You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: azure-stack/includes/operator-note-owa.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,12 +3,12 @@ author: sethmanheim
3
3
ms.author: sethm
4
4
ms.service: azure-stack
5
5
ms.topic: include
6
-
ms.date: 01/15/2025
6
+
ms.date: 01/23/2025
7
7
ms.lastreviewed: 12/2/2020
8
8
9
9
---
10
10
11
11
::: moniker range=">=azs-2005"
12
12
> [!NOTE]
13
-
> You can also use the The Operator Access Workstation (OAW) to access the privileged endpoint (PEP), the Administrator portal for support scenarios, and Azure Stack Hub GitHub Tools. For more information, see [Azure Stack Hub Operator Access Workstation](../operator/operator-access-workstation.md).
13
+
> You can also use the The Operator Access Workstation (OAW) to access the privileged endpoint (PEP), the administrator portal for support scenarios, and Azure Stack Hub GitHub Tools. For more information, see [Azure Stack Hub Operator Access Workstation](../operator/operator-access-workstation.md).
Copy file name to clipboardExpand all lines: azure-stack/operator/azure-stack-privileged-endpoint.md
+18-20Lines changed: 18 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,11 +2,9 @@
2
2
title: Using the privileged endpoint in Azure Stack Hub
3
3
description: Learn how to use the privileged endpoint (PEP) in Azure Stack Hub as an operator.
4
4
author: sethmanheim
5
-
6
5
ms.topic: article
7
-
ms.date: 12/16/2020
6
+
ms.date: 01/23/2025
8
7
ms.author: sethm
9
-
ms.reviewer: fiseraci
10
8
ms.lastreviewed: 04/28/2020
11
9
ms.custom: conteperfq4
12
10
@@ -18,46 +16,46 @@ ms.custom: conteperfq4
18
16
19
17
# Use the privileged endpoint in Azure Stack Hub
20
18
21
-
As an Azure Stack Hub operator, you should use the administrator portal, PowerShell, or Azure Resource Manager APIs for most day-to-day management tasks. However, for some less common operations, you need to use the *privileged endpoint* (PEP). The PEP is a pre-configured remote PowerShell console that provides you with just enough capabilities to help you do a required task. The endpoint uses [PowerShell JEA (Just Enough Administration)](/powershell/scripting/learn/remoting/jea/overview) to expose only a restricted set of cmdlets. To access the PEP and invoke the restricted set of cmdlets, a low-privileged account is used. No admin accounts are required. For additional security, scripting isn't allowed.
19
+
As an Azure Stack Hub operator, you should use the administrator portal, PowerShell, or Azure Resource Manager APIs for most day-to-day management tasks. However, for some less common operations, you must use the *Privileged Endpoint* (PEP). The PEP is a pre-configured remote PowerShell console that provides you with just enough capabilities to help you do a required task. The endpoint uses [PowerShell JEA (Just Enough Administration)](/powershell/scripting/learn/remoting/jea/overview) to expose only a restricted set of cmdlets. To access the PEP and invoke the restricted set of cmdlets, a low-privileged account is used. No admin accounts are required. For additional security, scripting isn't allowed.
22
20
23
21
You can use the PEP to perform these tasks:
24
22
25
23
- Low-level tasks, such as [collecting diagnostic logs](azure-stack-get-azurestacklog.md).
26
24
- Many post-deployment datacenter integration tasks for integrated systems, such as adding Domain Name System (DNS) forwarders after deployment, setting up Microsoft Graph integration, Active Directory Federation Services (AD FS) integration, certificate rotation, and so on.
27
-
- To work with support to obtain temporary, high-level access for in-depth troubleshooting of an integrated system.
25
+
- To work with support personnel to obtain temporary, high-level access for in-depth troubleshooting of an integrated system.
28
26
29
27
The PEP logs every action (and its corresponding output) that you perform in the PowerShell session. This provides full transparency and complete auditing of operations. You can keep these log files for future audits.
30
28
31
29
> [!NOTE]
32
-
> In the Azure Stack Development Kit (ASDK), you can run some of the commands available in the PEP directly from a PowerShell session on the development kit host. However, you may want to test some operations using the PEP, such as log collection, because this is the only method available to perform certain operations in an integrated systems environment.
30
+
> In the Azure Stack Development Kit (ASDK), you can run some of the commands available in the PEP directly from a PowerShell session on the development kit host. However, you might want to test some operations using the PEP, such as log collection, because this is the only method available to perform certain operations in an integrated systems environment.
You access the PEP through a remote PowerShell session on the virtual machine (VM) that hosts the PEP. In the ASDK, this VM is named **AzS-ERCS01**. If you're using an integrated system, there are three instances of the PEP, each running inside a VM (*Prefix*-ERCS01, *Prefix*-ERCS02, or *Prefix*-ERCS03) on different hosts for resiliency.
39
37
40
-
Before you begin this procedure for an integrated system, make sure you can access the PEP either by IP address or through DNS. After the initial deployment of Azure Stack Hub, you can access the PEP only by IP address because DNS integration isn't set up yet. Your OEM hardware vendor will provide you with a JSON file named **AzureStackStampDeploymentInfo** that contains the PEP IP addresses.
38
+
Before you begin this procedure for an integrated system, make sure you can access the PEP either by IP address or through DNS. After the initial deployment of Azure Stack Hub, you can access the PEP only by IP address because DNS integration isn't set up yet. Your OEM hardware vendor provides you with a JSON file named **AzureStackStampDeploymentInfo** that contains the PEP IP addresses.
41
39
42
-
You may also find the IP address in the Azure Stack Hub administrator portal. Open the portal, for example, `https://adminportal.local.azurestack.external`. Select **Region Management** > **Properties**.
40
+
You can also find the IP address in the Azure Stack Hub administrator portal. Open the portal; for example, `https://adminportal.local.azurestack.external`. Select **Region Management** > **Properties**.
43
41
44
-
You will need set your current culture setting to `en-US` when running the privileged endpoint, otherwise cmdlets such as Test-AzureStack or Get-AzureStackLog will not work as expected.
42
+
You must set your current culture to `en-US` when you run the privileged endpoint, otherwise cmdlets such as `Test-AzureStack` or `Get-AzureStackLog` won't work as expected.
45
43
46
44
> [!NOTE]
47
-
> For security reasons, we require that you connect to the PEP only from a hardened VM running on top of the hardware lifecycle host, or from a dedicated and secure computer, such as a [Privileged Access Workstation](https://4sysops.com/archives/understand-the-microsoft-privileged-access-workstation-paw-security-model). The original configuration of the hardware lifecycle host must not be modified from its original configuration (including installing new software) or used to connect to the PEP.
45
+
> For security reasons, we require that you connect to the PEP only from a hardened VM running on top of the hardware lifecycle host, or from a dedicated and secure computer, such as a [Privileged Access Workstation](https://4sysops.com/archives/understand-the-microsoft-privileged-access-workstation-paw-security-model). The original configuration of the hardware lifecycle host must not be modified from its original configuration (including installing new software) or used to connect to the PEP.
48
46
49
47
1. Establish the trust.
50
48
51
-
- On an integrated system, run the following command from an elevated Windows PowerShell session to add the PEP as a trusted host on the hardened VM running on the hardware lifecycle host or the Privileged Access Workstation.
49
+
- On an integrated system, run the following command from an elevated Windows PowerShell session to add the PEP as a trusted host on the hardened VM running on the hardware lifecycle host or the Privileged Access Workstation:
52
50
53
51
```powershell
54
52
Set-Item WSMan:\localhost\Client\TrustedHosts -Value '<IP Address of Privileged Endpoint>' -Concatenate
55
53
```
56
-
57
-
- If you're running the ASDK, sign in to the development kit host.
54
+
55
+
- If you run the ASDK, sign in to the development kit host.
58
56
59
57
1. On the hardened VM running on the hardware lifecycle host or the Privileged Access Workstation, open a Windows PowerShell session. Run the following commands to establish a remote session on the VM that hosts the PEP:
60
-
58
+
61
59
- On an integrated system:
62
60
63
61
```powershell
@@ -66,24 +64,24 @@ You will need set your current culture setting to `en-US` when running the privi
- **User name**: Specify the CloudAdmin account, in the format **<*Azure Stack Hub domain*>\cloudadmin**. (For ASDK, the user name is **azurestack\cloudadmin**)
83
+
84
+
- **User name**: Specify the CloudAdmin account, in the format **<*Azure Stack Hub domain*>\cloudadmin**.
87
85
- **Password**: Enter the same password that was provided during installation for the AzureStackAdmin domain administrator account.
88
86
89
87
> [!NOTE]
@@ -197,7 +195,7 @@ To close the endpoint session:
197
195
| Parameter | Description | Type | Required |
198
196
|---------|---------|---------|---------|
199
197
|*TranscriptsPathDestination*| Path to the external file share defined as "fileshareIP\sharefoldername" | String | Yes|
200
-
|*Credential*| Credentials to access the file share | SecureString |Yes |
198
+
|*Credential*| Credentials to access the file share | SecureString |Yes |
201
199
202
200
203
201
After the transcript log files are successfully transferred to the file share, they're automatically deleted from the PEP.
0 commit comments