You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/cost-management-billing/reservations/exchange-and-refund-azure-reservations.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,6 +39,8 @@ Not all reservations are eligible for exchange. For example, you can't exchange
39
39
- Synapse Analytics Pre-purchase plan
40
40
- Red Hat plans
41
41
- SUSE Linux plans
42
+
- Microsoft Defender for Cloud Pre-Purchase Plan
43
+
- Microsoft Sentinel Pre-Purchase Plan
42
44
43
45
You can also refund reservations, but the sum total of all canceled reservation commitment in your billing scope (such as EA, Microsoft Customer Agreement, and Microsoft Partner Agreement) can't exceed USD 50,000 in a 12 month rolling window.
44
46
@@ -51,6 +53,8 @@ The following reservations aren't eligible for refunds:
Copy file name to clipboardExpand all lines: articles/firewall/premium-deploy-certificates-enterprise-ca.md
+17-1Lines changed: 17 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,12 +28,28 @@ To use an Enterprise CA to generate a certificate to use with Azure Firewall Pre
28
28
- an [Azure Key Vault](premium-certificates.md#azure-key-vault)
29
29
- a Managed Identity with Read permissions to **Certificates and Secrets** defined in the Key Vault Access Policy
30
30
31
+
## Create a new Subordinate Certificate Template
32
+
33
+
1. Run `certtmpl.msc` to open the Certificate Template Console.
34
+
2. Find the **Subordinate Certification Authority** template in the console.
35
+
3. Right-click on the **Subordinate Certification Authority** template and select **Duplicate Template**.
36
+
4. In the **Properties of New Template** window, go to the **Compatibility** tab and set the appropriate compatibility settings or leave them as default.
37
+
5. Go to the **General** tab, set the **Template Display Name** (for example: `My Subordinate CA`), and adjust the validity period if necessary. Optionally, select the **Publish certificate in Active Directory** checkbox.
38
+
6. In the **Settings** tab, ensure the required users and groups have read and `enroll` permissions.
39
+
7. Navigate to the **Extensions** tab, select **Key Usage**, and select **Edit**.
40
+
- Ensure that the **Digital signature**, **Certificate signing**, and **CRL signing** checkboxes are selected.
41
+
- Select the **Make this extension critical** checkbox and select **OK**.
42
+
43
+
:::image type="content" source="media/premium-deploy-certificates-enterprise-ca/certificate-template-key-usage-extension.png" alt-text="Screenshot of certificate template key usage extensions.":::
44
+
8. Select **OK** to save the new certificate template.
45
+
9. Ensure the new template is enabled so it can be used to issue certificates.
46
+
31
47
## Request and export a certificate
32
48
33
49
1. Access the web enrollment site on the Root CA, usually `https://<servername>/certsrv` and select **Request a Certificate**.
34
50
1. Select **Advanced Certificate Request**.
35
51
1. Select **Create and Submit a Request to this CA**.
36
-
1. Fill out the form using the Subordinate Certification Authority template.
52
+
1. Fill out the form using the Subordinate Certification Authority template created in the previous section.
37
53
:::image type="content" source="media/premium-deploy-certificates-enterprise-ca/advanced-certificate-request.png" alt-text="Screenshot of advanced certificate request":::
38
54
1. Submit the request and install the certificate.
39
55
1. Assuming this request is made from a Windows Server using Internet Explorer, open **Internet Options**.
> In this case, the synapse data studio UI will not display the role assignment added by the above method, so it is recommended to add the role assignment to both object ID and application ID at the same time so that it can be displayed on the UI as well.
0 commit comments