Skip to content

Commit 1d272dd

Browse files
authored
Merge pull request #7427 from MicrosoftDocs/chrisda
Chrisda to Master
2 parents 372d2ec + 92e093b commit 1d272dd

File tree

5 files changed

+58
-16
lines changed

5 files changed

+58
-16
lines changed

exchange/docs-conceptual/app-only-auth-powershell-v2.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -54,15 +54,15 @@ The following examples show how to use the Exchange Online PowerShell V2 module
5454
>
5555
> - In the **Connect-ExchangeOnline** commands, be sure to use an `.onmicrosoft.com` domain in the _Organization_ parameter value. Otherwise, you might encounter cryptic permission issues when you run commands in the app context.
5656
>
57-
> - App-only authentication does not support delegation. Unattended scripting in delegation scenarios is supported with the Secure App Model. For more information, go [here](https://docs.microsoft.com/powershell/partnercenter/multi-factor-auth#exchange).
57+
> - App-only authentication does not support delegation. Unattended scripting in delegation scenarios is supported with the Secure App Model. For more information, go [here](/powershell/partnercenter/multi-factor-auth#exchange).
5858
5959
## How does it work?
6060

6161
The EXO V2 module uses the Active Directory Authentication Library to fetch an app-only token using the application Id, tenant Id (organization), and certificate thumbprint. The application object provisioned inside Azure AD has a Directory Role assigned to it, which is returned in the access token. Exchange Online configures the session RBAC using the directory role information that's available in the token.
6262

6363
## Set up app-only authentication
6464

65-
An initial onboarding is required for authentication using application objects. Application and service principal are used interchangeably, but an application is like a class object while a service principal is like an instance of the class. You can learn more about this at [Application and service principal objects in Azure Active Directory](https://docs.microsoft.com/azure/active-directory/develop/app-objects-and-service-principals).
65+
An initial onboarding is required for authentication using application objects. Application and service principal are used interchangeably, but an application is like a class object while a service principal is like an instance of the class. You can learn more about this at [Application and service principal objects in Azure Active Directory](/azure/active-directory/develop/app-objects-and-service-principals).
6666

6767
For a detailed visual flow about creating applications in Azure AD, see <https://aka.ms/azuread-app>.
6868

@@ -101,7 +101,7 @@ For a detailed visual flow about creating applications in Azure AD, see <https:/
101101

102102
## Step 1: Register the application in Azure AD
103103

104-
**Note**: If you encounter problems, check the [required permissions](https://docs.microsoft.com/azure/active-directory/develop/howto-create-service-principal-portal#required-permissions) to verify that your account can create the identity.
104+
**Note**: If you encounter problems, check the [required permissions](/azure/active-directory/develop/howto-create-service-principal-portal#required-permissions) to verify that your account can create the identity.
105105

106106
1. Open the Azure AD portal at <https://portal.azure.com/>.
107107

@@ -125,7 +125,7 @@ For a detailed visual flow about creating applications in Azure AD, see <https:/
125125

126126
- **Redirect URI (optional)**: In the first box, verify that **Web** is selected. In the second box, enter the URI where the access token is sent.
127127

128-
Note that you can't create credentials for [native applications](https://docs.microsoft.com/azure/active-directory/manage-apps/application-proxy-configure-native-client-application), because you can't use that type for automated applications.
128+
Note that you can't create credentials for [native applications](/azure/active-directory/manage-apps/application-proxy-configure-native-client-application), because you can't use that type for automated applications.
129129

130130
![Register an application](media/exo-app-only-auth-register-app.png)
131131

@@ -186,7 +186,7 @@ For a detailed visual flow about creating applications in Azure AD, see <https:/
186186

187187
Create a self-signed x.509 certificate using one of the following methods:
188188

189-
- (Recommended) Use the [New-SelfSignedCertificate](https://docs.microsoft.com/powershell/module/pkiclient/new-selfsignedcertificate), [Export-Certificate](https://docs.microsoft.com/powershell/module/pkiclient/export-certificate) and [Export-PfxCertificate](https://docs.microsoft.com/powershell/module/pkiclient/export-pfxcertificate) cmdlets in an elevated (run as administrator) Windows PowerShell session to request a self-signed certificate and export it to `.cer` and `.pfx` (SHA1 by default). For example:
189+
- (Recommended) Use the [New-SelfSignedCertificate](/powershell/module/pkiclient/new-selfsignedcertificate), [Export-Certificate](/powershell/module/pkiclient/export-certificate) and [Export-PfxCertificate](/powershell/module/pkiclient/export-pfxcertificate) cmdlets in an elevated (run as administrator) Windows PowerShell session to request a self-signed certificate and export it to `.cer` and `.pfx` (SHA1 by default). For example:
190190

191191
```powershell
192192
# Create certificate
@@ -251,7 +251,7 @@ Azure AD has more than 50 admin roles available. For app-only authentication in
251251
- Exchange administrator
252252
- Global Reader
253253

254-
For general instructions about assigning roles in Azure AD, see [View and assign administrator roles in Azure Active Directory](https://docs.microsoft.com/azure/active-directory/roles/manage-roles-portal).
254+
For general instructions about assigning roles in Azure AD, see [View and assign administrator roles in Azure Active Directory](/azure/active-directory/roles/manage-roles-portal).
255255

256256
1. On the Azure AD portal at <https://portal.azure.com/>, under **Manage Azure Active Directory**, click **View**.
257257

exchange/docs-conceptual/exchange-online-powershell-v2.md

Lines changed: 47 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -275,19 +275,59 @@ If the module is already installed on your computer, you can run the following c
275275

276276
For detailed syntax and parameter information, see [Update-Module](https://docs.microsoft.com/powershell/module/powershellget/update-module).
277277

278-
**Note**: If you receive the following error:
278+
### Troubleshoot installing the EXO V2 module
279279

280-
> The specified module 'ExchangeOnlineManagement' with PowerShellGetFormatVersion '\<version\>' is not supported by the current version of PowerShellGet. Get the latest version of the PowerShellGet module to install this module, 'ExchangeOnlineManagement'.
280+
- If you receive the following error:
281281

282-
Update your installation of the PowerShellGet module to the latest version as described in [Installing PowerShellGet](https://docs.microsoft.com/powershell/scripting/gallery/installing-psget). Be sure to close and re-open the elevated PowerShell window before you attempt to update the ExchangeOnlineManagement module again.
282+
> The specified module 'ExchangeOnlineManagement' with PowerShellGetFormatVersion '\<version\>' is not supported by the current version of PowerShellGet. Get the latest version of the PowerShellGet module to install this module, 'ExchangeOnlineManagement'.
283+
284+
Update your installation of the PowerShellGet module to the latest version as described in [Installing PowerShellGet](https://docs.microsoft.com/powershell/scripting/gallery/installing-psget). Be sure to close and re-open the PowerShell window before you attempt to update the ExchangeOnlineManagement module again.
285+
286+
- As of April 2020, the PowerShell Gallery only supports connections using TLS 1.2 or later. For more information, see [PowerShell Gallery TLS Support](https://devblogs.microsoft.com/powershell/powershell-gallery-tls-support/).
287+
288+
To check your current settings in the Microsoft .NET Framework, run the following command in Windows PowerShell:
289+
290+
```powershell
291+
[Net.ServicePointManager]::SecurityProtocol
292+
```
293+
294+
As described in the PowerShell Gallery TLS Support article, to *temporarily* change the security protocol to TLS 1.2 to install the PowerShellGet or ExchangeOnlineManagement modules, run the following command in Windows PowerShell *before* you install the module:
295+
296+
```powershell
297+
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
298+
```
299+
300+
To *permanently* enable strong cryptography in the Microsoft .NET Framework version 4.x or later, run one of the following commands based on your Windows architecture:
301+
302+
- x64:
303+
304+
```powershell
305+
Set-ItemProperty -Path 'HKLM:\SOFTWARE\Wow6432Node\Microsoft.NetFramework\v4.0.30319' -Name 'SchUseStrongCrypto' -Type DWord -Value '1'
306+
```
307+
308+
- x86
309+
310+
```powershell
311+
Set-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft.NetFramework\v4.0.30319' -Name 'SchUseStrongCrypto' -Type DWord -Value '1'
312+
```
313+
314+
For more information, see [SchUseStrongCrypto](/dotnet/framework/network-programming/tls#schusestrongcrypto).
283315
284316
### Uninstall the EXO V2 module
285317
286-
To uninstall the module, run the following command **in an elevated PowerShell window**:
318+
To uninstall the module, run **one** of the following commands based on how you originally installed the module (in an elevated PowerShell window vs. `Scope CurrentUser`):
287319
288-
```powershell
289-
Uninstall-Module -Name ExchangeOnlineManagement
290-
```
320+
- In an elevated PowerShell window (all users):
321+
322+
```powershell
323+
Uninstall-Module -Name ExchangeOnlineManagement
324+
```
325+
326+
- Only for the current user account:
327+
328+
```powershell
329+
Uninstall-Module -Name ExchangeOnlineManagement
330+
```
291331

292332
For detailed syntax and parameter information, see [Uninstall-Module](https://docs.microsoft.com/powershell/module/powershellget/uninstall-module).
293333

exchange/exchange-ps/exchange/Enable-Mailbox.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -231,7 +231,8 @@ Enable-Mailbox [-Identity] <UserIdParameter>
231231
```
232232
Enable-Mailbox [-Identity] <UserIdParameter>]
233233
[-Archive]
234-
[-ArchiveDatabase <DatabaseIdParameter> [-ArchiveGuid <Guid>]
234+
[-ArchiveDatabase <DatabaseIdParameter>]
235+
[-ArchiveGuid <Guid>]
235236
[-ArchiveName <MultiValuedProperty>]
236237
[-ActiveSyncMailboxPolicy <MailboxPolicyIdParameter>]
237238
[-Alias <String>

exchange/exchange-ps/exchange/Enable-RemoteMailbox.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,8 @@ Enable-RemoteMailbox [-Identity] <UserIdParameter>
8383
```
8484
Enable-RemoteMailbox [-Identity] <UserIdParameter>
8585
[-Shared]
86-
[-ACLableSyncedObjectEnabled [-Alias <String>]
86+
[-ACLableSyncedObjectEnabled]
87+
[-Alias <String>]
8788
[-Confirm]
8889
[-DisplayName <String>]
8990
[-DomainController <Fqdn>]

exchange/exchange-ps/exchange/Remove-PublicFolderAdministrativePermission.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ Remove-PublicFolderAdministrativePermission [-Identity] <PublicFolderIdParameter
3434

3535
### Instance
3636
```
37-
Remove-PublicFolderAdministrativePermission[[-Identity] <PublicFolderIdParameter>] -Instance <PublicFolderAdministrativeAceObject>
37+
Remove-PublicFolderAdministrativePermission [[-Identity] <PublicFolderIdParameter>] -Instance <PublicFolderAdministrativeAceObject>
3838
[-AccessRights <MultiValuedProperty>]
3939
[-Confirm]
4040
[-Deny]

0 commit comments

Comments
 (0)