Skip to content

Commit

Permalink
[BULK] - DocuTune - Rebranding of Azure Active Dir
Browse files Browse the repository at this point in the history
  • Loading branch information
alexbuckgit committed Oct 19, 2023
1 parent cce5b01 commit e30d991
Show file tree
Hide file tree
Showing 40 changed files with 133 additions and 144 deletions.
3 changes: 1 addition & 2 deletions azps-0.10.0/Az.Accounts/Add-AzEnvironment.md
Original file line number Diff line number Diff line change
Expand Up @@ -103,7 +103,7 @@ In this example we are creating a new Azure environment with sample endpoints us
## PARAMETERS

### -ActiveDirectoryEndpoint
Specifies the base authority for Azure Active Directory authentication.
Specifies the base authority for Microsoft Entra authentication.

```yaml
Type: System.String
Expand Down Expand Up @@ -605,4 +605,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
[Remove-AzEnvironment](./Remove-AzEnvironment.md)
[Set-AzEnvironment](./Set-AzEnvironment.md)
3 changes: 1 addition & 2 deletions azps-0.10.0/Az.Accounts/Set-AzEnvironment.md
Original file line number Diff line number Diff line change
Expand Up @@ -97,7 +97,7 @@ In this example we are creating a new Azure environment with sample endpoints us
## PARAMETERS

### -ActiveDirectoryEndpoint
Specifies the base authority for Azure Active Directory authentication.
Specifies the base authority for Microsoft Entra authentication.

```yaml
Type: System.String
Expand Down Expand Up @@ -599,4 +599,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
[Get-AzEnvironment](./Get-AzEnvironment.md)
[Remove-AzEnvironment](./Remove-AzEnvironment.md)
4 changes: 1 addition & 3 deletions azps-0.10.0/Az.Compute/Get-AzVMADDomainExtension.md
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ Get-AzVMADDomainExtension [-ResourceGroupName] <String> [-VMName] <String> [-Nam
```

## DESCRIPTION
The **Get-AzVMADDomainExtension** cmdlet gets information about the specified Azure Active Directory (AD) domain extension.
The **Get-AzVMADDomainExtension** cmdlet gets information about the specified Microsoft Entra domain extension.

## EXAMPLES

Expand Down Expand Up @@ -124,5 +124,3 @@ This cmdlet does not accept any input.
## RELATED LINKS
[Set-AzVMADDomainExtension](./Set-AzVMADDomainExtension.md)
2 changes: 1 addition & 1 deletion azps-0.10.0/Az.Compute/Set-AzVMADDomainExtension.md
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ Set-AzVMADDomainExtension -DomainName <String> [-OUPath <String>] [-JoinOption <
```

## DESCRIPTION
The **Set-AzVMADDomainExtension** cmdlet adds an Azure Active Directory (AD) domain virtual machine extension to a virtual machine.
The **Set-AzVMADDomainExtension** cmdlet adds a Microsoft Entra domain virtual machine extension to a virtual machine.
This extension lets your virtual machine join a domain.

## EXAMPLES
Expand Down
34 changes: 20 additions & 14 deletions azps-0.10.0/Az.Compute/Set-AzVMDiskEncryptionExtension.md
Original file line number Diff line number Diff line change
Expand Up @@ -46,7 +46,9 @@ It is advised that you save your work on the virtual machine before you run this

## EXAMPLES

### Example 1: Enable encryption using Azure AD Client ID and Client Secret
<a name='example-1-enable-encryption-using-azure-ad-client-id-and-client-secret'></a>

### Example 1: Enable encryption using Microsoft Entra Client ID and Client Secret
```
$RGName = "MyResourceGroup"
$VMName = "MyTestVM"
Expand All @@ -59,9 +61,11 @@ $KeyVaultResourceId = $KeyVault.ResourceId
Set-AzVMDiskEncryptionExtension -ResourceGroupName $RGName -VMName $VMName -AadClientID $AADClientID -AadClientSecret $AADClientSecret -DiskEncryptionKeyVaultUrl $DiskEncryptionKeyVaultUrl -DiskEncryptionKeyVaultId $KeyVaultResourceId
```

This example enables encryption using Azure AD client ID, and client secret.
This example enables encryption using Microsoft Entra client ID, and client secret.

<a name='example-2-enable-encryption-using-azure-ad-client-id-and-client-certification-thumbprint'></a>

### Example 2: Enable encryption using Azure AD client ID and client certification thumbprint
### Example 2: Enable encryption using Microsoft Entra client ID and client certification thumbprint
```
$RGName = "MyResourceGroup"
$VMName = "MyTestVM"
Expand Down Expand Up @@ -111,9 +115,11 @@ Update-AzVM -VM $VM -ResourceGroupName $RGName
Set-AzVMDiskEncryptionExtension -ResourceGroupName $RGName -VMName $VMName -AadClientID $AADClientID -AadClientCertThumbprint $AADClientCertThumbprint -DiskEncryptionKeyVaultUrl $DiskEncryptionKeyVaultUrl -DiskEncryptionKeyVaultId $KeyVaultResourceId
```

This example enables encryption using Azure AD client ID and client certification thumbprints.
This example enables encryption using Microsoft Entra client ID and client certification thumbprints.

<a name='example-3-enable-encryption-using-azure-ad-client-id-client-secret-and-wrap-disk-encryption-key-by-using-key-encryption-key'></a>

### Example 3: Enable encryption using Azure AD client ID, client secret, and wrap disk encryption key by using key encryption key
### Example 3: Enable encryption using Microsoft Entra client ID, client secret, and wrap disk encryption key by using key encryption key
```
$RGName = "MyResourceGroup"
$VMName = "MyTestVM"
Expand All @@ -132,9 +138,11 @@ $KeyEncryptionKeyUrl = $KEK.Key.kid
Set-AzVMDiskEncryptionExtension -ResourceGroupName $RGName -VMName $VMName -AadClientID $AADClientID -AadClientSecret $AADClientSecret -DiskEncryptionKeyVaultUrl $DiskEncryptionKeyVaultUrl -DiskEncryptionKeyVaultId $KeyVaultResourceId -KeyEncryptionKeyUrl $KeyEncryptionKeyUrl -KeyEncryptionKeyVaultId $KeyVaultResourceId
```

This example enables encryption using Azure AD client ID, client secret, and wrap disk encryption key by using the key encryption key.
This example enables encryption using Microsoft Entra client ID, client secret, and wrap disk encryption key by using the key encryption key.

### Example 4: Enable encryption using Azure AD client ID, client cert thumbprint, and wrap disk encryptionkey by using key encryption key
<a name='example-4-enable-encryption-using-azure-ad-client-id-client-cert-thumbprint-and-wrap-disk-encryptionkey-by-using-key-encryption-key'></a>

### Example 4: Enable encryption using Microsoft Entra client ID, client cert thumbprint, and wrap disk encryptionkey by using key encryption key
```
$RGName = "MyResourceGroup"
$VMName = "MyTestVM"
Expand Down Expand Up @@ -185,13 +193,13 @@ Update-AzVM -VM $VM -ResourceGroupName $RGName
Set-AzVMDiskEncryptionExtension -ResourceGroupName $RGname -VMName $VMName -AadClientID $AADClientID -AadClientCertThumbprint $AADClientCertThumbprint -DiskEncryptionKeyVaultUrl $DiskEncryptionKeyVaultUrl -DiskEncryptionKeyVaultId $KeyVaultResourceId
```

This example enables encryption using Azure AD client ID, client cert thumbprint, and wrap disk encryption key by using key encryption key.
This example enables encryption using Microsoft Entra client ID, client cert thumbprint, and wrap disk encryption key by using key encryption key.

## PARAMETERS

### -AadClientCertThumbprint
Specifies the thumbprint of the AzureActive Directory (Azure AD) application client certificate that has permissions to write secrets to **KeyVault**.
As a prerequisite, the Azure AD client certificate must be previously deployed to the virtual machine's local computer `my` certificate store.
Specifies the thumbprint of the Microsoft Entra application client certificate that has permissions to write secrets to **KeyVault**.
As a prerequisite, the Microsoft Entra client certificate must be previously deployed to the virtual machine's local computer `my` certificate store.
The Add-AzVMSecret cmdlet can be used to deploy a certificate to a virtual machine in Azure.
For more details, see the **Add-AzVMSecret** cmdlet help.
The certificate must be previously deployed to the virtual machine local computer my certificate store.
Expand All @@ -209,7 +217,7 @@ Accept wildcard characters: False
```
### -AadClientID
Specifies the client ID of the Azure AD application that has permissions to write secrets to **KeyVault**.
Specifies the client ID of the Microsoft Entra application that has permissions to write secrets to **KeyVault**.
```yaml
Type: String
Expand All @@ -224,7 +232,7 @@ Accept wildcard characters: False
```
### -AadClientSecret
Specifies the client secret of the Azure AD application that has permissions to write secrets to **KeyVault**.
Specifies the client secret of the Microsoft Entra application that has permissions to write secrets to **KeyVault**.
```yaml
Type: String
Expand Down Expand Up @@ -587,5 +595,3 @@ This cmdlet does not accept any input.
[Get-AzVMDiskEncryptionStatus](./Get-AzVMDiskEncryptionStatus.md)
[Remove-AzVMDiskEncryptionExtension](./Remove-AzVMDiskEncryptionExtension.md)
7 changes: 3 additions & 4 deletions azps-0.10.0/Az.KeyVault/Remove-AzKeyVaultAccessPolicy.md
Original file line number Diff line number Diff line change
Expand Up @@ -70,7 +70,7 @@ PS C:\>Remove-AzKeyVaultAccessPolicy -VaultName 'Contoso03Vault' -ServicePrincip
```

This command removes all the permissions that an application has on the key vault named Contoso03Vault.
This example identifies the application by using the service principal name registered in Azure Active Directory, `http://payroll.contoso.com`.
This example identifies the application by using the service principal name registered in Microsoft Entra ID, `http://payroll.contoso.com`.

### Example 3: Remove permissions for an application by using its object ID
```
Expand Down Expand Up @@ -180,7 +180,7 @@ Accept wildcard characters: False
```
### -ObjectId
Specifies the object ID of the user or service principal in Azure Active Directory for which to remove permissions.
Specifies the object ID of the user or service principal in Microsoft Entra ID for which to remove permissions.
```yaml
Type: String
Expand Down Expand Up @@ -228,7 +228,7 @@ Accept wildcard characters: False
### -ServicePrincipalName
Specifies the service principal name of the application whose permissions you want to remove.
Specify the application ID, also known as client ID, registered for the application in Azure Active Directory.
Specify the application ID, also known as client ID, registered for the application in Microsoft Entra ID.
```yaml
Type: String
Expand Down Expand Up @@ -321,4 +321,3 @@ This cmdlet does not accept any input.
## RELATED LINKS
[Set-AzKeyVaultAccessPolicy](./Set-AzKeyVaultAccessPolicy.md)
11 changes: 5 additions & 6 deletions azps-0.10.0/Az.KeyVault/Set-AzKeyVaultAccessPolicy.md
Original file line number Diff line number Diff line change
Expand Up @@ -82,7 +82,7 @@ PS C:\> Set-AzKeyVaultAccessPolicy -VaultName 'Contoso03Vault' -UserPrincipalNam
PS C:\> Set-AzKeyVaultAccessPolicy -VaultName 'Contoso03Vault' -UserPrincipalName '[email protected]' -PermissionsToKeys @() -PassThru
```

The first command grants permissions for a user in your Azure Active Directory, [email protected], to perform operations on keys and secrets with a key vault named Contoso03Vault.
The first command grants permissions for a user in your Microsoft Entra ID, [email protected], to perform operations on keys and secrets with a key vault named Contoso03Vault.

The second command modifies the permissions that were granted to [email protected] in the first command, to now allow getting secrets in addition to setting and deleting them. The permissions to key operations remain unchanged after this command. The *PassThru* parameter results in the updated object being returned by the cmdlet.

Expand All @@ -95,7 +95,7 @@ PS C:\>Set-AzKeyVaultAccessPolicy -VaultName 'Contoso03Vault' -ServicePrincipalN

This command grants permissions for an application for a key vault named Contoso03Vault.

The *ServicePrincipalName* parameter specifies the application. The application must be registered in your Azure Active Directory. The value of the *ServicePrincipalName* parameter must be either the service principal name of the application or the application ID GUID.
The *ServicePrincipalName* parameter specifies the application. The application must be registered in your Microsoft Entra ID. The value of the *ServicePrincipalName* parameter must be either the service principal name of the application or the application ID GUID.

This example specifies the service principal name `http://payroll.contoso.com`, and the command grants the application permissions to read and write secrets.

Expand Down Expand Up @@ -167,7 +167,7 @@ Accept wildcard characters: False
```
### -BypassObjectIdValidation
Enables you to specify an object ID without validating that the object exists in Azure Active Directory.
Enables you to specify an object ID without validating that the object exists in Microsoft Entra ID.
Use this parameter only if you want to grant access to your key vault to an object ID that refers to a delegated security group from another Azure tenant.
Expand Down Expand Up @@ -261,7 +261,7 @@ Accept wildcard characters: False
```
### -ObjectId
Specifies the object ID of the user or service principal in Azure Active Directory for which to grant permissions.
Specifies the object ID of the user or service principal in Microsoft Entra ID for which to grant permissions.
```yaml
Type: String
Expand Down Expand Up @@ -419,7 +419,7 @@ Accept wildcard characters: False
### -ServicePrincipalName
Specifies the service principal name of the application to which to grant permissions.
Specify the application ID, also known as client ID, registered for the application in AzureActive Directory. The application with the service principal name that this parameter specifies must be registered in the Azure directory that contains your current subscription.
Specify the application ID, also known as client ID, registered for the application in Microsoft Entra ID. The application with the service principal name that this parameter specifies must be registered in the Azure directory that contains your current subscription.
```yaml
Type: String
Expand Down Expand Up @@ -515,4 +515,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
[Get-AzKeyVault](./Get-AzKeyVault.md)
[Remove-AzKeyVaultAccessPolicy](./Remove-AzKeyVaultAccessPolicy.md)
15 changes: 7 additions & 8 deletions azps-0.10.0/Az.Resources/Az.Resources.md
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ Captures a resource group as a template and saves it to a file.
Retrieves a list of credentials associated with an application.

### [Get-AzADApplication](Get-AzADApplication.md)
Lists existing azure active directory applications.
Lists existing Microsoft Entra applications.

### [Get-AzADGroup](Get-AzADGroup.md)
Filters active directory groups.
Expand Down Expand Up @@ -109,13 +109,13 @@ Moves a resource to a different resource group or subscription.
Adds a credential to an existing application.

### [New-AzADApplication](New-AzADApplication.md)
Creates a new azure active directory application.
Creates a new Microsoft Entra application.

### [New-AzADGroup](New-AzADGroup.md)
Creates a new active directory group.

### [New-AzADServicePrincipal](New-AzADServicePrincipal.md)
Creates a new azure active directory service principal.
Creates a new Microsoft Entra service principal.

### [New-AzADSpCredential](New-AzADSpCredential.md)
Adds a credential to an existing service principal.
Expand Down Expand Up @@ -179,7 +179,7 @@ Registers a resource provider.
Removes a credential from an application.

### [Remove-AzADApplication](Remove-AzADApplication.md)
Deletes the azure active directory application.
Deletes the Microsoft Entra application.

### [Remove-AzADGroup](Remove-AzADGroup.md)
Deletes an active directory group.
Expand All @@ -188,7 +188,7 @@ Deletes an active directory group.
Removes a user from an AD group.

### [Remove-AzADServicePrincipal](Remove-AzADServicePrincipal.md)
Deletes the azure active directory service principal.
Deletes the Microsoft Entra service principal.

### [Remove-AzADSpCredential](Remove-AzADSpCredential.md)
Removes a credential from a service principal.
Expand Down Expand Up @@ -293,14 +293,13 @@ Validates a resource group deployment.
Unregisters a resource provider.

### [Update-AzADApplication](Update-AzADApplication.md)
Updates an existing azure active directory application.
Updates an existing Microsoft Entra application.

### [Update-AzADServicePrincipal](Update-AzADServicePrincipal.md)
Updates an existing azure active directory service principal.
Updates an existing Microsoft Entra service principal.

### [Update-AzADUser](Update-AzADUser.md)
Updates an existing active directory user.

### [Update-AzManagementGroup](Update-AzManagementGroup.md)
Updates a Management Group

5 changes: 2 additions & 3 deletions azps-0.10.0/Az.Resources/Get-AzADApplication.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ original_content_git_url: https://github.com/Azure/azure-powershell/blob/Azs-tzl
# Get-AzADApplication

## SYNOPSIS
Lists existing azure active directory applications.
Lists existing Microsoft Entra applications.

## SYNTAX

Expand Down Expand Up @@ -52,7 +52,7 @@ Get-AzADApplication -IdentifierUri <String> [-DefaultProfile <IAzureContextConta
```

## DESCRIPTION
Lists existing azure active directory applications.
Lists existing Microsoft Entra applications.
Application lookup can be done by ObjectId, ApplicationId, IdentifierUri or DisplayName.
If no parameter is provided, it fetches all applications under the tenant.

Expand Down Expand Up @@ -254,4 +254,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
[New-AzADApplication](./New-AzADApplication.md)
11 changes: 5 additions & 6 deletions azps-0.10.0/Az.Resources/Get-AzRoleAssignment.md
Original file line number Diff line number Diff line change
Expand Up @@ -129,9 +129,9 @@ Use the Get-AzRoleAssignment command to list all role assignments that are effec
Without any parameters, this command returns all the role assignments made under the subscription.
This list can be filtered using filtering parameters for principal, role and scope.
The subject of the assignment must be specified.
To specify a user, use SignInName or Azure AD ObjectId parameters.
To specify a security group, use Azure AD ObjectId parameter.
And to specify an Azure AD application, use ServicePrincipalName or ObjectId parameters.
To specify a user, use SignInName or Microsoft Entra ObjectId parameters.
To specify a security group, use Microsoft Entra ObjectId parameter.
And to specify a Microsoft Entra application, use ServicePrincipalName or ObjectId parameters.
The role that is being assigned must be specified using the RoleDefinitionName parameter.
The scope at which access is being granted may be specified.
It defaults to the selected subscription.
Expand Down Expand Up @@ -228,7 +228,7 @@ Accept wildcard characters: False
```
### -ObjectId
The Azure AD ObjectId of the User, Group or Service Principal.
The Microsoft Entra ObjectId of the User, Group or Service Principal.
Filters all assignments that are made to the specified principal.
```yaml
Expand Down Expand Up @@ -389,7 +389,7 @@ Accept wildcard characters: False
### -ServicePrincipalName
The ServicePrincipalName of the service principal.
Filters all assignments that are made to the specified Azure AD application.
Filters all assignments that are made to the specified Microsoft Entra application.
```yaml
Type: System.String
Expand Down Expand Up @@ -442,4 +442,3 @@ Keywords: azure, Az, arm, resource, management, manager, resource, group, templa
[Remove-AzRoleAssignment](./Remove-AzRoleAssignment.md)
[Get-AzRoleDefinition](./Get-AzRoleDefinition.md)
17 changes: 10 additions & 7 deletions azps-0.10.0/Az.Resources/New-AzADApplication.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ original_content_git_url: https://github.com/Azure/azure-powershell/blob/Azs-tzl
# New-AzADApplication

## SYNOPSIS
Creates a new azure active directory application.
Creates a new Microsoft Entra application.

## SYNTAX

Expand Down Expand Up @@ -51,27 +51,31 @@ New-AzADApplication -DisplayName <String> -IdentifierUris <String[]> [-HomePage
```

## DESCRIPTION
Creates a new azure active directory application.
Creates a new Microsoft Entra application.

## EXAMPLES

### Example 1 - Create new AAD application.
<a name='example-1---create-new-aad-application'></a>

### Example 1 - Create new Microsoft Entra application.

```
PS C:\> New-AzADApplication -DisplayName "NewApplication" -HomePage "http://www.microsoft.com" -IdentifierUris "http://NewApplication"
```

Creates a new azure active directory application without any credentials.
Creates a new Microsoft Entra application without any credentials.

<a name='example-2---create-new-aad-application-with-password'></a>

### Example 2 - Create new AAD application with password.
### Example 2 - Create new Microsoft Entra application with password.

```
PS C:\> $SecureStringPassword = ConvertTo-SecureString -String "password" -AsPlainText -Force
PS C:\> New-AzADApplication -DisplayName "NewApplication" -HomePage "http://www.microsoft.com" -IdentifierUris "http:
//NewApplication" -Password $SecureStringPassword
```

Creates a new azure active directory application and associates password credentials with it.
Creates a new Microsoft Entra application and associates password credentials with it.

## PARAMETERS

Expand Down Expand Up @@ -330,4 +334,3 @@ Keywords: azure, Az, arm, resource, management, manager, resource, group, templa
[New-AzADAppCredential](./New-AzADAppCredential.md)
[Remove-AzADAppCredential](./Remove-AzADAppCredential.md)
Loading

0 comments on commit e30d991

Please sign in to comment.