDiff line numberDiff line change
@@ -4,15 +4,15 @@ description: This article provides an overview of Azure Automation account authe
44
keywords: automation security, secure automation; automation authentication
55
services: automation
66
ms.subservice: process-automation
7-
ms.date: 04/12/2023
7+
ms.date: 10/04/2023
88
ms.topic: conceptual
99
ms.custom:
1010
---
1111

1212
# Azure Automation account authentication overview
1313

1414
> [!IMPORTANT]
15-
> Azure Automation Run As Account will retire on September 30, 2023 and will be replaced with Managed Identities. Before that date, you'll need to start migrating your runbooks to use [managed identities](automation-security-overview.md#managed-identities). For more information, see [migrating from an existing Run As accounts to managed identity](migrate-run-as-accounts-managed-identity.md?tabs=run-as-account#sample-scripts) to start migrating the runbooks from Run As account to managed identities before 30 September 2023.
15+
> Azure Automation Run as accounts, including Classic Run as accounts have retired on **30 September 2023** and replaced with [Managed Identities](automation-security-overview.md#managed-identities). You would no longer be able to create or renew Run as accounts through the Azure portal. For more information, see [migrating from an existing Run As accounts to managed identity](migrate-run-as-accounts-managed-identity.md?tabs=run-as-account#sample-scripts).
1616
1717
Azure Automation allows you to automate tasks against resources in Azure, on-premises, and with other cloud providers such as Amazon Web Services (AWS). You can use runbooks to automate your tasks, or a Hybrid Runbook Worker if you have business or operational processes to manage outside of Azure. Working in any one of these environments require permissions to securely access the resources with the minimal rights required.
1818

@@ -39,11 +39,10 @@ Managed identities are the recommended way to authenticate in your runbooks, and
3939

4040
Here are some of the benefits of using managed identities:
4141

42-
- Using a managed identity instead of the Automation Run As account simplifies management. You don't have to renew the certificate used by a Run As account.
43-
42+
- Using a managed identity instead of the Automation Run As account simplifies management.
4443
- Managed identities can be used without any additional cost.
4544

46-
- You don't have to specify the Run As connection object in your runbook code. You can access resources using your Automation account's managed identity from a runbook without creating certificates, connections, Run As accounts, etc.
45+
- You don't have to specify the Run As connection object in your runbook code. You can access resources using your Automation account's managed identity from a runbook without creating certificates, connections, etc.
4746

4847
An Automation account can authenticate using two types of managed identities:
4948

@@ -56,30 +55,14 @@ An Automation account can authenticate using two types of managed identities:
5655
5756
For details on using managed identities, see [Enable managed identity for Azure Automation](enable-managed-identity-for-automation.md).
5857

59-
## Run As accounts
60-
61-
> [!IMPORTANT]
62-
> Azure Automation Run As Account will retire on September 30, 2023 and will be replaced with Managed Identities. Before that date, you'll need to start migrating your runbooks to use [managed identities](automation-security-overview.md#managed-identities). For more information, see [migrating from an existing Run As accounts to managed identity](migrate-run-as-accounts-managed-identity.md?tabs=run-as-account#sample-scripts) to start migrating the runbooks from Run As account to managed identities before 30 September 2023.
63-
64-
Run As accounts in Azure Automation provide authentication for managing Azure Resource Manager resources or resources deployed on the classic deployment model. There are two types of Run As accounts in Azure Automation:
65-
- Azure Run As Account
66-
- Azure Classic Run As Account
67-
68-
To renew a Run As account, permissions are needed at three levels:
69-
70-
- Subscription,
71-
- Azure Active Directory (Azure AD), and
72-
- Automation account
73-
74-
7558
### Subscription permissions
7659

7760
You need the `Microsoft.Authorization/*/Write` permission. This permission is obtained through membership of one of the following Azure built-in roles:
7861

7962
- [Owner](../role-based-access-control/built-in-roles.md#owner)
8063
- [User Access Administrator](../role-based-access-control/built-in-roles.md#user-access-administrator)
8164

82-
To renew Classic Run As accounts, you must have the Co-administrator role at the subscription level. To learn more about classic subscription permissions, see [Azure classic subscription administrators](../role-based-access-control/classic-administrators.md#add-a-co-administrator).
65+
To learn more about classic subscription permissions, see [Azure classic subscription administrators](../role-based-access-control/classic-administrators.md#add-a-co-administrator).
8366

8467
### Azure AD permissions
8568

@@ -104,56 +87,6 @@ To learn more about the Azure Resource Manager and Classic deployment models, se
10487
10588
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RWwtF3]
10689
107-
### Run As account
108-
109-
Run As Account consists of the following components:
110-
- An Azure AD application with a self-signed certificate, and a service principal account for the application in Azure AD, which is assigned the [Contributor](../role-based-access-control/built-in-roles.md#contributor) role for the account in your current subscription. You can change the certificate setting to [Reader](../role-based-access-control/built-in-roles.md#reader) or any other role. For more information, see [Role-based access control in Azure Automation](automation-role-based-access-control.md).
111-
- An Automation certificate asset named `AzureRunAsCertificate` in the specified Automation account. The certificate asset holds the certificate private key that the Azure AD application uses.
112-
- An Automation connection asset named `AzureRunAsConnection` in the specified Automation account. The connection asset holds the application ID, tenant ID, subscription ID, and certificate thumbprint.
113-
114-
### Azure Classic Run As account
115-
116-
Azure Classic Run As Account consists of the following components:
117-
- A management certificate in the subscription.
118-
- An Automation certificate asset named `AzureClassicRunAsCertificate` in the specified Automation account. The certificate asset holds the certificate private key used by the management certificate.
119-
- An Automation connection asset named `AzureClassicRunAsConnection` in the specified Automation account. The connection asset holds the subscription name, subscription ID, and certificate asset name.
120-
121-
> [!NOTE]
122-
> You must be a co-administrator on the subscription to renew this type of Run As account.
123-
124-
## Service principal for Run As account
125-
126-
The service principal for a Run As account doesn't have permissions to read Azure AD by default. If you want to add permissions to read or manage Azure AD, you must grant the permissions on the service principal under **API permissions**. To learn more, see [Add permissions to access your web API](../active-directory/develop/quickstart-configure-app-access-web-apis.md#add-permissions-to-access-your-web-api).
127-
128-
## <a name="permissions"></a>Run As account permissions
129-
130-
This section defines permissions for both regular Run As accounts and Classic Run As accounts.
131-
132-
* To create or update or delete a Run As account, an Application administrator in Azure Active Directory and an Owner in the subscription can complete all the tasks.
133-
* To configure or renew or delete a Classic Run As accounts, you must have the Co-administrator role at the subscription level. To learn more about classic subscription permissions, see [Azure classic subscription administrators](../role-based-access-control/classic-administrators.md#add-a-co-administrator).
134-
135-
In a situation where you have separation of duties, the following table shows a listing of the tasks, the equivalent cmdlet, and permissions needed:
136-
137-
|Task|Cmdlet |Minimum Permissions |Where you set the permissions|
138-
|---|---------|---------|---|
139-
|Create Azure AD Application|[New-AzADApplication](/powershell/module/az.resources/new-azadapplication) | Application Developer role<sup>1</sup> |[Azure AD](../active-directory/develop/howto-create-service-principal-portal.md#permissions-required-for-registering-an-app)</br>Home > Azure AD > App Registrations |
140-
|Add a credential to the application.|[New-AzADAppCredential](/powershell/module/az.resources/new-azadappcredential) | Application Administrator or Global Administrator<sup>1</sup> |[Azure AD](../active-directory/develop/howto-create-service-principal-portal.md#permissions-required-for-registering-an-app)</br>Home > Azure AD > App Registrations|
141-
|Create and get an Azure AD service principal|[New-AzADServicePrincipal](/powershell/module/az.resources/new-azadserviceprincipal)</br>[Get-AzADServicePrincipal](/powershell/module/az.resources/get-azadserviceprincipal) | Application Administrator or Global Administrator<sup>1</sup> |[Azure AD](../active-directory/develop/howto-create-service-principal-portal.md#permissions-required-for-registering-an-app)</br>Home > Azure AD > App Registrations|
142-
|Assign or get the Azure role for the specified principal|[New-AzRoleAssignment](/powershell/module/az.resources/new-azroleassignment)</br>[Get-AzRoleAssignment](/powershell/module/Az.Resources/Get-AzRoleAssignment) | User Access Administrator or Owner, or have the following permissions:</br></br><code>Microsoft.Authorization/Operations/read</br>Microsoft.Authorization/permissions/read</br>Microsoft.Authorization/roleDefinitions/read</br>Microsoft.Authorization/roleAssignments/write</br>Microsoft.Authorization/roleAssignments/read</br>Microsoft.Authorization/roleAssignments/delete</code></br></br> | [Subscription](../role-based-access-control/role-assignments-portal.md)</br>Home > Subscriptions > \<subscription name\> - Access Control (IAM)|
143-
|Create or remove an Automation certificate|[New-AzAutomationCertificate](/powershell/module/Az.Automation/New-AzAutomationCertificate)</br>[Remove-AzAutomationCertificate](/powershell/module/az.automation/remove-azautomationcertificate) | Contributor on resource group |Automation account resource group|
144-
|Create or remove an Automation connection|[New-AzAutomationConnection](/powershell/module/az.automation/new-azautomationconnection)</br>[Remove-AzAutomationConnection](/powershell/module/az.automation/remove-azautomationconnection)|Contributor on resource group |Automation account resource group|
145-
146-
<sup>1</sup> Non-administrator users in your Azure AD tenant can [register AD applications](../active-directory/develop/howto-create-service-principal-portal.md#permissions-required-for-registering-an-app) if the Azure AD tenant's **Users can register applications** option on the **User settings** page is set to **Yes**. If the application registration setting is **No**, the user performing this action must be as defined in this table.
147-
148-
If you aren't a member of the subscription's Active Directory instance before you're added to the Global Administrator role of the subscription, you're added as a guest. In this situation, you receive a `You do not have permissions to create…` warning on the **Add Automation account** page.
149-
150-
To verify that the situation producing the error message has been remedied:
151-
152-
1. From the Azure Active Directory pane in the Azure portal, select **Users and groups**.
153-
2. Select **All users**.
154-
3. Choose your name, then select **Profile**.
155-
4. Ensure that the value of the **User type** attribute under your user's profile isn't set to **Guest**.
156-
15790
## Role-based access control
15891

15992
Role-based access control is available with Azure Resource Manager to grant permitted actions to an Azure AD user account and Run As account, and authenticate the service principal. Read [Role-based access control in Azure Automation article](automation-role-based-access-control.md) for further information to help develop your model for managing Automation permissions.

0 commit comments

Comments
 (0)