You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: exchange/docs-conceptual/app-only-auth-powershell-v2.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -138,7 +138,7 @@ For a detailed visual flow about creating applications in Azure AD, see <https:/
138
138
139
139
3. [Generate a self-signed certificate](#step-3-generate-a-self-signed-certificate)
140
140
141
-
- For app-only authentication in Azure AD, you typically use a certificate to request access. Anyone who has the certificate and its private key can use the app, and the permissions granted to the app.
141
+
- For app-only authentication in Azure AD, you typically use a certificate to request access. Anyone who has the certificate and its private key can use the app with the permissions granted to the app.
142
142
143
143
- Create and configure a self-signed X.509 certificate, which is used to authenticate your Application against Azure AD, while requesting the app-only access token.
Copy file name to clipboardExpand all lines: exchange/docs-conceptual/connect-exo-powershell-managed-identity.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -79,7 +79,7 @@ After you've successfully created, saved, and published the PowerShell runbook,
79
79
1. On the **Automation accounts** page at <https://portal.azure.com/#view/HubsExtension/BrowseResource/resourceType/Microsoft.Automation%2FAutomationAccounts>, select the Automation account.
80
80
2. In the details flyout that opens, start typing "Runbooks" in the **Search** box, and then select **Runbooks** from results.
81
81
3. On the **Runbooks** flyout that opens, select the runbook.
82
-
4. On the details page of the runbook, click**Start**.
82
+
4. On the details page of the runbook, select**Start**.
83
83
84
84
### Connect to Exchange Online PowerShell using Azure VMs with system-assigned managed identity
85
85
@@ -129,7 +129,7 @@ After you've successfully created the PowerShell runbook, do the following steps
129
129
1. On the **Automation accounts** page at <https://portal.azure.com/#view/HubsExtension/BrowseResource/resourceType/Microsoft.Automation%2FAutomationAccounts>, select the Automation account.
130
130
2. In the details flyout that opens, start typing "Runbooks" in the **Search** box, and then select **Runbooks** from results.
131
131
3. On the **Runbooks** flyout that opens, select the runbook.
132
-
4. On the details page of the runbook, click**Start**.
132
+
4. On the details page of the runbook, select**Start**.
133
133
134
134
### Connect to Exchange Online PowerShell using Azure VMs with system-assigned managed identities
135
135
@@ -248,15 +248,15 @@ For detailed syntax and parameter information, see [Get-AzADServicePrincipal](/p
248
248
249
249
1. On the **Automation accounts** page at <https://portal.azure.com/#view/HubsExtension/BrowseResource/resourceType/Microsoft.Automation%2FAutomationAccounts>, select the Automation account.
250
250
2. In the details flyout that opens, start typing "Modules" in the **Search** box, and then select **Modules** from results.
251
-
3. On the **Modules** flyout that opens, click**Add a module**.
251
+
3. On the **Modules** flyout that opens, select**Add a module**.
252
252
4. On the **Add a module** page that opens, configure the following settings:
253
253
-**Upload a module file**: Select **Browse from gallery**.
254
254
-**PowerShell module file**: Select **Click here to browse from gallery**:
255
255
1. In the **Browse Gallery** page that opens, start typing "ExchangeOnlineManagement" in the **Search** box, press Enter, and then select **ExchangeOnlineManagement** from the results.
256
-
2. On the details page that opens, click**Select** to return to the **Add a module** page.
256
+
2. On the details page that opens, select**Select** to return to the **Add a module** page.
257
257
-**Runtime version**: Select **5.1** or **7.1 (Preview)**. To add both versions, repeat the steps in this section to add and select the other runtime version for the module.
258
258
259
-
When you're finished, click**Import**.
259
+
When you're finished, select**Import**.
260
260
261
261

262
262
@@ -303,7 +303,7 @@ The procedures in this step require the Microsoft Graph PowerShell SDK. For inst
2. If a **Permissions requested** dialog opens, select **Consent on behalf of your organization**, and then click**Accept**.
306
+
2. If a **Permissions requested** dialog opens, select **Consent on behalf of your organization**, and then select**Accept**.
307
307
308
308
3. Run the following commands to grant the Exchange.ManageAsApp API permission for the managed identity to call Exchange Online:
309
309
@@ -356,13 +356,13 @@ For general instructions about assigning roles in Azure AD, see [View and assign
356
356
357
357

358
358
359
-
3. On the **Assignments** page that opens, click**Add assignments**.
359
+
3. On the **Assignments** page that opens, select**Add assignments**.
360
360
361
361

362
362
363
363
4. In the **Add assignments** flyout that opens, find and select the managed identity you created or identified in [Step 1](#step-1-create-a-resource-with-system-assigned-managed-identity).
364
364
365
-
When you're finished, click**Add**.
365
+
When you're finished, select**Add**.
366
366
367
367
5. Back on the **Assignments** page, verify that the role has been assigned to the managed identity.
0 commit comments