Skip to content

Commit f4d5833

Browse files
Merge pull request #291395 from spelluru/sfi-guids-12-04
SFI: Removed hardcoded GUIDs and added steps
2 parents abc994d + 7344f9f commit f4d5833

File tree

5 files changed

+24
-6
lines changed

5 files changed

+24
-6
lines changed
63.4 KB
Loading

articles/event-grid/scripts/powershell-webhook-secure-delivery-microsoft-entra-app.md

Lines changed: 11 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,14 +19,25 @@ Here are the high level steps from the script:
1919
1. Add service principal of event subscription writer Microsoft Entra app to the AzureEventGridSecureWebhookSubscriber role
2020
1. Add service principal of Microsoft.EventGrid to the AzureEventGridSecureWebhookSubscriber role as well
2121

22+
## Get Microsoft.EventGrid application ID
23+
24+
1. Navigate to [Azure portal](https://portal.azure.com).
25+
1. In the search bar, type `Microsoft.EventGrid`, and then select **Microsoft.EventGrid (Service Principal)** in the drop-down list.
26+
27+
:::image type="content" source="../media/event-grid-app-id/select-microsoft-event-grid.png" alt-text="Screenshot that shows the selection of Microsoft Event Grid from the drop-down list.":::
28+
1. On the **Microsoft.EventGrid** page, note down or copy the **Application ID** to the clipboard.
29+
1. In the following script, set the `$eventGridAppId` variable to this value before running it.
30+
2231
## Sample script - stable
2332

2433
```azurepowershell
2534
# NOTE: Before run this script ensure you are logged in Azure by using "az login" command.
2635
36+
$eventGridAppId = "[REPLACE_WITH_EVENT_GRID_APP_ID]"
2737
$webhookAppObjectId = "[REPLACE_WITH_YOUR_ID]"
2838
$eventSubscriptionWriterAppId = "[REPLACE_WITH_YOUR_ID]"
2939
40+
3041
# Start execution
3142
try {
3243
@@ -51,8 +62,6 @@ try {
5162
# You don't need to modify this id
5263
# But Azure Event Grid Entra Application Id is different for different clouds
5364
54-
$eventGridAppId = "4962773b-9cdb-44cf-a8bf-237846a00ab7" # Azure Public Cloud
55-
# $eventGridAppId = "54316b56-3481-47f9-8f30-0300f5542a7b" # Azure Government Cloud
5665
$eventGridSP = Get-MgServicePrincipal -Filter ("appId eq '" + $eventGridAppId + "'")
5766
if ($eventGridSP.DisplayName -match "Microsoft.EventGrid")
5867
{

articles/event-grid/scripts/powershell-webhook-secure-delivery-microsoft-entra-user.md

Lines changed: 11 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,11 +18,22 @@ Here are the high level steps from the script:
1818
1. Add service principal of user who is creating the subscription to the AzureEventGridSecureWebhookSubscriber role.
1919
1. Add service principal of Microsoft.EventGrid to the AzureEventGridSecureWebhookSubscriber.
2020

21+
## Get Microsoft.EventGrid application ID
22+
23+
1. Navigate to [Azure portal](https://portal.azure.com).
24+
1. In the search bar, type `Microsoft.EventGrid`, and then select **Microsoft.EventGrid (Service Principal)** in the drop-down list.
25+
26+
:::image type="content" source="../media/event-grid-app-id/select-microsoft-event-grid.png" alt-text="Screenshot that shows the selection of Microsoft Event Grid from the drop-down list.":::
27+
1. On the **Microsoft.EventGrid** page, note down or copy the **Application ID** to the clipboard.
28+
1. In the following script, set the `$eventGridAppId` variable to this value before running it.
29+
30+
2131
## Sample script
2232

2333
```azurepowershell
2434
# NOTE: Before run this script ensure you are logged in Azure by using "az login" command.
2535
36+
$eventGridAppId = "[REPLACE_WITH_EVENT_GRID_APP_ID]"
2637
$webhookAppObjectId = "[REPLACE_WITH_YOUR_ID]"
2738
$eventSubscriptionWriterUserPrincipalName = "[REPLACE_WITH_USER_PRINCIPAL_NAME_OF_THE_USER_WHO_WILL_CREATE_THE_SUBSCRIPTION]"
2839
@@ -50,8 +61,6 @@ try {
5061
# You don't need to modify this id
5162
# But Azure Event Grid Microsoft Entra Application Id is different for different clouds
5263
53-
$eventGridAppId = "4962773b-9cdb-44cf-a8bf-237846a00ab7" # Azure Public Cloud
54-
# $eventGridAppId = "54316b56-3481-47f9-8f30-0300f5542a7b" # Azure Government Cloud
5564
$eventGridSP = Get-MgServicePrincipal -Filter ("appId eq '" + $eventGridAppId + "'")
5665
if ($eventGridSP.DisplayName -match "Microsoft.EventGrid")
5766
{

articles/hdinsight/domain-joined/domain-joined-authentication-issues.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ Use [Hybrid Identity Administrator](/entra/identity/role-based-access-control/pe
4141
Sign in fails with error code 50034. Error message is similar to:
4242

4343
```
44-
{"error":"invalid_grant","error_description":"AADSTS50034: The user account Microsoft.AzureAD.Telemetry.Diagnostics.PII doesn't exist in the 0c349e3f-1ac3-4610-8599-9db831cbaf62 directory. To sign into this application, the account must be added to the directory.\r\nTrace ID: 2222cccc-33dd-eeee-ff44-aaaaaa555555\r\nCorrelation ID: cccc2222-dd33-4444-55ee-666666ffffff\r\nTimestamp: 2019-04-29 15:52:16Z", "error_codes":[50034],"timestamp":"2019-04-29 15:52:16Z","trace_id":"2222cccc-33dd-eeee-ff44-aaaaaa555555", "correlation_id":"cccc2222-dd33-4444-55ee-666666ffffff"}
44+
{"error":"invalid_grant","error_description":"AADSTS50034: The user account Microsoft.AzureAD.Telemetry.Diagnostics.PII doesn't exist in the aaaabbbb-0000-cccc-1111-dddd2222eeee directory. To sign into this application, the account must be added to the directory.\r\nTrace ID: 2222cccc-33dd-eeee-ff44-aaaaaa555555\r\nCorrelation ID: cccc2222-dd33-4444-55ee-666666ffffff\r\nTimestamp: 2019-04-29 15:52:16Z", "error_codes":[50034],"timestamp":"2019-04-29 15:52:16Z","trace_id":"2222cccc-33dd-eeee-ff44-aaaaaa555555", "correlation_id":"cccc2222-dd33-4444-55ee-666666ffffff"}
4545
```
4646

4747
### Cause

articles/hdinsight/hadoop/hdinsight-troubleshoot-data-lake-files.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ The certificate provided for Service principal access might have expired.
7575
1. If the service principal certificate has expired, the output will look something like this:
7676
7777
```
78-
Exception in OAuthTokenController.GetOAuthToken: 'System.InvalidOperationException: Error while getting the OAuth token from AAD for AppPrincipalId 23abe517-2ffd-4124-aa2d-7c224672cae2, ResourceUri https://management.core.windows.net/, AADTenantId https://login.windows.net/80abc8bf-86f1-41af-91ab-2d7cd011db47, ClientCertificateThumbprint C49C25705D60569884EDC91986CEF8A01A495783 ---> Microsoft.IdentityModel.Clients.ActiveDirectory.AdalServiceException: AADSTS70002: Error validating credentials. AADSTS50012: Client assertion contains an invalid signature. **[Reason - The key used is expired.**, Thumbprint of key used by client: 'C49C25705D60569884EDC91986CEF8A01A495783', Found key 'Start=08/03/2016, End=08/03/2017, Thumbprint=C39C25705D60569884EDC91986CEF8A01A4956D1', Configured keys: [Key0:Start=08/03/2016, End=08/03/2017, Thumbprint=C39C25705D60569884EDC91986CEF8A01A4956D1;]]
78+
Exception in OAuthTokenController.GetOAuthToken: 'System.InvalidOperationException: Error while getting the OAuth token from AAD for AppPrincipalId aaaaaaaa-bbbb-cccc-1111-222222222222, ResourceUri https://management.core.windows.net/, AADTenantId https://login.windows.net/80abc8bf-86f1-41af-91ab-2d7cd011db47, ClientCertificateThumbprint C49C25705D60569884EDC91986CEF8A01A495783 ---> Microsoft.IdentityModel.Clients.ActiveDirectory.AdalServiceException: AADSTS70002: Error validating credentials. AADSTS50012: Client assertion contains an invalid signature. **[Reason - The key used is expired.**, Thumbprint of key used by client: 'C49C25705D60569884EDC91986CEF8A01A495783', Found key 'Start=08/03/2016, End=08/03/2017, Thumbprint=C39C25705D60569884EDC91986CEF8A01A4956D1', Configured keys: [Key0:Start=08/03/2016, End=08/03/2017, Thumbprint=C39C25705D60569884EDC91986CEF8A01A4956D1;]]
7979
Trace ID: 0000aaaa-11bb-cccc-dd22-eeeeee333333
8080
Correlation ID: aaaa0000-bb11-2222-33cc-444444dddddd
8181
Timestamp: 2017-10-06 20:44:56Z ---> System.Net.WebException: The remote server returned an error: (401) Unauthorized.

0 commit comments

Comments
 (0)