From e30d991e75bcbf189e6968090135dab532e6e014 Mon Sep 17 00:00:00 2001 From: Alex Buck Date: Wed, 18 Oct 2023 23:33:59 -0400 Subject: [PATCH] [BULK] - DocuTune - Rebranding of Azure Active Dir --- azps-0.10.0/Az.Accounts/Add-AzEnvironment.md | 3 +- azps-0.10.0/Az.Accounts/Set-AzEnvironment.md | 3 +- .../Az.Compute/Get-AzVMADDomainExtension.md | 4 +-- .../Az.Compute/Set-AzVMADDomainExtension.md | 2 +- .../Set-AzVMDiskEncryptionExtension.md | 34 +++++++++++-------- .../Remove-AzKeyVaultAccessPolicy.md | 7 ++-- .../Az.KeyVault/Set-AzKeyVaultAccessPolicy.md | 11 +++--- azps-0.10.0/Az.Resources/Az.Resources.md | 15 ++++---- .../Az.Resources/Get-AzADApplication.md | 5 ++- .../Az.Resources/Get-AzRoleAssignment.md | 11 +++--- .../Az.Resources/New-AzADApplication.md | 17 ++++++---- .../Az.Resources/New-AzADServicePrincipal.md | 5 ++- .../Az.Resources/New-AzPolicyAssignment.md | 4 +-- .../Az.Resources/New-AzRoleAssignment.md | 8 ++--- .../Az.Resources/Remove-AzADApplication.md | 5 ++- .../Remove-AzADServicePrincipal.md | 4 +-- .../Az.Resources/Remove-AzRoleAssignment.md | 5 ++- .../Az.Resources/Set-AzPolicyAssignment.md | 4 +-- .../Az.Resources/Update-AzADApplication.md | 4 +-- .../Update-AzADServicePrincipal.md | 4 +-- azps-10.3.0/Az.Accounts/Add-AzEnvironment.md | 3 +- azps-10.3.0/Az.Accounts/Connect-AzAccount.md | 2 +- .../Az.Accounts/Invoke-AzRestMethod.md | 2 +- azps-10.3.0/Az.Accounts/Set-AzEnvironment.md | 3 +- azps-10.3.0/Az.Aks/New-AzAksCluster.md | 6 ++-- azps-10.3.0/Az.Aks/Set-AzAksCluster.md | 6 ++-- .../Get-AzApiManagementIdentityProvider.md | 12 ++++--- ...iManagementIdentityProviderClientSecret.md | 6 ++-- .../Az.ApiManagement/New-AzApiManagement.md | 2 +- .../New-AzApiManagementGroup.md | 6 ++-- .../New-AzApiManagementIdentityProvider.md | 14 ++++---- .../Az.ApiManagement/Set-AzApiManagement.md | 2 +- .../Set-AzApiManagementIdentityProvider.md | 14 ++++---- .../Az.App/New-AzContainerAppAuthConfig.md | 13 ++++--- ...ew-AzContainerAppIdentityProviderObject.md | 17 +++++----- .../Az.Batch/Disable-AzBatchAutoScale.md | 4 +-- .../Disable-AzBatchComputeNodeScheduling.md | 4 +-- azps-10.3.0/Az.Batch/Disable-AzBatchJob.md | 2 +- .../Az.Batch/Disable-AzBatchJobSchedule.md | 2 +- .../Az.Batch/Enable-AzBatchAutoScale.md | 2 +- 40 files changed, 133 insertions(+), 144 deletions(-) diff --git a/azps-0.10.0/Az.Accounts/Add-AzEnvironment.md b/azps-0.10.0/Az.Accounts/Add-AzEnvironment.md index 165825fe7d..982a5885aa 100644 --- a/azps-0.10.0/Az.Accounts/Add-AzEnvironment.md +++ b/azps-0.10.0/Az.Accounts/Add-AzEnvironment.md @@ -103,7 +103,7 @@ In this example we are creating a new Azure environment with sample endpoints us ## PARAMETERS ### -ActiveDirectoryEndpoint -Specifies the base authority for Azure Active Directory authentication. +Specifies the base authority for Microsoft Entra authentication. ```yaml Type: System.String @@ -605,4 +605,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable [Remove-AzEnvironment](./Remove-AzEnvironment.md) [Set-AzEnvironment](./Set-AzEnvironment.md) - diff --git a/azps-0.10.0/Az.Accounts/Set-AzEnvironment.md b/azps-0.10.0/Az.Accounts/Set-AzEnvironment.md index 43f801acc8..45d81acbf4 100644 --- a/azps-0.10.0/Az.Accounts/Set-AzEnvironment.md +++ b/azps-0.10.0/Az.Accounts/Set-AzEnvironment.md @@ -97,7 +97,7 @@ In this example we are creating a new Azure environment with sample endpoints us ## PARAMETERS ### -ActiveDirectoryEndpoint -Specifies the base authority for Azure Active Directory authentication. +Specifies the base authority for Microsoft Entra authentication. ```yaml Type: System.String @@ -599,4 +599,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable [Get-AzEnvironment](./Get-AzEnvironment.md) [Remove-AzEnvironment](./Remove-AzEnvironment.md) - diff --git a/azps-0.10.0/Az.Compute/Get-AzVMADDomainExtension.md b/azps-0.10.0/Az.Compute/Get-AzVMADDomainExtension.md index 26b68e6c2d..118c61db50 100644 --- a/azps-0.10.0/Az.Compute/Get-AzVMADDomainExtension.md +++ b/azps-0.10.0/Az.Compute/Get-AzVMADDomainExtension.md @@ -21,7 +21,7 @@ Get-AzVMADDomainExtension [-ResourceGroupName] [-VMName] [-Nam ``` ## DESCRIPTION -The **Get-AzVMADDomainExtension** cmdlet gets information about the specified Azure Active Directory (AD) domain extension. +The **Get-AzVMADDomainExtension** cmdlet gets information about the specified Microsoft Entra domain extension. ## EXAMPLES @@ -124,5 +124,3 @@ This cmdlet does not accept any input. ## RELATED LINKS [Set-AzVMADDomainExtension](./Set-AzVMADDomainExtension.md) - - diff --git a/azps-0.10.0/Az.Compute/Set-AzVMADDomainExtension.md b/azps-0.10.0/Az.Compute/Set-AzVMADDomainExtension.md index 02011f1b55..01087b8aa6 100644 --- a/azps-0.10.0/Az.Compute/Set-AzVMADDomainExtension.md +++ b/azps-0.10.0/Az.Compute/Set-AzVMADDomainExtension.md @@ -23,7 +23,7 @@ Set-AzVMADDomainExtension -DomainName [-OUPath ] [-JoinOption < ``` ## DESCRIPTION -The **Set-AzVMADDomainExtension** cmdlet adds an Azure Active Directory (AD) domain virtual machine extension to a virtual machine. +The **Set-AzVMADDomainExtension** cmdlet adds a Microsoft Entra domain virtual machine extension to a virtual machine. This extension lets your virtual machine join a domain. ## EXAMPLES diff --git a/azps-0.10.0/Az.Compute/Set-AzVMDiskEncryptionExtension.md b/azps-0.10.0/Az.Compute/Set-AzVMDiskEncryptionExtension.md index 4635cfa59d..e71f478b3e 100644 --- a/azps-0.10.0/Az.Compute/Set-AzVMDiskEncryptionExtension.md +++ b/azps-0.10.0/Az.Compute/Set-AzVMDiskEncryptionExtension.md @@ -46,7 +46,9 @@ It is advised that you save your work on the virtual machine before you run this ## EXAMPLES -### Example 1: Enable encryption using Azure AD Client ID and Client Secret + + +### Example 1: Enable encryption using Microsoft Entra Client ID and Client Secret ``` $RGName = "MyResourceGroup" $VMName = "MyTestVM" @@ -59,9 +61,11 @@ $KeyVaultResourceId = $KeyVault.ResourceId Set-AzVMDiskEncryptionExtension -ResourceGroupName $RGName -VMName $VMName -AadClientID $AADClientID -AadClientSecret $AADClientSecret -DiskEncryptionKeyVaultUrl $DiskEncryptionKeyVaultUrl -DiskEncryptionKeyVaultId $KeyVaultResourceId ``` -This example enables encryption using Azure AD client ID, and client secret. +This example enables encryption using Microsoft Entra client ID, and client secret. + + -### Example 2: Enable encryption using Azure AD client ID and client certification thumbprint +### Example 2: Enable encryption using Microsoft Entra client ID and client certification thumbprint ``` $RGName = "MyResourceGroup" $VMName = "MyTestVM" @@ -111,9 +115,11 @@ Update-AzVM -VM $VM -ResourceGroupName $RGName Set-AzVMDiskEncryptionExtension -ResourceGroupName $RGName -VMName $VMName -AadClientID $AADClientID -AadClientCertThumbprint $AADClientCertThumbprint -DiskEncryptionKeyVaultUrl $DiskEncryptionKeyVaultUrl -DiskEncryptionKeyVaultId $KeyVaultResourceId ``` -This example enables encryption using Azure AD client ID and client certification thumbprints. +This example enables encryption using Microsoft Entra client ID and client certification thumbprints. + + -### Example 3: Enable encryption using Azure AD client ID, client secret, and wrap disk encryption key by using key encryption key +### Example 3: Enable encryption using Microsoft Entra client ID, client secret, and wrap disk encryption key by using key encryption key ``` $RGName = "MyResourceGroup" $VMName = "MyTestVM" @@ -132,9 +138,11 @@ $KeyEncryptionKeyUrl = $KEK.Key.kid Set-AzVMDiskEncryptionExtension -ResourceGroupName $RGName -VMName $VMName -AadClientID $AADClientID -AadClientSecret $AADClientSecret -DiskEncryptionKeyVaultUrl $DiskEncryptionKeyVaultUrl -DiskEncryptionKeyVaultId $KeyVaultResourceId -KeyEncryptionKeyUrl $KeyEncryptionKeyUrl -KeyEncryptionKeyVaultId $KeyVaultResourceId ``` -This example enables encryption using Azure AD client ID, client secret, and wrap disk encryption key by using the key encryption key. +This example enables encryption using Microsoft Entra client ID, client secret, and wrap disk encryption key by using the key encryption key. -### Example 4: Enable encryption using Azure AD client ID, client cert thumbprint, and wrap disk encryptionkey by using key encryption key + + +### Example 4: Enable encryption using Microsoft Entra client ID, client cert thumbprint, and wrap disk encryptionkey by using key encryption key ``` $RGName = "MyResourceGroup" $VMName = "MyTestVM" @@ -185,13 +193,13 @@ Update-AzVM -VM $VM -ResourceGroupName $RGName Set-AzVMDiskEncryptionExtension -ResourceGroupName $RGname -VMName $VMName -AadClientID $AADClientID -AadClientCertThumbprint $AADClientCertThumbprint -DiskEncryptionKeyVaultUrl $DiskEncryptionKeyVaultUrl -DiskEncryptionKeyVaultId $KeyVaultResourceId ``` -This example enables encryption using Azure AD client ID, client cert thumbprint, and wrap disk encryption key by using key encryption key. +This example enables encryption using Microsoft Entra client ID, client cert thumbprint, and wrap disk encryption key by using key encryption key. ## PARAMETERS ### -AadClientCertThumbprint -Specifies the thumbprint of the AzureActive Directory (Azure AD) application client certificate that has permissions to write secrets to **KeyVault**. -As a prerequisite, the Azure AD client certificate must be previously deployed to the virtual machine's local computer `my` certificate store. +Specifies the thumbprint of the Microsoft Entra application client certificate that has permissions to write secrets to **KeyVault**. +As a prerequisite, the Microsoft Entra client certificate must be previously deployed to the virtual machine's local computer `my` certificate store. The Add-AzVMSecret cmdlet can be used to deploy a certificate to a virtual machine in Azure. For more details, see the **Add-AzVMSecret** cmdlet help. The certificate must be previously deployed to the virtual machine local computer my certificate store. @@ -209,7 +217,7 @@ Accept wildcard characters: False ``` ### -AadClientID -Specifies the client ID of the Azure AD application that has permissions to write secrets to **KeyVault**. +Specifies the client ID of the Microsoft Entra application that has permissions to write secrets to **KeyVault**. ```yaml Type: String @@ -224,7 +232,7 @@ Accept wildcard characters: False ``` ### -AadClientSecret -Specifies the client secret of the Azure AD application that has permissions to write secrets to **KeyVault**. +Specifies the client secret of the Microsoft Entra application that has permissions to write secrets to **KeyVault**. ```yaml Type: String @@ -587,5 +595,3 @@ This cmdlet does not accept any input. [Get-AzVMDiskEncryptionStatus](./Get-AzVMDiskEncryptionStatus.md) [Remove-AzVMDiskEncryptionExtension](./Remove-AzVMDiskEncryptionExtension.md) - - diff --git a/azps-0.10.0/Az.KeyVault/Remove-AzKeyVaultAccessPolicy.md b/azps-0.10.0/Az.KeyVault/Remove-AzKeyVaultAccessPolicy.md index eff7ddeeac..3666617ee6 100644 --- a/azps-0.10.0/Az.KeyVault/Remove-AzKeyVaultAccessPolicy.md +++ b/azps-0.10.0/Az.KeyVault/Remove-AzKeyVaultAccessPolicy.md @@ -70,7 +70,7 @@ PS C:\>Remove-AzKeyVaultAccessPolicy -VaultName 'Contoso03Vault' -ServicePrincip ``` This command removes all the permissions that an application has on the key vault named Contoso03Vault. -This example identifies the application by using the service principal name registered in Azure Active Directory, `http://payroll.contoso.com`. +This example identifies the application by using the service principal name registered in Microsoft Entra ID, `http://payroll.contoso.com`. ### Example 3: Remove permissions for an application by using its object ID ``` @@ -180,7 +180,7 @@ Accept wildcard characters: False ``` ### -ObjectId -Specifies the object ID of the user or service principal in Azure Active Directory for which to remove permissions. +Specifies the object ID of the user or service principal in Microsoft Entra ID for which to remove permissions. ```yaml Type: String @@ -228,7 +228,7 @@ Accept wildcard characters: False ### -ServicePrincipalName Specifies the service principal name of the application whose permissions you want to remove. -Specify the application ID, also known as client ID, registered for the application in Azure Active Directory. +Specify the application ID, also known as client ID, registered for the application in Microsoft Entra ID. ```yaml Type: String @@ -321,4 +321,3 @@ This cmdlet does not accept any input. ## RELATED LINKS [Set-AzKeyVaultAccessPolicy](./Set-AzKeyVaultAccessPolicy.md) - diff --git a/azps-0.10.0/Az.KeyVault/Set-AzKeyVaultAccessPolicy.md b/azps-0.10.0/Az.KeyVault/Set-AzKeyVaultAccessPolicy.md index 9da5d7c3c1..34ee8c0d5a 100644 --- a/azps-0.10.0/Az.KeyVault/Set-AzKeyVaultAccessPolicy.md +++ b/azps-0.10.0/Az.KeyVault/Set-AzKeyVaultAccessPolicy.md @@ -82,7 +82,7 @@ PS C:\> Set-AzKeyVaultAccessPolicy -VaultName 'Contoso03Vault' -UserPrincipalNam PS C:\> Set-AzKeyVaultAccessPolicy -VaultName 'Contoso03Vault' -UserPrincipalName 'PattiFuller@contoso.com' -PermissionsToKeys @() -PassThru ``` -The first command grants permissions for a user in your Azure Active Directory, PattiFuller@contoso.com, to perform operations on keys and secrets with a key vault named Contoso03Vault. +The first command grants permissions for a user in your Microsoft Entra ID, PattiFuller@contoso.com, to perform operations on keys and secrets with a key vault named Contoso03Vault. The second command modifies the permissions that were granted to PattiFuller@contoso.com in the first command, to now allow getting secrets in addition to setting and deleting them. The permissions to key operations remain unchanged after this command. The *PassThru* parameter results in the updated object being returned by the cmdlet. @@ -95,7 +95,7 @@ PS C:\>Set-AzKeyVaultAccessPolicy -VaultName 'Contoso03Vault' -ServicePrincipalN This command grants permissions for an application for a key vault named Contoso03Vault. -The *ServicePrincipalName* parameter specifies the application. The application must be registered in your Azure Active Directory. The value of the *ServicePrincipalName* parameter must be either the service principal name of the application or the application ID GUID. +The *ServicePrincipalName* parameter specifies the application. The application must be registered in your Microsoft Entra ID. The value of the *ServicePrincipalName* parameter must be either the service principal name of the application or the application ID GUID. This example specifies the service principal name `http://payroll.contoso.com`, and the command grants the application permissions to read and write secrets. @@ -167,7 +167,7 @@ Accept wildcard characters: False ``` ### -BypassObjectIdValidation -Enables you to specify an object ID without validating that the object exists in Azure Active Directory. +Enables you to specify an object ID without validating that the object exists in Microsoft Entra ID. Use this parameter only if you want to grant access to your key vault to an object ID that refers to a delegated security group from another Azure tenant. @@ -261,7 +261,7 @@ Accept wildcard characters: False ``` ### -ObjectId -Specifies the object ID of the user or service principal in Azure Active Directory for which to grant permissions. +Specifies the object ID of the user or service principal in Microsoft Entra ID for which to grant permissions. ```yaml Type: String @@ -419,7 +419,7 @@ Accept wildcard characters: False ### -ServicePrincipalName Specifies the service principal name of the application to which to grant permissions. -Specify the application ID, also known as client ID, registered for the application in AzureActive Directory. The application with the service principal name that this parameter specifies must be registered in the Azure directory that contains your current subscription. +Specify the application ID, also known as client ID, registered for the application in Microsoft Entra ID. The application with the service principal name that this parameter specifies must be registered in the Azure directory that contains your current subscription. ```yaml Type: String @@ -515,4 +515,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable [Get-AzKeyVault](./Get-AzKeyVault.md) [Remove-AzKeyVaultAccessPolicy](./Remove-AzKeyVaultAccessPolicy.md) - diff --git a/azps-0.10.0/Az.Resources/Az.Resources.md b/azps-0.10.0/Az.Resources/Az.Resources.md index fe45b54dce..e000547fce 100644 --- a/azps-0.10.0/Az.Resources/Az.Resources.md +++ b/azps-0.10.0/Az.Resources/Az.Resources.md @@ -23,7 +23,7 @@ Captures a resource group as a template and saves it to a file. Retrieves a list of credentials associated with an application. ### [Get-AzADApplication](Get-AzADApplication.md) -Lists existing azure active directory applications. +Lists existing Microsoft Entra applications. ### [Get-AzADGroup](Get-AzADGroup.md) Filters active directory groups. @@ -109,13 +109,13 @@ Moves a resource to a different resource group or subscription. Adds a credential to an existing application. ### [New-AzADApplication](New-AzADApplication.md) -Creates a new azure active directory application. +Creates a new Microsoft Entra application. ### [New-AzADGroup](New-AzADGroup.md) Creates a new active directory group. ### [New-AzADServicePrincipal](New-AzADServicePrincipal.md) -Creates a new azure active directory service principal. +Creates a new Microsoft Entra service principal. ### [New-AzADSpCredential](New-AzADSpCredential.md) Adds a credential to an existing service principal. @@ -179,7 +179,7 @@ Registers a resource provider. Removes a credential from an application. ### [Remove-AzADApplication](Remove-AzADApplication.md) -Deletes the azure active directory application. +Deletes the Microsoft Entra application. ### [Remove-AzADGroup](Remove-AzADGroup.md) Deletes an active directory group. @@ -188,7 +188,7 @@ Deletes an active directory group. Removes a user from an AD group. ### [Remove-AzADServicePrincipal](Remove-AzADServicePrincipal.md) -Deletes the azure active directory service principal. +Deletes the Microsoft Entra service principal. ### [Remove-AzADSpCredential](Remove-AzADSpCredential.md) Removes a credential from a service principal. @@ -293,14 +293,13 @@ Validates a resource group deployment. Unregisters a resource provider. ### [Update-AzADApplication](Update-AzADApplication.md) -Updates an existing azure active directory application. +Updates an existing Microsoft Entra application. ### [Update-AzADServicePrincipal](Update-AzADServicePrincipal.md) -Updates an existing azure active directory service principal. +Updates an existing Microsoft Entra service principal. ### [Update-AzADUser](Update-AzADUser.md) Updates an existing active directory user. ### [Update-AzManagementGroup](Update-AzManagementGroup.md) Updates a Management Group - diff --git a/azps-0.10.0/Az.Resources/Get-AzADApplication.md b/azps-0.10.0/Az.Resources/Get-AzADApplication.md index 7eb4f40234..ec807dae89 100644 --- a/azps-0.10.0/Az.Resources/Get-AzADApplication.md +++ b/azps-0.10.0/Az.Resources/Get-AzADApplication.md @@ -11,7 +11,7 @@ original_content_git_url: https://github.com/Azure/azure-powershell/blob/Azs-tzl # Get-AzADApplication ## SYNOPSIS -Lists existing azure active directory applications. +Lists existing Microsoft Entra applications. ## SYNTAX @@ -52,7 +52,7 @@ Get-AzADApplication -IdentifierUri [-DefaultProfile -IdentifierUris [-HomePage ``` ## DESCRIPTION -Creates a new azure active directory application. +Creates a new Microsoft Entra application. ## EXAMPLES -### Example 1 - Create new AAD application. + + +### Example 1 - Create new Microsoft Entra application. ``` PS C:\> New-AzADApplication -DisplayName "NewApplication" -HomePage "http://www.microsoft.com" -IdentifierUris "http://NewApplication" ``` -Creates a new azure active directory application without any credentials. +Creates a new Microsoft Entra application without any credentials. + + -### Example 2 - Create new AAD application with password. +### Example 2 - Create new Microsoft Entra application with password. ``` PS C:\> $SecureStringPassword = ConvertTo-SecureString -String "password" -AsPlainText -Force @@ -71,7 +75,7 @@ PS C:\> New-AzADApplication -DisplayName "NewApplication" -HomePage "http://www. //NewApplication" -Password $SecureStringPassword ``` -Creates a new azure active directory application and associates password credentials with it. +Creates a new Microsoft Entra application and associates password credentials with it. ## PARAMETERS @@ -330,4 +334,3 @@ Keywords: azure, Az, arm, resource, management, manager, resource, group, templa [New-AzADAppCredential](./New-AzADAppCredential.md) [Remove-AzADAppCredential](./Remove-AzADAppCredential.md) - diff --git a/azps-0.10.0/Az.Resources/New-AzADServicePrincipal.md b/azps-0.10.0/Az.Resources/New-AzADServicePrincipal.md index da48f45ccb..265b4c4695 100644 --- a/azps-0.10.0/Az.Resources/New-AzADServicePrincipal.md +++ b/azps-0.10.0/Az.Resources/New-AzADServicePrincipal.md @@ -11,7 +11,7 @@ original_content_git_url: https://github.com/Azure/azure-powershell/blob/Azs-tzl # New-AzADServicePrincipal ## SYNOPSIS -Creates a new azure active directory service principal. +Creates a new Microsoft Entra service principal. ## SYNTAX @@ -115,7 +115,7 @@ New-AzADServicePrincipal -ApplicationObject -KeyCredential [-PassThru] [-Force] ``` ## DESCRIPTION -Deletes the azure active directory application. +Deletes the Microsoft Entra application. ## EXAMPLES @@ -233,4 +233,3 @@ Keywords: azure, Az, arm, resource, management, manager, resource, group, templa [Remove-AzADAppCredential](./Remove-AzADAppCredential.md) - diff --git a/azps-0.10.0/Az.Resources/Remove-AzADServicePrincipal.md b/azps-0.10.0/Az.Resources/Remove-AzADServicePrincipal.md index a77573484c..3dd96adcf9 100644 --- a/azps-0.10.0/Az.Resources/Remove-AzADServicePrincipal.md +++ b/azps-0.10.0/Az.Resources/Remove-AzADServicePrincipal.md @@ -11,7 +11,7 @@ original_content_git_url: https://github.com/Azure/azure-powershell/blob/Azs-tzl # Remove-AzADServicePrincipal ## SYNOPSIS -Deletes the azure active directory service principal. +Deletes the Microsoft Entra service principal. ## SYNTAX @@ -52,7 +52,7 @@ Remove-AzADServicePrincipal -ApplicationObject [-PassThru] [-F ``` ## DESCRIPTION -Deletes the azure active directory service principal. +Deletes the Microsoft Entra service principal. ## EXAMPLES diff --git a/azps-0.10.0/Az.Resources/Remove-AzRoleAssignment.md b/azps-0.10.0/Az.Resources/Remove-AzRoleAssignment.md index 3200a17b80..3d715c234c 100644 --- a/azps-0.10.0/Az.Resources/Remove-AzRoleAssignment.md +++ b/azps-0.10.0/Az.Resources/Remove-AzRoleAssignment.md @@ -165,7 +165,7 @@ Accept wildcard characters: False ``` ### -ObjectId -Azure AD ObjectId of the user, group or service principal. +Microsoft Entra ObjectId of the user, group or service principal. ```yaml Type: System.Guid @@ -315,7 +315,7 @@ Accept wildcard characters: False ``` ### -ServicePrincipalName -The ServicePrincipalName of the Azure AD application +The ServicePrincipalName of the Microsoft Entra application ```yaml Type: System.String @@ -398,4 +398,3 @@ Keywords: azure, Az, arm, resource, management, manager, resource, group, templa [Get-AzRoleAssignment](./Get-AzRoleAssignment.md) [Get-AzRoleDefinition](./Get-AzRoleDefinition.md) - diff --git a/azps-0.10.0/Az.Resources/Set-AzPolicyAssignment.md b/azps-0.10.0/Az.Resources/Set-AzPolicyAssignment.md index fe9e1ae4e1..e6f1c2389d 100644 --- a/azps-0.10.0/Az.Resources/Set-AzPolicyAssignment.md +++ b/azps-0.10.0/Az.Resources/Set-AzPolicyAssignment.md @@ -79,7 +79,7 @@ Accept wildcard characters: False ``` ### -AssignIdentity -Generate and assign an Azure Active Directory Identity for this policy assignment. The identity will be used when executing deployments for 'deployIfNotExists' policies. Location is required when assigning an identity. +Generate and assign a Microsoft Entra identity for this policy assignment. The identity will be used when executing deployments for 'deployIfNotExists' policies. Location is required when assigning an identity. ```yaml Type: System.Management.Automation.SwitchParameter @@ -311,5 +311,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable [New-AzPolicyAssignment](./New-AzPolicyAssignment.md) [Remove-AzPolicyAssignment](./Remove-AzPolicyAssignment.md) - - diff --git a/azps-0.10.0/Az.Resources/Update-AzADApplication.md b/azps-0.10.0/Az.Resources/Update-AzADApplication.md index 5615d981ba..126b381992 100644 --- a/azps-0.10.0/Az.Resources/Update-AzADApplication.md +++ b/azps-0.10.0/Az.Resources/Update-AzADApplication.md @@ -10,7 +10,7 @@ original_content_git_url: https://github.com/Azure/azure-powershell/blob/Azs-tzl # Update-AzADApplication ## SYNOPSIS -Updates an existing azure active directory application. +Updates an existing Microsoft Entra application. ## SYNTAX @@ -36,7 +36,7 @@ Update-AzADApplication -InputObject [-DisplayName ] [- ``` ## DESCRIPTION -Updates an existing azure active directory application. +Updates an existing Microsoft Entra application. To update the credentials associated with this application, please use the New-AzADAppCredential cmdlet. ## EXAMPLES diff --git a/azps-0.10.0/Az.Resources/Update-AzADServicePrincipal.md b/azps-0.10.0/Az.Resources/Update-AzADServicePrincipal.md index 0daad9a236..db61146115 100644 --- a/azps-0.10.0/Az.Resources/Update-AzADServicePrincipal.md +++ b/azps-0.10.0/Az.Resources/Update-AzADServicePrincipal.md @@ -10,7 +10,7 @@ original_content_git_url: https://github.com/Azure/azure-powershell/blob/Azs-tzl # Update-AzADServicePrincipal ## SYNOPSIS -Updates an existing azure active directory service principal. +Updates an existing Microsoft Entra service principal. ## SYNTAX @@ -44,7 +44,7 @@ Update-AzADServicePrincipal -InputObject [-DisplayName + +### Example 2: Get the Microsoft Entra ID Type Identity Provider ```powershell $apimContext = New-AzApiManagementContext -ResourceGroupName "Api-Default-WestUS" -ServiceName "contoso" Get-AzApiManagementIdentityProvider -Context $apimContext -Type Aad @@ -63,9 +65,11 @@ ResourceGroupName : Api-Default-West-US ServiceName : contoso ``` -Gets the Identity Provider Configuration of Azure Active Directory. +Gets the Identity Provider Configuration of Microsoft Entra ID. + + -### Example 3: Get the AAD B2C Type Identity Provider +### Example 3: Get the Azure AD B2C Type Identity Provider ```powershell $context = New-AzApiManagementContext -ResourceGroupName "Api-Default-WestUS" -ServiceName "contoso" Get-AzApiManagementIdentityProvider -Context $context -Type AadB2C @@ -87,7 +91,7 @@ ResourceGroupName : Api-Default-West-US ServiceName : contoso ``` -Gets the Identity Provider Configuration of Azure Active Directory. +Gets the Identity Provider Configuration of Microsoft Entra ID. ## PARAMETERS diff --git a/azps-10.3.0/Az.ApiManagement/Get-AzApiManagementIdentityProviderClientSecret.md b/azps-10.3.0/Az.ApiManagement/Get-AzApiManagementIdentityProviderClientSecret.md index bf0b149004..9e00fbb01d 100644 --- a/azps-10.3.0/Az.ApiManagement/Get-AzApiManagementIdentityProviderClientSecret.md +++ b/azps-10.3.0/Az.ApiManagement/Get-AzApiManagementIdentityProviderClientSecret.md @@ -24,13 +24,15 @@ Get the identity provider client secret. ## EXAMPLES -### Example 1: Get the client secret of AAD Type Identity Provider + + +### Example 1: Get the client secret of Microsoft Entra ID Type Identity Provider ```powershell $apimContext = New-AzApiManagementContext -ResourceGroupName "Api-Default-WestUS" -ServiceName "contoso" Get-AzApiManagementIdentityProviderClientSecret -Context $apimContext -Type Aad ``` -Gets the client secret of the Identity Provider Configuration of Azure Active Directory. +Gets the client secret of the Identity Provider Configuration of Microsoft Entra ID. ## PARAMETERS diff --git a/azps-10.3.0/Az.ApiManagement/New-AzApiManagement.md b/azps-10.3.0/Az.ApiManagement/New-AzApiManagement.md index e3acdae86a..6e161e3a2e 100644 --- a/azps-10.3.0/Az.ApiManagement/New-AzApiManagement.md +++ b/azps-10.3.0/Az.ApiManagement/New-AzApiManagement.md @@ -541,7 +541,7 @@ Accept wildcard characters: False ### -SystemAssignedIdentity -Generate and assign an Azure Active Directory Identity for this server for use with key management services like Azure KeyVault. +Generate and assign a Microsoft Entra identity for this server for use with key management services like Azure KeyVault. ```yaml Type: System.Management.Automation.SwitchParameter diff --git a/azps-10.3.0/Az.ApiManagement/New-AzApiManagementGroup.md b/azps-10.3.0/Az.ApiManagement/New-AzApiManagementGroup.md index 89aeb0395a..1e508a34e3 100644 --- a/azps-10.3.0/Az.ApiManagement/New-AzApiManagementGroup.md +++ b/azps-10.3.0/Az.ApiManagement/New-AzApiManagementGroup.md @@ -91,7 +91,7 @@ Accept wildcard characters: False ``` ### -ExternalId -For external groups, this property contains the id of the group from the external identity provider, e.g. Azure Active Directory aad://contoso5api.onmicrosoft.com/groups/12ad42b1-592f-4664-a77b4250-2f2e82579f4c; otherwise the value is null. +For external groups, this property contains the id of the group from the external identity provider, e.g. Microsoft Entra aad://contoso5api.onmicrosoft.com/groups/12ad42b1-592f-4664-a77b4250-2f2e82579f4c; otherwise the value is null. ```yaml Type: System.String @@ -136,7 +136,7 @@ Accept wildcard characters: False ``` ### -Type -Group Type. Custom Group is User defined Group. System Group includes Administrator, Developers and Guests. You cannot create or update a System Group. External Group is groups from External Identity Provider like Azure Active Directory. This parameter is optional and by default assumed to be a Custom Group. +Group Type. Custom Group is User defined Group. System Group includes Administrator, Developers and Guests. You cannot create or update a System Group. External Group is groups from External Identity Provider like Microsoft Entra ID. This parameter is optional and by default assumed to be a Custom Group. ```yaml Type: System.Nullable`1[Microsoft.Azure.Commands.ApiManagement.ServiceManagement.Models.PsApiManagementGroupType] @@ -175,5 +175,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable [Remove-AzApiManagementGroup](./Remove-AzApiManagementGroup.md) [Set-AzApiManagementGroup](./Set-AzApiManagementGroup.md) - - diff --git a/azps-10.3.0/Az.ApiManagement/New-AzApiManagementIdentityProvider.md b/azps-10.3.0/Az.ApiManagement/New-AzApiManagementIdentityProvider.md index 18513ba4de..1c37c24dfc 100644 --- a/azps-10.3.0/Az.ApiManagement/New-AzApiManagementIdentityProvider.md +++ b/azps-10.3.0/Az.ApiManagement/New-AzApiManagementIdentityProvider.md @@ -63,7 +63,7 @@ This takes as input the ClientId and ClientSecret of the Facebook app. ## PARAMETERS ### -AllowedTenants -List of allowed Azure Active Directory Tenants +List of allowed Microsoft Entra tenants ```yaml Type: System.String[] @@ -78,7 +78,7 @@ Accept wildcard characters: False ``` ### -Authority -OpenID Connect discovery endpoint hostname for AAD or AAD B2C. This parameter is optional. +OpenID Connect discovery endpoint hostname for Microsoft Entra ID or Azure AD B2C. This parameter is optional. ```yaml Type: System.String @@ -156,7 +156,7 @@ Accept wildcard characters: False ``` ### -PasswordResetPolicyName -Password Reset Policy Name. Only applies to AAD B2C Identity Provider. This parameter is optional. +Password Reset Policy Name. Only applies to Azure AD B2C Identity Provider. This parameter is optional. ```yaml Type: System.String @@ -171,7 +171,7 @@ Accept wildcard characters: False ``` ### -ProfileEditingPolicyName -Profile Editing Policy Name. Only applies to AAD B2C Identity Provider. This parameter is optional. +Profile Editing Policy Name. Only applies to Azure AD B2C Identity Provider. This parameter is optional. ```yaml Type: System.String @@ -186,7 +186,7 @@ Accept wildcard characters: False ``` ### -SigninPolicyName -Signin Policy Name. Only applies to AAD B2C Identity Provider. This parameter is optional. +Signin Policy Name. Only applies to Azure AD B2C Identity Provider. This parameter is optional. ```yaml Type: System.String @@ -201,7 +201,7 @@ Accept wildcard characters: False ``` ### -SigninTenant -Signin Tenant to override in AAD B2C instead of the `common` Tenant +Signin Tenant to override in Azure AD B2C instead of the `common` Tenant ```yaml Type: System.String @@ -216,7 +216,7 @@ Accept wildcard characters: False ``` ### -SignupPolicyName -Signup Policy Name. Only applies to AAD B2C Identity Provider. This parameter is optional. +Signup Policy Name. Only applies to Azure AD B2C Identity Provider. This parameter is optional. ```yaml Type: System.String diff --git a/azps-10.3.0/Az.ApiManagement/Set-AzApiManagement.md b/azps-10.3.0/Az.ApiManagement/Set-AzApiManagement.md index 20c5edafe0..166c909c43 100644 --- a/azps-10.3.0/Az.ApiManagement/Set-AzApiManagement.md +++ b/azps-10.3.0/Az.ApiManagement/Set-AzApiManagement.md @@ -223,7 +223,7 @@ Accept wildcard characters: False ### -SystemAssignedIdentity -Generate and assign an Azure Active Directory Identity for this server for use with key management services like Azure KeyVault. +Generate and assign a Microsoft Entra identity for this server for use with key management services like Azure KeyVault. ```yaml Type: System.Management.Automation.SwitchParameter diff --git a/azps-10.3.0/Az.ApiManagement/Set-AzApiManagementIdentityProvider.md b/azps-10.3.0/Az.ApiManagement/Set-AzApiManagementIdentityProvider.md index e02e196bb2..9410bfaace 100644 --- a/azps-10.3.0/Az.ApiManagement/Set-AzApiManagementIdentityProvider.md +++ b/azps-10.3.0/Az.ApiManagement/Set-AzApiManagementIdentityProvider.md @@ -57,7 +57,7 @@ Set-AzApiManagementIdentityProvider -AllowedTenants 'samirtestbc.onmicrosoft.com ## PARAMETERS ### -AllowedTenants -List of allowed Azure Active Directory Tenants. +List of allowed Microsoft Entra tenants. ```yaml Type: System.String[] @@ -72,7 +72,7 @@ Accept wildcard characters: False ``` ### -Authority -OpenID Connect discovery endpoint hostname for AAD or AAD B2C. This parameter is optional. +OpenID Connect discovery endpoint hostname for Microsoft Entra ID or Azure AD B2C. This parameter is optional. ```yaml Type: System.String @@ -180,7 +180,7 @@ Accept wildcard characters: False ``` ### -PasswordResetPolicyName -Password Reset Policy Name. Only applies to AAD B2C Identity Provider. This parameter is optional. +Password Reset Policy Name. Only applies to Azure AD B2C Identity Provider. This parameter is optional. ```yaml Type: System.String @@ -195,7 +195,7 @@ Accept wildcard characters: False ``` ### -ProfileEditingPolicyName -Profile Editing Policy Name. Only applies to AAD B2C Identity Provider. This parameter is optional. +Profile Editing Policy Name. Only applies to Azure AD B2C Identity Provider. This parameter is optional. ```yaml Type: System.String @@ -210,7 +210,7 @@ Accept wildcard characters: False ``` ### -SigninPolicyName -Signin Policy Name. Only applies to AAD B2C Identity Provider. This parameter is optional. +Signin Policy Name. Only applies to Azure AD B2C Identity Provider. This parameter is optional. ```yaml Type: System.String @@ -225,7 +225,7 @@ Accept wildcard characters: False ``` ### -SigninTenant -Signin Tenant to override in AAD B2C instead of the `common` Tenant +Signin Tenant to override in Azure AD B2C instead of the `common` Tenant ```yaml Type: System.String @@ -240,7 +240,7 @@ Accept wildcard characters: False ``` ### -SignupPolicyName -Signup Policy Name. Only applies to AAD B2C Identity Provider. This parameter is optional. +Signup Policy Name. Only applies to Azure AD B2C Identity Provider. This parameter is optional. ```yaml Type: System.String diff --git a/azps-10.3.0/Az.App/New-AzContainerAppAuthConfig.md b/azps-10.3.0/Az.App/New-AzContainerAppAuthConfig.md index 34e159ea5a..5d7569f3f9 100644 --- a/azps-10.3.0/Az.App/New-AzContainerAppAuthConfig.md +++ b/azps-10.3.0/Az.App/New-AzContainerAppAuthConfig.md @@ -454,16 +454,16 @@ To create the parameters described below, construct a hash table containing the - `[AppleLoginScope ]`: A list of the scopes that should be requested while authenticating. - `[AppleRegistrationClientId ]`: The Client ID of the app used for login. - `[AppleRegistrationClientSecretSettingName ]`: The app setting name that contains the client secret. - - `[AzureActiveDirectoryEnabled ]`: false if the Azure Active Directory provider should not be enabled despite the set registration; otherwise, true. - - `[AzureActiveDirectoryIsAutoProvisioned ]`: Gets a value indicating whether the Azure AD configuration was auto-provisioned using 1st party tooling. This is an internal flag primarily intended to support the Azure Management Portal. Users should not read or write to this property. - - `[AzureActiveDirectoryRegistrationClientId ]`: The Client ID of this relying party application, known as the client_id. This setting is required for enabling OpenID Connection authentication with Azure Active Directory or other 3rd party OpenID Connect providers. More information on OpenID Connect: http://openid.net/specs/openid-connect-core-1_0.html + - `[AzureActiveDirectoryEnabled ]`: false if the Microsoft Entra provider should not be enabled despite the set registration; otherwise, true. + - `[AzureActiveDirectoryIsAutoProvisioned ]`: Gets a value indicating whether the Microsoft Entra configuration was auto-provisioned using 1st party tooling. This is an internal flag primarily intended to support the Azure Management Portal. Users should not read or write to this property. + - `[AzureActiveDirectoryRegistrationClientId ]`: The Client ID of this relying party application, known as the client_id. This setting is required for enabling OpenID Connect authentication with Microsoft Entra ID or other 3rd party OpenID Connect providers. More information on OpenID Connect: http://openid.net/specs/openid-connect-core-1_0.html - `[AzureActiveDirectoryRegistrationClientSecretSettingName ]`: The app setting name that contains the client secret of the relying party application. - `[AzureActiveDirectoryValidationAllowedAudience ]`: The list of audiences that can make successful authentication/authorization requests. - `[AzureStaticWebAppEnabled ]`: false if the Azure Static Web Apps provider should not be enabled despite the set registration; otherwise, true. - `[AzureStaticWebAppsRegistrationClientId ]`: The Client ID of the app used for login. - - `[CustomOpenIdConnectProvider ]`: The map of the name of the alias of each custom Open ID Connect provider to the configuration settings of the custom Open ID Connect provider. + - `[CustomOpenIdConnectProvider ]`: The map of the name of the alias of each custom OpenID Connect provider to the configuration settings of the custom OpenID Connect provider. - `[(Any) ]`: This indicates any property can be added to this object. - - `[DefaultAuthorizationPolicyAllowedApplication ]`: The configuration settings of the Azure Active Directory allowed applications. + - `[DefaultAuthorizationPolicyAllowedApplication ]`: The configuration settings of the Microsoft Entra ID allowed applications. - `[FacebookEnabled ]`: false if the Facebook provider should not be enabled despite the set registration; otherwise, true. - `[FacebookGraphApiVersion ]`: The version of the Facebook api to be used while logging in. - `[FacebookLoginScope ]`: A list of the scopes that should be requested while authenticating. @@ -487,8 +487,7 @@ To create the parameters described below, construct a hash table containing the - `[RegistrationClientSecretCertificateThumbprint ]`: An alternative to the client secret, that is the thumbprint of a certificate used for signing purposes. This property acts as a replacement for the Client Secret. It is also optional. - `[RegistrationConsumerKey ]`: The OAuth 1.0a consumer key of the Twitter application used for sign-in. This setting is required for enabling Twitter Sign-In. Twitter Sign-In documentation: https://dev.twitter.com/web/sign-in - `[RegistrationConsumerSecretSettingName ]`: The app setting name that contains the OAuth 1.0a consumer secret of the Twitter application used for sign-in. - - `[RegistrationOpenIdIssuer ]`: The OpenID Connect Issuer URI that represents the entity which issues access tokens for this application. When using Azure Active Directory, this value is the URI of the directory tenant, e.g. `https://login.microsoftonline.com/v2.0/{tenant-guid}/`. This URI is a case-sensitive identifier for the token issuer. More information on OpenID Connect Discovery: http://openid.net/specs/openid-connect-discovery-1_0.html + - `[RegistrationOpenIdIssuer ]`: The OpenID Connect Issuer URI that represents the entity which issues access tokens for this application. When using Microsoft Entra ID, this value is the URI of the directory tenant, e.g. `https://login.microsoftonline.com/v2.0/{tenant-guid}/`. This URI is a case-sensitive identifier for the token issuer. More information on OpenID Connect Discovery: http://openid.net/specs/openid-connect-discovery-1_0.html - `[TwitterEnabled ]`: false if the Twitter provider should not be enabled despite the set registration; otherwise, true. ## RELATED LINKS - diff --git a/azps-10.3.0/Az.App/New-AzContainerAppIdentityProviderObject.md b/azps-10.3.0/Az.App/New-AzContainerAppIdentityProviderObject.md index 5903f4d1ce..2f3a9bff54 100644 --- a/azps-10.3.0/Az.App/New-AzContainerAppIdentityProviderObject.md +++ b/azps-10.3.0/Az.App/New-AzContainerAppIdentityProviderObject.md @@ -151,7 +151,7 @@ Accept wildcard characters: False ``` ### -AzureActiveDirectoryEnabled -\false\ if the Azure Active Directory provider should not be enabled despite the set registration; otherwise, \true\. +\false\ if the Microsoft Entra provider should not be enabled despite the set registration; otherwise, \true\. ```yaml Type: System.Boolean @@ -166,7 +166,7 @@ Accept wildcard characters: False ``` ### -AzureActiveDirectoryIsAutoProvisioned -Gets a value indicating whether the Azure AD configuration was auto-provisioned using 1st party tooling. +Gets a value indicating whether the Microsoft Entra configuration was auto-provisioned using 1st party tooling. This is an internal flag primarily intended to support the Azure Management Portal. Users should not read or write to this property. @@ -185,7 +185,7 @@ Accept wildcard characters: False ### -AzureActiveDirectoryRegistrationClientId The Client ID of this relying party application, known as the client_id. - This setting is required for enabling OpenID Connection authentication with Azure Active Directory or + This setting is required for enabling OpenID Connect authentication with Microsoft Entra ID or other 3rd party OpenID Connect providers. More information on OpenID Connect: http://openid.net/specs/openid-connect-core-1_0.html. @@ -262,8 +262,8 @@ Accept wildcard characters: False ``` ### -CustomOpenIdConnectProvider -The map of the name of the alias of each custom Open ID Connect provider to the - configuration settings of the custom Open ID Connect provider. +The map of the name of the alias of each custom OpenID Connect provider to the + configuration settings of the custom OpenID Connect provider. To construct, see NOTES section for CUSTOMOPENIDCONNECTPROVIDER properties and create a hash table. ```yaml @@ -279,7 +279,7 @@ Accept wildcard characters: False ``` ### -DefaultAuthorizationPolicyAllowedApplication -The configuration settings of the Azure Active Directory allowed applications. +The configuration settings of the Microsoft Entra ID allowed applications. ```yaml Type: System.String[] @@ -654,7 +654,7 @@ Accept wildcard characters: False ### -RegistrationOpenIdIssuer The OpenID Connect Issuer URI that represents the entity which issues access tokens for this application. - When using Azure Active Directory, this value is the URI of the directory tenant, e.g. + When using Microsoft Entra ID, this value is the URI of the directory tenant, e.g. `https://login.microsoftonline.com/v2.0/{tenant-guid}/`. This URI is a case-sensitive identifier for the token issuer. More information on OpenID Connect Discovery: http://openid.net/specs/openid-connect-discovery-1_0.html. @@ -704,8 +704,7 @@ COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. -`CUSTOMOPENIDCONNECTPROVIDER `: The map of the name of the alias of each custom Open ID Connect provider to the configuration settings of the custom Open ID Connect provider. +`CUSTOMOPENIDCONNECTPROVIDER `: The map of the name of the alias of each custom OpenID Connect provider to the configuration settings of the custom OpenID Connect provider. - `[(Any) ]`: This indicates any property can be added to this object. ## RELATED LINKS - diff --git a/azps-10.3.0/Az.Batch/Disable-AzBatchAutoScale.md b/azps-10.3.0/Az.Batch/Disable-AzBatchAutoScale.md index 3db4ea1c07..985db9e020 100644 --- a/azps-10.3.0/Az.Batch/Disable-AzBatchAutoScale.md +++ b/azps-10.3.0/Az.Batch/Disable-AzBatchAutoScale.md @@ -36,7 +36,7 @@ This command disables automatic scaling for the pool named MyPool. ### -BatchContext Specifies the **BatchAccountContext** instance that this cmdlet uses to interact with the Batch service. -If you use the Get-AzBatchAccount cmdlet to get your BatchAccountContext, then Azure Active Directory authentication will be used when interacting with the Batch service. To use shared key authentication instead, use the Get-AzBatchAccountKey cmdlet to get a BatchAccountContext object with its access keys populated. When using shared key authentication, the primary access key is used by default. To change the key to use, set the BatchAccountContext.KeyInUse property. +If you use the Get-AzBatchAccount cmdlet to get your BatchAccountContext, then Microsoft Entra authentication will be used when interacting with the Batch service. To use shared key authentication instead, use the Get-AzBatchAccountKey cmdlet to get a BatchAccountContext object with its access keys populated. When using shared key authentication, the primary access key is used by default. To change the key to use, set the BatchAccountContext.KeyInUse property. ```yaml Type: Microsoft.Azure.Commands.Batch.BatchAccountContext @@ -102,5 +102,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable [Test-AzBatchAutoScale](./Test-AzBatchAutoScale.md) [Azure Batch Cmdlets](/powershell/module/Az.Batch/) - - diff --git a/azps-10.3.0/Az.Batch/Disable-AzBatchComputeNodeScheduling.md b/azps-10.3.0/Az.Batch/Disable-AzBatchComputeNodeScheduling.md index 698becfb34..7c76f64eba 100644 --- a/azps-10.3.0/Az.Batch/Disable-AzBatchComputeNodeScheduling.md +++ b/azps-10.3.0/Az.Batch/Disable-AzBatchComputeNodeScheduling.md @@ -72,7 +72,7 @@ Because the *DisableComputeNodeSchedulingOptions* parameter was not included any ### -BatchContext Specifies the **BatchAccountContext** instance that this cmdlet uses to interact with the Batch service. -If you use the Get-AzBatchAccount cmdlet to get your BatchAccountContext, then Azure Active Directory authentication will be used when interacting with the Batch service. To use shared key authentication instead, use the Get-AzBatchAccountKey cmdlet to get a BatchAccountContext object with its access keys populated. When using shared key authentication, the primary access key is used by default. To change the key to use, set the BatchAccountContext.KeyInUse property. +If you use the Get-AzBatchAccount cmdlet to get your BatchAccountContext, then Microsoft Entra authentication will be used when interacting with the Batch service. To use shared key authentication instead, use the Get-AzBatchAccountKey cmdlet to get a BatchAccountContext object with its access keys populated. When using shared key authentication, the primary access key is used by default. To change the key to use, set the BatchAccountContext.KeyInUse property. ```yaml Type: Microsoft.Azure.Commands.Batch.BatchAccountContext @@ -198,5 +198,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable [Get-AzBatchAccountKey](./Get-AzBatchAccountKey.md) [Enable-AzBatchComputeNodeScheduling](./Enable-AzBatchComputeNodeScheduling.md) - - diff --git a/azps-10.3.0/Az.Batch/Disable-AzBatchJob.md b/azps-10.3.0/Az.Batch/Disable-AzBatchJob.md index 11047af87d..9565814efc 100644 --- a/azps-10.3.0/Az.Batch/Disable-AzBatchJob.md +++ b/azps-10.3.0/Az.Batch/Disable-AzBatchJob.md @@ -41,7 +41,7 @@ Use the **Get-AzBatchAccountKey** cmdlet to assign a context to the $Context var ### -BatchContext Specifies the **BatchAccountContext** instance that this cmdlet uses to interact with the Batch service. -If you use the Get-AzBatchAccount cmdlet to get your BatchAccountContext, then Azure Active Directory authentication will be used when interacting with the Batch service. To use shared key authentication instead, use the Get-AzBatchAccountKey cmdlet to get a BatchAccountContext object with its access keys populated. When using shared key authentication, the primary access key is used by default. To change the key to use, set the BatchAccountContext.KeyInUse property. +If you use the Get-AzBatchAccount cmdlet to get your BatchAccountContext, then Microsoft Entra authentication will be used when interacting with the Batch service. To use shared key authentication instead, use the Get-AzBatchAccountKey cmdlet to get a BatchAccountContext object with its access keys populated. When using shared key authentication, the primary access key is used by default. To change the key to use, set the BatchAccountContext.KeyInUse property. ```yaml Type: Microsoft.Azure.Commands.Batch.BatchAccountContext diff --git a/azps-10.3.0/Az.Batch/Disable-AzBatchJobSchedule.md b/azps-10.3.0/Az.Batch/Disable-AzBatchJobSchedule.md index 21f3ba9391..8e26371328 100644 --- a/azps-10.3.0/Az.Batch/Disable-AzBatchJobSchedule.md +++ b/azps-10.3.0/Az.Batch/Disable-AzBatchJobSchedule.md @@ -39,7 +39,7 @@ Use the **Get-AzBatchAccountKey** cmdlet to assign a context to the $Context var ### -BatchContext Specifies the **BatchAccountContext** instance that this cmdlet uses to interact with the Batch service. -If you use the Get-AzBatchAccount cmdlet to get your BatchAccountContext, then Azure Active Directory authentication will be used when interacting with the Batch service. To use shared key authentication instead, use the Get-AzBatchAccountKey cmdlet to get a BatchAccountContext object with its access keys populated. When using shared key authentication, the primary access key is used by default. To change the key to use, set the BatchAccountContext.KeyInUse property. +If you use the Get-AzBatchAccount cmdlet to get your BatchAccountContext, then Microsoft Entra authentication will be used when interacting with the Batch service. To use shared key authentication instead, use the Get-AzBatchAccountKey cmdlet to get a BatchAccountContext object with its access keys populated. When using shared key authentication, the primary access key is used by default. To change the key to use, set the BatchAccountContext.KeyInUse property. ```yaml Type: Microsoft.Azure.Commands.Batch.BatchAccountContext diff --git a/azps-10.3.0/Az.Batch/Enable-AzBatchAutoScale.md b/azps-10.3.0/Az.Batch/Enable-AzBatchAutoScale.md index 94429f6159..8f55e30541 100644 --- a/azps-10.3.0/Az.Batch/Enable-AzBatchAutoScale.md +++ b/azps-10.3.0/Az.Batch/Enable-AzBatchAutoScale.md @@ -70,7 +70,7 @@ Accept wildcard characters: False ### -BatchContext Specifies the **BatchAccountContext** instance that this cmdlet uses to interact with the Batch service. -If you use the Get-AzBatchAccount cmdlet to get your BatchAccountContext, then Azure Active Directory authentication will be used when interacting with the Batch service. To use shared key authentication instead, use the Get-AzBatchAccountKey cmdlet to get a BatchAccountContext object with its access keys populated. When using shared key authentication, the primary access key is used by default. To change the key to use, set the BatchAccountContext.KeyInUse property. +If you use the Get-AzBatchAccount cmdlet to get your BatchAccountContext, then Microsoft Entra authentication will be used when interacting with the Batch service. To use shared key authentication instead, use the Get-AzBatchAccountKey cmdlet to get a BatchAccountContext object with its access keys populated. When using shared key authentication, the primary access key is used by default. To change the key to use, set the BatchAccountContext.KeyInUse property. ```yaml Type: Microsoft.Azure.Commands.Batch.BatchAccountContext