Skip to content

Commit

Permalink
Merge pull request #3149 from MicrosoftDocs/main
Browse files Browse the repository at this point in the history
8/08/2024 PM Publish
  • Loading branch information
Albertyang0 authored Aug 8, 2024
2 parents efd780e + 7556d3f commit a4c9fe3
Show file tree
Hide file tree
Showing 84 changed files with 257 additions and 257 deletions.
2 changes: 1 addition & 1 deletion azps-12.2.0/Az.ApiManagement/Backup-AzApiManagement.md
Original file line number Diff line number Diff line change
Expand Up @@ -46,7 +46,7 @@ $resourceGroupName="contosogroup2";
$apiManagementName="contosoapi";
$containerName="apimbackupcontainer";
$backupName="test-sdk-backup-1";
$msiClientId="a6270d0c-7d86-478b-8cbe-dc9047ba54f7"
$msiClientId="00001111-aaaa-2222-bbbb-3333cccc4444"
Backup-AzApiManagement -ResourceGroupName $resourceGroupName -Name $apiManagementName -StorageContext $storageContext -TargetContainerName $containerName -TargetBlobName $backupName -AccessType "UserAssignedManagedIdentity" -IdentityClientId $msiClientId -PassThru
```

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -73,7 +73,7 @@ Get-AzApiManagementIdentityProvider -Context $context -Type AadB2C

```output
Type : AadB2C
ClientId : f02dafe2-b8b8-48ec-a38e-27e5c16c51e5
ClientId : 00001111-aaaa-2222-bbbb-3333cccc4444
ClientSecret : xxxxxx
AllowedTenants : {contosoaadb2c.onmicrosoft.com}
Authority : login.microsoftonline.com
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -39,12 +39,12 @@ This takes as input the ClientId and ClientSecret of the Facebook app.
### Example 2: Configures adB2C as an identity Provider for Developer Portal Logins
```powershell
$apimContext = New-AzApiManagementContext -ResourceGroupName "Api-Default-WestUS" -ServiceName "contoso"
New-AzApiManagementIdentityProvider -Context $context -Type AadB2C -ClientId 6b1fc750-9e68-450c-97d2-ba6acd0fbc20 -ClientSecret "foobar" -AllowedTenants 'samirtestbc.onmicrosoft.com' -SignupPolicyName B2C_1_signup-policy
New-AzApiManagementIdentityProvider -Context $context -Type AadB2C -ClientId 00001111-aaaa-2222-bbbb-3333cccc4444 -ClientSecret "foobar" -AllowedTenants 'samirtestbc.onmicrosoft.com' -SignupPolicyName B2C_1_signup-policy
```

```output
Type : AadB2C
ClientId : 6b1fc750-9e68-450c-97d2-ba6acd0fbc20
ClientId : 00001111-aaaa-2222-bbbb-3333cccc4444
ClientSecret : foobar
AllowedTenants : {samirtestbc.onmicrosoft.com}
Authority : login.microsoftonline.com
Expand Down
2 changes: 1 addition & 1 deletion azps-12.2.0/Az.ApiManagement/Restore-AzApiManagement.md
Original file line number Diff line number Diff line change
Expand Up @@ -46,7 +46,7 @@ $resourceGroupName="ContosoGroup02";
$apiManagementName="contosoapi";
$containerName="apimbackupcontainer";
$backupName="test-sdk-backup-1";
$msiClientId="a6270d0c-7d86-478b-8cbe-dc9047ba54f7"
$msiClientId="00001111-aaaa-2222-bbbb-3333cccc4444"
Restore-AzApiManagement -ResourceGroupName $resourceGroupName -Name $apiManagementName -StorageContext $storageContext -SourceContainerName $containerName -SourceBlobName $backupName -AccessType "UserAssignedManagedIdentity" -IdentityClientId $msiClientId -PassThru
```

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -47,7 +47,7 @@ Get Api Keys for an application insights resource

### Example 2: Get specific API key for an application insights resource
```powershell
Get-AzApplicationInsightsApiKey -ResourceGroupName "testGroup" -Name "test" -ApiKeyId 7c4c61dc-b392-4aa4-992f-ee92b84e5dee
Get-AzApplicationInsightsApiKey -ResourceGroupName "testGroup" -Name "test" -ApiKeyId 00001111-aaaa-2222-bbbb-3333cccc4444
```

Get specific API key for an application insights resource
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ Delete an API Key of an Application Insights component.

### Example 1: Remove an application insights api key for an application insights resource
```powershell
Remove-AzApplicationInsightsApiKey -ResourceGroupName "testGroup" -Name "test" -ApiKeyId dd173f38-4fd1-4c75-8af5-99c29aa0f867
Remove-AzApplicationInsightsApiKey -ResourceGroupName "testGroup" -Name "test" -ApiKeyId 00001111-aaaa-2222-bbbb-3333cccc4444
```

Remove an application insights api key for an application insights resource
Expand Down
4 changes: 2 additions & 2 deletions azps-12.2.0/Az.Automation/New-AzAutomationConnection.md
Original file line number Diff line number Diff line change
Expand Up @@ -39,8 +39,8 @@ The command uses the connection field values in $FieldValues.
### Example 2: Create a connection for ConnectionTypeName=AzureServicePrincipal
```powershell
$Thumbprint = "0SZTNJ34TCCMUJ5MJZGR8XQD3S0RVHJBA33Z8ZXV"
$TenantId = "4cd76576-b611-43d0-8f2b-adcb139531bf"
$ApplicationId = "3794a65a-e4e4-493d-ac1d-f04308d712dd"
$TenantId = "00001111-aaaa-2222-bbbb-3333cccc4444"
$ApplicationId = "00001111-aaaa-2222-bbbb-3333cccc4444"
$SubscriptionId = "81b59010-dc55-45b7-89cd-5ca26db62472"
$RunAsAccountConnectionFieldValues = @{"ApplicationId" = $ApplicationId; "TenantId" = $TenantId; "CertificateThumbprint" = $Thumbprint; "SubscriptionId" = $SubscriptionId}
New-AzAutomationConnection -Name "Connection13" -ConnectionTypeName AzureServicePrincipal -ConnectionFieldValues $RunAsAccountConnectionFieldValues -ResourceGroupName "ResourceGroup01" -AutomationAccountName "AutomationAccount01"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -39,7 +39,7 @@ Invoke-AzBillingBenefitsElevateSavingPlanOrder -SavingsPlanOrderId "e0b1f446-568
```output
Name PrincipalId RoleDefinitionId Scope
---- ----------- ---------------- -----
5c545baf-2ef5-4016-9c31-6e0e23c397a0 067e7443-3a55-40b6-a2d8-0a7a12a9da2d /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635 /providers/Microsoft.BillingBenefits/savingsplanorders/e45905d2-9207-4f24-8549-f615c203b49b
00001111-aaaa-2222-bbbb-3333cccc4444 067e7443-3a55-40b6-a2d8-0a7a12a9da2d /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635 /providers/Microsoft.BillingBenefits/savingsplanorders/e45905d2-9207-4f24-8549-f615c203b49b
```

Elevate savings plan order
Expand All @@ -56,7 +56,7 @@ $response = Invoke-AzBillingBenefitsElevateSavingPlanOrder -InputObject $identit
```output
Name PrincipalId RoleDefinitionId Scope
---- ----------- ---------------- -----
5c545baf-2ef5-4016-9c31-6e0e23c397a0 067e7443-3a55-40b6-a2d8-0a7a12a9da2d /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635 /providers/Microsoft.BillingBenefits/savingsplanorders/e45905d2-9207-4f24-8549-f615c203b49b
00001111-aaaa-2222-bbbb-3333cccc4444 067e7443-3a55-40b6-a2d8-0a7a12a9da2d /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635 /providers/Microsoft.BillingBenefits/savingsplanorders/e45905d2-9207-4f24-8549-f615c203b49b
```

Elevate savings plan order
Expand Down
4 changes: 2 additions & 2 deletions azps-12.2.0/Az.BotService/New-AzBotService.md
Original file line number Diff line number Diff line change
Expand Up @@ -37,7 +37,7 @@ Returns a BotService specified by the parameters.

### Example 1: Create a new bot
```powershell
New-AzBotService -resourcegroupname BotTest-rg -name BotTest1 -ApplicationId "af5fce4d-ee68-4b25-be09-f3222582e133" -Location global -Sku F0 -Description "123134" -Registration
New-AzBotService -resourcegroupname BotTest-rg -name BotTest1 -ApplicationId "00001111-aaaa-2222-bbbb-3333cccc4444" -Location global -Sku F0 -Description "123134" -Registration
```

```output
Expand All @@ -50,7 +50,7 @@ Create a new Bot by ResourceGroupName and ApplicationId

### Example 2: Create a new Web App
```powershell
New-AzBotService -resourcegroupname BotTest-rg -name BotTest2 -ApplicationId "b1ab1727-0465-4255-a1bb-976210af972c" -Location global -Sku F0 -Description "123134" -Webapp
New-AzBotService -resourcegroupname BotTest-rg -name BotTest2 -ApplicationId "00001111-aaaa-2222-bbbb-3333cccc4444" -Location global -Sku F0 -Description "123134" -Webapp
```

```output
Expand Down
8 changes: 4 additions & 4 deletions azps-12.2.0/Az.Chaos/New-AzChaosExperiment.md
Original file line number Diff line number Diff line change
Expand Up @@ -40,8 +40,8 @@ New-AzChaosExperiment -Name experiment-test -ResourceGroupName azps_test_group_c

```output
Id : /subscriptions/{subId}/resourceGroups/azps_test_group_chaos/providers/Microsoft.Chaos/experiments/EXPERIMENT-TEST
IdentityPrincipalId : 72f14040-8265-4f10-b5ea-377c6fc2671c
IdentityTenantId : 72f988bf-86f1-41af-91ab-2d7cd011db47
IdentityPrincipalId : 00001111-aaaa-2222-bbbb-3333cccc4444
IdentityTenantId : 00001111-aaaa-2222-bbbb-3333cccc4444
IdentityType : SystemAssigned
IdentityUserAssignedIdentity : {
}
Expand Down Expand Up @@ -148,8 +148,8 @@ New-AzChaosExperiment -Name experiment-test -ResourceGroupName azps_test_group_c

```output
Id : /subscriptions/{subId}/resourceGroups/azps_test_group_chaos/providers/Microsoft.Chaos/experiments/EXPERIMENT-TEST
IdentityPrincipalId : 72f14040-8265-4f10-b5ea-377c6fc2671c
IdentityTenantId : 72f988bf-86f1-41af-91ab-2d7cd011db47
IdentityPrincipalId : 00001111-aaaa-2222-bbbb-3333cccc4444
IdentityTenantId : 00001111-aaaa-2222-bbbb-3333cccc4444
IdentityType : SystemAssigned
IdentityUserAssignedIdentity : {
}
Expand Down
4 changes: 2 additions & 2 deletions azps-12.2.0/Az.Chaos/Update-AzChaosExperiment.md
Original file line number Diff line number Diff line change
Expand Up @@ -42,8 +42,8 @@ Update-AzChaosExperiment -Name experiment-test -ResourceGroupName azps_test_grou

```output
Id : /subscriptions/{subId}/resourceGroups/azps_test_group_chaos/providers/Microsoft.Chaos/experiments/EXPERIMENT-TEST
IdentityPrincipalId : 72f14040-8265-4f10-b5ea-377c6fc2671c
IdentityTenantId : 72f988bf-86f1-41af-91ab-2d7cd011db47
IdentityPrincipalId : 00001111-aaaa-2222-bbbb-3333cccc4444
IdentityTenantId : 00001111-aaaa-2222-bbbb-3333cccc4444
IdentityType : SystemAssigned
IdentityUserAssignedIdentity : {
}
Expand Down
2 changes: 1 addition & 1 deletion azps-12.2.0/Az.Compute/Set-AzVMOSDisk.md
Original file line number Diff line number Diff line change
Expand Up @@ -143,7 +143,7 @@ $cred = New-Object System.Management.Automation.PSCredential ($user, $securePass
# Create Key Vault
New-AzKeyVault -Name $keyVaultName -Location $Location -ResourceGroupName $ResourceGroupName -Sku Premium -EnablePurgeProtection -EnabledForDiskEncryption;
$cvmAgent = Get-AzADServicePrincipal -ApplicationId 'bf7b6499-ff71-4aa2-97a4-f372087be7f0';
$cvmAgent = Get-AzADServicePrincipal -ApplicationId '00001111-aaaa-2222-bbbb-3333cccc4444';
Set-AzKeyVaultAccessPolicy -VaultName $keyVaultName -ResourceGroupName $ResourceGroupName -ObjectId $cvmAgent.id -PermissionsToKeys get,release;
# Add Key vault Key
Expand Down
2 changes: 1 addition & 1 deletion azps-12.2.0/Az.Compute/Set-AzVmssSecurityProfile.md
Original file line number Diff line number Diff line change
Expand Up @@ -264,7 +264,7 @@ The second command sets the SecurityType enum to "TrustedLaunch".
$keyVaultName = "kv" + $rgname;
$keyName = "k" + $rgname;
$desName = "des" + $rgname;
$cvmAgent = Get-AzADServicePrincipal -ApplicationId "bf7b6499-ff71-4aa2-97a4-f372087be7f0";
$cvmAgent = Get-AzADServicePrincipal -ApplicationId "00001111-aaaa-2222-bbbb-3333cccc4444";
$kv = New-AzKeyVault -Name $keyVaultName -ResourceGroupName $rgName -Location $loc -Sku "Premium" -EnablePurgeProtection -SoftDeleteRetentionInDays 7;
Set-AzKeyVaultAccessPolicy -ObjectId $cvmAgent.Id -VaultName $keyVaultName -ResourceGroupName $rgName -PermissionsToKeys "get","release";
Start-BitsTransfer -Source https://cvmprivatepreviewsa.blob.core.windows.net/cvmpublicpreviewcontainer/skr-policy.json -Destination ".\skr-policy.json";
Expand Down
8 changes: 4 additions & 4 deletions azps-12.2.0/Az.ConfidentialLedger/New-AzConfidentialLedger.md
Original file line number Diff line number Diff line change
Expand Up @@ -36,8 +36,8 @@ New-AzConfidentialLedger `
-AadBasedSecurityPrincipal `
@{
LedgerRoleName="Administrator";
PrincipalId="34621747-6fc8-4771-a2eb-72f31c461f2e";
TenantId="bce123b9-2b7b-4975-8360-5ca0b9b1cd08"
PrincipalId="00001111-aaaa-2222-bbbb-3333cccc4444";
TenantId="00001111-aaaa-2222-bbbb-3333cccc4444"
} `
-CertBasedSecurityPrincipal `
@{
Expand All @@ -60,8 +60,8 @@ Creates a new Confidential Ledger.
```powershell
$aadSecurityPrincipal = New-AzConfidentialLedgerAADBasedSecurityPrincipalObject `
-LedgerRoleName "Administrator" `
-PrincipalId "34621747-6fc8-4771-a2eb-72f31c461f2e" `
-TenantId "bce123b9-2b7b-4975-8360-5ca0b9b1cd08"
-PrincipalId "00001111-aaaa-2222-bbbb-3333cccc4444" `
-TenantId "00001111-aaaa-2222-bbbb-3333cccc4444"
$certSecurityPrincipal = New-AzConfidentialLedgerCertBasedSecurityPrincipalObject `
-Cert "-----BEGIN CERTIFICATE-----********************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************-----END CERTIFICATE-----" `
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -28,14 +28,14 @@ Create an in-memory object for AADBasedSecurityPrincipal.
```powershell
New-AzConfidentialLedgerAADBasedSecurityPrincipalObject `
-LedgerRoleName "Administrator" `
-PrincipalId "34621747-6fc8-4771-a2eb-72f31c461f2e" `
-TenantId "bce123b9-2b7b-4975-8360-5ca0b9b1cd08"
-PrincipalId "00001111-aaaa-2222-bbbb-3333cccc4444" `
-TenantId "00001111-aaaa-2222-bbbb-3333cccc4444"
```

```output
LedgerRoleName PrincipalId TenantId
-------------- ----------- --------
Administrator 34621747-6fc8-4771-a2eb-72f31c461f2e bce123b9-2b7b-4975-8360-5ca0b9b1cd08
Administrator 00001111-aaaa-2222-bbbb-3333cccc4444 00001111-aaaa-2222-bbbb-3333cccc4444
```

Creates an AadBasedSecurityPrincipalObject that may be used for `Az.ConfidentialLedger` commands.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -46,8 +46,8 @@ Update-AzConfidentialLedger `
-AadBasedSecurityPrincipal `
@{
LedgerRoleName="Administrator";
PrincipalId="34621747-6fc8-4771-a2eb-72f31c461f2e";
TenantId="bce123b9-2b7b-4975-8360-5ca0b9b1cd08"
PrincipalId="00001111-aaaa-2222-bbbb-3333cccc4444";
TenantId="00001111-aaaa-2222-bbbb-3333cccc4444"
} `
-CertBasedSecurityPrincipal `
@{
Expand Down
Loading

0 comments on commit a4c9fe3

Please sign in to comment.