diff --git a/azps-12.2.0/Az.ApiManagement/Backup-AzApiManagement.md b/azps-12.2.0/Az.ApiManagement/Backup-AzApiManagement.md index 7d5ed9ae6d..f6170712fb 100644 --- a/azps-12.2.0/Az.ApiManagement/Backup-AzApiManagement.md +++ b/azps-12.2.0/Az.ApiManagement/Backup-AzApiManagement.md @@ -46,7 +46,7 @@ $resourceGroupName="contosogroup2"; $apiManagementName="contosoapi"; $containerName="apimbackupcontainer"; $backupName="test-sdk-backup-1"; -$msiClientId="a6270d0c-7d86-478b-8cbe-dc9047ba54f7" +$msiClientId="00001111-aaaa-2222-bbbb-3333cccc4444" Backup-AzApiManagement -ResourceGroupName $resourceGroupName -Name $apiManagementName -StorageContext $storageContext -TargetContainerName $containerName -TargetBlobName $backupName -AccessType "UserAssignedManagedIdentity" -IdentityClientId $msiClientId -PassThru ``` diff --git a/azps-12.2.0/Az.ApiManagement/Get-AzApiManagementIdentityProvider.md b/azps-12.2.0/Az.ApiManagement/Get-AzApiManagementIdentityProvider.md index 3438006dda..885e76cee4 100644 --- a/azps-12.2.0/Az.ApiManagement/Get-AzApiManagementIdentityProvider.md +++ b/azps-12.2.0/Az.ApiManagement/Get-AzApiManagementIdentityProvider.md @@ -73,7 +73,7 @@ Get-AzApiManagementIdentityProvider -Context $context -Type AadB2C ```output Type : AadB2C -ClientId : f02dafe2-b8b8-48ec-a38e-27e5c16c51e5 +ClientId : 00001111-aaaa-2222-bbbb-3333cccc4444 ClientSecret : xxxxxx AllowedTenants : {contosoaadb2c.onmicrosoft.com} Authority : login.microsoftonline.com diff --git a/azps-12.2.0/Az.ApiManagement/New-AzApiManagementIdentityProvider.md b/azps-12.2.0/Az.ApiManagement/New-AzApiManagementIdentityProvider.md index 18513ba4de..f9c899f929 100644 --- a/azps-12.2.0/Az.ApiManagement/New-AzApiManagementIdentityProvider.md +++ b/azps-12.2.0/Az.ApiManagement/New-AzApiManagementIdentityProvider.md @@ -39,12 +39,12 @@ This takes as input the ClientId and ClientSecret of the Facebook app. ### Example 2: Configures adB2C as an identity Provider for Developer Portal Logins ```powershell $apimContext = New-AzApiManagementContext -ResourceGroupName "Api-Default-WestUS" -ServiceName "contoso" -New-AzApiManagementIdentityProvider -Context $context -Type AadB2C -ClientId 6b1fc750-9e68-450c-97d2-ba6acd0fbc20 -ClientSecret "foobar" -AllowedTenants 'samirtestbc.onmicrosoft.com' -SignupPolicyName B2C_1_signup-policy +New-AzApiManagementIdentityProvider -Context $context -Type AadB2C -ClientId 00001111-aaaa-2222-bbbb-3333cccc4444 -ClientSecret "foobar" -AllowedTenants 'samirtestbc.onmicrosoft.com' -SignupPolicyName B2C_1_signup-policy ``` ```output Type : AadB2C -ClientId : 6b1fc750-9e68-450c-97d2-ba6acd0fbc20 +ClientId : 00001111-aaaa-2222-bbbb-3333cccc4444 ClientSecret : foobar AllowedTenants : {samirtestbc.onmicrosoft.com} Authority : login.microsoftonline.com diff --git a/azps-12.2.0/Az.ApiManagement/Restore-AzApiManagement.md b/azps-12.2.0/Az.ApiManagement/Restore-AzApiManagement.md index 9dd0d86dfa..acddd99f8a 100644 --- a/azps-12.2.0/Az.ApiManagement/Restore-AzApiManagement.md +++ b/azps-12.2.0/Az.ApiManagement/Restore-AzApiManagement.md @@ -46,7 +46,7 @@ $resourceGroupName="ContosoGroup02"; $apiManagementName="contosoapi"; $containerName="apimbackupcontainer"; $backupName="test-sdk-backup-1"; -$msiClientId="a6270d0c-7d86-478b-8cbe-dc9047ba54f7" +$msiClientId="00001111-aaaa-2222-bbbb-3333cccc4444" Restore-AzApiManagement -ResourceGroupName $resourceGroupName -Name $apiManagementName -StorageContext $storageContext -SourceContainerName $containerName -SourceBlobName $backupName -AccessType "UserAssignedManagedIdentity" -IdentityClientId $msiClientId -PassThru ``` diff --git a/azps-12.2.0/Az.ApplicationInsights/Get-AzApplicationInsightsApiKey.md b/azps-12.2.0/Az.ApplicationInsights/Get-AzApplicationInsightsApiKey.md index f4ed2e7692..1f95a5f9fb 100644 --- a/azps-12.2.0/Az.ApplicationInsights/Get-AzApplicationInsightsApiKey.md +++ b/azps-12.2.0/Az.ApplicationInsights/Get-AzApplicationInsightsApiKey.md @@ -47,7 +47,7 @@ Get Api Keys for an application insights resource ### Example 2: Get specific API key for an application insights resource ```powershell -Get-AzApplicationInsightsApiKey -ResourceGroupName "testGroup" -Name "test" -ApiKeyId 7c4c61dc-b392-4aa4-992f-ee92b84e5dee +Get-AzApplicationInsightsApiKey -ResourceGroupName "testGroup" -Name "test" -ApiKeyId 00001111-aaaa-2222-bbbb-3333cccc4444 ``` Get specific API key for an application insights resource diff --git a/azps-12.2.0/Az.ApplicationInsights/Remove-AzApplicationInsightsApiKey.md b/azps-12.2.0/Az.ApplicationInsights/Remove-AzApplicationInsightsApiKey.md index 3f1d2d16c7..a8f568b0a7 100644 --- a/azps-12.2.0/Az.ApplicationInsights/Remove-AzApplicationInsightsApiKey.md +++ b/azps-12.2.0/Az.ApplicationInsights/Remove-AzApplicationInsightsApiKey.md @@ -34,7 +34,7 @@ Delete an API Key of an Application Insights component. ### Example 1: Remove an application insights api key for an application insights resource ```powershell -Remove-AzApplicationInsightsApiKey -ResourceGroupName "testGroup" -Name "test" -ApiKeyId dd173f38-4fd1-4c75-8af5-99c29aa0f867 +Remove-AzApplicationInsightsApiKey -ResourceGroupName "testGroup" -Name "test" -ApiKeyId 00001111-aaaa-2222-bbbb-3333cccc4444 ``` Remove an application insights api key for an application insights resource diff --git a/azps-12.2.0/Az.Automation/New-AzAutomationConnection.md b/azps-12.2.0/Az.Automation/New-AzAutomationConnection.md index af1c523fa6..8769b1e75d 100644 --- a/azps-12.2.0/Az.Automation/New-AzAutomationConnection.md +++ b/azps-12.2.0/Az.Automation/New-AzAutomationConnection.md @@ -39,8 +39,8 @@ The command uses the connection field values in $FieldValues. ### Example 2: Create a connection for ConnectionTypeName=AzureServicePrincipal ```powershell $Thumbprint = "0SZTNJ34TCCMUJ5MJZGR8XQD3S0RVHJBA33Z8ZXV" -$TenantId = "4cd76576-b611-43d0-8f2b-adcb139531bf" -$ApplicationId = "3794a65a-e4e4-493d-ac1d-f04308d712dd" +$TenantId = "00001111-aaaa-2222-bbbb-3333cccc4444" +$ApplicationId = "00001111-aaaa-2222-bbbb-3333cccc4444" $SubscriptionId = "81b59010-dc55-45b7-89cd-5ca26db62472" $RunAsAccountConnectionFieldValues = @{"ApplicationId" = $ApplicationId; "TenantId" = $TenantId; "CertificateThumbprint" = $Thumbprint; "SubscriptionId" = $SubscriptionId} New-AzAutomationConnection -Name "Connection13" -ConnectionTypeName AzureServicePrincipal -ConnectionFieldValues $RunAsAccountConnectionFieldValues -ResourceGroupName "ResourceGroup01" -AutomationAccountName "AutomationAccount01" diff --git a/azps-12.2.0/Az.BillingBenefits/Invoke-AzBillingBenefitsElevateSavingPlanOrder.md b/azps-12.2.0/Az.BillingBenefits/Invoke-AzBillingBenefitsElevateSavingPlanOrder.md index 61226dcb01..71c6909074 100644 --- a/azps-12.2.0/Az.BillingBenefits/Invoke-AzBillingBenefitsElevateSavingPlanOrder.md +++ b/azps-12.2.0/Az.BillingBenefits/Invoke-AzBillingBenefitsElevateSavingPlanOrder.md @@ -39,7 +39,7 @@ Invoke-AzBillingBenefitsElevateSavingPlanOrder -SavingsPlanOrderId "e0b1f446-568 ```output Name PrincipalId RoleDefinitionId Scope ---- ----------- ---------------- ----- -5c545baf-2ef5-4016-9c31-6e0e23c397a0 067e7443-3a55-40b6-a2d8-0a7a12a9da2d /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635 /providers/Microsoft.BillingBenefits/savingsplanorders/e45905d2-9207-4f24-8549-f615c203b49b +00001111-aaaa-2222-bbbb-3333cccc4444 067e7443-3a55-40b6-a2d8-0a7a12a9da2d /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635 /providers/Microsoft.BillingBenefits/savingsplanorders/e45905d2-9207-4f24-8549-f615c203b49b ``` Elevate savings plan order @@ -56,7 +56,7 @@ $response = Invoke-AzBillingBenefitsElevateSavingPlanOrder -InputObject $identit ```output Name PrincipalId RoleDefinitionId Scope ---- ----------- ---------------- ----- -5c545baf-2ef5-4016-9c31-6e0e23c397a0 067e7443-3a55-40b6-a2d8-0a7a12a9da2d /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635 /providers/Microsoft.BillingBenefits/savingsplanorders/e45905d2-9207-4f24-8549-f615c203b49b +00001111-aaaa-2222-bbbb-3333cccc4444 067e7443-3a55-40b6-a2d8-0a7a12a9da2d /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635 /providers/Microsoft.BillingBenefits/savingsplanorders/e45905d2-9207-4f24-8549-f615c203b49b ``` Elevate savings plan order diff --git a/azps-12.2.0/Az.BotService/New-AzBotService.md b/azps-12.2.0/Az.BotService/New-AzBotService.md index 8cd476c5af..a955b379ad 100644 --- a/azps-12.2.0/Az.BotService/New-AzBotService.md +++ b/azps-12.2.0/Az.BotService/New-AzBotService.md @@ -37,7 +37,7 @@ Returns a BotService specified by the parameters. ### Example 1: Create a new bot ```powershell -New-AzBotService -resourcegroupname BotTest-rg -name BotTest1 -ApplicationId "af5fce4d-ee68-4b25-be09-f3222582e133" -Location global -Sku F0 -Description "123134" -Registration +New-AzBotService -resourcegroupname BotTest-rg -name BotTest1 -ApplicationId "00001111-aaaa-2222-bbbb-3333cccc4444" -Location global -Sku F0 -Description "123134" -Registration ``` ```output @@ -50,7 +50,7 @@ Create a new Bot by ResourceGroupName and ApplicationId ### Example 2: Create a new Web App ```powershell -New-AzBotService -resourcegroupname BotTest-rg -name BotTest2 -ApplicationId "b1ab1727-0465-4255-a1bb-976210af972c" -Location global -Sku F0 -Description "123134" -Webapp +New-AzBotService -resourcegroupname BotTest-rg -name BotTest2 -ApplicationId "00001111-aaaa-2222-bbbb-3333cccc4444" -Location global -Sku F0 -Description "123134" -Webapp ``` ```output diff --git a/azps-12.2.0/Az.Chaos/New-AzChaosExperiment.md b/azps-12.2.0/Az.Chaos/New-AzChaosExperiment.md index 4c616f55e7..a27693c492 100644 --- a/azps-12.2.0/Az.Chaos/New-AzChaosExperiment.md +++ b/azps-12.2.0/Az.Chaos/New-AzChaosExperiment.md @@ -40,8 +40,8 @@ New-AzChaosExperiment -Name experiment-test -ResourceGroupName azps_test_group_c ```output Id : /subscriptions/{subId}/resourceGroups/azps_test_group_chaos/providers/Microsoft.Chaos/experiments/EXPERIMENT-TEST -IdentityPrincipalId : 72f14040-8265-4f10-b5ea-377c6fc2671c -IdentityTenantId : 72f988bf-86f1-41af-91ab-2d7cd011db47 +IdentityPrincipalId : 00001111-aaaa-2222-bbbb-3333cccc4444 +IdentityTenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 IdentityType : SystemAssigned IdentityUserAssignedIdentity : { } @@ -148,8 +148,8 @@ New-AzChaosExperiment -Name experiment-test -ResourceGroupName azps_test_group_c ```output Id : /subscriptions/{subId}/resourceGroups/azps_test_group_chaos/providers/Microsoft.Chaos/experiments/EXPERIMENT-TEST -IdentityPrincipalId : 72f14040-8265-4f10-b5ea-377c6fc2671c -IdentityTenantId : 72f988bf-86f1-41af-91ab-2d7cd011db47 +IdentityPrincipalId : 00001111-aaaa-2222-bbbb-3333cccc4444 +IdentityTenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 IdentityType : SystemAssigned IdentityUserAssignedIdentity : { } diff --git a/azps-12.2.0/Az.Chaos/Update-AzChaosExperiment.md b/azps-12.2.0/Az.Chaos/Update-AzChaosExperiment.md index cfe8d4061e..322171be65 100644 --- a/azps-12.2.0/Az.Chaos/Update-AzChaosExperiment.md +++ b/azps-12.2.0/Az.Chaos/Update-AzChaosExperiment.md @@ -42,8 +42,8 @@ Update-AzChaosExperiment -Name experiment-test -ResourceGroupName azps_test_grou ```output Id : /subscriptions/{subId}/resourceGroups/azps_test_group_chaos/providers/Microsoft.Chaos/experiments/EXPERIMENT-TEST -IdentityPrincipalId : 72f14040-8265-4f10-b5ea-377c6fc2671c -IdentityTenantId : 72f988bf-86f1-41af-91ab-2d7cd011db47 +IdentityPrincipalId : 00001111-aaaa-2222-bbbb-3333cccc4444 +IdentityTenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 IdentityType : SystemAssigned IdentityUserAssignedIdentity : { } diff --git a/azps-12.2.0/Az.Compute/Set-AzVMOSDisk.md b/azps-12.2.0/Az.Compute/Set-AzVMOSDisk.md index a86b0112e3..2dfe210ea7 100644 --- a/azps-12.2.0/Az.Compute/Set-AzVMOSDisk.md +++ b/azps-12.2.0/Az.Compute/Set-AzVMOSDisk.md @@ -143,7 +143,7 @@ $cred = New-Object System.Management.Automation.PSCredential ($user, $securePass # Create Key Vault New-AzKeyVault -Name $keyVaultName -Location $Location -ResourceGroupName $ResourceGroupName -Sku Premium -EnablePurgeProtection -EnabledForDiskEncryption; -$cvmAgent = Get-AzADServicePrincipal -ApplicationId 'bf7b6499-ff71-4aa2-97a4-f372087be7f0'; +$cvmAgent = Get-AzADServicePrincipal -ApplicationId '00001111-aaaa-2222-bbbb-3333cccc4444'; Set-AzKeyVaultAccessPolicy -VaultName $keyVaultName -ResourceGroupName $ResourceGroupName -ObjectId $cvmAgent.id -PermissionsToKeys get,release; # Add Key vault Key diff --git a/azps-12.2.0/Az.Compute/Set-AzVmssSecurityProfile.md b/azps-12.2.0/Az.Compute/Set-AzVmssSecurityProfile.md index e7186893c3..4b9386508f 100644 --- a/azps-12.2.0/Az.Compute/Set-AzVmssSecurityProfile.md +++ b/azps-12.2.0/Az.Compute/Set-AzVmssSecurityProfile.md @@ -264,7 +264,7 @@ The second command sets the SecurityType enum to "TrustedLaunch". $keyVaultName = "kv" + $rgname; $keyName = "k" + $rgname; $desName = "des" + $rgname; - $cvmAgent = Get-AzADServicePrincipal -ApplicationId "bf7b6499-ff71-4aa2-97a4-f372087be7f0"; + $cvmAgent = Get-AzADServicePrincipal -ApplicationId "00001111-aaaa-2222-bbbb-3333cccc4444"; $kv = New-AzKeyVault -Name $keyVaultName -ResourceGroupName $rgName -Location $loc -Sku "Premium" -EnablePurgeProtection -SoftDeleteRetentionInDays 7; Set-AzKeyVaultAccessPolicy -ObjectId $cvmAgent.Id -VaultName $keyVaultName -ResourceGroupName $rgName -PermissionsToKeys "get","release"; Start-BitsTransfer -Source https://cvmprivatepreviewsa.blob.core.windows.net/cvmpublicpreviewcontainer/skr-policy.json -Destination ".\skr-policy.json"; diff --git a/azps-12.2.0/Az.ConfidentialLedger/New-AzConfidentialLedger.md b/azps-12.2.0/Az.ConfidentialLedger/New-AzConfidentialLedger.md index 41a096377e..78bf8604ef 100644 --- a/azps-12.2.0/Az.ConfidentialLedger/New-AzConfidentialLedger.md +++ b/azps-12.2.0/Az.ConfidentialLedger/New-AzConfidentialLedger.md @@ -36,8 +36,8 @@ New-AzConfidentialLedger ` -AadBasedSecurityPrincipal ` @{ LedgerRoleName="Administrator"; - PrincipalId="34621747-6fc8-4771-a2eb-72f31c461f2e"; - TenantId="bce123b9-2b7b-4975-8360-5ca0b9b1cd08" + PrincipalId="00001111-aaaa-2222-bbbb-3333cccc4444"; + TenantId="00001111-aaaa-2222-bbbb-3333cccc4444" } ` -CertBasedSecurityPrincipal ` @{ @@ -60,8 +60,8 @@ Creates a new Confidential Ledger. ```powershell $aadSecurityPrincipal = New-AzConfidentialLedgerAADBasedSecurityPrincipalObject ` -LedgerRoleName "Administrator" ` - -PrincipalId "34621747-6fc8-4771-a2eb-72f31c461f2e" ` - -TenantId "bce123b9-2b7b-4975-8360-5ca0b9b1cd08" + -PrincipalId "00001111-aaaa-2222-bbbb-3333cccc4444" ` + -TenantId "00001111-aaaa-2222-bbbb-3333cccc4444" $certSecurityPrincipal = New-AzConfidentialLedgerCertBasedSecurityPrincipalObject ` -Cert "-----BEGIN CERTIFICATE-----********************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************-----END CERTIFICATE-----" ` diff --git a/azps-12.2.0/Az.ConfidentialLedger/New-AzConfidentialLedgerAADBasedSecurityPrincipalObject.md b/azps-12.2.0/Az.ConfidentialLedger/New-AzConfidentialLedgerAADBasedSecurityPrincipalObject.md index acef5c206f..347628148c 100644 --- a/azps-12.2.0/Az.ConfidentialLedger/New-AzConfidentialLedgerAADBasedSecurityPrincipalObject.md +++ b/azps-12.2.0/Az.ConfidentialLedger/New-AzConfidentialLedgerAADBasedSecurityPrincipalObject.md @@ -28,14 +28,14 @@ Create an in-memory object for AADBasedSecurityPrincipal. ```powershell New-AzConfidentialLedgerAADBasedSecurityPrincipalObject ` -LedgerRoleName "Administrator" ` - -PrincipalId "34621747-6fc8-4771-a2eb-72f31c461f2e" ` - -TenantId "bce123b9-2b7b-4975-8360-5ca0b9b1cd08" + -PrincipalId "00001111-aaaa-2222-bbbb-3333cccc4444" ` + -TenantId "00001111-aaaa-2222-bbbb-3333cccc4444" ``` ```output LedgerRoleName PrincipalId TenantId -------------- ----------- -------- -Administrator 34621747-6fc8-4771-a2eb-72f31c461f2e bce123b9-2b7b-4975-8360-5ca0b9b1cd08 +Administrator 00001111-aaaa-2222-bbbb-3333cccc4444 00001111-aaaa-2222-bbbb-3333cccc4444 ``` Creates an AadBasedSecurityPrincipalObject that may be used for `Az.ConfidentialLedger` commands. diff --git a/azps-12.2.0/Az.ConfidentialLedger/Update-AzConfidentialLedger.md b/azps-12.2.0/Az.ConfidentialLedger/Update-AzConfidentialLedger.md index 8ebbf25f7b..3845192d7f 100644 --- a/azps-12.2.0/Az.ConfidentialLedger/Update-AzConfidentialLedger.md +++ b/azps-12.2.0/Az.ConfidentialLedger/Update-AzConfidentialLedger.md @@ -46,8 +46,8 @@ Update-AzConfidentialLedger ` -AadBasedSecurityPrincipal ` @{ LedgerRoleName="Administrator"; - PrincipalId="34621747-6fc8-4771-a2eb-72f31c461f2e"; - TenantId="bce123b9-2b7b-4975-8360-5ca0b9b1cd08" + PrincipalId="00001111-aaaa-2222-bbbb-3333cccc4444"; + TenantId="00001111-aaaa-2222-bbbb-3333cccc4444" } ` -CertBasedSecurityPrincipal ` @{ diff --git a/azps-12.2.0/Az.ConnectedVMware/New-AzConnectedVMwareVM.md b/azps-12.2.0/Az.ConnectedVMware/New-AzConnectedVMwareVM.md index cd710cc1cc..a118cf18d8 100644 --- a/azps-12.2.0/Az.ConnectedVMware/New-AzConnectedVMwareVM.md +++ b/azps-12.2.0/Az.ConnectedVMware/New-AzConnectedVMwareVM.md @@ -50,11 +50,11 @@ Please note some properties can be set only during virtual machine instance crea ### Example 1: Create Virtual Machine Instances on the given Resource Pool ```powershell -New-AzConnectedVMwareVM -ExtendedLocationName "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourcegroups/test-rg/providers/microsoft.extendedlocation/customlocations/test-cl" -ExtendedLocationType "CustomLocation" -InfrastructureProfileTemplateId "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/virtualMachineTemplates/test-vmtmpl" -InfrastructureProfileVCenterId "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/vcenters/test-vc" -PlacementProfileResourcePoolId "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/resourcepools/test-rp" -MachineId "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.HybridCompute/machines/test-machine" +New-AzConnectedVMwareVM -ExtendedLocationName "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourcegroups/test-rg/providers/microsoft.extendedlocation/customlocations/test-cl" -ExtendedLocationType "CustomLocation" -InfrastructureProfileTemplateId "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/virtualMachineTemplates/test-vmtmpl" -InfrastructureProfileVCenterId "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/vcenters/test-vc" -PlacementProfileResourcePoolId "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/resourcepools/test-rp" -MachineId "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.HybridCompute/machines/test-machine" ``` ```output -ExtendedLocationName : /subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourcegroups/test-rg/providers/microsoft.extendedlocation/customlocations/test-cl +ExtendedLocationName : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourcegroups/test-rg/providers/microsoft.extendedlocation/customlocations/test-cl ExtendedLocationType : CustomLocation HardwareProfileCpuHotAddEnabled : True HardwareProfileCpuHotRemoveEnabled : False @@ -62,7 +62,7 @@ HardwareProfileMemoryHotAddEnabled : True HardwareProfileMemorySizeMb : 1024 HardwareProfileNumCoresPerSocket : 1 HardwareProfileNumCpUs : 1 -Id : /subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.HybridCompute/machines/test-machine/providers/Microsoft.ConnectedVMwarevSphere/virtualMachineInstances/default +Id : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.HybridCompute/machines/test-machine/providers/Microsoft.ConnectedVMwarevSphere/virtualMachineInstances/default InfrastructureProfileCustomResourceName : d04a3534-2dfa-42c8-8959-83796a1bcac1 InfrastructureProfileFirmwareType : bios InfrastructureProfileFolderPath : ArcPrivateClouds-67 @@ -71,8 +71,8 @@ InfrastructureProfileInventoryItemId : InfrastructureProfileMoName : test-machine InfrastructureProfileMoRefId : vm-1529269 InfrastructureProfileSmbiosUuid : 4215b305-5f69-959b-0620-16a5bd8c5fc9 -InfrastructureProfileTemplateId : /subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/virtualMachineTemplates/test-vmtmpl -InfrastructureProfileVCenterId : /subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/vcenters/test-vc +InfrastructureProfileTemplateId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/virtualMachineTemplates/test-vmtmpl +InfrastructureProfileVCenterId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/vcenters/test-vc Name : default NetworkProfileNetworkInterface : {{ "ipSettings": { @@ -81,7 +81,7 @@ NetworkProfileNetworkInterface : {{ "name": "nic_1", "label": "Network adapter 1", "macAddress": "00:50:56:95:ec:bc", - "networkId": "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/VirtualNetworks/test-vnet", + "networkId": "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/VirtualNetworks/test-vnet", "nicType": "vmxnet3", "powerOnBoot": "enabled", "networkMoRefId": "network-563661", @@ -100,7 +100,7 @@ OSProfileToolsVersionStatus : guestToolsUnmanaged PlacementProfileClusterId : PlacementProfileDatastoreId : PlacementProfileHostId : -PlacementProfileResourcePoolId : /subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/ResourcePools/test-rp +PlacementProfileResourcePoolId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/ResourcePools/test-rp PowerState : poweredOn ProvisioningState : Succeeded ResourceGroupName : test-rg @@ -149,11 +149,11 @@ This command create a VM Instances of machine named `test-machine` in a resource ### Example 2: Create Virtual Machine Instances on the given Cluster ```powershell -New-AzConnectedVMwareVM -ExtendedLocationName "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourcegroups/test-rg/providers/microsoft.extendedlocation/customlocations/test-cl" -ExtendedLocationType "CustomLocation" -InfrastructureProfileTemplateId "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/virtualMachineTemplates/test-vmtmpl" -InfrastructureProfileVCenterId "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/vcenters/test-vc" -PlacementProfileClusterId "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/clusters/test-cluster" -MachineId "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.HybridCompute/machines/test-machine" +New-AzConnectedVMwareVM -ExtendedLocationName "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourcegroups/test-rg/providers/microsoft.extendedlocation/customlocations/test-cl" -ExtendedLocationType "CustomLocation" -InfrastructureProfileTemplateId "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/virtualMachineTemplates/test-vmtmpl" -InfrastructureProfileVCenterId "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/vcenters/test-vc" -PlacementProfileClusterId "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/clusters/test-cluster" -MachineId "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.HybridCompute/machines/test-machine" ``` ```output -ExtendedLocationName : /subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourcegroups/test-rg/providers/microsoft.extendedlocation/customlocations/test-cl +ExtendedLocationName : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourcegroups/test-rg/providers/microsoft.extendedlocation/customlocations/test-cl ExtendedLocationType : CustomLocation HardwareProfileCpuHotAddEnabled : True HardwareProfileCpuHotRemoveEnabled : False @@ -161,7 +161,7 @@ HardwareProfileMemoryHotAddEnabled : True HardwareProfileMemorySizeMb : 1024 HardwareProfileNumCoresPerSocket : 1 HardwareProfileNumCpUs : 1 -Id : /subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.HybridCompute/machines/test-machine/providers/Microsoft.ConnectedVMwarevSphere/virtualMachineInstances/default +Id : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.HybridCompute/machines/test-machine/providers/Microsoft.ConnectedVMwarevSphere/virtualMachineInstances/default InfrastructureProfileCustomResourceName : d04a3534-2dfa-42c8-8959-83796a1bcac1 InfrastructureProfileFirmwareType : bios InfrastructureProfileFolderPath : ArcPrivateClouds-67 @@ -170,8 +170,8 @@ InfrastructureProfileInventoryItemId : InfrastructureProfileMoName : test-machine InfrastructureProfileMoRefId : vm-1529269 InfrastructureProfileSmbiosUuid : 4215b305-5f69-959b-0620-16a5bd8c5fc9 -InfrastructureProfileTemplateId : /subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/virtualMachineTemplates/test-vmtmpl -InfrastructureProfileVCenterId : /subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/vcenters/test-vc +InfrastructureProfileTemplateId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/virtualMachineTemplates/test-vmtmpl +InfrastructureProfileVCenterId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/vcenters/test-vc Name : default NetworkProfileNetworkInterface : {{ "ipSettings": { @@ -180,7 +180,7 @@ NetworkProfileNetworkInterface : {{ "name": "nic_1", "label": "Network adapter 1", "macAddress": "00:50:56:95:ec:bc", - "networkId": "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/VirtualNetworks/test-vnet", + "networkId": "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/VirtualNetworks/test-vnet", "nicType": "vmxnet3", "powerOnBoot": "enabled", "networkMoRefId": "network-563661", @@ -196,7 +196,7 @@ OSProfileOstype : Linux OSProfileToolsRunningStatus : guestToolsNotRunning OSProfileToolsVersion : 10304 OSProfileToolsVersionStatus : guestToolsUnmanaged -PlacementProfileClusterId : /subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/Clusters/test-cluster +PlacementProfileClusterId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/Clusters/test-cluster PlacementProfileDatastoreId : PlacementProfileHostId : PlacementProfileResourcePoolId : @@ -248,11 +248,11 @@ This command create a VM Instances of machine named `test-machine` in a resource ### Example 3: Create Virtual Machine on the given Host ```powershell -New-AzConnectedVMwareVM -ExtendedLocationName "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourcegroups/test-rg/providers/microsoft.extendedlocation/customlocations/test-cl" -ExtendedLocationType "CustomLocation" -InfrastructureProfileTemplateId "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/virtualMachineTemplates/test-vmtmpl" -InfrastructureProfileVCenterId "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/vcenters/test-vc" -PlacementProfileHostId "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/hosts/test-host" -MachineId "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.HybridCompute/machines/test-machine" +New-AzConnectedVMwareVM -ExtendedLocationName "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourcegroups/test-rg/providers/microsoft.extendedlocation/customlocations/test-cl" -ExtendedLocationType "CustomLocation" -InfrastructureProfileTemplateId "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/virtualMachineTemplates/test-vmtmpl" -InfrastructureProfileVCenterId "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/vcenters/test-vc" -PlacementProfileHostId "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/hosts/test-host" -MachineId "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.HybridCompute/machines/test-machine" ``` ```output -ExtendedLocationName : /subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourcegroups/test-rg/providers/microsoft.extendedlocation/customlocations/test-cl +ExtendedLocationName : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourcegroups/test-rg/providers/microsoft.extendedlocation/customlocations/test-cl ExtendedLocationType : CustomLocation HardwareProfileCpuHotAddEnabled : True HardwareProfileCpuHotRemoveEnabled : False @@ -260,7 +260,7 @@ HardwareProfileMemoryHotAddEnabled : True HardwareProfileMemorySizeMb : 1024 HardwareProfileNumCoresPerSocket : 1 HardwareProfileNumCpUs : 1 -Id : /subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.HybridCompute/machines/test-machine/providers/Microsoft.ConnectedVMwarevSphere/virtualMachineInstances/default +Id : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.HybridCompute/machines/test-machine/providers/Microsoft.ConnectedVMwarevSphere/virtualMachineInstances/default InfrastructureProfileCustomResourceName : d04a3534-2dfa-42c8-8959-83796a1bcac1 InfrastructureProfileFirmwareType : bios InfrastructureProfileFolderPath : ArcPrivateClouds-67 @@ -269,8 +269,8 @@ InfrastructureProfileInventoryItemId : InfrastructureProfileMoName : test-machine InfrastructureProfileMoRefId : vm-1529269 InfrastructureProfileSmbiosUuid : 4215b305-5f69-959b-0620-16a5bd8c5fc9 -InfrastructureProfileTemplateId : /subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/virtualMachineTemplates/test-vmtmpl -InfrastructureProfileVCenterId : /subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/vcenters/test-vc +InfrastructureProfileTemplateId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/virtualMachineTemplates/test-vmtmpl +InfrastructureProfileVCenterId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/vcenters/test-vc Name : default NetworkProfileNetworkInterface : {{ "ipSettings": { @@ -279,7 +279,7 @@ NetworkProfileNetworkInterface : {{ "name": "nic_1", "label": "Network adapter 1", "macAddress": "00:50:56:95:ec:bc", - "networkId": "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/VirtualNetworks/test-vnet", + "networkId": "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/VirtualNetworks/test-vnet", "nicType": "vmxnet3", "powerOnBoot": "enabled", "networkMoRefId": "network-563661", @@ -297,7 +297,7 @@ OSProfileToolsVersion : 10304 OSProfileToolsVersionStatus : guestToolsUnmanaged PlacementProfileClusterId : PlacementProfileDatastoreId : -PlacementProfileHostId : /subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/Hosts/test-host +PlacementProfileHostId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/Hosts/test-host PlacementProfileResourcePoolId : PowerState : poweredOn ProvisioningState : Succeeded @@ -347,11 +347,11 @@ This command create a VM Instances of machine named `test-machine` in a resource ### Example 4: Create Virtual Machine with a VM Inventory ```powershell -New-AzConnectedVMwareVM -ExtendedLocationName "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourcegroups/test-rg/providers/microsoft.extendedlocation/customlocations/test-cl" -ExtendedLocationType "CustomLocation" -InfrastructureProfileInventoryItemId "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/VCenters/test-vc/InventoryItems/vm-1528583" -MachineId "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.HybridCompute/machines/test-machine-ps" +New-AzConnectedVMwareVM -ExtendedLocationName "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourcegroups/test-rg/providers/microsoft.extendedlocation/customlocations/test-cl" -ExtendedLocationType "CustomLocation" -InfrastructureProfileInventoryItemId "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/VCenters/test-vc/InventoryItems/vm-1528583" -MachineId "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.HybridCompute/machines/test-machine-ps" ``` ```output -ExtendedLocationName : /subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourcegroups/test-rg/providers/microsoft.extendedlocation/customlocations/test-cl +ExtendedLocationName : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourcegroups/test-rg/providers/microsoft.extendedlocation/customlocations/test-cl ExtendedLocationType : CustomLocation HardwareProfileCpuHotAddEnabled : False HardwareProfileCpuHotRemoveEnabled : False @@ -359,17 +359,17 @@ HardwareProfileMemoryHotAddEnabled : False HardwareProfileMemorySizeMb : 8192 HardwareProfileNumCoresPerSocket : 1 HardwareProfileNumCpUs : 4 -Id : /subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.HybridCompute/machines/test-machine-ps/providers/Microsoft.ConnectedVMwarevSphere/virtualMachineInstances/default +Id : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.HybridCompute/machines/test-machine-ps/providers/Microsoft.ConnectedVMwarevSphere/virtualMachineInstances/default InfrastructureProfileCustomResourceName : 9d8766c2-6e02-4553-8ae2-7c37a19cb45b InfrastructureProfileFirmwareType : bios InfrastructureProfileFolderPath : ArcPrivateClouds-67/test-folder InfrastructureProfileInstanceUuid : 5015d462-e12c-623f-45ad-ddfecc541d51 -InfrastructureProfileInventoryItemId : /subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/VCenters/test-vc/InventoryItems/vm-1528583 +InfrastructureProfileInventoryItemId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/VCenters/test-vc/InventoryItems/vm-1528583 InfrastructureProfileMoName : test-ps-vm InfrastructureProfileMoRefId : vm-1528583 InfrastructureProfileSmbiosUuid : 421532ab-22b5-67b4-41fd-829f0e7355b9 InfrastructureProfileTemplateId : -InfrastructureProfileVCenterId : /subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/VCenters/test-vc +InfrastructureProfileVCenterId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/VCenters/test-vc Name : default NetworkProfileNetworkInterface : {{ "ipSettings": { diff --git a/azps-12.2.0/Az.CustomLocation/New-AzCustomLocation.md b/azps-12.2.0/Az.CustomLocation/New-AzCustomLocation.md index 92d01547fa..142308c16a 100644 --- a/azps-12.2.0/Az.CustomLocation/New-AzCustomLocation.md +++ b/azps-12.2.0/Az.CustomLocation/New-AzCustomLocation.md @@ -75,8 +75,8 @@ HostResourceId : /subscriptions/11111111-2222-3333-4444-1234567891 HostType : Kubernetes Id : /subscriptions/11111111-2222-3333-4444-123456789101/resourcegroups/group01/providers/microsoft.extendedlocation/customlocations/az ps-customlocation -IdentityPrincipalId : 11111111-2222-3333-4444-123456789123 -IdentityTenantId : 11111111-2222-3333-4444-123456789876 +IdentityPrincipalId : 00001111-aaaa-2222-bbbb-3333cccc4444 +IdentityTenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 IdentityType : SystemAssigned Location : eastus Name : azps-customlocation diff --git a/azps-12.2.0/Az.DataProtection/Get-AzDataProtectionBackupVault.md b/azps-12.2.0/Az.DataProtection/Get-AzDataProtectionBackupVault.md index 372eb3f535..5d48b1ac57 100644 --- a/azps-12.2.0/Az.DataProtection/Get-AzDataProtectionBackupVault.md +++ b/azps-12.2.0/Az.DataProtection/Get-AzDataProtectionBackupVault.md @@ -113,7 +113,7 @@ CmkInfrastructureEncryption : Enabled CmkKeyVaultProperty : Microsoft.Azure.PowerShell.Cmdlets.DataProtection.Models.Api20240401.CmkKeyVaultProperties State : Enabled -IdentityId : /subscriptions/191973cd-9c54-41e0-ac19-25dd9a92d5a8/resourcegroups/jeevan-wrk-vms/providers/Microsoft.ManagedIdentity/userAssignedIdentities +IdentityId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourcegroups/jeevan-wrk-vms/providers/Microsoft.ManagedIdentity/userAssignedIdentities /userMSIpstest IdentityType : UserAssigned diff --git a/azps-12.2.0/Az.Databricks/New-AzDatabricksWorkspaceProviderAuthorizationObject.md b/azps-12.2.0/Az.Databricks/New-AzDatabricksWorkspaceProviderAuthorizationObject.md index 7876c10624..04d1050a5d 100644 --- a/azps-12.2.0/Az.Databricks/New-AzDatabricksWorkspaceProviderAuthorizationObject.md +++ b/azps-12.2.0/Az.Databricks/New-AzDatabricksWorkspaceProviderAuthorizationObject.md @@ -26,13 +26,13 @@ Create an in-memory object for WorkspaceProviderAuthorization. ### Example 1: Create an in-memory object for WorkspaceProviderAuthorization. ```powershell -New-AzDatabricksWorkspaceProviderAuthorizationObject -PrincipalId 024d7367-0890-4ad3-8140-e37374722820 -RoleDefinitionId 2124844c-7e23-48cc-bc52-a3af25f7a4ae +New-AzDatabricksWorkspaceProviderAuthorizationObject -PrincipalId 00001111-aaaa-2222-bbbb-3333cccc4444 -RoleDefinitionId 2124844c-7e23-48cc-bc52-a3af25f7a4ae ``` ```output PrincipalId RoleDefinitionId ----------- ---------------- -024d7367-0890-4ad3-8140-e37374722820 2124844c-7e23-48cc-bc52-a3af25f7a4ae +00001111-aaaa-2222-bbbb-3333cccc4444 2124844c-7e23-48cc-bc52-a3af25f7a4ae ``` Create an in-memory object for WorkspaceProviderAuthorization. diff --git a/azps-12.2.0/Az.Fleet/New-AzFleet.md b/azps-12.2.0/Az.Fleet/New-AzFleet.md index baf5ce9f33..500738396a 100644 --- a/azps-12.2.0/Az.Fleet/New-AzFleet.md +++ b/azps-12.2.0/Az.Fleet/New-AzFleet.md @@ -86,8 +86,8 @@ New-AzFleet -Name testfleet02 -ResourceGroupName joyer-test -Location eastus -Ta ```output ETag : "0a006dc9-0000-0100-0000-661cd4f70000" Id : /subscriptions/9e223dbe-3399-4e19-88eb-0975f02ac87f/resourceGroups/joyer-test/providers/Microsoft.ContainerService/fleets/testfleet02 -IdentityPrincipalId : 978528a9-fa0f-4cdb-8282-95b3b30bb883 -IdentityTenantId : 72f988bf-86f1-41af-91ab-2d7cd011db47 +IdentityPrincipalId : 00001111-aaaa-2222-bbbb-3333cccc4444 +IdentityTenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 IdentityType : SystemAssigned IdentityUserAssignedIdentity : { } diff --git a/azps-12.2.0/Az.FluidRelay/New-AzFluidRelayServer.md b/azps-12.2.0/Az.FluidRelay/New-AzFluidRelayServer.md index c2d889f0d8..0a7d840eb1 100644 --- a/azps-12.2.0/Az.FluidRelay/New-AzFluidRelayServer.md +++ b/azps-12.2.0/Az.FluidRelay/New-AzFluidRelayServer.md @@ -30,7 +30,7 @@ Create or Update a Fluid Relay server. ### Example 1: Create or Update a Fluid Relay server. ```powershell -New-AzFluidRelayServer -Name azps-fluidrelay -ResourceGroup azpstest-gp -Location westus2 -Storagesku 'basic' -ProvisioningState 'Succeeded' -IdentityUserAssignedIdentity @{"/subscriptions/9e223dbe-3399-4e19-88eb-0975f02ac87f/resourcegroups/azpstest-gp/providers/Microsoft.ManagedIdentity/userAssignedIdentities/azpstest-uami" = @{};} -IdentityType 'UserAssigned' -KeyEncryptionKeyIdentityUserAssignedIdentityResourceId "/subscriptions/9e223dbe-3399-4e19-88eb-0975f02ac87f/resourcegroups/azpstest-gp/providers/Microsoft.ManagedIdentity/userAssignedIdentities/azpstest-uami" -KeyEncryptionKeyIdentityType 'SystemAssigned' +New-AzFluidRelayServer -Name azps-fluidrelay -ResourceGroup azpstest-gp -Location westus2 -Storagesku 'basic' -ProvisioningState 'Succeeded' -IdentityUserAssignedIdentity @{"/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourcegroups/azpstest-gp/providers/Microsoft.ManagedIdentity/userAssignedIdentities/azpstest-uami" = @{};} -IdentityType 'UserAssigned' -KeyEncryptionKeyIdentityUserAssignedIdentityResourceId "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourcegroups/azpstest-gp/providers/Microsoft.ManagedIdentity/userAssignedIdentities/azpstest-uami" -KeyEncryptionKeyIdentityType 'SystemAssigned' ``` ```output diff --git a/azps-12.2.0/Az.FluidRelay/Update-AzFluidRelayServer.md b/azps-12.2.0/Az.FluidRelay/Update-AzFluidRelayServer.md index 5a98a21ba7..2f4ca1b783 100644 --- a/azps-12.2.0/Az.FluidRelay/Update-AzFluidRelayServer.md +++ b/azps-12.2.0/Az.FluidRelay/Update-AzFluidRelayServer.md @@ -39,7 +39,7 @@ Update a Fluid Relay server. ### Example 1: Update a Fluid Relay server. ```powershell -Update-AzFluidRelayServer -Name azps-fluidrelay -ResourceGroup azpstest-gp -KeyEncryptionKeyIdentityUserAssignedIdentityResourceId "/subscriptions/9e223dbe-3399-4e19-88eb-0975f02ac87f/resourcegroups/azpstest-gp/providers/Microsoft.ManagedIdentity/userAssignedIdentities/azpstest-uami" -KeyEncryptionKeyIdentityType 'SystemAssigned' -Tag @{"Category"="sales"} -IdentityUserAssignedIdentity @{"/subscriptions/9e223dbe-3399-4e19-88eb-0975f02ac87f/resourcegroups/azpstest-gp/providers/Microsoft.ManagedIdentity/userAssignedIdentities/azpstest-uami" = @{};} -IdentityType 'UserAssigned' +Update-AzFluidRelayServer -Name azps-fluidrelay -ResourceGroup azpstest-gp -KeyEncryptionKeyIdentityUserAssignedIdentityResourceId "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourcegroups/azpstest-gp/providers/Microsoft.ManagedIdentity/userAssignedIdentities/azpstest-uami" -KeyEncryptionKeyIdentityType 'SystemAssigned' -Tag @{"Category"="sales"} -IdentityUserAssignedIdentity @{"/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourcegroups/azpstest-gp/providers/Microsoft.ManagedIdentity/userAssignedIdentities/azpstest-uami" = @{};} -IdentityType 'UserAssigned' ``` ```output diff --git a/azps-12.2.0/Az.HanaOnAzure/New-AzSapMonitorProviderInstance.md b/azps-12.2.0/Az.HanaOnAzure/New-AzSapMonitorProviderInstance.md index aa01fb448c..1ee97e8de4 100644 --- a/azps-12.2.0/Az.HanaOnAzure/New-AzSapMonitorProviderInstance.md +++ b/azps-12.2.0/Az.HanaOnAzure/New-AzSapMonitorProviderInstance.md @@ -62,7 +62,7 @@ This command creates an instance of SAP monitor by string for HANA. ### Example 2: Create an instance of SAP monitor by key vault for HANA ```powershell -New-AzSapMonitorProviderInstance -ResourceGroupName nancyc-hn1 -SapMonitorName sapMonitor-vayh7q-test -ProviderType SapHana -HanaHostname 'hdb1-0' -HanaDatabaseName 'SYSTEMDB' -HanaDatabaseSqlPort 30015 -HanaDatabaseUsername SYSTEM -HanaDatabasePasswordSecretId https://kv-9gosjc-test.vault.azure.net/secrets/hanaPassword/bf516d1dfcc144138e5cf55114f3344b -HanaDatabasePasswordKeyVaultResourceId /subscriptions/9e223dbe-3399-4e19-88eb-0975f02ac87f/resourceGroups/costmanagement-rg-8p50xe/providers/Microsoft.KeyVault/vaults/kv-9gosjc-test -Name sapins-kv-test +New-AzSapMonitorProviderInstance -ResourceGroupName nancyc-hn1 -SapMonitorName sapMonitor-vayh7q-test -ProviderType SapHana -HanaHostname 'hdb1-0' -HanaDatabaseName 'SYSTEMDB' -HanaDatabaseSqlPort 30015 -HanaDatabaseUsername SYSTEM -HanaDatabasePasswordSecretId https://kv-9gosjc-test.vault.azure.net/secrets/hanaPassword/bf516d1dfcc144138e5cf55114f3344b -HanaDatabasePasswordKeyVaultResourceId /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/costmanagement-rg-8p50xe/providers/Microsoft.KeyVault/vaults/kv-9gosjc-test -Name sapins-kv-test ``` ```output diff --git a/azps-12.2.0/Az.KeyVault/Add-AzKeyVaultKey.md b/azps-12.2.0/Az.KeyVault/Add-AzKeyVaultKey.md index 03d8a11f3c..6f501245ec 100644 --- a/azps-12.2.0/Az.KeyVault/Add-AzKeyVaultKey.md +++ b/azps-12.2.0/Az.KeyVault/Add-AzKeyVaultKey.md @@ -397,7 +397,7 @@ Create a secure key in managed hsm named testmhsm. Its name is test-key and type ### Example 10: Add a key for a Confidential VM to a key vault. ```powershell New-AzKeyVault -Name $keyVaultName -Location $location -ResourceGroupName $resourceGroupName -Sku Premium -EnablePurgeProtection -EnabledForDiskEncryption; -$cvmAgent = Get-AzADServicePrincipal -ApplicationId 'bf7b6499-ff71-4aa2-97a4-f372087be7f0'; +$cvmAgent = Get-AzADServicePrincipal -ApplicationId '00001111-aaaa-2222-bbbb-3333cccc4444'; Set-AzKeyVaultAccessPolicy -VaultName $keyVaultName -ResourceGroupName $resourceGroupName -ObjectId $cvmAgent.id -PermissionsToKeys get,release; $keySize = 3072; diff --git a/azps-12.2.0/Az.KeyVault/New-AzKeyVaultManagedHsm.md b/azps-12.2.0/Az.KeyVault/New-AzKeyVaultManagedHsm.md index 74669fb6da..4d930c068b 100644 --- a/azps-12.2.0/Az.KeyVault/New-AzKeyVaultManagedHsm.md +++ b/azps-12.2.0/Az.KeyVault/New-AzKeyVaultManagedHsm.md @@ -73,7 +73,7 @@ Location : eastus2euap Resource ID : /subscriptions/0b1f6471-1bf0-4dda-aec3-cb9272f09590/resourceGroups/bez-rg/pro viders/Microsoft.KeyVault/managedHSMs/bezmhsm HSM Pool URI : -Tenant ID : 54826b22-38d6-4fb2-bad9-b7b93a3e9c5a +Tenant ID : 00001111-aaaa-2222-bbbb-3333cccc4444 Initial Admin Object Ids : {xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx} SKU : StandardB1 Soft Delete Enabled? : True diff --git a/azps-12.2.0/Az.Kusto/New-AzKustoClusterPrincipalAssignment.md b/azps-12.2.0/Az.Kusto/New-AzKustoClusterPrincipalAssignment.md index 027d6d548d..b681db0042 100644 --- a/azps-12.2.0/Az.Kusto/New-AzKustoClusterPrincipalAssignment.md +++ b/azps-12.2.0/Az.Kusto/New-AzKustoClusterPrincipalAssignment.md @@ -29,7 +29,7 @@ Create a Kusto cluster principalAssignment. ### Example 1: Create a Kusto cluster principalAssignment ```powershell -New-AzKustoClusterPrincipalAssignment -ResourceGroupName testrg -ClusterName testnewkustocluster -PrincipalAssignmentName kustoprincipal1 -PrincipalId "7e1cb39f-d2cb-4f0d-801a-c9ea1f376e96" -PrincipalType App -Role AllDatabasesAdmin +New-AzKustoClusterPrincipalAssignment -ResourceGroupName testrg -ClusterName testnewkustocluster -PrincipalAssignmentName kustoprincipal1 -PrincipalId "00001111-aaaa-2222-bbbb-3333cccc4444" -PrincipalType App -Role AllDatabasesAdmin ``` ```output diff --git a/azps-12.2.0/Az.Kusto/New-AzKustoDatabasePrincipalAssignment.md b/azps-12.2.0/Az.Kusto/New-AzKustoDatabasePrincipalAssignment.md index d5263209a1..07db2c7aa4 100644 --- a/azps-12.2.0/Az.Kusto/New-AzKustoDatabasePrincipalAssignment.md +++ b/azps-12.2.0/Az.Kusto/New-AzKustoDatabasePrincipalAssignment.md @@ -29,7 +29,7 @@ Creates a Kusto cluster database principalAssignment. ### Example 1: Create a Kusto cluster database principalAssignment ```powershell -New-AzKustoDatabasePrincipalAssignment -ResourceGroupName testrg -ClusterName testnewkustocluster -DatabaseName mykustodatabase -PrincipalAssignmentName kustoprincipal1 -PrincipalId "7e1cb39f-d2cb-4f0d-801a-c9ea1f376e96" -PrincipalType App -Role Admin +New-AzKustoDatabasePrincipalAssignment -ResourceGroupName testrg -ClusterName testnewkustocluster -DatabaseName mykustodatabase -PrincipalAssignmentName kustoprincipal1 -PrincipalId "00001111-aaaa-2222-bbbb-3333cccc4444" -PrincipalType App -Role Admin ``` ```output diff --git a/azps-12.2.0/Az.LogicApp/Get-AzLogicAppRunHistory.md b/azps-12.2.0/Az.LogicApp/Get-AzLogicAppRunHistory.md index 7034de1d36..86ffabaf28 100644 --- a/azps-12.2.0/Az.LogicApp/Get-AzLogicAppRunHistory.md +++ b/azps-12.2.0/Az.LogicApp/Get-AzLogicAppRunHistory.md @@ -40,7 +40,7 @@ Get-AzLogicAppRunHistory -ResourceGroupName "Resourcegroup11" -Name "LogicApp03" ``` ```output -CorrelationId : 55830326-9042-404d-a4c3-fab198106a57 +CorrelationId : 00001111-aaaa-2222-bbbb-3333cccc4444 EndTime : 1/13/2016 2:46:55 PM Error : {code, message} Name : 08587489104702792076 @@ -51,7 +51,7 @@ TriggerName : LogicAppName : LogicApp03 LogicAppVersion : 08587489107859952540 -CorrelationId : d3ddc917-9aaa-47b3-8814-c621c2ae530b +CorrelationId : 00001111-aaaa-2222-bbbb-3333cccc4444 EndTime : 1/13/2016 2:42:56 PM Error : {code, message} Name : 08587489107100664541 @@ -72,7 +72,7 @@ Get-AzLogicAppRunHistory -ResourceGroupName "Resourcegroup11" -Name "LogicApp03" ``` ```output -CorrelationId : 55830326-9042-404d-a4c3-fab198106a57 +CorrelationId : 00001111-aaaa-2222-bbbb-3333cccc4444 EndTime : 1/13/2016 2:46:55 PM Error : {code, message} Name : 08587489104702792076 diff --git a/azps-12.2.0/Az.ManagedNetworkFabric/New-AzNetworkFabricL3Domain.md b/azps-12.2.0/Az.ManagedNetworkFabric/New-AzNetworkFabricL3Domain.md index 99090bf5be..44a60c2783 100644 --- a/azps-12.2.0/Az.ManagedNetworkFabric/New-AzNetworkFabricL3Domain.md +++ b/azps-12.2.0/Az.ManagedNetworkFabric/New-AzNetworkFabricL3Domain.md @@ -47,8 +47,8 @@ Create isolation domain resources for layer 3 connectivity between compute nodes ```powershell $connectedSubnetRoutePolicy = @{ ExportRoutePolicy = @(@{ - ExportIpv4RoutePolicyId = "/subscriptions/9531faa8-8c39-4165-b033-48697fe943db/resourceGroups/nfa-tool-ts-powershell-rg092123/providers/Microsoft.ManagedNetworkFabric/routePolicies/RoutePolicyName" - ExportIpv6RoutePolicyId = "/subscriptions/9531faa8-8c39-4165-b033-48697fe943db/resourceGroups/nfa-tool-ts-powershell-rg092123/providers/Microsoft.ManagedNetworkFabric/routePolicies/RoutePolicyName" + ExportIpv4RoutePolicyId = "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/nfa-tool-ts-powershell-rg092123/providers/Microsoft.ManagedNetworkFabric/routePolicies/RoutePolicyName" + ExportIpv6RoutePolicyId = "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/nfa-tool-ts-powershell-rg092123/providers/Microsoft.ManagedNetworkFabric/routePolicies/RoutePolicyName" }) } $aggregateRouteConfiguration = @{ diff --git a/azps-12.2.0/Az.ManagementPartner/Get-AzManagementPartner.md b/azps-12.2.0/Az.ManagementPartner/Get-AzManagementPartner.md index fd8c4bb2ca..a884c3bc8d 100644 --- a/azps-12.2.0/Az.ManagementPartner/Get-AzManagementPartner.md +++ b/azps-12.2.0/Az.ManagementPartner/Get-AzManagementPartner.md @@ -31,7 +31,7 @@ Get-AzManagementPartner ```output PartnerId : 4977985 PartnerName : Test_Test_DPORTest -TenantId : 1b1121dd-6900-412a-af73-e8d44f81e1c1 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 ObjectId : aa67f786-0552-423e-8849-244ed12bf581 State : Active ``` @@ -46,7 +46,7 @@ Get-AzManagementPartner -PartnerId 4977985 ```output PartnerId : 4977985 PartnerName : Test_Test_DPORTest -TenantId : 1b1121dd-6900-412a-af73-e8d44f81e1c1 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 ObjectId : aa67f786-0552-423e-8849-244ed12bf581 State : Active ``` @@ -104,4 +104,4 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable [New-AzManagementPartner](./New-AzManagementPartner.md) -[Update-AzManagementPartner](./Update-AzManagementPartner.md) \ No newline at end of file +[Update-AzManagementPartner](./Update-AzManagementPartner.md) diff --git a/azps-12.2.0/Az.ManagementPartner/New-AzManagementPartner.md b/azps-12.2.0/Az.ManagementPartner/New-AzManagementPartner.md index 344fed201c..cb2d17fbd9 100644 --- a/azps-12.2.0/Az.ManagementPartner/New-AzManagementPartner.md +++ b/azps-12.2.0/Az.ManagementPartner/New-AzManagementPartner.md @@ -32,7 +32,7 @@ New-AzManagementPartner -PartnerId 4977985 ```output PartnerId : 4977985 PartnerName : Test_Test_DPORTest -TenantId : 1b1121dd-6900-412a-af73-e8d44f81e1c1 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 ObjectId : aa67f786-0552-423e-8849-244ed12bf581 State : Active ``` @@ -121,4 +121,4 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable [Get-AzManagementPartner](./Get-AzManagementPartner.md) -[Update-AzManagementPartner](./Update-AzManagementPartner.md) \ No newline at end of file +[Update-AzManagementPartner](./Update-AzManagementPartner.md) diff --git a/azps-12.2.0/Az.ManagementPartner/Update-AzManagementPartner.md b/azps-12.2.0/Az.ManagementPartner/Update-AzManagementPartner.md index f742eb1f8e..3341f795d3 100644 --- a/azps-12.2.0/Az.ManagementPartner/Update-AzManagementPartner.md +++ b/azps-12.2.0/Az.ManagementPartner/Update-AzManagementPartner.md @@ -32,7 +32,7 @@ Update-AzManagementPartner -PartnerId 4977985 ```output PartnerId : 4977985 PartnerName : Test_Test_DPORTest -TenantId : 1b1121dd-6900-412a-af73-e8d44f81e1c1 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 ObjectId : aa67f786-0552-423e-8849-244ed12bf581 State : Active ``` @@ -121,4 +121,4 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable [New-AzManagementPartner](./New-AzManagementPartner.md) -[Get-AzManagementPartner](./Get-AzManagementPartner.md) \ No newline at end of file +[Get-AzManagementPartner](./Get-AzManagementPartner.md) diff --git a/azps-12.2.0/Az.Migrate/Get-AzMigrateServerReplication.md b/azps-12.2.0/Az.Migrate/Get-AzMigrateServerReplication.md index ec1502bb06..2f82f39fd7 100644 --- a/azps-12.2.0/Az.Migrate/Get-AzMigrateServerReplication.md +++ b/azps-12.2.0/Az.Migrate/Get-AzMigrateServerReplication.md @@ -68,7 +68,7 @@ CurrentJobId : /Subscriptions/xxx-xxx-xxx/resourceGroups/azmigrat ices/vaults/AzMigrateTestProjectPWSH02aarsvault/replicationJobs/None CurrentJobName : None CurrentJobStartTime : 1/1/53 1:01:01 AM -EventCorrelationId : d8b110c6-3be9-4798-b2d4-9a1cd068adfb +EventCorrelationId : 00001111-aaaa-2222-bbbb-3333cccc4444 Health : Normal HealthError : {101883a0-23f7-538a-bbd5-6d8b4fa900e2} Id : /Subscriptions/xxx-xxx-xxx/resourceGroups/azmigratepwshtestasr13072020/providers/Microsoft.RecoveryServ @@ -104,7 +104,7 @@ CurrentJobId : /Subscriptions/xxx-xxx-xxx/resourceGroups/azmigrat ices/vaults/AzMigrateTestProjectPWSH02aarsvault/replicationJobs/None CurrentJobName : None CurrentJobStartTime : 1/1/53 1:01:01 AM -EventCorrelationId : d8b110c6-3be9-4798-b2d4-9a1cd068adfb +EventCorrelationId : 00001111-aaaa-2222-bbbb-3333cccc4444 Health : Normal HealthError : {101883a0-23f7-538a-bbd5-6d8b4fa900e2} Id : /Subscriptions/xxx-xxx-xxx/resourceGroups/azmigratepwshtestasr13072020/providers/Microsoft.RecoveryServ @@ -131,7 +131,7 @@ CurrentJobId : /Subscriptions/xxx-xxx-xxx/resourceGroups/azmigrat ices/vaults/AzMigrateTestProjectPWSH02aarsvault/replicationJobs/None CurrentJobName : None CurrentJobStartTime : 1/1/53 1:01:01 AM -EventCorrelationId : 57b59212-6a2f-4333-8882-461647bb05f9 +EventCorrelationId : 00001111-aaaa-2222-bbbb-3333cccc4444 Health : Normal HealthError : {593b735d-2a34-53b2-b8ed-e33da5650703} Id : /Subscriptions/xxx-xxx-xxx/resourceGroups/azmigratepwshtestasr13072020/providers/Microsoft.RecoveryServ @@ -167,7 +167,7 @@ CurrentJobId : /Subscriptions/xxx-xxx-xxx/resourceGroups/azmigrat ices/vaults/AzMigrateTestProjectPWSH02aarsvault/replicationJobs/None CurrentJobName : None CurrentJobStartTime : 1/1/53 1:01:01 AM -EventCorrelationId : d8b110c6-3be9-4798-b2d4-9a1cd068adfb +EventCorrelationId : 00001111-aaaa-2222-bbbb-3333cccc4444 Health : Normal HealthError : {101883a0-23f7-538a-bbd5-6d8b4fa900e2} Id : /Subscriptions/xxx-xxx-xxx/resourceGroups/azmigratepwshtestasr13072020/providers/Microsoft.RecoveryServ @@ -194,7 +194,7 @@ CurrentJobId : /Subscriptions/xxx-xxx-xxx/resourceGroups/azmigrat ices/vaults/AzMigrateTestProjectPWSH02aarsvault/replicationJobs/None CurrentJobName : None CurrentJobStartTime : 1/1/53 1:01:01 AM -EventCorrelationId : 57b59212-6a2f-4333-8882-461647bb05f9 +EventCorrelationId : 00001111-aaaa-2222-bbbb-3333cccc4444 Health : Normal HealthError : {593b735d-2a34-53b2-b8ed-e33da5650703} Id : /Subscriptions/xxx-xxx-xxx/resourceGroups/azmigratepwshtestasr13072020/providers/Microsoft.RecoveryServ diff --git a/azps-12.2.0/Az.Monitor/Get-AzActivityLog.md b/azps-12.2.0/Az.Monitor/Get-AzActivityLog.md index 99ae5c3e6d..f2bca33518 100644 --- a/azps-12.2.0/Az.Monitor/Get-AzActivityLog.md +++ b/azps-12.2.0/Az.Monitor/Get-AzActivityLog.md @@ -84,7 +84,7 @@ This command lists at most 1000 of the events associated with the user's subscri ### Example 5: Get an event log by correlation ID ```powershell -Get-AzActivityLog -CorrelationId "60c694d0-e46f-4c12-bed1-9b7aef541c23" +Get-AzActivityLog -CorrelationId "00001111-aaaa-2222-bbbb-3333cccc4444" ``` This command lists at most 1000 events associated with the specified correlation ID that took place 7 days from the current date/time. @@ -92,7 +92,7 @@ This command lists at most 1000 events associated with the specified correlation ### Example 6: Get an event log by correlation ID with a maximum number of events ```powershell -Get-AzActivityLog -CorrelationId "60c694d0-e46f-4c12-bed1-9b7aef541c23" -MaxRecord 100 +Get-AzActivityLog -CorrelationId "00001111-aaaa-2222-bbbb-3333cccc4444" -MaxRecord 100 ``` This command lists at most 100 events associated with the specified correlation ID that took place 7 days from the current date/time. @@ -100,7 +100,7 @@ This command lists at most 100 events associated with the specified correlation ### Example 7: Get an event log by correlation ID and start time ```powershell -Get-AzActivityLog -CorrelationId "60c694d0-e46f-4c12-bed1-9b7aef541c23" -StartTime 2017-05-22T04:30:00 +Get-AzActivityLog -CorrelationId "00001111-aaaa-2222-bbbb-3333cccc4444" -StartTime 2017-05-22T04:30:00 ``` This command lists at most 1000 events associated with the specified correlation ID that took place on or after 2017-05-22T04:30:00 local time if the start time is not older than 90 days from the current date/time. @@ -108,7 +108,7 @@ This command lists at most 1000 events associated with the specified correlation ### Example 8: Get an event log by correlation ID with start time and end time ```powershell -Get-AzActivityLog -CorrelationId "60c694d0-e46f-4c12-bed1-9b7aef541c23" -StartTime 2017-04-15T04:30:00 -EndTime 2017-04-25T12:30:00 +Get-AzActivityLog -CorrelationId "00001111-aaaa-2222-bbbb-3333cccc4444" -StartTime 2017-04-15T04:30:00 -EndTime 2017-04-25T12:30:00 ``` This command lists at most 1000 events associated with the specified correlation ID that took place on or after 2017-04-15T04:30 local time, but before 2017-04-25T12:30 local time if the whole date/time range is not older than 90 days from the current date/time, i.e.: the retention period. diff --git a/azps-12.2.0/Az.Monitor/Get-AzAlertHistory.md b/azps-12.2.0/Az.Monitor/Get-AzAlertHistory.md index 7c1606f5fe..2528f1b078 100644 --- a/azps-12.2.0/Az.Monitor/Get-AzAlertHistory.md +++ b/azps-12.2.0/Az.Monitor/Get-AzAlertHistory.md @@ -36,7 +36,7 @@ Authorization : Caller : Microsoft.Insights/alertRules Claims : http://schemas.xmlsoap.org/ws/2005/05/identity/claims/spn: Microsoft.Insights/alertRules -CorrelationId : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/ +CorrelationId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/ Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d/incidents/L3N1YnNj cmlwdGlvbnMvYTkzZmIwN2MtNmM5My00MGJlLWJmM2ItNGYwZGViYTEwZjRiL3Jlc291cmNlR3JvdXBzL0RlZmF1bHQtV2Vi LUVhc3RVUy9wcm92aWRlcnMvbWljcm9zb2Z0Lmluc2lnaHRzL2FsZXJ0cnVsZXMvY2hlY2tydWxlMy00YjEzNTQwMS1hMzBj @@ -48,18 +48,18 @@ EventName : Alert EventSource : Microsoft.Insights/alertrules EventTimestamp : 2/11/2015 7:14:45 PM HttpRequest : -Id : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/ +Id : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/ Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d/events/769fab1c-fc 9f-4e18-bc3a-fa79fbdd3616/ticks/635592788857929926 Level : Informational -OperationId : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/ +OperationId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/ Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d/incidents/L3N1YnNj cmlwdGlvbnMvYTkzZmIwN2MtNmM5My00MGJlLWJmM2ItNGYwZGViYTEwZjRiL3Jlc291cmNlR3JvdXBzL0RlZmF1bHQtV2Vi LUVhc3RVUy9wcm92aWRlcnMvbWljcm9zb2Z0Lmluc2lnaHRzL2FsZXJ0cnVsZXMvY2hlY2tydWxlMy00YjEzNTQwMS1hMzBj LTQyMjQtYWUyMS1mYTUzYTViZDI1M2QwNjM1NTkyNzg4ODU3OTI5OTI2 OperationName : ResolveAlert Properties : - RuleUri : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web- + RuleUri : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web- EastUS/providers/Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d RuleName : checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d RuleDescription: @@ -71,17 +71,17 @@ Properties : MetricUnit : Count ResourceGroupName : Default-Web-EastUS ResourceProviderName : Microsoft.Insights -ResourceId : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/ +ResourceId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/ Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d Status : Resolved SubmissionTimestamp : 2/11/2015 7:14:45 PM -SubscriptionId : b93fb07a-6f93-30be-bf3e-4f0deca15f4f +SubscriptionId : 00001111-aaaa-2222-bbbb-3333cccc4444 SubStatus : Authorization : Caller : Microsoft.Insights/alertRules Claims : http://schemas.xmlsoap.org/ws/2005/05/identity/claims/spn: Microsoft.Insights/alertRules -CorrelationId : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/ +CorrelationId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/ Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d/incidents/L3N1YnNj cmlwdGlvbnMvYTkzZmIwN2MtNmM5My00MGJlLWJmM2ItNGYwZGViYTEwZjRiL3Jlc291cmNlR3JvdXBzL0RlZmF1bHQtV2Vi LUVhc3RVUy9wcm92aWRlcnMvbWljcm9zb2Z0Lmluc2lnaHRzL2FsZXJ0cnVsZXMvY2hlY2tydWxlMy00YjEzNTQwMS1hMzBj @@ -93,18 +93,18 @@ EventName : Alert EventSource : Microsoft.Insights/alertrules EventTimestamp : 2/11/2015 7:04:46 PM HttpRequest : -Id : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/ +Id : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/ microsoft.web/sites/garyyang1/events/66277c94-2097-4f5f-860d-e585f1206cd7/ticks/6355927828650595 14 Level : Error -OperationId : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/ +OperationId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/ Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d/incidents/L3N1YnNj cmlwdGlvbnMvYTkzZmIwN2MtNmM5My00MGJlLWJmM2ItNGYwZGViYTEwZjRiL3Jlc291cmNlR3JvdXBzL0RlZmF1bHQtV2Vi LUVhc3RVUy9wcm92aWRlcnMvbWljcm9zb2Z0Lmluc2lnaHRzL2FsZXJ0cnVsZXMvY2hlY2tydWxlMy00YjEzNTQwMS1hMzBj LTQyMjQtYWUyMS1mYTUzYTViZDI1M2QwNjM1NTkyNzgyODY1MDU5NTE0 OperationName : ActivateAlert Properties : - RuleUri : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web- + RuleUri : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web- EastUS/providers/Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d RuleName : checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d RuleDescription: @@ -116,17 +116,17 @@ Properties : MetricUnit : Count ResourceGroupName : Default-Web-EastUS ResourceProviderName : microsoft.web -ResourceId : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/ +ResourceId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/ microsoft.web/sites/garyyang1 Status : Activated SubmissionTimestamp : 2/11/2015 7:04:46 PM -SubscriptionId : b93fb07a-6f93-30be-bf3e-4f0deca15f4f +SubscriptionId : 00001111-aaaa-2222-bbbb-3333cccc4444 SubStatus : Authorization : Caller : Microsoft.Insights/alertRules Claims : http://schemas.xmlsoap.org/ws/2005/05/identity/claims/spn: Microsoft.Insights/alertRules -CorrelationId : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/ +CorrelationId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/ Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d/incidents/L3N1YnNj cmlwdGlvbnMvYTkzZmIwN2MtNmM5My00MGJlLWJmM2ItNGYwZGViYTEwZjRiL3Jlc291cmNlR3JvdXBzL0RlZmF1bHQtV2Vi LUVhc3RVUy9wcm92aWRlcnMvbWljcm9zb2Z0Lmluc2lnaHRzL2FsZXJ0cnVsZXMvY2hlY2tydWxlMy00YjEzNTQwMS1hMzBj @@ -138,18 +138,18 @@ EventName : Alert EventSource : Microsoft.Insights/alertrules EventTimestamp : 2/11/2015 7:04:46 PM HttpRequest : -Id : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/ +Id : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/ Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d/events/ec9f7b3c-c6 ea-4b45-bd15-ff43e38491e3/ticks/635592782865059514 Level : Error -OperationId : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/ +OperationId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/ Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d/incidents/L3N1YnNj cmlwdGlvbnMvYTkzZmIwN2MtNmM5My00MGJlLWJmM2ItNGYwZGViYTEwZjRiL3Jlc291cmNlR3JvdXBzL0RlZmF1bHQtV2Vi LUVhc3RVUy9wcm92aWRlcnMvbWljcm9zb2Z0Lmluc2lnaHRzL2FsZXJ0cnVsZXMvY2hlY2tydWxlMy00YjEzNTQwMS1hMzBj LTQyMjQtYWUyMS1mYTUzYTViZDI1M2QwNjM1NTkyNzgyODY1MDU5NTE0 OperationName : ActivateAlert Properties : - RuleUri : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web- + RuleUri : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web- EastUS/providers/Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d RuleName : checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d RuleDescription: @@ -161,11 +161,11 @@ Properties : MetricUnit : Count ResourceGroupName : Default-Web-EastUS ResourceProviderName : Microsoft.Insights -ResourceId : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/ +ResourceId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/ Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d Status : Activated SubmissionTimestamp : 2/11/2015 7:04:46 PM -SubscriptionId : b93fb07a-6f93-30be-bf3e-4f0deca15f4f +SubscriptionId : 00001111-aaaa-2222-bbbb-3333cccc4444 SubStatus : ``` @@ -173,7 +173,7 @@ This command gets the alert history for the specified time frame for the current ### Example 2: Get alert history for a specified resource ```powershell -Get-AzAlertHistory -StartTime 2015-02-11T11:00:00 -EndTime 2015-02-11T12:00:00 -ResourceId "/subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d" -DetailedOutput +Get-AzAlertHistory -StartTime 2015-02-11T11:00:00 -EndTime 2015-02-11T12:00:00 -ResourceId "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d" -DetailedOutput ``` ```output @@ -181,7 +181,7 @@ Authorization : Caller : Microsoft.Insights/alertRules Claims : http://schemas.xmlsoap.org/ws/2005/05/identity/claims/spn: Microsoft.Insights/alertRules -CorrelationId : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/ +CorrelationId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/ Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d/incidents/L3N1YnNj cmlwdGlvbnMvYTkzZmIwN2MtNmM5My00MGJlLWJmM2ItNGYwZGViYTEwZjRiL3Jlc291cmNlR3JvdXBzL0RlZmF1bHQtV2Vi LUVhc3RVUy9wcm92aWRlcnMvbWljcm9zb2Z0Lmluc2lnaHRzL2FsZXJ0cnVsZXMvY2hlY2tydWxlMy00YjEzNTQwMS1hMzBj @@ -193,18 +193,18 @@ EventName : Alert EventSource : Microsoft.Insights/alertrules EventTimestamp : 2/11/2015 7:14:45 PM HttpRequest : -Id : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/ +Id : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/ Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d/events/769fab1c-fc 9f-4e18-bc3a-fa79fbdd3616/ticks/635592788857929926 Level : Informational -OperationId : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/ +OperationId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/ Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d/incidents/L3N1YnNj cmlwdGlvbnMvYTkzZmIwN2MtNmM5My00MGJlLWJmM2ItNGYwZGViYTEwZjRiL3Jlc291cmNlR3JvdXBzL0RlZmF1bHQtV2Vi LUVhc3RVUy9wcm92aWRlcnMvbWljcm9zb2Z0Lmluc2lnaHRzL2FsZXJ0cnVsZXMvY2hlY2tydWxlMy00YjEzNTQwMS1hMzBj LTQyMjQtYWUyMS1mYTUzYTViZDI1M2QwNjM1NTkyNzg4ODU3OTI5OTI2 OperationName : ResolveAlert Properties : -RuleUri : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web- +RuleUri : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web- EastUS/providers/Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d RuleName : checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d RuleDescription: @@ -216,17 +216,17 @@ MetricName : CpuTime MetricUnit : Count ResourceGroupName : Default-Web-EastUS ResourceProviderName : Microsoft.Insights -ResourceId : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/ +ResourceId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/ Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d Status : Resolved SubmissionTimestamp : 2/11/2015 7:14:45 PM -SubscriptionId : b93fb07a-6f93-30be-bf3e-4f0deca15f4f +SubscriptionId : 00001111-aaaa-2222-bbbb-3333cccc4444 SubStatus : Authorization : Caller : Microsoft.Insights/alertRules Claims : http://schemas.xmlsoap.org/ws/2005/05/identity/claims/spn: Microsoft.Insights/alertRules -CorrelationId : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/ +CorrelationId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/ Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d/incidents/L3N1YnNj cmlwdGlvbnMvYTkzZmIwN2MtNmM5My00MGJlLWJmM2ItNGYwZGViYTEwZjRiL3Jlc291cmNlR3JvdXBzL0RlZmF1bHQtV2Vi LUVhc3RVUy9wcm92aWRlcnMvbWljcm9zb2Z0Lmluc2lnaHRzL2FsZXJ0cnVsZXMvY2hlY2tydWxlMy00YjEzNTQwMS1hMzBj @@ -238,18 +238,18 @@ EventName : Alert EventSource : Microsoft.Insights/alertrules EventTimestamp : 2/11/2015 7:04:46 PM HttpRequest : -Id : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/ +Id : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/ Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d/events/ec9f7b3c-c6 ea-4b45-bd15-ff43e38491e3/ticks/635592782865059514 Level : Error -OperationId : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/ +OperationId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/ Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d/incidents/L3N1YnNj cmlwdGlvbnMvYTkzZmIwN2MtNmM5My00MGJlLWJmM2ItNGYwZGViYTEwZjRiL3Jlc291cmNlR3JvdXBzL0RlZmF1bHQtV2Vi LUVhc3RVUy9wcm92aWRlcnMvbWljcm9zb2Z0Lmluc2lnaHRzL2FsZXJ0cnVsZXMvY2hlY2tydWxlMy00YjEzNTQwMS1hMzBj LTQyMjQtYWUyMS1mYTUzYTViZDI1M2QwNjM1NTkyNzgyODY1MDU5NTE0 OperationName : ActivateAlert Properties : -RuleUri : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web- +RuleUri : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web- EastUS/providers/Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d RuleName : checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d RuleDescription: @@ -261,11 +261,11 @@ MetricName : CpuTime MetricUnit : Count ResourceGroupName : Default-Web-EastUS ResourceProviderName : Microsoft.Insights -ResourceId : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/ +ResourceId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/ Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d Status : Activated SubmissionTimestamp : 2/11/2015 7:04:46 PM -SubscriptionId : b93fb07a-6f93-30be-bf3e-4f0deca15f4f +SubscriptionId : 00001111-aaaa-2222-bbbb-3333cccc4444 SubStatus : ``` diff --git a/azps-12.2.0/Az.Monitor/Get-AzAutoscaleHistory.md b/azps-12.2.0/Az.Monitor/Get-AzAutoscaleHistory.md index 41466b83fc..5f4a8cb953 100644 --- a/azps-12.2.0/Az.Monitor/Get-AzAutoscaleHistory.md +++ b/azps-12.2.0/Az.Monitor/Get-AzAutoscaleHistory.md @@ -42,7 +42,7 @@ Get-AzAutoscaleHistory -StartTime 2015-02-09T18:35:00 -EndTime 2015-02-09T18:40: Authorization : Caller : Microsoft.Insights/autoscaleSettings Claims : http://schemas.xmlsoap.org/ws/2005/05/identity/claims/spn: Microsoft.Insights/autoscaleSettings -CorrelationId : ac5b03ca-05d4-4811-9c27-0314a145f785 +CorrelationId : 00001111-aaaa-2222-bbbb-3333cccc4444 Description : The autoscale engine attempting to scale resource '/subscriptions/a93fb07c-6c93-40be-bf3b-4f0deb a10f4b/resourceGroups/Default-Web-EastUS/providers/microsoft.web/serverFarms/DefaultServerFarm' from 1 instances count to 2 instances count. @@ -55,7 +55,7 @@ Id : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resou Microsoft.Insights/autoscalesettings/DefaultServerFarm-Default-Web-EastUS/events/c554f7ed-514c-4 49c-9338-13e15b4b56a3/ticks/635591326997519815 Level : Informational -OperationId : ac5b03ca-05d4-4811-9c27-0314a145f785 +OperationId : 00001111-aaaa-2222-bbbb-3333cccc4444 OperationName : ScaleUp Properties : Description : The autoscale engine attempting to scale resource '/subscriptions/a93fb07c-6c93 diff --git a/azps-12.2.0/Az.Monitor/New-AzActionGroupEventHubReceiverObject.md b/azps-12.2.0/Az.Monitor/New-AzActionGroupEventHubReceiverObject.md index 293995b49f..83a5988246 100644 --- a/azps-12.2.0/Az.Monitor/New-AzActionGroupEventHubReceiverObject.md +++ b/azps-12.2.0/Az.Monitor/New-AzActionGroupEventHubReceiverObject.md @@ -27,15 +27,15 @@ Create an in-memory object for EventHubReceiver. ### Example 1: create action group event hub receiver ```powershell -New-AzActionGroupEventHubReceiverObject -EventHubName "testEventHub" -EventHubNameSpace "testEventHubNameSpace" -Name "sample eventhub" -SubscriptionId "187f412d-1758-44d9-b052-169e2564721d" -TenantId "68a4459a-ccb8-493c-b9da-dd30457d1b84" +New-AzActionGroupEventHubReceiverObject -EventHubName "testEventHub" -EventHubNameSpace "testEventHubNameSpace" -Name "sample eventhub" -SubscriptionId "00001111-aaaa-2222-bbbb-3333cccc4444" -TenantId "00001111-aaaa-2222-bbbb-3333cccc4444" ``` ```output EventHubName : testEventHub EventHubNameSpace : testEventHubNameSpace Name : sample eventhub -SubscriptionId : 187f412d-1758-44d9-b052-169e2564721d -TenantId : 68a4459a-ccb8-493c-b9da-dd30457d1b84 +SubscriptionId : 00001111-aaaa-2222-bbbb-3333cccc4444 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 UseCommonAlertSchema : ``` diff --git a/azps-12.2.0/Az.Monitor/New-AzActionGroupWebhookReceiverObject.md b/azps-12.2.0/Az.Monitor/New-AzActionGroupWebhookReceiverObject.md index c6499390ca..4cb9df4bca 100644 --- a/azps-12.2.0/Az.Monitor/New-AzActionGroupWebhookReceiverObject.md +++ b/azps-12.2.0/Az.Monitor/New-AzActionGroupWebhookReceiverObject.md @@ -27,15 +27,15 @@ Create an in-memory object for WebhookReceiver. ### Example 1: create action group webhook receiver with aad auth ```powershell -New-AzActionGroupWebhookReceiverObject -Name "sample webhook" -ServiceUri "http://www.example.com/webhook1" -IdentifierUri "http://someidentifier/d7811ba3-7996-4a93-99b6-6b2f3f355f8a" -ObjectId "d3bb868c-fe44-452c-aa26-769a6538c808" -TenantId 68a4459a-ccb8-493c-b9da-dd30457d1b84 -UseAadAuth $true -UseCommonAlertSchema $true +New-AzActionGroupWebhookReceiverObject -Name "sample webhook" -ServiceUri "http://www.example.com/webhook1" -IdentifierUri "http://someidentifier/00001111-aaaa-2222-bbbb-3333cccc4444" -ObjectId "d3bb868c-fe44-452c-aa26-769a6538c808" -TenantId 00001111-aaaa-2222-bbbb-3333cccc4444 -UseAadAuth $true -UseCommonAlertSchema $true ``` ```output -IdentifierUri : http://someidentifier/d7811ba3-7996-4a93-99b6-6b2f3f355f8a +IdentifierUri : http://someidentifier/00001111-aaaa-2222-bbbb-3333cccc4444 Name : sample webhook ObjectId : d3bb868c-fe44-452c-aa26-769a6538c808 ServiceUri : http://www.example.com/webhook1 -TenantId : 68a4459a-ccb8-493c-b9da-dd30457d1b84 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 UseAadAuth : True UseCommonAlertSchema : True ``` diff --git a/azps-12.2.0/Az.Monitor/Update-AzActionGroup.md b/azps-12.2.0/Az.Monitor/Update-AzActionGroup.md index a7789ae5fe..2f0d202ad1 100644 --- a/azps-12.2.0/Az.Monitor/Update-AzActionGroup.md +++ b/azps-12.2.0/Az.Monitor/Update-AzActionGroup.md @@ -65,7 +65,7 @@ EventHubReceiver : {{ "eventHubNameSpace": "actiongrouptest", "eventHubName": "testEventHub", "useCommonAlertSchema": false, - "tenantId": "72f988bf-86f1-41af-91ab-2d7cd011db47", + "tenantId": "00001111-aaaa-2222-bbbb-3333cccc4444", "subscriptionId": "{subid}" }} GroupShortName : ag1 diff --git a/azps-12.2.0/Az.Network/Get-AzNetworkManagerScopeConnection.md b/azps-12.2.0/Az.Network/Get-AzNetworkManagerScopeConnection.md index 34e4644b83..d54601fbc7 100644 --- a/azps-12.2.0/Az.Network/Get-AzNetworkManagerScopeConnection.md +++ b/azps-12.2.0/Az.Network/Get-AzNetworkManagerScopeConnection.md @@ -66,7 +66,7 @@ Get-AzNetworkManagerScopeConnection -ResourceGroupName "psResourceGroup" -Networ ``` ```output -TenantId : 72f988bf-86f1-41af-91ab-2d7cd011db47 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 ResourceId : /subscriptions/0fd190fa-dd1c-4724-b7f6-c5cc3ba5c884 ConnectionState : Pending DisplayName : @@ -86,7 +86,7 @@ Name : subConnection Etag : Id : /subscriptions/f0dc2b34-dfad-40e4-83e0-2309fed8d00b/resourceGroups/psResourceGroup/providers/Microsoft.Network/networkManagers/psNetworkManager/scopeConnections/subConnection -TenantId : 72f988bf-86f1-41af-91ab-2d7cd011db47 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 ResourceId : /providers/Microsoft.Management/managementGroups/newMG ConnectionState : Pending DisplayName : diff --git a/azps-12.2.0/Az.Network/New-AzNetworkManagerScopeConnection.md b/azps-12.2.0/Az.Network/New-AzNetworkManagerScopeConnection.md index f5b838119f..380113b902 100644 --- a/azps-12.2.0/Az.Network/New-AzNetworkManagerScopeConnection.md +++ b/azps-12.2.0/Az.Network/New-AzNetworkManagerScopeConnection.md @@ -27,11 +27,11 @@ The **New-AzNetworkManagerScopeConnection** cmdlet creates a scope connection. ### Example 1 ```powershell -New-AzNetworkManagerScopeConnection -ResourceGroupName psResourceGroup -NetworkManagerName psNetworkManager -Name "subConnection" -TenantId "72f988bf-86f1-41af-91ab-2d7cd011db47" -ResourceId "/subscriptions/0fd190fa-dd1c-4724-b7f6-c5cc3ba5c884" -Description "SampleDescription" +New-AzNetworkManagerScopeConnection -ResourceGroupName psResourceGroup -NetworkManagerName psNetworkManager -Name "subConnection" -TenantId "00001111-aaaa-2222-bbbb-3333cccc4444" -ResourceId "/subscriptions/0fd190fa-dd1c-4724-b7f6-c5cc3ba5c884" -Description "SampleDescription" ``` ```output -TenantId : 72f988bf-86f1-41af-91ab-2d7cd011db47 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 ResourceId : /subscriptions/0fd190fa-dd1c-4724-b7f6-c5cc3ba5c884 ConnectionState : Pending DisplayName : @@ -56,11 +56,11 @@ Creates a scope connection to a cross-tenant subscription. ### Example 2 ```powershell -New-AzNetworkManagerScopeConnection -ResourceGroupName psResourceGroup -NetworkManagerName psNetworkManager -Name "mgConnection" -TenantId "72f988bf-86f1-41af-91ab-2d7cd011db47" -ResourceId "/providers/Microsoft.Management/managementGroups/newMG" -Description "SampleDescription" +New-AzNetworkManagerScopeConnection -ResourceGroupName psResourceGroup -NetworkManagerName psNetworkManager -Name "mgConnection" -TenantId "00001111-aaaa-2222-bbbb-3333cccc4444" -ResourceId "/providers/Microsoft.Management/managementGroups/newMG" -Description "SampleDescription" ``` ```output -TenantId : 72f988bf-86f1-41af-91ab-2d7cd011db47 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 ResourceId : /providers/Microsoft.Management/managementGroups/newMG ConnectionState : Pending DisplayName : @@ -271,4 +271,4 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable [Remove-AzNetworkManagerScopeConnection](./Remove-AzNetworkManagerScopeConnection.md) -[Set-AzNetworkManagerScopeConnection](./Set-AzNetworkManagerScopeConnection.md) \ No newline at end of file +[Set-AzNetworkManagerScopeConnection](./Set-AzNetworkManagerScopeConnection.md) diff --git a/azps-12.2.0/Az.Network/Set-AzNetworkManagerScopeConnection.md b/azps-12.2.0/Az.Network/Set-AzNetworkManagerScopeConnection.md index 3a3b34105e..3534fd0f2e 100644 --- a/azps-12.2.0/Az.Network/Set-AzNetworkManagerScopeConnection.md +++ b/azps-12.2.0/Az.Network/Set-AzNetworkManagerScopeConnection.md @@ -32,7 +32,7 @@ Set-AzNetworkManagerScopeConnection -InputObject $scopeConnection ``` ```output -TenantId : 72f988bf-86f1-41af-91ab-2d7cd011db47 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 ResourceId : /providers/Microsoft.Management/managementGroups/newMG ConnectionState : Pending DisplayName : @@ -154,4 +154,4 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable [New-AzNetworkManagerScopeConnection](./New-AzNetworkManagerScopeConnection.md) -[Remove-AzNetworkManagerScopeConnection](./Remove-AzNetworkManagerScopeConnection.md) \ No newline at end of file +[Remove-AzNetworkManagerScopeConnection](./Remove-AzNetworkManagerScopeConnection.md) diff --git a/azps-12.2.0/Az.NewRelic/Get-AzNewRelicBillingInfo.md b/azps-12.2.0/Az.NewRelic/Get-AzNewRelicBillingInfo.md index a91ce1860c..5157ab81a1 100644 --- a/azps-12.2.0/Az.NewRelic/Get-AzNewRelicBillingInfo.md +++ b/azps-12.2.0/Az.NewRelic/Get-AzNewRelicBillingInfo.md @@ -42,8 +42,8 @@ MarketplaceSaaInfoMarketplaceResourceId : /subscriptions/11111111-2222-333 MarketplaceSaaInfoMarketplaceStatus : Subscribed MarketplaceSaaInfoMarketplaceSubscriptionId : 00000000-0000-0000-0000-000000000000 MarketplaceSaaInfoMarketplaceSubscriptionName : AzNewRelic_11111111-2222-3333-4444-123456789102_test-01 -PartnerBillingEntityOrganizationId : 11111111-2222-3333-4444-123456789103 -PartnerBillingEntityOrganizationName : 11111111-2222-3333-4444-123456789103 +PartnerBillingEntityOrganizationId : 00001111-aaaa-2222-bbbb-3333cccc4444 +PartnerBillingEntityOrganizationName : 00001111-aaaa-2222-bbbb-3333cccc4444 ``` This command gets marketplace info mapped to the given monitor. diff --git a/azps-12.2.0/Az.NewRelic/Get-AzNewRelicPlan.md b/azps-12.2.0/Az.NewRelic/Get-AzNewRelicPlan.md index ab1f09ae91..381d31e9b9 100644 --- a/azps-12.2.0/Az.NewRelic/Get-AzNewRelicPlan.md +++ b/azps-12.2.0/Az.NewRelic/Get-AzNewRelicPlan.md @@ -26,7 +26,7 @@ List plans data ### Example 1: List plans data associated with specified organization ```powershell -Get-AzNewRelicPlan -SubscriptionId 11111111-2222-3333-4444-123456789101 -OrganizationId 11111111-2222-3333-4444-123456789104 +Get-AzNewRelicPlan -SubscriptionId 00001111-aaaa-2222-bbbb-3333cccc4444 -OrganizationId 11111111-2222-3333-4444-123456789104 ``` ```output @@ -39,7 +39,7 @@ List plans data associated with specified Organization Id ### Example 2: Link plans account with specified organization in different subscription ```powershell -Get-AzNewRelicPlan -SubscriptionId 11111111-2222-3333-4444-123456789101 -OrganizationId 11111111-2222-3333-4444-123456789104 -AccountId 1234567 +Get-AzNewRelicPlan -SubscriptionId 00001111-aaaa-2222-bbbb-3333cccc4444 -OrganizationId 11111111-2222-3333-4444-123456789104 -AccountId 1234567 ``` Link plans account with specified organization in different subscription diff --git a/azps-12.2.0/Az.Reservations/Move-AzReservationDirectory.md b/azps-12.2.0/Az.Reservations/Move-AzReservationDirectory.md index 699c4879a5..0f55d4e2be 100644 --- a/azps-12.2.0/Az.Reservations/Move-AzReservationDirectory.md +++ b/azps-12.2.0/Az.Reservations/Move-AzReservationDirectory.md @@ -45,7 +45,7 @@ Change directory (tenant) of `ReservationOrder` and all `Reservation` under it t ### Example 1: Move reservation order from one tenant to another ```powershell -Move-AzReservationDirectory -ReservationOrderId "7c31a9e8-8490-4002-88cd-3a16b71362a9" -DestinationTenantId "f65fbe9a-14b0-44c6-8c0d-2ef2c4543040" +Move-AzReservationDirectory -ReservationOrderId "00001111-aaaa-2222-bbbb-3333cccc4444" -DestinationTenantId "f65fbe9a-14b0-44c6-8c0d-2ef2c4543040" ``` ```output @@ -63,7 +63,7 @@ Reservation : {{ "isSucceeded": true }} ReservationOrderError : -ReservationOrderId : 7c31a9e8-8490-4002-88cd-3a16b71362a9 +ReservationOrderId : 00001111-aaaa-2222-bbbb-3333cccc4444 ReservationOrderIsSucceeded : True ReservationOrderName : VM_RI_05-26-2022_16-53 ``` diff --git a/azps-12.2.0/Az.Resources/Get-AzADServicePrincipalAppRoleAssignment.md b/azps-12.2.0/Az.Resources/Get-AzADServicePrincipalAppRoleAssignment.md index b18ed601d6..27560b0e42 100644 --- a/azps-12.2.0/Az.Resources/Get-AzADServicePrincipalAppRoleAssignment.md +++ b/azps-12.2.0/Az.Resources/Get-AzADServicePrincipalAppRoleAssignment.md @@ -35,27 +35,27 @@ Get appRoleAssignments from servicePrincipals ### Example 1: List assigned app roles ```powershell -Get-AzADServicePrincipalAppRoleAssignment -ServicePrincipalId 71beb965-8347-495d-a589-c21cdde7a722 +Get-AzADServicePrincipalAppRoleAssignment -ServicePrincipalId 00001111-aaaa-2222-bbbb-3333cccc4444 ``` ```output Id AppRoleId PrincipalDisplayName PrincipalId CreatedDateTime -- --------- -------------------- ----------- --------------- -Zbm-cUeDXUmlicIc3eenIkgIm8kv9kJPj4MFhepACNE 649ae968-bdf9-4f22-bb2c-2aa1b4af0a83 funapp1214 71beb965-8347-495d-a589-c21cdde7a722 12/14/2023 7:04:28 AM -Zbm-cUeDXUmlicIc3eenIhHyPMkzw2VEh76fTc0bGtM e799a9e2-acac-4960-9ba0-6a17661fa16a funapp1214 71beb965-8347-495d-a589-c21cdde7a722 12/14/2023 6:56:52 AM +Zbm-cUeDXUmlicIc3eenIkgIm8kv9kJPj4MFhepACNE 649ae968-bdf9-4f22-bb2c-2aa1b4af0a83 funapp1214 00001111-aaaa-2222-bbbb-3333cccc4444 12/14/2023 7:04:28 AM +Zbm-cUeDXUmlicIc3eenIhHyPMkzw2VEh76fTc0bGtM e799a9e2-acac-4960-9ba0-6a17661fa16a funapp1214 00001111-aaaa-2222-bbbb-3333cccc4444 12/14/2023 6:56:52 AM ``` List assigned app roles. ### Example 2: Get by AppRoleAssignmentId ```powershell -Get-AzADServicePrincipalAppRoleAssignment -ServicePrincipalId 71beb965-8347-495d-a589-c21cdde7a722 -AppRoleAssignmentId Zbm-cUeDXUmlicIc3eenIkgIm8kv9kJPj4MFhepACNE +Get-AzADServicePrincipalAppRoleAssignment -ServicePrincipalId 00001111-aaaa-2222-bbbb-3333cccc4444 -AppRoleAssignmentId Zbm-cUeDXUmlicIc3eenIkgIm8kv9kJPj4MFhepACNE ``` ```output Id AppRoleId PrincipalDisplayName PrincipalId CreatedDateTime -- --------- -------------------- ----------- --------------- -Zbm-cUeDXUmlicIc3eenIkgIm8kv9kJPj4MFhepACNE 649ae968-bdf9-4f22-bb2c-2aa1b4af0a83 funapp1214 71beb965-8347-495d-a589-c21cdde7a722 12/14/2023 7:04:28 AM +Zbm-cUeDXUmlicIc3eenIkgIm8kv9kJPj4MFhepACNE 649ae968-bdf9-4f22-bb2c-2aa1b4af0a83 funapp1214 00001111-aaaa-2222-bbbb-3333cccc4444 12/14/2023 7:04:28 AM ``` Get an assigned app role by Id. diff --git a/azps-12.2.0/Az.Resources/Get-AzManagementGroup.md b/azps-12.2.0/Az.Resources/Get-AzManagementGroup.md index 8800c544e1..f86c6e20b6 100644 --- a/azps-12.2.0/Az.Resources/Get-AzManagementGroup.md +++ b/azps-12.2.0/Az.Resources/Get-AzManagementGroup.md @@ -40,13 +40,13 @@ Get-AzManagementGroup Id : /providers/Microsoft.Management/managementGroups/TestGroup Type : /providers/Microsoft.Management/managementGroups Name : TestGroup -TenantId : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 DisplayName : TestGroupDisplayName Id : /providers/Microsoft.Management/managementGroups/TestGroupChild Type : /providers/Microsoft.Management/managementGroups Name : TestGroupChild -TenantId : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 DisplayName : TestGroupChildDisplayName ``` @@ -61,7 +61,7 @@ Get-AzManagementGroup -GroupName TestGroup Id : /providers/Microsoft.Management/managementGroups/TestGroup Type : /providers/Microsoft.Management/managementGroups Name : TestGroup -TenantId : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 DisplayName : TestGroupDisplayName UpdatedTime : 2/1/2018 11:16:12 AM UpdatedBy : 64360beb-ffb4-43a8-9314-01aa34db95a9 @@ -83,13 +83,13 @@ $response Id : /providers/Microsoft.Management/managementGroups/TestGroupParent Type : /providers/Microsoft.Management/managementGroups Name : TestGroupParent -TenantId : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 DisplayName : TestGroupParent UpdatedTime : 2/1/2018 11:15:46 AM UpdatedBy : 64360beb-ffb4-43a8-9314-01aa34db95a9 -ParentId : /providers/Microsoft.Management/managementGroups/6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 -ParentName : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 -ParentDisplayName : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 +ParentId : /providers/Microsoft.Management/managementGroups/00001111-aaaa-2222-bbbb-3333cccc4444 +ParentName : 00001111-aaaa-2222-bbbb-3333cccc4444 +ParentDisplayName : 00001111-aaaa-2222-bbbb-3333cccc4444 Children : {TestGroup1DisplayName, TestGroup2DisplayName} $response.Children[0] @@ -114,13 +114,13 @@ $response Id : /providers/Microsoft.Management/managementGroups/TestGroupParent Type : /providers/Microsoft.Management/managementGroups Name : TestGroupParent -TenantId : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 DisplayName : TestGroupParent UpdatedTime : 2/1/2018 11:15:46 AM UpdatedBy : 64360beb-ffb4-43a8-9314-01aa34db95a9 -ParentId : /providers/Microsoft.Management/managementGroups/6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 -ParentName : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 -ParentDisplayName : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 +ParentId : /providers/Microsoft.Management/managementGroups/00001111-aaaa-2222-bbbb-3333cccc4444 +ParentName : 00001111-aaaa-2222-bbbb-3333cccc4444 +ParentDisplayName : 00001111-aaaa-2222-bbbb-3333cccc4444 Children : {TestGroup1DisplayName, TestGroup2DisplayName} $response.Children[0] diff --git a/azps-12.2.0/Az.Resources/Get-AzManagementGroupEntity.md b/azps-12.2.0/Az.Resources/Get-AzManagementGroupEntity.md index d7b145efee..5557e18359 100644 --- a/azps-12.2.0/Az.Resources/Get-AzManagementGroupEntity.md +++ b/azps-12.2.0/Az.Resources/Get-AzManagementGroupEntity.md @@ -33,13 +33,13 @@ Get-AzManagementGroupEntity Id : /providers/Microsoft.Management/managementGroups/TestGroup Type : Microsoft.Management/managementGroups Name : TestGroup -TenantId : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 DisplayName : TestGroupDisplayName Id : /providers/Microsoft.Management/managementGroups/TestGroupChild Type : /providers/Microsoft.Management/managementGroups Name : TestGroupChild -TenantId : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 DisplayName : TestGroupChildDisplayName ``` diff --git a/azps-12.2.0/Az.Resources/Get-AzManagementGroupHierarchySetting.md b/azps-12.2.0/Az.Resources/Get-AzManagementGroupHierarchySetting.md index c60ba378bc..1dc01a0047 100644 --- a/azps-12.2.0/Az.Resources/Get-AzManagementGroupHierarchySetting.md +++ b/azps-12.2.0/Az.Resources/Get-AzManagementGroupHierarchySetting.md @@ -40,7 +40,7 @@ Get-AzManagementGroupHierarchySetting -GroupName c7a87cda-9a66-4920-b0f8-869baa0 Id : /providers/Microsoft.Management/managementGroups/c7a87cda-9a66-4920-b0f8-869baa04efe0/settings/default Type : Microsoft.Management/managementGroups/settings Name : default -TenantId : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 RequireAuthorizationForGroupCreation : true DefaultManagementGroup : TestGroup ``` diff --git a/azps-12.2.0/Az.Resources/Get-AzManagementGroupSubscription.md b/azps-12.2.0/Az.Resources/Get-AzManagementGroupSubscription.md index 8bfdf16e77..8cc4bca461 100644 --- a/azps-12.2.0/Az.Resources/Get-AzManagementGroupSubscription.md +++ b/azps-12.2.0/Az.Resources/Get-AzManagementGroupSubscription.md @@ -34,7 +34,7 @@ Get-AzManagementGroupSubscription -GroupName "TestGroup" -SubscriptionId 5602fbd Name : 5602fbd9-fb0d-4fbb-98b3-10c8ea20b6de Type : Microsoft.Management/managementGroups/subscriptions Id : /providers/Microsoft.Management/managementGroups/TestGroup/subscriptions/5602fbd9-fb0d-4fbb-98b3-10c8ea20b6de -TenantId : 14307de0-5e6f-46cf-b2ba-64a062964d30 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 DisplayName : Visual Studio Enterprise Subscription ParentId : /providers/Microsoft.Management/managementGroups/TestGroup State : Active @@ -49,7 +49,7 @@ Get-AzManagementGroupSubscription -GroupName "TestGroup" Name : 5602fbd9-fb0d-4fbb-98b3-10c8ea20b6de Type : Microsoft.Management/managementGroups/subscriptions Id : /providers/Microsoft.Management/managementGroups/TestGroup/subscriptions/5602fbd9-fb0d-4fbb-98b3-10c8ea20b6de -TenantId : 14307de0-5e6f-46cf-b2ba-64a062964d30 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 DisplayName : Visual Studio Enterprise Subscription ParentId : /providers/Microsoft.Management/managementGroups/TestGroup State : Active @@ -57,7 +57,7 @@ State : Active Name : 2120692d-35c3-44c8-81f5-631fa7351726 Type : Microsoft.Management/managementGroups/subscriptions Id : /providers/Microsoft.Management/managementGroups/TestGroup/subscriptions/2120692d-35c3-44c8-81f5-631fa7351726 -TenantId : 14307de0-5e6f-46cf-b2ba-64a062964d30 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 DisplayName : Test Subscription ParentId : /providers/Microsoft.Management/managementGroups/TestGroup State : Active diff --git a/azps-12.2.0/Az.Resources/Get-AzRoleAssignmentSchedule.md b/azps-12.2.0/Az.Resources/Get-AzRoleAssignmentSchedule.md index ff2e357db5..8d6a2b7397 100644 --- a/azps-12.2.0/Az.Resources/Get-AzRoleAssignmentSchedule.md +++ b/azps-12.2.0/Az.Resources/Get-AzRoleAssignmentSchedule.md @@ -65,9 +65,9 @@ Get-AzRoleAssignmentSchedule -Scope $scope -Filter "asTarget()" Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 4cd7e26b-8eca-425c-969d-ec708c88bf18 Microsoft.Authorization/roleAssignmentSchedules /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorizatio… -a1f32976-b8f4-4606-a91d-af097a2473a2 Microsoft.Authorization/roleAssignmentSchedules /providers/Microsoft.Management/managementGroups/MG-3 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… -4f9bdc29-3bb9-4ad7-9c1d-3f3f5ba3e1d9 Microsoft.Authorization/roleAssignmentSchedules /providers/Microsoft.Management/managementGroups/MG-2 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… -529e4bba-621c-4309-a4b2-73e3364d4dd3 Microsoft.Authorization/roleAssignmentSchedules /providers/Microsoft.Management/managementGroups/MG-1 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… +00001111-aaaa-2222-bbbb-3333cccc4444 Microsoft.Authorization/roleAssignmentSchedules /providers/Microsoft.Management/managementGroups/MG-3 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… +00001111-aaaa-2222-bbbb-3333cccc4444 Microsoft.Authorization/roleAssignmentSchedules /providers/Microsoft.Management/managementGroups/MG-2 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… +00001111-aaaa-2222-bbbb-3333cccc4444 Microsoft.Authorization/roleAssignmentSchedules /providers/Microsoft.Management/managementGroups/MG-1 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… ``` Returns all `roleAssignmentSchedules` for the `scope` which are assigned to the calling user. diff --git a/azps-12.2.0/Az.Resources/Get-AzRoleAssignmentScheduleInstance.md b/azps-12.2.0/Az.Resources/Get-AzRoleAssignmentScheduleInstance.md index 81e1166406..b21355704d 100644 --- a/azps-12.2.0/Az.Resources/Get-AzRoleAssignmentScheduleInstance.md +++ b/azps-12.2.0/Az.Resources/Get-AzRoleAssignmentScheduleInstance.md @@ -65,9 +65,9 @@ Get-AzRoleAssignmentScheduleInstance -Scope $scope -Filter "asTarget()" Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 4cd7e26b-8eca-425c-969d-ec708c88bf18 Microsoft.Authorization/roleAssignmentScheduleInstances /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorizatio… -a1f32976-b8f4-4606-a91d-af097a2473a2 Microsoft.Authorization/roleAssignmentScheduleInstances /providers/Microsoft.Management/managementGroups/MG-3 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… -4f9bdc29-3bb9-4ad7-9c1d-3f3f5ba3e1d9 Microsoft.Authorization/roleAssignmentScheduleInstances /providers/Microsoft.Management/managementGroups/MG-2 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… -529e4bba-621c-4309-a4b2-73e3364d4dd3 Microsoft.Authorization/roleAssignmentScheduleInstances /providers/Microsoft.Management/managementGroups/MG-1 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… +00001111-aaaa-2222-bbbb-3333cccc4444 Microsoft.Authorization/roleAssignmentScheduleInstances /providers/Microsoft.Management/managementGroups/MG-3 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… +00001111-aaaa-2222-bbbb-3333cccc4444 Microsoft.Authorization/roleAssignmentScheduleInstances /providers/Microsoft.Management/managementGroups/MG-2 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… +00001111-aaaa-2222-bbbb-3333cccc4444 Microsoft.Authorization/roleAssignmentScheduleInstances /providers/Microsoft.Management/managementGroups/MG-1 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… ``` Returns all `roleAssignmentScheduleInstances` for the `scope` which are assigned to the calling user. diff --git a/azps-12.2.0/Az.Resources/Get-AzRoleEligibilitySchedule.md b/azps-12.2.0/Az.Resources/Get-AzRoleEligibilitySchedule.md index 2f1cbf4661..1d77dd5f8e 100644 --- a/azps-12.2.0/Az.Resources/Get-AzRoleEligibilitySchedule.md +++ b/azps-12.2.0/Az.Resources/Get-AzRoleEligibilitySchedule.md @@ -65,9 +65,9 @@ Get-AzRoleEligibilitySchedule -Scope $scope -Filter "asTarget()" Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 4cd7e26b-8eca-425c-969d-ec708c88bf18 Microsoft.Authorization/roleEligibilitySchedules /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorizatio… -a1f32976-b8f4-4606-a91d-af097a2473a2 Microsoft.Authorization/roleEligibilitySchedules /providers/Microsoft.Management/managementGroups/MG-3 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… -4f9bdc29-3bb9-4ad7-9c1d-3f3f5ba3e1d9 Microsoft.Authorization/roleEligibilitySchedules /providers/Microsoft.Management/managementGroups/MG-2 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… -529e4bba-621c-4309-a4b2-73e3364d4dd3 Microsoft.Authorization/roleEligibilitySchedules /providers/Microsoft.Management/managementGroups/MG-1 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… +00001111-aaaa-2222-bbbb-3333cccc4444 Microsoft.Authorization/roleEligibilitySchedules /providers/Microsoft.Management/managementGroups/MG-3 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… +00001111-aaaa-2222-bbbb-3333cccc4444 Microsoft.Authorization/roleEligibilitySchedules /providers/Microsoft.Management/managementGroups/MG-2 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… +00001111-aaaa-2222-bbbb-3333cccc4444 Microsoft.Authorization/roleEligibilitySchedules /providers/Microsoft.Management/managementGroups/MG-1 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… ``` Returns all `roleEligibilitySchedules` for the `scope` which are assigned to the calling user. diff --git a/azps-12.2.0/Az.Resources/Get-AzRoleEligibilityScheduleInstance.md b/azps-12.2.0/Az.Resources/Get-AzRoleEligibilityScheduleInstance.md index 99afb0c748..0f6012dacd 100644 --- a/azps-12.2.0/Az.Resources/Get-AzRoleEligibilityScheduleInstance.md +++ b/azps-12.2.0/Az.Resources/Get-AzRoleEligibilityScheduleInstance.md @@ -65,9 +65,9 @@ Get-AzRoleEligibilityScheduleInstance -Scope $scope -Filter "asTarget()" Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 4cd7e26b-8eca-425c-969d-ec708c88bf18 Microsoft.Authorization/roleEligibilityScheduleInstances /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorizatio… -a1f32976-b8f4-4606-a91d-af097a2473a2 Microsoft.Authorization/roleEligibilityScheduleInstances /providers/Microsoft.Management/managementGroups/MG-3 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… -4f9bdc29-3bb9-4ad7-9c1d-3f3f5ba3e1d9 Microsoft.Authorization/roleEligibilityScheduleInstances /providers/Microsoft.Management/managementGroups/MG-2 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… -529e4bba-621c-4309-a4b2-73e3364d4dd3 Microsoft.Authorization/roleEligibilityScheduleInstances /providers/Microsoft.Management/managementGroups/MG-1 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… +00001111-aaaa-2222-bbbb-3333cccc4444 Microsoft.Authorization/roleEligibilityScheduleInstances /providers/Microsoft.Management/managementGroups/MG-3 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… +00001111-aaaa-2222-bbbb-3333cccc4444 Microsoft.Authorization/roleEligibilityScheduleInstances /providers/Microsoft.Management/managementGroups/MG-2 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… +00001111-aaaa-2222-bbbb-3333cccc4444 Microsoft.Authorization/roleEligibilityScheduleInstances /providers/Microsoft.Management/managementGroups/MG-1 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… ``` Returns all `roleEligibilityScheduleInstances` for the `scope` which are assigned to the calling user. diff --git a/azps-12.2.0/Az.Resources/New-AzADServicePrincipalAppRoleAssignment.md b/azps-12.2.0/Az.Resources/New-AzADServicePrincipalAppRoleAssignment.md index 3d36614af1..4d99e6e2e0 100644 --- a/azps-12.2.0/Az.Resources/New-AzADServicePrincipalAppRoleAssignment.md +++ b/azps-12.2.0/Az.Resources/New-AzADServicePrincipalAppRoleAssignment.md @@ -49,13 +49,13 @@ Create new navigation property to appRoleAssignments for servicePrincipals ### Example 1: ObjectIdWithResourceIdParameterSet ```powershell -New-AzADServicePrincipalAppRoleAssignment -ServicePrincipalId 71beb965-8347-495d-a589-c21cdde7a722 -ResourceId 351fa797-c81a-4998-9720-4c2ecb6c7abc -AppRoleId 649ae968-bdf9-4f22-bb2c-2aa1b4af0a83 +New-AzADServicePrincipalAppRoleAssignment -ServicePrincipalId 00001111-aaaa-2222-bbbb-3333cccc4444 -ResourceId 351fa797-c81a-4998-9720-4c2ecb6c7abc -AppRoleId 649ae968-bdf9-4f22-bb2c-2aa1b4af0a83 ``` ```output Id AppRoleId PrincipalDisplayName PrincipalId CreatedDateTime -- --------- -------------------- ----------- --------------- -Zbm-cUeDXUmlicIc3eenIkgIm8kv9kJPj4MFhepACNE 649ae968-bdf9-4f22-bb2c-2aa1b4af0a83 funapp1214 71beb965-8347-495d-a589-c21cdde7a722 12/14/2023 7:04:28 AM +Zbm-cUeDXUmlicIc3eenIkgIm8kv9kJPj4MFhepACNE 649ae968-bdf9-4f22-bb2c-2aa1b4af0a83 funapp1214 00001111-aaaa-2222-bbbb-3333cccc4444 12/14/2023 7:04:28 AM ``` Create an appRoleAssignment using ServicePrincipalId and ResourceId. @@ -68,7 +68,7 @@ New-AzADServicePrincipalAppRoleAssignment -ServicePrincipalDisplayName funapp121 ```output Id AppRoleId PrincipalDisplayName PrincipalId CreatedDateTime -- --------- -------------------- ----------- --------------- -Zbm-cUeDXUmlicIc3eenIlqgWRlWp2hFrXIJiqP2j78 649ae968-bdf9-4f22-bb2c-2aa1b4af0a83 funapp1214 71beb965-8347-495d-a589-c21cdde7a722 12/14/2023 7:07:16 AM +Zbm-cUeDXUmlicIc3eenIlqgWRlWp2hFrXIJiqP2j78 649ae968-bdf9-4f22-bb2c-2aa1b4af0a83 funapp1214 00001111-aaaa-2222-bbbb-3333cccc4444 12/14/2023 7:07:16 AM ``` Create an appRoleAssignment for service principal using ServicePrincipal DisplayName and Resource DisplayName. diff --git a/azps-12.2.0/Az.Resources/New-AzManagementGroup.md b/azps-12.2.0/Az.Resources/New-AzManagementGroup.md index 169ce3eee8..68079f612c 100644 --- a/azps-12.2.0/Az.Resources/New-AzManagementGroup.md +++ b/azps-12.2.0/Az.Resources/New-AzManagementGroup.md @@ -42,13 +42,13 @@ New-AzManagementGroup -GroupName "TestGroup" Id : /providers/Microsoft.Management/managementGroups/TestGroup Type : /providers/Microsoft.Management/managementGroups Name : TestGroup -TenantId : 14307de0-5e6f-46cf-b2ba-64a062964d30 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 DisplayName : TestGroup UpdatedTime : 2/1/2018 11:06:27 AM -UpdatedBy : 14307de0-5e6f-46cf-b2ba-64a062964d30 -ParentId : /providers/Microsoft.Management/managementGroups/14307de0-5e6f-46cf-b2ba-64a062964d30 -ParentName : 14307de0-5e6f-46cf-b2ba-64a062964d30 -ParentDisplayName : 14307de0-5e6f-46cf-b2ba-64a062964d30 +UpdatedBy : 00001111-aaaa-2222-bbbb-3333cccc4444 +ParentId : /providers/Microsoft.Management/managementGroups/00001111-aaaa-2222-bbbb-3333cccc4444 +ParentName : 00001111-aaaa-2222-bbbb-3333cccc4444 +ParentDisplayName : 00001111-aaaa-2222-bbbb-3333cccc4444 ``` Creation of a new group with `DisplayName` and `ParentId` set to `null`. The `DisplayName` will be same as the `GroupName` and the parent of the group will be the tenant. @@ -62,13 +62,13 @@ New-AzManagementGroup -GroupName "TestGroup" -DisplayName "TestGroupDisplayName" Id : /providers/Microsoft.Management/managementGroups/TestGroup Type : /providers/Microsoft.Management/managementGroups Name : TestGroup -TenantId : 14307de0-5e6f-46cf-b2ba-64a062964d30 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 DisplayName : TestGroup UpdatedTime : 2/1/2018 11:06:27 AM -UpdatedBy : 14307de0-5e6f-46cf-b2ba-64a062964d30 -ParentId : /providers/Microsoft.Management/managementGroups/14307de0-5e6f-46cf-b2ba-64a062964d30 -ParentName : 14307de0-5e6f-46cf-b2ba-64a062964d30 -ParentDisplayName : 14307de0-5e6f-46cf-b2ba-64a062964d30 +UpdatedBy : 00001111-aaaa-2222-bbbb-3333cccc4444 +ParentId : /providers/Microsoft.Management/managementGroups/00001111-aaaa-2222-bbbb-3333cccc4444 +ParentName : 00001111-aaaa-2222-bbbb-3333cccc4444 +ParentDisplayName : 00001111-aaaa-2222-bbbb-3333cccc4444 ``` In this case, the parent of the group will be the tenant and the `DisplayName` will be set to the value given. @@ -82,10 +82,10 @@ New-AzManagementGroup -GroupName "TestGroup" -DisplayName "TestGroupDisplayName" Id : /providers/Microsoft.Management/managementGroups/TestGroup Type : /providers/Microsoft.Management/managementGroups Name : TestGroup -TenantId : 14307de0-5e6f-46cf-b2ba-64a062964d30 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 DisplayName : TestGroupDisplayName UpdatedTime : 2/1/2018 11:16:12 AM -UpdatedBy : 14307de0-5e6f-46cf-b2ba-64a062964d30 +UpdatedBy : 00001111-aaaa-2222-bbbb-3333cccc4444 ParentId : /providers/Microsoft.Management/managementGroups/TestGroupParent ParentName : TestGroupParent ParentDisplayName : TestGroupParent @@ -101,10 +101,10 @@ New-AzManagementGroup -GroupName "TestGroup" -ParentObject $parentObject Id : /providers/Microsoft.Management/managementGroups/TestGroup Type : /providers/Microsoft.Management/managementGroups Name : TestGroup -TenantId : 14307de0-5e6f-46cf-b2ba-64a062964d30 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 DisplayName : TestGroupDisplayName UpdatedTime : 2/1/2018 11:16:12 AM -UpdatedBy : 14307de0-5e6f-46cf-b2ba-64a062964d30 +UpdatedBy : 00001111-aaaa-2222-bbbb-3333cccc4444 ParentId : /providers/Microsoft.Management/managementGroups/TestGroupParent ParentName : TestGroupParent ParentDisplayName : TestGroupParent diff --git a/azps-12.2.0/Az.Resources/New-AzManagementGroupHierarchySetting.md b/azps-12.2.0/Az.Resources/New-AzManagementGroupHierarchySetting.md index 35227d99e7..a5c6d10883 100644 --- a/azps-12.2.0/Az.Resources/New-AzManagementGroupHierarchySetting.md +++ b/azps-12.2.0/Az.Resources/New-AzManagementGroupHierarchySetting.md @@ -42,7 +42,7 @@ New-AzManagementGroupHierarchySetting -GroupName c7a87cda-9a66-4920-b0f8-869baa0 Id : /providers/Microsoft.Management/managementGroups/c7a87cda-9a66-4920-b0f8-869baa04efe0/settings/default Type : Microsoft.Management/managementGroups/settings Name : default -TenantId : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 RequireAuthorizationForGroupCreation : true DefaultManagementGroup : ``` @@ -56,7 +56,7 @@ New-AzManagementGroupHierarchySetting -GroupName c7a87cda-9a66-4920-b0f8-869baa0 Id : /providers/Microsoft.Management/managementGroups/c7a87cda-9a66-4920-b0f8-869baa04efe0/settings/default Type : Microsoft.Management/managementGroups/settings Name : default -TenantId : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 RequireAuthorizationForGroupCreation : false DefaultManagementGroup : TestGroup ``` @@ -70,7 +70,7 @@ New-AzManagementGroupHierarchySetting -GroupName c7a87cda-9a66-4920-b0f8-869baa0 Id : /providers/Microsoft.Management/managementGroups/c7a87cda-9a66-4920-b0f8-869baa04efe0/settings/default Type : Microsoft.Management/managementGroups/settings Name : default -TenantId : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 RequireAuthorizationForGroupCreation : true DefaultManagementGroup : TestGroup ``` diff --git a/azps-12.2.0/Az.Resources/New-AzManagementGroupSubscription.md b/azps-12.2.0/Az.Resources/New-AzManagementGroupSubscription.md index 9e983c3b1a..1ee6c6c1d1 100644 --- a/azps-12.2.0/Az.Resources/New-AzManagementGroupSubscription.md +++ b/azps-12.2.0/Az.Resources/New-AzManagementGroupSubscription.md @@ -34,7 +34,7 @@ New-AzManagementGroupSubscription -GroupName "TestGroup" -SubscriptionId 5602fbd Name : 5602fbd9-fb0d-4fbb-98b3-10c8ea20b6de Type : Microsoft.Management/managementGroups/subscriptions Id : /providers/Microsoft.Management/managementGroups/TestGroup/subscriptions/5602fbd9-fb0d-4fbb-98b3-10c8ea20b6de -TenantId : 14307de0-5e6f-46cf-b2ba-64a062964d30 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 DisplayName : Visual Studio Enterprise Subscription ParentId : /providers/Microsoft.Management/managementGroups/TestGroup State : Active diff --git a/azps-12.2.0/Az.Resources/New-AzRoleAssignment.md b/azps-12.2.0/Az.Resources/New-AzRoleAssignment.md index f8edfb8d1f..cd673940d7 100644 --- a/azps-12.2.0/Az.Resources/New-AzRoleAssignment.md +++ b/azps-12.2.0/Az.Resources/New-AzRoleAssignment.md @@ -160,14 +160,14 @@ Grant access to a security group ### Example 3 ```powershell -New-AzRoleAssignment -SignInName john.doe@contoso.com -RoleDefinitionName Owner -Scope "/subscriptions/86f81fc3-b00f-48cd-8218-3879f51ff362/resourcegroups/rg1/providers/Microsoft.Web/sites/site1" +New-AzRoleAssignment -SignInName john.doe@contoso.com -RoleDefinitionName Owner -Scope "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourcegroups/rg1/providers/Microsoft.Web/sites/site1" ``` Grant access to a user at a resource (website) ### Example 4 ```powershell -New-AzRoleAssignment -ObjectId 5ac84765-1c8c-4994-94b2-629461bd191b -RoleDefinitionName "Virtual Machine Contributor" -ResourceName Devices-Engineering-ProjectRND -ResourceType Microsoft.Network/virtualNetworks/subnets -ParentResource virtualNetworks/VNET-EASTUS-01 -ResourceGroupName Network +New-AzRoleAssignment -ObjectId 00001111-aaaa-2222-bbbb-3333cccc4444 -RoleDefinitionName "Virtual Machine Contributor" -ResourceName Devices-Engineering-ProjectRND -ResourceType Microsoft.Network/virtualNetworks/subnets -ParentResource virtualNetworks/VNET-EASTUS-01 -ResourceGroupName Network ``` Grant access to a group at a nested resource (subnet) diff --git a/azps-12.2.0/Az.Resources/New-AzRoleAssignmentScheduleRequest.md b/azps-12.2.0/Az.Resources/New-AzRoleAssignmentScheduleRequest.md index 6055d316fe..03febc5f06 100644 --- a/azps-12.2.0/Az.Resources/New-AzRoleAssignmentScheduleRequest.md +++ b/azps-12.2.0/Az.Resources/New-AzRoleAssignmentScheduleRequest.md @@ -34,7 +34,7 @@ Creates a role assignment schedule request. $guid = "12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" $startTime = Get-Date -Format o $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -New-AzRoleAssignmentScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType AdminAssign -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +New-AzRoleAssignmentScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 00001111-aaaa-2222-bbbb-3333cccc4444 -RequestType AdminAssign -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime ``` ```output @@ -50,7 +50,7 @@ Creates a request to provision an active assignment of `roleDefinition` on the ` $guid = "13f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" $startTime = Get-Date -Format o $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -New-AzRoleAssignmentScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType AdminRemove -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +New-AzRoleAssignmentScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 00001111-aaaa-2222-bbbb-3333cccc4444 -RequestType AdminRemove -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime ``` ```output @@ -66,7 +66,7 @@ Creates a request to remove an active assignment of `roleDefinition` on the `sco $guid = "12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" $startTime = Get-Date -Format o $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -New-AzRoleAssignmentScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType SelfActivate -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +New-AzRoleAssignmentScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 00001111-aaaa-2222-bbbb-3333cccc4444 -RequestType SelfActivate -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime ``` ```output @@ -82,7 +82,7 @@ Creates a request to activate an eligible assignment of `roleDefinition` on the $guid = "12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" $startTime = Get-Date -Format o $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -New-AzRoleAssignmentScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType SelfDeactivate -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +New-AzRoleAssignmentScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 00001111-aaaa-2222-bbbb-3333cccc4444 -RequestType SelfDeactivate -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime ``` ```output diff --git a/azps-12.2.0/Az.Resources/New-AzRoleEligibilityScheduleRequest.md b/azps-12.2.0/Az.Resources/New-AzRoleEligibilityScheduleRequest.md index ee37eb62fb..165cf3b2b2 100644 --- a/azps-12.2.0/Az.Resources/New-AzRoleEligibilityScheduleRequest.md +++ b/azps-12.2.0/Az.Resources/New-AzRoleEligibilityScheduleRequest.md @@ -34,7 +34,7 @@ Creates a role eligibility schedule request. $guid = "12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" $startTime = Get-Date -Format o $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -New-AzRoleEligibilityScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType AdminAssign -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +New-AzRoleEligibilityScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 00001111-aaaa-2222-bbbb-3333cccc4444 -RequestType AdminAssign -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime ``` ```output @@ -50,7 +50,7 @@ Creates a request to provision an eligible assignment of `roleDefinition` on the $guid = "13f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" $startTime = Get-Date -Format o $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -New-AzRoleEligibilityScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType AdminRemove -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +New-AzRoleEligibilityScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 00001111-aaaa-2222-bbbb-3333cccc4444 -RequestType AdminRemove -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime ``` ```output diff --git a/azps-12.2.0/Az.Resources/Remove-AzADServicePrincipalAppRoleAssignment.md b/azps-12.2.0/Az.Resources/Remove-AzADServicePrincipalAppRoleAssignment.md index c04023ede1..ae06933e7f 100644 --- a/azps-12.2.0/Az.Resources/Remove-AzADServicePrincipalAppRoleAssignment.md +++ b/azps-12.2.0/Az.Resources/Remove-AzADServicePrincipalAppRoleAssignment.md @@ -27,7 +27,7 @@ Delete navigation property appRoleAssignments for servicePrincipals ### Example 1: Remove an app role from service principal ```powershell -Remove-AzADServicePrincipalAppRoleAssignment -AppRoleAssignmentId Zbm-cUeDXUmlicIc3eenIlTWN1A5UVFMigS0D3ED-dk -ServicePrincipalId 71beb965-8347-495d-a589-c21cdde7a722 +Remove-AzADServicePrincipalAppRoleAssignment -AppRoleAssignmentId Zbm-cUeDXUmlicIc3eenIlTWN1A5UVFMigS0D3ED-dk -ServicePrincipalId 00001111-aaaa-2222-bbbb-3333cccc4444 ``` Remove an app role from service principal. diff --git a/azps-12.2.0/Az.Resources/Remove-AzRoleAssignment.md b/azps-12.2.0/Az.Resources/Remove-AzRoleAssignment.md index cffffec441..eb6ae8f704 100644 --- a/azps-12.2.0/Az.Resources/Remove-AzRoleAssignment.md +++ b/azps-12.2.0/Az.Resources/Remove-AzRoleAssignment.md @@ -139,7 +139,7 @@ Removes a role assignment for john.doe@contoso.com who is assigned to the Reader ### Example 2 ```powershell -Remove-AzRoleAssignment -ObjectId 36f81fc3-b00f-48cd-8218-3879f51ff39f -RoleDefinitionName Reader +Remove-AzRoleAssignment -ObjectId 00001111-aaaa-2222-bbbb-3333cccc4444 -RoleDefinitionName Reader ``` Removes the role assignment to the group principal identified by the ObjectId and assigned to the Reader role. diff --git a/azps-12.2.0/Az.Resources/Remove-AzRoleDefinition.md b/azps-12.2.0/Az.Resources/Remove-AzRoleDefinition.md index ca5b749a8b..90b8a64452 100644 --- a/azps-12.2.0/Az.Resources/Remove-AzRoleDefinition.md +++ b/azps-12.2.0/Az.Resources/Remove-AzRoleDefinition.md @@ -54,7 +54,7 @@ Get-AzRoleDefinition -Name "Virtual Machine Operator" | Remove-AzRoleDefinition ### Example 2 ```powershell -Remove-AzRoleDefinition -Id "52a6cc13-ff92-47a8-a39b-2a8205c3087e" +Remove-AzRoleDefinition -Id "00001111-aaaa-2222-bbbb-3333cccc4444" ``` ## PARAMETERS diff --git a/azps-12.2.0/Az.Resources/Set-AzRoleAssignment.md b/azps-12.2.0/Az.Resources/Set-AzRoleAssignment.md index 282745f913..7297a47683 100644 --- a/azps-12.2.0/Az.Resources/Set-AzRoleAssignment.md +++ b/azps-12.2.0/Az.Resources/Set-AzRoleAssignment.md @@ -52,7 +52,7 @@ $ConditionVersion = "2.0" $Description = "This is a new role assignment for John" $Condition = "@Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:Path] StringEqualsIgnoreCase 'foo_storage_container'" - $roleAssignment = Get-AzRoleAssignment -Scope "/subscriptions/4e5329a6-39ce-4e13-b12e-11b30f015986/resourceGroups/contoso_rg" -PrincipalId "0c0f6cdc-90dd-4664-83c0-a0d986c4c604" + $roleAssignment = Get-AzRoleAssignment -Scope "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/contoso_rg" -PrincipalId "0c0f6cdc-90dd-4664-83c0-a0d986c4c604" $roleAssignment.Description = $Description $roleAssignment.Condition = $Condition $roleAssignment.ConditionVersion = $ConditionVersion @@ -64,7 +64,7 @@ $ConditionVersion = "2.0" RoleAssignmentId : /providers/Microsoft.Management/managementGroups/1273adef-00a3 -4086-a51a-dbcce1857d36/providers/Microsoft.Authorization/role Assignments/926c2a76-be19-4281-94de-38777629b9dc - Scope : /subscriptions/4e5329a6-39ce-4e13-b12e-11b30f015986/resourceGroups/contoso_rg + Scope : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/contoso_rg DisplayName : John Doe SignInName : John.Doe@Contoso.com RoleDefinitionName : Owner @@ -88,7 +88,7 @@ Set-AzRoleAssignment -InputFile "C:\RoleAssignments\example.json" -PassThru RoleAssignmentId : /providers/Microsoft.Management/managementGroups/1273adef-00a3 -4086-a51a-dbcce1857d36/providers/Microsoft.Authorization/role Assignments/926c2a76-be19-4281-94de-38777629b9dc - Scope : /subscriptions/4e5329a6-39ce-4e13-b12e-11b30f015986/resourceGroups/contoso_rg + Scope : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/contoso_rg DisplayName : John Doe SignInName : John.Doe@Contoso.com RoleDefinitionName : Owner diff --git a/azps-12.2.0/Az.Resources/Update-AzADServicePrincipalAppRoleAssignment.md b/azps-12.2.0/Az.Resources/Update-AzADServicePrincipalAppRoleAssignment.md index 01360f2a4a..12c5a77a8a 100644 --- a/azps-12.2.0/Az.Resources/Update-AzADServicePrincipalAppRoleAssignment.md +++ b/azps-12.2.0/Az.Resources/Update-AzADServicePrincipalAppRoleAssignment.md @@ -35,7 +35,7 @@ Update the navigation property appRoleAssignments in servicePrincipals ### Example 1: Update the AppRoleId ```powershell -Update-AzADServicePrincipalAppRoleAssignment -AppRoleAssignmentId Zbm-cUeDXUmlicIc3eenIoFW9pZ_gRBIudKgu0gaMIw -ServicePrincipalId 71beb965-8347-495d-a589-c21cdde7a722 -AppRoleId 649ae968-bdf9-4f22-bb2c-2aa1b4af0a83 +Update-AzADServicePrincipalAppRoleAssignment -AppRoleAssignmentId Zbm-cUeDXUmlicIc3eenIoFW9pZ_gRBIudKgu0gaMIw -ServicePrincipalId 00001111-aaaa-2222-bbbb-3333cccc4444 -AppRoleId 649ae968-bdf9-4f22-bb2c-2aa1b4af0a83 ``` Update the assigned App role id. diff --git a/azps-12.2.0/Az.Resources/Update-AzManagementGroup.md b/azps-12.2.0/Az.Resources/Update-AzManagementGroup.md index e260192cfc..c6e7fc407d 100644 --- a/azps-12.2.0/Az.Resources/Update-AzManagementGroup.md +++ b/azps-12.2.0/Az.Resources/Update-AzManagementGroup.md @@ -56,13 +56,13 @@ Update-AzManagementGroup -GroupName "TestGroup" -DisplayName "New Display Name" Id : /providers/Microsoft.Management/managementGroups/TestGroup Type : /providers/Microsoft.Management/managementGroups Name : TestGroup -TenantId : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 DisplayName : New Display Name UpdatedTime : 2/1/2018 12:03:37 PM UpdatedBy : 64360beb-ffb4-43a8-9314-01aa34db95a9 -ParentId : /providers/Microsoft.Management/managementGroups/6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 -ParentName : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 -ParentDisplayName : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 +ParentId : /providers/Microsoft.Management/managementGroups/00001111-aaaa-2222-bbbb-3333cccc4444 +ParentName : 00001111-aaaa-2222-bbbb-3333cccc4444 +ParentDisplayName : 00001111-aaaa-2222-bbbb-3333cccc4444 ``` ### Example 2: Update a Management Group's Parent @@ -74,7 +74,7 @@ Update-AzManagementGroup -GroupName "TestGroup" -ParentId "/providers/Microsoft. Id : /providers/Microsoft.Management/managementGroups/TestGroup Type : /providers/Microsoft.Management/managementGroups Name : TestGroup -TenantId : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 DisplayName : TestGroup UpdatedTime : 2/1/2018 12:03:37 PM UpdatedBy : 64360beb-ffb4-43a8-9314-01aa34db95a9 @@ -92,7 +92,7 @@ Get-AzManagementGroup -GroupName "TestGroup" | Update-AzManagementGroup -Display Id : /providers/Microsoft.Management/managementGroups/TestGroup Type : /providers/Microsoft.Management/managementGroups Name : TestGroup -TenantId : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 DisplayName : TestDisplayName UpdatedTime : 2/1/2018 12:03:37 PM UpdatedBy : 64360beb-ffb4-43a8-9314-01aa34db95a9 @@ -111,10 +111,10 @@ Update-AzManagementGroup -GroupName "TestGroup" -ParentObject $parentObject Id : /providers/Microsoft.Management/managementGroups/TestGroup Type : /providers/Microsoft.Management/managementGroups Name : TestGroup -TenantId : 14307de0-5e6f-46cf-b2ba-64a062964d30 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 DisplayName : TestGroupDisplayName UpdatedTime : 2/1/2018 11:16:12 AM -UpdatedBy : 14307de0-5e6f-46cf-b2ba-64a062964d30 +UpdatedBy : 00001111-aaaa-2222-bbbb-3333cccc4444 ParentId : /providers/Microsoft.Management/managementGroups/TestGroupParent ParentName : TestGroupParent ParentDisplayName : TestGroupParent diff --git a/azps-12.2.0/Az.Resources/Update-AzManagementGroupHierarchySetting.md b/azps-12.2.0/Az.Resources/Update-AzManagementGroupHierarchySetting.md index 7b2af89dff..20ae56a22c 100644 --- a/azps-12.2.0/Az.Resources/Update-AzManagementGroupHierarchySetting.md +++ b/azps-12.2.0/Az.Resources/Update-AzManagementGroupHierarchySetting.md @@ -42,7 +42,7 @@ Update-AzManagementGroupHierarchySetting -GroupName c7a87cda-9a66-4920-b0f8-869b Id : /providers/Microsoft.Management/managementGroups/c7a87cda-9a66-4920-b0f8-869baa04efe0/settings/default Type : Microsoft.Management/managementGroups/settings Name : default -TenantId : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 RequireAuthorizationForGroupCreation : true DefaultManagementGroup : ``` @@ -56,7 +56,7 @@ Update-AzManagementGroupHierarchySetting -GroupName c7a87cda-9a66-4920-b0f8-869b Id : /providers/Microsoft.Management/managementGroups/c7a87cda-9a66-4920-b0f8-869baa04efe0/settings/default Type : Microsoft.Management/managementGroups/settings Name : default -TenantId : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 RequireAuthorizationForGroupCreation : false DefaultManagementGroup : TestGroup ``` @@ -70,7 +70,7 @@ Update-AzManagementGroupHierarchySetting -GroupName c7a87cda-9a66-4920-b0f8-869b Id : /providers/Microsoft.Management/managementGroups/c7a87cda-9a66-4920-b0f8-869baa04efe0/settings/default Type : Microsoft.Management/managementGroups/settings Name : default -TenantId : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 RequireAuthorizationForGroupCreation : true DefaultManagementGroup : TestGroup ``` diff --git a/azps-12.2.0/Az.SecurityInsights/Get-AzSentinelEntityInsight.md b/azps-12.2.0/Az.SecurityInsights/Get-AzSentinelEntityInsight.md index 307ed3c317..9b34f54ad9 100644 --- a/azps-12.2.0/Az.SecurityInsights/Get-AzSentinelEntityInsight.md +++ b/azps-12.2.0/Az.SecurityInsights/Get-AzSentinelEntityInsight.md @@ -47,7 +47,7 @@ This command gets insights for an Entity for a given time range. ```powershell $startTime = (Get-Date).AddDays(-7).ToUniversalTime() | Get-Date -Format "yyyy-MM-ddThh:00:00.000Z" $endTime = (Get-Date).ToUniversalTime() | Get-Date -Format "yyyy-MM-ddThh:00:00.000Z" - $Entity = Get-AzSentinelEntity -ResourceGroupName "myResourceGroupName" -workspaceName "myWorkspaceName" -EntityId "8d036a2d-f37d-e936-6cca-4e172687cb79" + $Entity = Get-AzSentinelEntity -ResourceGroupName "myResourceGroupName" -workspaceName "myWorkspaceName" -EntityId "00001111-aaaa-2222-bbbb-3333cccc4444" $Entity | Get-AzSentinelEntityInsight -EndTime $endTime -StartTime $startTime ``` diff --git a/azps-12.2.0/Az.SecurityInsights/New-AzSentinelIncidentTeam.md b/azps-12.2.0/Az.SecurityInsights/New-AzSentinelIncidentTeam.md index 309970061f..2a80597f21 100644 --- a/azps-12.2.0/Az.SecurityInsights/New-AzSentinelIncidentTeam.md +++ b/azps-12.2.0/Az.SecurityInsights/New-AzSentinelIncidentTeam.md @@ -44,7 +44,7 @@ $incident = Get-AzSentinelIncident -ResourceGroupName "myResourceGroup" -Workspa Description : Name : Incident : NewIncident3 PrimaryChannelUrl : https://teams.microsoft.com/l/team/19:vYoGjeGlZmTEDmu0gTbrk9T_eDS4pKIkEU7UuM1IyZk1%40thread.tacv2/conversations?groupId=3c637cc5-caf1-46c7-93ac-069c6 - 4b05395&tenantId=8f21ced5-2eff-4f8d-aff1-4dbb4cee8e3d + 4b05395&tenantId=00001111-aaaa-2222-bbbb-3333cccc4444 TeamCreationTimeUtc : 2/4/2022 3:02:03 PM TeamId : 3c637cc5-caf1-46c7-93ac-069c64b05395 ``` diff --git a/azps-12.2.0/Az.Sql/Get-AzSqlInstance.md b/azps-12.2.0/Az.Sql/Get-AzSqlInstance.md index 635178610f..a6c2265ef3 100644 --- a/azps-12.2.0/Az.Sql/Get-AzSqlInstance.md +++ b/azps-12.2.0/Az.Sql/Get-AzSqlInstance.md @@ -385,14 +385,14 @@ AdministratorType : ActiveDirectory PrincipalType : Group Login : Dummy Sid : df7667b8-f9fd-4029-a0e3-b43c75ce9538 -TenantId : f553829b-6d84-481b-86a9-42db57c1dc73 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 AzureADOnlyAuthentication : True AdministratorType : ActiveDirectory PrincipalType : Group Login : Dummy2 Sid : df7667b8-f9fd-4029-a0e3-b43c75ce9538 -TenantId : f553829b-6d84-481b-86a9-42db57c1dc73 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 AzureADOnlyAuthentication : True ``` @@ -428,7 +428,7 @@ AdministratorType : ActiveDirectory PrincipalType : Group Login : Dummy Sid : df7667b8-f9fd-4029-a0e3-b43c75ce9538 -TenantId : f553829b-6d84-481b-86a9-42db57c1dc73 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 AzureADOnlyAuthentication : True ``` diff --git a/azps-12.2.0/Az.Sql/Get-AzSqlServer.md b/azps-12.2.0/Az.Sql/Get-AzSqlServer.md index 9c59790d28..806bae84b4 100644 --- a/azps-12.2.0/Az.Sql/Get-AzSqlServer.md +++ b/azps-12.2.0/Az.Sql/Get-AzSqlServer.md @@ -174,14 +174,14 @@ AdministratorType : ActiveDirectory PrincipalType : Group Login : Dummy Sid : df7667b8-f9fd-4029-a0e3-b43c75ce9538 -TenantId : f553829b-6d84-481b-86a9-42db57c1dc73 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 AzureADOnlyAuthentication : True AdministratorType : ActiveDirectory PrincipalType : Group Login : Dummy2 Sid : df7667b8-f9fd-4029-a0e3-b43c75ce9538 -TenantId : f553829b-6d84-481b-86a9-42db57c1dc73 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 AzureADOnlyAuthentication : True ``` @@ -207,7 +207,7 @@ AdministratorType : ActiveDirectory PrincipalType : Group Login : Dummy Sid : df7667b8-f9fd-4029-a0e3-b43c75ce9538 -TenantId : f553829b-6d84-481b-86a9-42db57c1dc73 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 AzureADOnlyAuthentication : True ``` diff --git a/azps-12.2.0/Az.Sql/New-AzSqlInstance.md b/azps-12.2.0/Az.Sql/New-AzSqlInstance.md index b501bc930a..a0544d8aed 100644 --- a/azps-12.2.0/Az.Sql/New-AzSqlInstance.md +++ b/azps-12.2.0/Az.Sql/New-AzSqlInstance.md @@ -358,7 +358,7 @@ AdministratorType : ActiveDirectory PrincipalType : Group Login : DummyLogin Sid : df7667b8-f9fd-4029-a0e3-b43c75ce9538 -TenantId : f553829b-6d84-481b-86a9-42db57c1dc73 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 AzureADOnlyAuthentication : True ``` diff --git a/azps-12.2.0/Az.Sql/New-AzSqlServer.md b/azps-12.2.0/Az.Sql/New-AzSqlServer.md index 497156da78..e161983325 100644 --- a/azps-12.2.0/Az.Sql/New-AzSqlServer.md +++ b/azps-12.2.0/Az.Sql/New-AzSqlServer.md @@ -76,7 +76,7 @@ AdministratorType : ActiveDirectory PrincipalType : Group Login : DummyLogin Sid : df7667b8-f9fd-4029-a0e3-b43c75ce9538 -TenantId : f553829b-6d84-481b-86a9-42db57c1dc73 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 AzureADOnlyAuthentication : True ``` diff --git a/azps-12.2.0/Az.SqlVirtualMachine/Assert-AzSqlVMEntraAuth.md b/azps-12.2.0/Az.SqlVirtualMachine/Assert-AzSqlVMEntraAuth.md index e845c0b2d9..335e5fcaf9 100644 --- a/azps-12.2.0/Az.SqlVirtualMachine/Assert-AzSqlVMEntraAuth.md +++ b/azps-12.2.0/Az.SqlVirtualMachine/Assert-AzSqlVMEntraAuth.md @@ -46,7 +46,7 @@ Validates system assigned managed identity for enabling Entra authentication on ### Example 2: ```powershell -Assert-AzSqlVMEntraAuth -ResourceGroupName 'ResourceGroup01' -Name 'sqlvm1' -IdentityType 'UserAssigned' -ManagedIdentityClientId '11111111-2222-3333-4444-555555555555' +Assert-AzSqlVMEntraAuth -ResourceGroupName 'ResourceGroup01' -Name 'sqlvm1' -IdentityType 'UserAssigned' -ManagedIdentityClientId '00001111-aaaa-2222-bbbb-3333cccc4444' ``` ```output @@ -70,7 +70,7 @@ Validates system assigned managed identity for enabling Entra authentication on ### Example 4: ```powershell $sqlVM = Get-AzSqlVM -ResourceGroupName 'ResourceGroup01' -Name 'sqlvm1' -$sqlVM | Assert-AzSqlVMEntraAuth -ResourceGroupName 'ResourceGroup01' -Name 'sqlvm1' -IdentityType 'UserAssigned' -ManagedIdentityClientId '11111111-2222-3333-4444-555555555555' +$sqlVM | Assert-AzSqlVMEntraAuth -ResourceGroupName 'ResourceGroup01' -Name 'sqlvm1' -IdentityType 'UserAssigned' -ManagedIdentityClientId '00001111-aaaa-2222-bbbb-3333cccc4444' ``` ```output diff --git a/azps-12.2.0/Az.SqlVirtualMachine/Update-AzSqlVM.md b/azps-12.2.0/Az.SqlVirtualMachine/Update-AzSqlVM.md index 3d0f225a3f..247770c335 100644 --- a/azps-12.2.0/Az.SqlVirtualMachine/Update-AzSqlVM.md +++ b/azps-12.2.0/Az.SqlVirtualMachine/Update-AzSqlVM.md @@ -227,7 +227,7 @@ Update a SQL virtual machine to enable Microsoft Entra authentication using "Sys ### Example 12 ```powershell -Update-AzSqlVM -ResourceGroupName 'ResourceGroup01' -Name 'sqlvm1' -IdentityType 'UserAssigned' -ManagedIdentityClientId '11111111-2222-3333-4444-555555555555' +Update-AzSqlVM -ResourceGroupName 'ResourceGroup01' -Name 'sqlvm1' -IdentityType 'UserAssigned' -ManagedIdentityClientId '00001111-aaaa-2222-bbbb-3333cccc4444' ``` ```output diff --git a/azps-12.2.0/Az.StackHCI/New-AzStackHciCluster.md b/azps-12.2.0/Az.StackHCI/New-AzStackHciCluster.md index 6d23907d4e..21c2bbe85d 100644 --- a/azps-12.2.0/Az.StackHCI/New-AzStackHciCluster.md +++ b/azps-12.2.0/Az.StackHCI/New-AzStackHciCluster.md @@ -32,7 +32,7 @@ Create an HCI cluster. ### Example 1: ```powershell -New-AzStackHciCluster -Name "myCluster" -ResourceGroupName "test-rg" -AadTenantId "c76bd4d1-bea3-45ea-be1b-4a745a675d07" -AadClientId "24a6e53d-04e5-44d2-b7cc-1b732a847dfc" -Location "eastus" +New-AzStackHciCluster -Name "myCluster" -ResourceGroupName "test-rg" -AadTenantId "00001111-aaaa-2222-bbbb-3333cccc4444" -AadClientId "24a6e53d-04e5-44d2-b7cc-1b732a847dfc" -Location "eastus" ``` ```output @@ -45,7 +45,7 @@ This command creates a Stack HCI cluster ### Example 2: ```powershell -New-AzStackHciCluster -Name "myCluster2" -ResourceGroupName "test-rg" -AadTenantId "c76bd4d1-bea3-45ea-be1b-4a745a675d07" -AadClientId "24a6e53d-04e5-44d2-b7cc-1b732a847dfc" -Location "westeurope" -DesiredPropertyDiagnosticLevel "Off" -DesiredPropertyWindowsServerSubscription "Enabled" +New-AzStackHciCluster -Name "myCluster2" -ResourceGroupName "test-rg" -AadTenantId "00001111-aaaa-2222-bbbb-3333cccc4444" -AadClientId "24a6e53d-04e5-44d2-b7cc-1b732a847dfc" -Location "westeurope" -DesiredPropertyDiagnosticLevel "Off" -DesiredPropertyWindowsServerSubscription "Enabled" ``` ```output diff --git a/azps-12.2.0/Az.StackHCI/Register-AzStackHCI.md b/azps-12.2.0/Az.StackHCI/Register-AzStackHCI.md index 4e0fabe83b..5d55b807b1 100644 --- a/azps-12.2.0/Az.StackHCI/Register-AzStackHCI.md +++ b/azps-12.2.0/Az.StackHCI/Register-AzStackHCI.md @@ -38,7 +38,7 @@ Register-AzStackHCI -SubscriptionId "12a0f531-56cb-4340-9501-257726d741fd" -Regi Result: Success ResourceId: /subscriptions/12a0f531-56cb-4340-9501-257726d741fd/resourceGroups/DemoHCICluster1-rg/providers/Microsoft.AzureStackHCI/clusters/DemoHCICluster1 PortalResourceURL: https://portal.azure.com/#@c31c0dbb-ce27-4c78-ad26-a5f717c14557/resource/subscriptions/12a0f531-56cb-4340-9501-257726d741fd/resourceGroups/DemoHCICluster1-rg/providers/Microsoft.AzureStackHCI/clusters/DemoHCICluster1/overview -PortalAADAppPermissionsURL: https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/ApplicationMenuBlade/CallAnAPI/appId/980be58d-578c-4cff-b4cd-43e9c3a77826/isMSAApp/ +PortalAADAppPermissionsURL: https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/ApplicationMenuBlade/CallAnAPI/appId/00001111-aaaa-2222-bbbb-3333cccc4444/isMSAApp/ ``` Invoking on one of the cluster node. @@ -52,7 +52,7 @@ Register-AzStackHCI -SubscriptionId "12a0f531-56cb-4340-9501-257726d741fd" -Comp Result: Success ResourceId: /subscriptions/12a0f531-56cb-4340-9501-257726d741fd/resourceGroups/DemoHCICluster2-rg/providers/Microsoft.AzureStackHCI/clusters/DemoHCICluster2 PortalResourceURL: https://portal.azure.com/#@c31c0dbb-ce27-4c78-ad26-a5f717c14557/resource/subscriptions/12a0f531-56cb-4340-9501-257726d741fd/resourceGroups/DemoHCICluster2-rg/providers/Microsoft.AzureStackHCI/clusters/DemoHCICluster2/overview -PortalAADAppPermissionsURL: https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/ApplicationMenuBlade/CallAnAPI/appId/950be58d-578c-4cff-b4cd-43e9c3a77866/isMSAApp/ +PortalAADAppPermissionsURL: https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/ApplicationMenuBlade/CallAnAPI/appId/00001111-aaaa-2222-bbbb-3333cccc4444/isMSAApp/ ``` Invoking from the management node. @@ -66,7 +66,7 @@ Register-AzStackHCI -SubscriptionId "12a0f531-56cb-4340-9501-257726d741fd" -ArmA Result: PendingForAdminConsent ResourceId: /subscriptions/12a0f531-56cb-4340-9501-257726d741fd/resourceGroups/DemoHCIRG/providers/Microsoft.AzureStackHCI/clusters/DemoHCICluster3 PortalResourceURL: https://portal.azure.com/#@c31c0dbb-ce27-4c78-ad26-a5f717c14557/resource/subscriptions/12a0f531-56cb-4340-9501-257726d741fd/resourceGroups/DemoHCIRG/providers/Microsoft.AzureStackHCI/clusters/DemoHCICluster3/overview -PortalAADAppPermissionsURL: https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/ApplicationMenuBlade/CallAnAPI/appId/980be58d-578c-4cff-b4cd-43e9c3a77866/isMSAApp/ +PortalAADAppPermissionsURL: https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/ApplicationMenuBlade/CallAnAPI/appId/00001111-aaaa-2222-bbbb-3333cccc4444/isMSAApp/ ``` Invoking from WAC. @@ -80,7 +80,7 @@ Register-AzStackHCI -SubscriptionId "12a0f531-56cb-4340-9501-257726d741fd" -Regi Result: Success ResourceId: /subscriptions/12a0f531-56cb-4340-9501-257726d741fd/resourceGroups/HciRG/providers/Microsoft.AzureStackHCI/clusters/HciCluster1 PortalResourceURL: https://portal.azure.com/#@c31c0dbb-ce27-4c78-ad26-a5f717c14557/resource/subscriptions/12a0f531-56cb-4340-9501-257726d741fd/resourceGroups/HciRG/providers/Microsoft.AzureStackHCI/clusters/HciCluster1/overview -PortalAADAppPermissionsURL: https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/ApplicationMenuBlade/CallAnAPI/appId/990be58d-578c-4cff-b4cd-43e9c3a77866/isMSAApp/ +PortalAADAppPermissionsURL: https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/ApplicationMenuBlade/CallAnAPI/appId/00001111-aaaa-2222-bbbb-3333cccc4444/isMSAApp/ ``` Invoking with all the parameters. diff --git a/azps-12.2.0/Az.Storage/Get-AzStorageObjectReplicationPolicy.md b/azps-12.2.0/Az.Storage/Get-AzStorageObjectReplicationPolicy.md index ee672d0057..ab1ec8e743 100644 --- a/azps-12.2.0/Az.Storage/Get-AzStorageObjectReplicationPolicy.md +++ b/azps-12.2.0/Az.Storage/Get-AzStorageObjectReplicationPolicy.md @@ -37,13 +37,13 @@ The **Get-AzStorageObjectReplicationPolicy** cmdlet gets or lists object replica ``` -$policy = Get-AzStorageObjectReplicationPolicy -ResourceGroupName "myresourcegroup" -AccountName "mydestaccount" -PolicyId 56bfa11c-81ef-4f8d-b307-5e5386e16fba +$policy = Get-AzStorageObjectReplicationPolicy -ResourceGroupName "myresourcegroup" -AccountName "mydestaccount" -PolicyId 00001111-aaaa-2222-bbbb-3333cccc4444 $policy ResourceGroupName StorageAccountName PolicyId EnabledTime SourceAccount DestinationAccount Rules ----------------- ------------------ -------- ----------- ------------- ------------------ ----- -myresourcegroup mydestaccount 56bfa11c-81ef-4f8d-b307-5e5386e16fba mysourceaccount mydestaccount [5fa8b1d6-4985-4abd-a0b3-ec4d07295a43,...] +myresourcegroup mydestaccount 00001111-aaaa-2222-bbbb-3333cccc4444 mysourceaccount mydestaccount [5fa8b1d6-4985-4abd-a0b3-ec4d07295a43,...] $policy.Rules @@ -65,7 +65,7 @@ $policies ```output ResourceGroupName StorageAccountName PolicyId EnabledTime SourceAccount DestinationAccount Rules ----------------- ------------------ -------- ----------- ------------- ------------------ ----- -myresourcegroup mydestaccount 56bfa11c-81ef-4f8d-b307-5e5386e16fba mysrcaccount1 mydestaccount [5fa8b1d6-4985-4abd-a0b3-ec4d07295a43,...] +myresourcegroup mydestaccount 00001111-aaaa-2222-bbbb-3333cccc4444 mysrcaccount1 mydestaccount [5fa8b1d6-4985-4abd-a0b3-ec4d07295a43,...] myresourcegroup mydestaccount 68434c7a-20d0-4282-b75c-43b5a243435e mysrcaccount2 mydestaccount [d3d39a01-8d92-40e5-849f-e56209ae5cf5,...] ``` diff --git a/azps-12.2.0/Az.StorageAction/New-AzStorageActionTask.md b/azps-12.2.0/Az.StorageAction/New-AzStorageActionTask.md index 16641e8b8b..c81d547653 100644 --- a/azps-12.2.0/Az.StorageAction/New-AzStorageActionTask.md +++ b/azps-12.2.0/Az.StorageAction/New-AzStorageActionTask.md @@ -163,7 +163,7 @@ ElseOperation : {{ }} Enabled : True Id : /subscriptions/11111111-2222-3333-4444-123456789101/resourceGroups/group001/providers/Microsoft.StorageActions/storageTasks/mytask3 -IdentityPrincipalId : 11111111-2222-3333-4444-123456789123 +IdentityPrincipalId : 00001111-aaaa-2222-bbbb-3333cccc4444 IdentityTenantId : 11111111-2222-3333-4444-123456789101 IdentityType : SystemAssigned IdentityUserAssignedIdentity : { diff --git a/azps-12.2.0/Az.StorageAction/Update-AzStorageActionTask.md b/azps-12.2.0/Az.StorageAction/Update-AzStorageActionTask.md index 136f7b785f..9fc6c61568 100644 --- a/azps-12.2.0/Az.StorageAction/Update-AzStorageActionTask.md +++ b/azps-12.2.0/Az.StorageAction/Update-AzStorageActionTask.md @@ -105,8 +105,8 @@ ElseOperation : {{ }} Enabled : True Id : /subscriptions/11111111-2222-3333-4444-123456789101/resourceGroups/group001/providers/Microsoft.StorageActions/storageTasks/mytask3 -IdentityPrincipalId : 11111111-2222-3333-4444-123456789123 -IdentityTenantId : 11111111-2222-3333-4444-987654321012 +IdentityPrincipalId : 00001111-aaaa-2222-bbbb-3333cccc4444 +IdentityTenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 IdentityType : SystemAssigned IdentityUserAssignedIdentity : { } @@ -149,8 +149,8 @@ ElseOperation : Enabled : True Id : /subscriptions/11111111-2222-3333-4444-123456789101/resourceGroups/group001/providers/Microsoft.StorageActions/storageTasks/myta sk1 -IdentityPrincipalId : 66aefa04-060e-4eeb-9342-7228e31d1596 -IdentityTenantId : 72f988bf-86f1-41af-91ab-2d7cd011db47 +IdentityPrincipalId : 00001111-aaaa-2222-bbbb-3333cccc4444 +IdentityTenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 IdentityType : SystemAssigned IdentityUserAssignedIdentity : { } diff --git a/azps-12.2.0/Az.Synapse/New-AzSynapseRoleAssignment.md b/azps-12.2.0/Az.Synapse/New-AzSynapseRoleAssignment.md index b1ac95b581..5dae6a35a8 100644 --- a/azps-12.2.0/Az.Synapse/New-AzSynapseRoleAssignment.md +++ b/azps-12.2.0/Az.Synapse/New-AzSynapseRoleAssignment.md @@ -84,7 +84,7 @@ The cmdlet may call below Microsoft Graph API according to input parameters: >[!Note] > To create a role assignment for a service principal, pass the object ID of the principal in the ObjectId parameter. -> When you are a user with permission to manage Azure RBAC role assignment on the workspace but not a Synapse Administrator, please create Synapse Administrator role by **-RoleDefinitionId** and **-ObjectId** directly but not by **-RoleDefinitionName**, for Synapse Administrator, RoleDefinitionId is "6e4bf58a-b8e1-4cc3-bbf9-d73143322b78", please take below Example 5 as reference. The reason for this is , when you try to add a "Synapse Administrator" role, the cmdlet needs to get the role ID from the role name which requires workspace read permission, which the current user does not have. +> When you are a user with permission to manage Azure RBAC role assignment on the workspace but not a Synapse Administrator, please create Synapse Administrator role by **-RoleDefinitionId** and **-ObjectId** directly but not by **-RoleDefinitionName**, for Synapse Administrator, RoleDefinitionId is "00001111-aaaa-2222-bbbb-3333cccc4444", please take below Example 5 as reference. The reason for this is , when you try to add a "Synapse Administrator" role, the cmdlet needs to get the role ID from the role name which requires workspace read permission, which the current user does not have. ## EXAMPLES @@ -120,7 +120,7 @@ This command assigns ContosoRole to the user whose principal name is ContosoName ### Example 5 ```powershell $ws = Get-AzSynapseWorkspace -Name ContosoWorkspace -$ws | New-AzSynapseRoleAssignment -RoleDefinitionId "6e4bf58a-b8e1-4cc3-bbf9-d73143322b78" -ObjectId ContosoObjectId +$ws | New-AzSynapseRoleAssignment -RoleDefinitionId "00001111-aaaa-2222-bbbb-3333cccc4444" -ObjectId ContosoObjectId ``` This command assigns Synapse Administrator role to the user whose object Id is ContosoObjectId through pipeline. diff --git a/azps-12.2.0/Az.Synapse/Update-AzSynapseManagedVirtualNetworkConfig.md b/azps-12.2.0/Az.Synapse/Update-AzSynapseManagedVirtualNetworkConfig.md index d9726c2a26..c831851fd6 100644 --- a/azps-12.2.0/Az.Synapse/Update-AzSynapseManagedVirtualNetworkConfig.md +++ b/azps-12.2.0/Az.Synapse/Update-AzSynapseManagedVirtualNetworkConfig.md @@ -28,7 +28,7 @@ The **Update-AzSynapseManagedVirtualNetworkConfig** cmdlet updates managed virtu ### Example 1 ```powershell $ws = Get-AzSynapseWorkspace -ResourceGroupName ContosoResourceGroup -WorkspaceName ContosoWorkspace -$ws = $ws | Update-AzSynapseManagedVirtualNetworkConfig -AllowedAadTenantIdsForLinking a96040c4-18dd-4dde-8181-f70daca04919 +$ws = $ws | Update-AzSynapseManagedVirtualNetworkConfig -AllowedAadTenantIdsForLinking 00001111-aaaa-2222-bbbb-3333cccc4444 $ws | Update-AzSynapseWorkspace ```