## Troubleshooting
-### Unable to connect to DevOps VM using AAD credentials
-The Azure AD enrollment can take a few minutes to complete. Check: [https://portal.manage-beta.microsoft.com/devices](https://portal.manage-beta.microsoft.com/devices)
+### Unable to connect to DevOps VM using Microsoft Entra ID credentials
+The Microsoft Entra ID enrollment can take a few minutes to complete. Check: [https://portal.manage-beta.microsoft.com/devices](https://portal.manage-beta.microsoft.com/devices)
Verify in the Azure Portal if the `aad-login-for-windows` VM extension was deployed successfully.
@@ -260,4 +260,4 @@ Connect to the VM using the local VM admin credentials and run `dsregcmd /status
DeviceManagementSrvId : urn:ms-drs:enterpriseregistration.windows.net
```
-If the VM is AAD joined, try to login in with the Azure AD credentials again after a few minutes. If it's not AAD joined, attempt to re-install the VM extension or manually enroll the VM to AAD by following the steps in Edge: open Edge and click "Sign in to sync data", select "Work or school account", and then press OK on "Allow my organization to manage my device". It takes a few minutes for the policies to be applied, device scanned and confirmed as secure to access corporate resources. You will know that the process is complete.
+If the VM is Microsoft Entra ID joined, try to login in with the Microsoft Entra ID credentials again after a few minutes. If it's not Microsoft Entra ID joined, attempt to re-install the VM extension or manually enroll the VM to Microsoft Entra ID by following the steps in Edge: open Edge and click "Sign in to sync data", select "Work or school account", and then press OK on "Allow my organization to manage my device". It takes a few minutes for the policies to be applied, device scanned and confirmed as secure to access corporate resources. You will know that the process is complete.
diff --git a/scenarios/secure-baseline-multitenant/terraform/spoke/README.md b/scenarios/secure-baseline-multitenant/terraform/spoke/README.md
index f772148c..7d8c2631 100644
--- a/scenarios/secure-baseline-multitenant/terraform/spoke/README.md
+++ b/scenarios/secure-baseline-multitenant/terraform/spoke/README.md
@@ -1,6 +1,6 @@
-# spoke
-
-
+# spoke
+
+
## Requirements
| Name | Version |
@@ -56,8 +56,8 @@
| Name | Description | Type | Default | Required |
|------|-------------|------|---------|:--------:|
-| [aad\_admin\_group\_name](#input\_aad\_admin\_group\_name) | The name of the Azure AD group that should be granted SQL Admin permissions to the SQL Server | `string` | n/a | yes |
-| [aad\_admin\_group\_object\_id](#input\_aad\_admin\_group\_object\_id) | The object ID of the Azure AD group that should be granted SQL Admin permissions to the SQL Server | `string` | n/a | yes |
+| [aad\_admin\_group\_name](#input\_aad\_admin\_group\_name) | The name of the Microsoft Entra ID group that should be granted SQL Admin permissions to the SQL Server | `string` | n/a | yes |
+| [aad\_admin\_group\_object\_id](#input\_aad\_admin\_group\_object\_id) | The object ID of the Microsoft Entra ID group that should be granted SQL Admin permissions to the SQL Server | `string` | n/a | yes |
| [application\_name](#input\_application\_name) | The name of your application | `string` | `"sec-baseline-1-spoke"` | no |
| [appsvc\_options](#input\_appsvc\_options) | The options for the app service | object({
service_plan = object({
os_type = string
sku_name = string
worker_count = optional(number)
zone_redundant = optional(bool)
})
web_app = object({
slots = list(string)
application_stack = object({
current_stack = string # required for windows
dotnet_version = optional(string)
docker_image = optional(string) # linux only
docker_image_tag = optional(string) # linux only
php_version = optional(string)
node_version = optional(string)
java_version = optional(string)
python = optional(bool) # windows only
python_version = optional(string) # linux only
java_server = optional(string) # linux only
java_server_version = optional(string) # linux only
go_version = optional(string) # linux only
ruby_version = optional(string) # linux only
})
})
})
| {
"service_plan": {
"os_type": "Windows",
"sku_name": "S1"
},
"web_app": {
"application_stack": {
"current_stack": "dotnet",
"dotnet_version": "6.0"
},
"slots": []
}
}
| no |
| [appsvc\_subnet\_cidr](#input\_appsvc\_subnet\_cidr) | The CIDR block for the subnet. | `list(string)` | [
"10.240.0.0/26"
]
| no |
@@ -81,11 +81,11 @@
| [private\_link\_subnet\_cidr](#input\_private\_link\_subnet\_cidr) | The CIDR block for the subnet. | `list(string)` | [
"10.240.11.0/24"
]
| no |
| [spoke\_vnet\_cidr](#input\_spoke\_vnet\_cidr) | [Optional] The CIDR block(s) for the virtual network for whitelisting on the firewall. Defaults to 10.240.0.0/20 | `list(string)` | [
"10.240.0.0/20"
]
| no |
| [tags](#input\_tags) | [Optional] Additional tags to assign to your resources | `map(string)` | `{}` | no |
-| [tenant\_id](#input\_tenant\_id) | The Azure AD tenant ID for the identities. If no value provided, will use current deployment environment tenant. | `string` | `null` | no |
-| [vm\_aad\_admin\_object\_id](#input\_vm\_aad\_admin\_object\_id) | The Azure AD object ID for the VM admin user/group. If vm\_aad\_admin\_username is not specified, this value will be used. | `string` | `null` | no |
-| [vm\_aad\_admin\_username](#input\_vm\_aad\_admin\_username) | [Optional] The Azure AD username for the VM admin account. If vm\_aad\_admin\_object\_id is not specified, this value will be used. | `string` | `null` | no |
-| [vm\_admin\_password](#input\_vm\_admin\_password) | The password for the local VM admin account. Autogenerated if null. Prefer using the Azure AD admin account. | `string` | `null` | no |
-| [vm\_admin\_username](#input\_vm\_admin\_username) | The username for the local VM admin account. Autogenerated if null. Prefer using the Azure AD admin account. | `string` | `null` | no |
+| [tenant\_id](#input\_tenant\_id) | The Microsoft Entra ID tenant ID for the identities. If no value provided, will use current deployment environment tenant. | `string` | `null` | no |
+| [vm\_aad\_admin\_object\_id](#input\_vm\_aad\_admin\_object\_id) | The Microsoft Entra ID object ID for the VM admin user/group. If vm\_aad\_admin\_username is not specified, this value will be used. | `string` | `null` | no |
+| [vm\_aad\_admin\_username](#input\_vm\_aad\_admin\_username) | [Optional] The Microsoft Entra ID username for the VM admin account. If vm\_aad\_admin\_object\_id is not specified, this value will be used. | `string` | `null` | no |
+| [vm\_admin\_password](#input\_vm\_admin\_password) | The password for the local VM admin account. Autogenerated if null. Prefer using the Microsoft Entra ID admin account. | `string` | `null` | no |
+| [vm\_admin\_username](#input\_vm\_admin\_username) | The username for the local VM admin account. Autogenerated if null. Prefer using the Microsoft Entra ID admin account. | `string` | `null` | no |
## Outputs
@@ -102,4 +102,4 @@
| [web\_app\_name](#output\_web\_app\_name) | n/a |
| [web\_app\_slot\_name](#output\_web\_app\_slot\_name) | n/a |
| [web\_app\_uri](#output\_web\_app\_uri) | n/a |
-
+
diff --git a/scenarios/shared/bicep/app-configuration.bicep b/scenarios/shared/bicep/app-configuration.bicep
index afb6166f..6df9668e 100644
--- a/scenarios/shared/bicep/app-configuration.bicep
+++ b/scenarios/shared/bicep/app-configuration.bicep
@@ -22,7 +22,7 @@ param userAssignedIdentities object = {}
@description('Optional. Pricing tier of App Configuration.')
param sku string = 'Standard'
-@description('Optional, default is true. Disables all authentication methods other than AAD authentication.')
+@description('Optional, default is true. Disables all authentication methods other than Microsoft Entra ID authentication.')
param disableLocalAuth bool = true
@description('Optional default is false. Property specifying whether protection against purge is enabled for this configuration store.')
diff --git a/scenarios/shared/bicep/databases/sql.bicep b/scenarios/shared/bicep/databases/sql.bicep
index 728ec036..881384f7 100644
--- a/scenarios/shared/bicep/databases/sql.bicep
+++ b/scenarios/shared/bicep/databases/sql.bicep
@@ -10,14 +10,14 @@ param tags object = {}
@description('Whether the resource has private links or not')
param hasPrivateLinks bool
-@description('Conditional. The administrator username for the server. Required if no `administrators` object for AAD authentication is provided.')
+@description('Conditional. The administrator username for the server. Required if no `administrators` object for Microsoft Entra ID authentication is provided.')
param administratorLogin string = ''
-@description('Conditional. The administrator login password. Required if no `administrators` object for AAD authentication is provided.')
+@description('Conditional. The administrator login password. Required if no `administrators` object for Microsoft Entra ID authentication is provided.')
@secure()
param administratorLoginPassword string = ''
-@description('Conditional. The Azure Active Directory (AAD) administrator authentication. Required if no `administratorLogin` & `administratorLoginPassword` is provided.')
+@description('Conditional. The Microsoft Entra ID administrator authentication. Required if no `administratorLogin` & `administratorLoginPassword` is provided.')
param administrators object = {}
@description('Conditional. The resource ID of a user assigned identity to be used by default. Required if "userAssignedIdentities" is not empty.')
diff --git a/scenarios/shared/bicep/role-assignments/roledefinitions.json b/scenarios/shared/bicep/role-assignments/roledefinitions.json
index 83d1fd78..b84c913e 100644
--- a/scenarios/shared/bicep/role-assignments/roledefinitions.json
+++ b/scenarios/shared/bicep/role-assignments/roledefinitions.json
@@ -1026,7 +1026,7 @@
},
{
"ID": "/subscriptions/0a52391c-0d81-434e-90b4-d04f5c670e8a/providers/Microsoft.Authorization/roleDefinitions/420fcaa2-552c-430f-98ca-3264be4806c7",
- "description": "Lets your app server access SignalR Service with AAD auth options.",
+ "description": "Lets your app server access SignalR Service with Microsoft Entra ID auth options.",
"roleName": "SignalR App Server"
},
{
diff --git a/scenarios/shared/terraform-modules/key-vault/README.md b/scenarios/shared/terraform-modules/key-vault/README.md
index 4681451b..cc6ea84a 100644
--- a/scenarios/shared/terraform-modules/key-vault/README.md
+++ b/scenarios/shared/terraform-modules/key-vault/README.md
@@ -1,6 +1,6 @@
-# key-vault
-
-
+# key-vault
+
+
## Requirements
No requirements.
@@ -44,7 +44,7 @@ No modules.
| [secret\_reader\_identities](#input\_secret\_reader\_identities) | The list of identities that will be granted secret reader permissions | `list(string)` | n/a | yes |
| [sku\_name](#input\_sku\_name) | The sku name for the app service plan | `string` | `"standard"` | no |
| [tags](#input\_tags) | A mapping of tags to assign to the resource. | `map(string)` | `{}` | no |
-| [tenant\_id](#input\_tenant\_id) | The Azure AD tenant ID for the identities. If no value provided, will use current deployment environment tenant. | `string` | `null` | no |
+| [tenant\_id](#input\_tenant\_id) | The Microsoft Entra ID tenant ID for the identities. If no value provided, will use current deployment environment tenant. | `string` | `null` | no |
| [unique\_id](#input\_unique\_id) | The unique id | `string` | n/a | yes |
## Outputs
@@ -53,4 +53,4 @@ No modules.
|------|-------------|
| [vault\_name](#output\_vault\_name) | n/a |
| [vault\_uri](#output\_vault\_uri) | n/a |
-
+
diff --git a/scenarios/shared/terraform-modules/windows-vm-ext/README.md b/scenarios/shared/terraform-modules/windows-vm-ext/README.md
index 37748485..abe8b942 100644
--- a/scenarios/shared/terraform-modules/windows-vm-ext/README.md
+++ b/scenarios/shared/terraform-modules/windows-vm-ext/README.md
@@ -1,6 +1,6 @@
-# windows-vm-ext
-
-
+# windows-vm-ext
+
+
## Requirements
No requirements.
@@ -26,7 +26,7 @@ No modules.
| Name | Description | Type | Default | Required |
|------|-------------|------|---------|:--------:|
-| [enable\_azure\_ad\_join](#input\_enable\_azure\_ad\_join) | True to enable Azure AD join of the VM. | `bool` | `true` | no |
+| [enable\_azure\_ad\_join](#input\_enable\_azure\_ad\_join) | True to enable Microsoft Entra ID join of the VM. | `bool` | `true` | no |
| [enroll\_with\_mdm](#input\_enroll\_with\_mdm) | True to enroll the device with an approved MDM provider like Intune. | `bool` | `true` | no |
| [install\_extensions](#input\_install\_extensions) | n/a | `bool` | `false` | no |
| [mdm\_id](#input\_mdm\_id) | The default value is the MDM Id for Intune, but you can use your own MDM id if you want to use a different MDM service. | `string` | `"0000000a-0000-0000-c000-000000000000"` | no |
@@ -36,4 +36,4 @@ No modules.
## Outputs
No outputs.
-
+
diff --git a/scenarios/shared/terraform-modules/windows-vm/README.md b/scenarios/shared/terraform-modules/windows-vm/README.md
index 3aa4ecdd..10fed98d 100644
--- a/scenarios/shared/terraform-modules/windows-vm/README.md
+++ b/scenarios/shared/terraform-modules/windows-vm/README.md
@@ -1,6 +1,6 @@
-# windows-vm
-
-
+# windows-vm
+
+
## Requirements
No requirements.
@@ -35,8 +35,8 @@ No modules.
| Name | Description | Type | Default | Required |
|------|-------------|------|---------|:--------:|
-| [aad\_admin\_object\_id](#input\_aad\_admin\_object\_id) | The Azure AD object ID for the VM admin user/group. If aad\_admin\_username is not specified, this value will be used. | `string` | `null` | no |
-| [aad\_admin\_username](#input\_aad\_admin\_username) | [Optional] The Azure AD username for the VM admin account. If aad\_admin\_object\_id is not specified, this value will be used. | `string` | `null` | no |
+| [aad\_admin\_object\_id](#input\_aad\_admin\_object\_id) | The Microsoft Entra ID object ID for the VM admin user/group. If aad\_admin\_username is not specified, this value will be used. | `string` | `null` | no |
+| [aad\_admin\_username](#input\_aad\_admin\_username) | [Optional] The Microsoft Entra ID username for the VM admin account. If aad\_admin\_object\_id is not specified, this value will be used. | `string` | `null` | no |
| [admin\_password](#input\_admin\_password) | n/a | `string` | `null` | no |
| [admin\_username](#input\_admin\_username) | n/a | `string` | `null` | no |
| [global\_settings](#input\_global\_settings) | Global settings for the naming convention module. | `any` | n/a | yes |
@@ -62,4 +62,4 @@ No modules.
| [principal\_id](#output\_principal\_id) | n/a |
| [private\_ip\_address](#output\_private\_ip\_address) | n/a |
| [vm\_key\_vault\_secret\_ids](#output\_vm\_key\_vault\_secret\_ids) | n/a |
-
+