From 46813281d180c4e852c17cf19aab42fda8bddca1 Mon Sep 17 00:00:00 2001 From: "Mike F. Robbins" Date: Thu, 8 Aug 2024 01:06:10 -0500 Subject: [PATCH] Updated guids to approved versions (#25730) Co-authored-by: Mike F. Robbins --- .../help/Backup-AzApiManagement.md | 2 +- .../Get-AzApiManagementIdentityProvider.md | 2 +- .../New-AzApiManagementIdentityProvider.md | 4 +- .../help/Restore-AzApiManagement.md | 2 +- .../help/Get-AzApplicationInsightsApiKey.md | 2 +- .../Remove-AzApplicationInsightsApiKey.md | 2 +- .../help/New-AzAutomationConnection.md | 4 +- ...AzBillingBenefitsElevateSavingPlanOrder.md | 4 +- .../BotService/help/New-AzBotService.md | 4 +- src/Chaos/Chaos/help/New-AzChaosExperiment.md | 8 +-- .../Chaos/help/Update-AzChaosExperiment.md | 4 +- src/Compute/Compute/help/Set-AzVMOSDisk.md | 2 +- .../Compute/help/Set-AzVmssSecurityProfile.md | 2 +- .../help/New-AzConfidentialLedger.md | 8 +-- ...alLedgerAADBasedSecurityPrincipalObject.md | 6 +- .../help/Update-AzConfidentialLedger.md | 4 +- .../help/New-AzConnectedVMwareVM.md | 52 ++++++++-------- .../help/New-AzCustomLocation.md | 4 +- .../help/Get-AzDataProtectionBackupVault.md | 2 +- ...cksWorkspaceProviderAuthorizationObject.md | 4 +- src/Fleet/Fleet/help/New-AzFleet.md | 4 +- .../FluidRelay/help/New-AzFluidRelayServer.md | 2 +- .../help/Update-AzFluidRelayServer.md | 2 +- .../help/New-AzSapMonitorProviderInstance.md | 2 +- .../KeyVault/help/Add-AzKeyVaultKey.md | 2 +- .../KeyVault/help/New-AzKeyVaultManagedHsm.md | 2 +- .../New-AzKustoClusterPrincipalAssignment.md | 2 +- .../New-AzKustoDatabasePrincipalAssignment.md | 2 +- .../LogicApp/help/Get-AzLogicAppRunHistory.md | 6 +- .../help/New-AzNetworkFabricL3Domain.md | 4 +- .../help/Get-AzManagementPartner.md | 6 +- .../help/New-AzManagementPartner.md | 4 +- .../help/Update-AzManagementPartner.md | 4 +- .../help/Get-AzMigrateServerReplication.md | 10 +-- src/Monitor/Monitor/help/Get-AzActivityLog.md | 8 +-- .../Monitor/help/Get-AzAlertHistory.md | 62 +++++++++---------- .../Monitor/help/Get-AzAutoscaleHistory.md | 4 +- ...New-AzActionGroupEventHubReceiverObject.md | 6 +- .../New-AzActionGroupWebhookReceiverObject.md | 6 +- .../Monitor/help/Update-AzActionGroup.md | 2 +- .../Get-AzNetworkManagerScopeConnection.md | 4 +- .../New-AzNetworkManagerScopeConnection.md | 10 +-- .../Set-AzNetworkManagerScopeConnection.md | 4 +- .../help/Get-AzNewRelicBillingInfo.md | 4 +- .../NewRelic/help/Get-AzNewRelicPlan.md | 4 +- .../help/Move-AzReservationDirectory.md | 4 +- ...t-AzADServicePrincipalAppRoleAssignment.md | 10 +-- .../Resources/help/Get-AzManagementGroup.md | 22 +++---- .../help/Get-AzManagementGroupEntity.md | 4 +- .../Get-AzManagementGroupHierarchySetting.md | 2 +- .../help/Get-AzManagementGroupSubscription.md | 6 +- .../help/Get-AzRoleAssignmentSchedule.md | 6 +- .../Get-AzRoleAssignmentScheduleInstance.md | 6 +- .../help/Get-AzRoleEligibilitySchedule.md | 6 +- .../Get-AzRoleEligibilityScheduleInstance.md | 6 +- ...w-AzADServicePrincipalAppRoleAssignment.md | 6 +- .../Resources/help/New-AzManagementGroup.md | 28 ++++----- .../New-AzManagementGroupHierarchySetting.md | 6 +- .../help/New-AzManagementGroupSubscription.md | 2 +- .../Resources/help/New-AzRoleAssignment.md | 4 +- .../New-AzRoleAssignmentScheduleRequest.md | 8 +-- .../New-AzRoleEligibilityScheduleRequest.md | 4 +- ...e-AzADServicePrincipalAppRoleAssignment.md | 2 +- .../Resources/help/Remove-AzRoleAssignment.md | 2 +- .../Resources/help/Remove-AzRoleDefinition.md | 2 +- .../Resources/help/Set-AzRoleAssignment.md | 6 +- ...e-AzADServicePrincipalAppRoleAssignment.md | 2 +- .../help/Update-AzManagementGroup.md | 16 ++--- ...pdate-AzManagementGroupHierarchySetting.md | 6 +- .../help/Get-AzSentinelEntityInsight.md | 2 +- .../help/New-AzSentinelIncidentTeam.md | 2 +- src/Sql/Sql/help/Get-AzSqlInstance.md | 6 +- src/Sql/Sql/help/Get-AzSqlServer.md | 6 +- src/Sql/Sql/help/New-AzSqlInstance.md | 2 +- src/Sql/Sql/help/New-AzSqlServer.md | 2 +- .../help/Assert-AzSqlVMEntraAuth.md | 4 +- .../SqlVirtualMachine/help/Update-AzSqlVM.md | 2 +- .../StackHCI/help/New-AzStackHciCluster.md | 4 +- .../StackHCI/help/Register-AzStackHCI.md | 8 +-- .../help/New-AzStorageActionTask.md | 2 +- .../help/Update-AzStorageActionTask.md | 8 +-- .../help/New-AzSynapseRoleAssignment.md | 4 +- ...te-AzSynapseManagedVirtualNetworkConfig.md | 2 +- 83 files changed, 254 insertions(+), 254 deletions(-) diff --git a/src/ApiManagement/ApiManagement/help/Backup-AzApiManagement.md b/src/ApiManagement/ApiManagement/help/Backup-AzApiManagement.md index fd00590e7016..8476433ae425 100644 --- a/src/ApiManagement/ApiManagement/help/Backup-AzApiManagement.md +++ b/src/ApiManagement/ApiManagement/help/Backup-AzApiManagement.md @@ -44,7 +44,7 @@ $resourceGroupName="contosogroup2"; $apiManagementName="contosoapi"; $containerName="apimbackupcontainer"; $backupName="test-sdk-backup-1"; -$msiClientId="a6270d0c-7d86-478b-8cbe-dc9047ba54f7" +$msiClientId="00001111-aaaa-2222-bbbb-3333cccc4444" Backup-AzApiManagement -ResourceGroupName $resourceGroupName -Name $apiManagementName -StorageContext $storageContext -TargetContainerName $containerName -TargetBlobName $backupName -AccessType "UserAssignedManagedIdentity" -IdentityClientId $msiClientId -PassThru ``` diff --git a/src/ApiManagement/ApiManagement/help/Get-AzApiManagementIdentityProvider.md b/src/ApiManagement/ApiManagement/help/Get-AzApiManagementIdentityProvider.md index 3e6f071f4582..484ebadb940e 100644 --- a/src/ApiManagement/ApiManagement/help/Get-AzApiManagementIdentityProvider.md +++ b/src/ApiManagement/ApiManagement/help/Get-AzApiManagementIdentityProvider.md @@ -71,7 +71,7 @@ Get-AzApiManagementIdentityProvider -Context $context -Type AadB2C ```output Type : AadB2C -ClientId : f02dafe2-b8b8-48ec-a38e-27e5c16c51e5 +ClientId : 00001111-aaaa-2222-bbbb-3333cccc4444 ClientSecret : xxxxxx AllowedTenants : {contosoaadb2c.onmicrosoft.com} Authority : login.microsoftonline.com diff --git a/src/ApiManagement/ApiManagement/help/New-AzApiManagementIdentityProvider.md b/src/ApiManagement/ApiManagement/help/New-AzApiManagementIdentityProvider.md index c860b83beaef..fbecc05c7942 100644 --- a/src/ApiManagement/ApiManagement/help/New-AzApiManagementIdentityProvider.md +++ b/src/ApiManagement/ApiManagement/help/New-AzApiManagementIdentityProvider.md @@ -37,12 +37,12 @@ This takes as input the ClientId and ClientSecret of the Facebook app. ### Example 2: Configures adB2C as an identity Provider for Developer Portal Logins ```powershell $apimContext = New-AzApiManagementContext -ResourceGroupName "Api-Default-WestUS" -ServiceName "contoso" -New-AzApiManagementIdentityProvider -Context $context -Type AadB2C -ClientId 6b1fc750-9e68-450c-97d2-ba6acd0fbc20 -ClientSecret "foobar" -AllowedTenants 'samirtestbc.onmicrosoft.com' -SignupPolicyName B2C_1_signup-policy +New-AzApiManagementIdentityProvider -Context $context -Type AadB2C -ClientId 00001111-aaaa-2222-bbbb-3333cccc4444 -ClientSecret "foobar" -AllowedTenants 'samirtestbc.onmicrosoft.com' -SignupPolicyName B2C_1_signup-policy ``` ```output Type : AadB2C -ClientId : 6b1fc750-9e68-450c-97d2-ba6acd0fbc20 +ClientId : 00001111-aaaa-2222-bbbb-3333cccc4444 ClientSecret : foobar AllowedTenants : {samirtestbc.onmicrosoft.com} Authority : login.microsoftonline.com diff --git a/src/ApiManagement/ApiManagement/help/Restore-AzApiManagement.md b/src/ApiManagement/ApiManagement/help/Restore-AzApiManagement.md index b7a1dd36afb2..876cc16f3f98 100644 --- a/src/ApiManagement/ApiManagement/help/Restore-AzApiManagement.md +++ b/src/ApiManagement/ApiManagement/help/Restore-AzApiManagement.md @@ -44,7 +44,7 @@ $resourceGroupName="ContosoGroup02"; $apiManagementName="contosoapi"; $containerName="apimbackupcontainer"; $backupName="test-sdk-backup-1"; -$msiClientId="a6270d0c-7d86-478b-8cbe-dc9047ba54f7" +$msiClientId="00001111-aaaa-2222-bbbb-3333cccc4444" Restore-AzApiManagement -ResourceGroupName $resourceGroupName -Name $apiManagementName -StorageContext $storageContext -SourceContainerName $containerName -SourceBlobName $backupName -AccessType "UserAssignedManagedIdentity" -IdentityClientId $msiClientId -PassThru ``` diff --git a/src/ApplicationInsights/ApplicationInsights/help/Get-AzApplicationInsightsApiKey.md b/src/ApplicationInsights/ApplicationInsights/help/Get-AzApplicationInsightsApiKey.md index 8097d4e85595..56f8fdc9eedc 100644 --- a/src/ApplicationInsights/ApplicationInsights/help/Get-AzApplicationInsightsApiKey.md +++ b/src/ApplicationInsights/ApplicationInsights/help/Get-AzApplicationInsightsApiKey.md @@ -45,7 +45,7 @@ Get Api Keys for an application insights resource ### Example 2: Get specific API key for an application insights resource ```powershell -Get-AzApplicationInsightsApiKey -ResourceGroupName "testGroup" -Name "test" -ApiKeyId 7c4c61dc-b392-4aa4-992f-ee92b84e5dee +Get-AzApplicationInsightsApiKey -ResourceGroupName "testGroup" -Name "test" -ApiKeyId 00001111-aaaa-2222-bbbb-3333cccc4444 ``` Get specific API key for an application insights resource diff --git a/src/ApplicationInsights/ApplicationInsights/help/Remove-AzApplicationInsightsApiKey.md b/src/ApplicationInsights/ApplicationInsights/help/Remove-AzApplicationInsightsApiKey.md index 86aee425916b..133aeab31dda 100644 --- a/src/ApplicationInsights/ApplicationInsights/help/Remove-AzApplicationInsightsApiKey.md +++ b/src/ApplicationInsights/ApplicationInsights/help/Remove-AzApplicationInsightsApiKey.md @@ -32,7 +32,7 @@ Delete an API Key of an Application Insights component. ### Example 1: Remove an application insights api key for an application insights resource ```powershell -Remove-AzApplicationInsightsApiKey -ResourceGroupName "testGroup" -Name "test" -ApiKeyId dd173f38-4fd1-4c75-8af5-99c29aa0f867 +Remove-AzApplicationInsightsApiKey -ResourceGroupName "testGroup" -Name "test" -ApiKeyId 00001111-aaaa-2222-bbbb-3333cccc4444 ``` Remove an application insights api key for an application insights resource diff --git a/src/Automation/Automation/help/New-AzAutomationConnection.md b/src/Automation/Automation/help/New-AzAutomationConnection.md index 85b13903d0a7..0fbc796ce5a8 100644 --- a/src/Automation/Automation/help/New-AzAutomationConnection.md +++ b/src/Automation/Automation/help/New-AzAutomationConnection.md @@ -37,8 +37,8 @@ The command uses the connection field values in $FieldValues. ### Example 2: Create a connection for ConnectionTypeName=AzureServicePrincipal ```powershell $Thumbprint = "0SZTNJ34TCCMUJ5MJZGR8XQD3S0RVHJBA33Z8ZXV" -$TenantId = "4cd76576-b611-43d0-8f2b-adcb139531bf" -$ApplicationId = "3794a65a-e4e4-493d-ac1d-f04308d712dd" +$TenantId = "00001111-aaaa-2222-bbbb-3333cccc4444" +$ApplicationId = "00001111-aaaa-2222-bbbb-3333cccc4444" $SubscriptionId = "81b59010-dc55-45b7-89cd-5ca26db62472" $RunAsAccountConnectionFieldValues = @{"ApplicationId" = $ApplicationId; "TenantId" = $TenantId; "CertificateThumbprint" = $Thumbprint; "SubscriptionId" = $SubscriptionId} New-AzAutomationConnection -Name "Connection13" -ConnectionTypeName AzureServicePrincipal -ConnectionFieldValues $RunAsAccountConnectionFieldValues -ResourceGroupName "ResourceGroup01" -AutomationAccountName "AutomationAccount01" diff --git a/src/BillingBenefits/BillingBenefits/help/Invoke-AzBillingBenefitsElevateSavingPlanOrder.md b/src/BillingBenefits/BillingBenefits/help/Invoke-AzBillingBenefitsElevateSavingPlanOrder.md index bc43d6348abe..4a47f57e1300 100644 --- a/src/BillingBenefits/BillingBenefits/help/Invoke-AzBillingBenefitsElevateSavingPlanOrder.md +++ b/src/BillingBenefits/BillingBenefits/help/Invoke-AzBillingBenefitsElevateSavingPlanOrder.md @@ -37,7 +37,7 @@ Invoke-AzBillingBenefitsElevateSavingPlanOrder -SavingsPlanOrderId "e0b1f446-568 ```output Name PrincipalId RoleDefinitionId Scope ---- ----------- ---------------- ----- -5c545baf-2ef5-4016-9c31-6e0e23c397a0 067e7443-3a55-40b6-a2d8-0a7a12a9da2d /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635 /providers/Microsoft.BillingBenefits/savingsplanorders/e45905d2-9207-4f24-8549-f615c203b49b +00001111-aaaa-2222-bbbb-3333cccc4444 067e7443-3a55-40b6-a2d8-0a7a12a9da2d /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635 /providers/Microsoft.BillingBenefits/savingsplanorders/e45905d2-9207-4f24-8549-f615c203b49b ``` Elevate savings plan order @@ -54,7 +54,7 @@ $response = Invoke-AzBillingBenefitsElevateSavingPlanOrder -InputObject $identit ```output Name PrincipalId RoleDefinitionId Scope ---- ----------- ---------------- ----- -5c545baf-2ef5-4016-9c31-6e0e23c397a0 067e7443-3a55-40b6-a2d8-0a7a12a9da2d /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635 /providers/Microsoft.BillingBenefits/savingsplanorders/e45905d2-9207-4f24-8549-f615c203b49b +00001111-aaaa-2222-bbbb-3333cccc4444 067e7443-3a55-40b6-a2d8-0a7a12a9da2d /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635 /providers/Microsoft.BillingBenefits/savingsplanorders/e45905d2-9207-4f24-8549-f615c203b49b ``` Elevate savings plan order diff --git a/src/BotService/BotService/help/New-AzBotService.md b/src/BotService/BotService/help/New-AzBotService.md index 39935191ea23..6bea6016f5df 100644 --- a/src/BotService/BotService/help/New-AzBotService.md +++ b/src/BotService/BotService/help/New-AzBotService.md @@ -35,7 +35,7 @@ Returns a BotService specified by the parameters. ### Example 1: Create a new bot ```powershell -New-AzBotService -resourcegroupname BotTest-rg -name BotTest1 -ApplicationId "af5fce4d-ee68-4b25-be09-f3222582e133" -Location global -Sku F0 -Description "123134" -Registration +New-AzBotService -resourcegroupname BotTest-rg -name BotTest1 -ApplicationId "00001111-aaaa-2222-bbbb-3333cccc4444" -Location global -Sku F0 -Description "123134" -Registration ``` ```output @@ -48,7 +48,7 @@ Create a new Bot by ResourceGroupName and ApplicationId ### Example 2: Create a new Web App ```powershell -New-AzBotService -resourcegroupname BotTest-rg -name BotTest2 -ApplicationId "b1ab1727-0465-4255-a1bb-976210af972c" -Location global -Sku F0 -Description "123134" -Webapp +New-AzBotService -resourcegroupname BotTest-rg -name BotTest2 -ApplicationId "00001111-aaaa-2222-bbbb-3333cccc4444" -Location global -Sku F0 -Description "123134" -Webapp ``` ```output diff --git a/src/Chaos/Chaos/help/New-AzChaosExperiment.md b/src/Chaos/Chaos/help/New-AzChaosExperiment.md index e7a7be063bfd..41015470dfca 100644 --- a/src/Chaos/Chaos/help/New-AzChaosExperiment.md +++ b/src/Chaos/Chaos/help/New-AzChaosExperiment.md @@ -38,8 +38,8 @@ New-AzChaosExperiment -Name experiment-test -ResourceGroupName azps_test_group_c ```output Id : /subscriptions/{subId}/resourceGroups/azps_test_group_chaos/providers/Microsoft.Chaos/experiments/EXPERIMENT-TEST -IdentityPrincipalId : 72f14040-8265-4f10-b5ea-377c6fc2671c -IdentityTenantId : 72f988bf-86f1-41af-91ab-2d7cd011db47 +IdentityPrincipalId : 00001111-aaaa-2222-bbbb-3333cccc4444 +IdentityTenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 IdentityType : SystemAssigned IdentityUserAssignedIdentity : { } @@ -146,8 +146,8 @@ New-AzChaosExperiment -Name experiment-test -ResourceGroupName azps_test_group_c ```output Id : /subscriptions/{subId}/resourceGroups/azps_test_group_chaos/providers/Microsoft.Chaos/experiments/EXPERIMENT-TEST -IdentityPrincipalId : 72f14040-8265-4f10-b5ea-377c6fc2671c -IdentityTenantId : 72f988bf-86f1-41af-91ab-2d7cd011db47 +IdentityPrincipalId : 00001111-aaaa-2222-bbbb-3333cccc4444 +IdentityTenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 IdentityType : SystemAssigned IdentityUserAssignedIdentity : { } diff --git a/src/Chaos/Chaos/help/Update-AzChaosExperiment.md b/src/Chaos/Chaos/help/Update-AzChaosExperiment.md index 5f7957e9aaed..6f2b3faa0130 100644 --- a/src/Chaos/Chaos/help/Update-AzChaosExperiment.md +++ b/src/Chaos/Chaos/help/Update-AzChaosExperiment.md @@ -40,8 +40,8 @@ Update-AzChaosExperiment -Name experiment-test -ResourceGroupName azps_test_grou ```output Id : /subscriptions/{subId}/resourceGroups/azps_test_group_chaos/providers/Microsoft.Chaos/experiments/EXPERIMENT-TEST -IdentityPrincipalId : 72f14040-8265-4f10-b5ea-377c6fc2671c -IdentityTenantId : 72f988bf-86f1-41af-91ab-2d7cd011db47 +IdentityPrincipalId : 00001111-aaaa-2222-bbbb-3333cccc4444 +IdentityTenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 IdentityType : SystemAssigned IdentityUserAssignedIdentity : { } diff --git a/src/Compute/Compute/help/Set-AzVMOSDisk.md b/src/Compute/Compute/help/Set-AzVMOSDisk.md index 60e508895407..10e75fe38e1a 100644 --- a/src/Compute/Compute/help/Set-AzVMOSDisk.md +++ b/src/Compute/Compute/help/Set-AzVMOSDisk.md @@ -141,7 +141,7 @@ $cred = New-Object System.Management.Automation.PSCredential ($user, $securePass # Create Key Vault New-AzKeyVault -Name $keyVaultName -Location $Location -ResourceGroupName $ResourceGroupName -Sku Premium -EnablePurgeProtection -EnabledForDiskEncryption; -$cvmAgent = Get-AzADServicePrincipal -ApplicationId 'bf7b6499-ff71-4aa2-97a4-f372087be7f0'; +$cvmAgent = Get-AzADServicePrincipal -ApplicationId '00001111-aaaa-2222-bbbb-3333cccc4444'; Set-AzKeyVaultAccessPolicy -VaultName $keyVaultName -ResourceGroupName $ResourceGroupName -ObjectId $cvmAgent.id -PermissionsToKeys get,release; # Add Key vault Key diff --git a/src/Compute/Compute/help/Set-AzVmssSecurityProfile.md b/src/Compute/Compute/help/Set-AzVmssSecurityProfile.md index e1ab5939b7d2..77bcb6c4c2ba 100644 --- a/src/Compute/Compute/help/Set-AzVmssSecurityProfile.md +++ b/src/Compute/Compute/help/Set-AzVmssSecurityProfile.md @@ -262,7 +262,7 @@ The second command sets the SecurityType enum to "TrustedLaunch". $keyVaultName = "kv" + $rgname; $keyName = "k" + $rgname; $desName = "des" + $rgname; - $cvmAgent = Get-AzADServicePrincipal -ApplicationId "bf7b6499-ff71-4aa2-97a4-f372087be7f0"; + $cvmAgent = Get-AzADServicePrincipal -ApplicationId "00001111-aaaa-2222-bbbb-3333cccc4444"; $kv = New-AzKeyVault -Name $keyVaultName -ResourceGroupName $rgName -Location $loc -Sku "Premium" -EnablePurgeProtection -SoftDeleteRetentionInDays 7; Set-AzKeyVaultAccessPolicy -ObjectId $cvmAgent.Id -VaultName $keyVaultName -ResourceGroupName $rgName -PermissionsToKeys "get","release"; Start-BitsTransfer -Source https://cvmprivatepreviewsa.blob.core.windows.net/cvmpublicpreviewcontainer/skr-policy.json -Destination ".\skr-policy.json"; diff --git a/src/ConfidentialLedger/ConfidentialLedger/help/New-AzConfidentialLedger.md b/src/ConfidentialLedger/ConfidentialLedger/help/New-AzConfidentialLedger.md index 18de2c0ac8dc..a8d4d90d888c 100644 --- a/src/ConfidentialLedger/ConfidentialLedger/help/New-AzConfidentialLedger.md +++ b/src/ConfidentialLedger/ConfidentialLedger/help/New-AzConfidentialLedger.md @@ -34,8 +34,8 @@ New-AzConfidentialLedger ` -AadBasedSecurityPrincipal ` @{ LedgerRoleName="Administrator"; - PrincipalId="34621747-6fc8-4771-a2eb-72f31c461f2e"; - TenantId="bce123b9-2b7b-4975-8360-5ca0b9b1cd08" + PrincipalId="00001111-aaaa-2222-bbbb-3333cccc4444"; + TenantId="00001111-aaaa-2222-bbbb-3333cccc4444" } ` -CertBasedSecurityPrincipal ` @{ @@ -58,8 +58,8 @@ Creates a new Confidential Ledger. ```powershell $aadSecurityPrincipal = New-AzConfidentialLedgerAADBasedSecurityPrincipalObject ` -LedgerRoleName "Administrator" ` - -PrincipalId "34621747-6fc8-4771-a2eb-72f31c461f2e" ` - -TenantId "bce123b9-2b7b-4975-8360-5ca0b9b1cd08" + -PrincipalId "00001111-aaaa-2222-bbbb-3333cccc4444" ` + -TenantId "00001111-aaaa-2222-bbbb-3333cccc4444" $certSecurityPrincipal = New-AzConfidentialLedgerCertBasedSecurityPrincipalObject ` -Cert "-----BEGIN CERTIFICATE-----********************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************-----END CERTIFICATE-----" ` diff --git a/src/ConfidentialLedger/ConfidentialLedger/help/New-AzConfidentialLedgerAADBasedSecurityPrincipalObject.md b/src/ConfidentialLedger/ConfidentialLedger/help/New-AzConfidentialLedgerAADBasedSecurityPrincipalObject.md index 878136580133..1153e7f55fa7 100644 --- a/src/ConfidentialLedger/ConfidentialLedger/help/New-AzConfidentialLedgerAADBasedSecurityPrincipalObject.md +++ b/src/ConfidentialLedger/ConfidentialLedger/help/New-AzConfidentialLedgerAADBasedSecurityPrincipalObject.md @@ -26,14 +26,14 @@ Create an in-memory object for AADBasedSecurityPrincipal. ```powershell New-AzConfidentialLedgerAADBasedSecurityPrincipalObject ` -LedgerRoleName "Administrator" ` - -PrincipalId "34621747-6fc8-4771-a2eb-72f31c461f2e" ` - -TenantId "bce123b9-2b7b-4975-8360-5ca0b9b1cd08" + -PrincipalId "00001111-aaaa-2222-bbbb-3333cccc4444" ` + -TenantId "00001111-aaaa-2222-bbbb-3333cccc4444" ``` ```output LedgerRoleName PrincipalId TenantId -------------- ----------- -------- -Administrator 34621747-6fc8-4771-a2eb-72f31c461f2e bce123b9-2b7b-4975-8360-5ca0b9b1cd08 +Administrator 00001111-aaaa-2222-bbbb-3333cccc4444 00001111-aaaa-2222-bbbb-3333cccc4444 ``` Creates an AadBasedSecurityPrincipalObject that may be used for `Az.ConfidentialLedger` commands. diff --git a/src/ConfidentialLedger/ConfidentialLedger/help/Update-AzConfidentialLedger.md b/src/ConfidentialLedger/ConfidentialLedger/help/Update-AzConfidentialLedger.md index 6f219c4283a6..8bfdbbb9d623 100644 --- a/src/ConfidentialLedger/ConfidentialLedger/help/Update-AzConfidentialLedger.md +++ b/src/ConfidentialLedger/ConfidentialLedger/help/Update-AzConfidentialLedger.md @@ -44,8 +44,8 @@ Update-AzConfidentialLedger ` -AadBasedSecurityPrincipal ` @{ LedgerRoleName="Administrator"; - PrincipalId="34621747-6fc8-4771-a2eb-72f31c461f2e"; - TenantId="bce123b9-2b7b-4975-8360-5ca0b9b1cd08" + PrincipalId="00001111-aaaa-2222-bbbb-3333cccc4444"; + TenantId="00001111-aaaa-2222-bbbb-3333cccc4444" } ` -CertBasedSecurityPrincipal ` @{ diff --git a/src/ConnectedVMware/ConnectedVMware/help/New-AzConnectedVMwareVM.md b/src/ConnectedVMware/ConnectedVMware/help/New-AzConnectedVMwareVM.md index 369a7aeef7b5..3d928845adcd 100644 --- a/src/ConnectedVMware/ConnectedVMware/help/New-AzConnectedVMwareVM.md +++ b/src/ConnectedVMware/ConnectedVMware/help/New-AzConnectedVMwareVM.md @@ -48,11 +48,11 @@ Please note some properties can be set only during virtual machine instance crea ### Example 1: Create Virtual Machine Instances on the given Resource Pool ```powershell -New-AzConnectedVMwareVM -ExtendedLocationName "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourcegroups/test-rg/providers/microsoft.extendedlocation/customlocations/test-cl" -ExtendedLocationType "CustomLocation" -InfrastructureProfileTemplateId "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/virtualMachineTemplates/test-vmtmpl" -InfrastructureProfileVCenterId "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/vcenters/test-vc" -PlacementProfileResourcePoolId "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/resourcepools/test-rp" -MachineId "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.HybridCompute/machines/test-machine" +New-AzConnectedVMwareVM -ExtendedLocationName "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourcegroups/test-rg/providers/microsoft.extendedlocation/customlocations/test-cl" -ExtendedLocationType "CustomLocation" -InfrastructureProfileTemplateId "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/virtualMachineTemplates/test-vmtmpl" -InfrastructureProfileVCenterId "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/vcenters/test-vc" -PlacementProfileResourcePoolId "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/resourcepools/test-rp" -MachineId "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.HybridCompute/machines/test-machine" ``` ```output -ExtendedLocationName : /subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourcegroups/test-rg/providers/microsoft.extendedlocation/customlocations/test-cl +ExtendedLocationName : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourcegroups/test-rg/providers/microsoft.extendedlocation/customlocations/test-cl ExtendedLocationType : CustomLocation HardwareProfileCpuHotAddEnabled : True HardwareProfileCpuHotRemoveEnabled : False @@ -60,7 +60,7 @@ HardwareProfileMemoryHotAddEnabled : True HardwareProfileMemorySizeMb : 1024 HardwareProfileNumCoresPerSocket : 1 HardwareProfileNumCpUs : 1 -Id : /subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.HybridCompute/machines/test-machine/providers/Microsoft.ConnectedVMwarevSphere/virtualMachineInstances/default +Id : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.HybridCompute/machines/test-machine/providers/Microsoft.ConnectedVMwarevSphere/virtualMachineInstances/default InfrastructureProfileCustomResourceName : d04a3534-2dfa-42c8-8959-83796a1bcac1 InfrastructureProfileFirmwareType : bios InfrastructureProfileFolderPath : ArcPrivateClouds-67 @@ -69,8 +69,8 @@ InfrastructureProfileInventoryItemId : InfrastructureProfileMoName : test-machine InfrastructureProfileMoRefId : vm-1529269 InfrastructureProfileSmbiosUuid : 4215b305-5f69-959b-0620-16a5bd8c5fc9 -InfrastructureProfileTemplateId : /subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/virtualMachineTemplates/test-vmtmpl -InfrastructureProfileVCenterId : /subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/vcenters/test-vc +InfrastructureProfileTemplateId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/virtualMachineTemplates/test-vmtmpl +InfrastructureProfileVCenterId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/vcenters/test-vc Name : default NetworkProfileNetworkInterface : {{ "ipSettings": { @@ -79,7 +79,7 @@ NetworkProfileNetworkInterface : {{ "name": "nic_1", "label": "Network adapter 1", "macAddress": "00:50:56:95:ec:bc", - "networkId": "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/VirtualNetworks/test-vnet", + "networkId": "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/VirtualNetworks/test-vnet", "nicType": "vmxnet3", "powerOnBoot": "enabled", "networkMoRefId": "network-563661", @@ -98,7 +98,7 @@ OSProfileToolsVersionStatus : guestToolsUnmanaged PlacementProfileClusterId : PlacementProfileDatastoreId : PlacementProfileHostId : -PlacementProfileResourcePoolId : /subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/ResourcePools/test-rp +PlacementProfileResourcePoolId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/ResourcePools/test-rp PowerState : poweredOn ProvisioningState : Succeeded ResourceGroupName : test-rg @@ -147,11 +147,11 @@ This command create a VM Instances of machine named `test-machine` in a resource ### Example 2: Create Virtual Machine Instances on the given Cluster ```powershell -New-AzConnectedVMwareVM -ExtendedLocationName "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourcegroups/test-rg/providers/microsoft.extendedlocation/customlocations/test-cl" -ExtendedLocationType "CustomLocation" -InfrastructureProfileTemplateId "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/virtualMachineTemplates/test-vmtmpl" -InfrastructureProfileVCenterId "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/vcenters/test-vc" -PlacementProfileClusterId "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/clusters/test-cluster" -MachineId "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.HybridCompute/machines/test-machine" +New-AzConnectedVMwareVM -ExtendedLocationName "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourcegroups/test-rg/providers/microsoft.extendedlocation/customlocations/test-cl" -ExtendedLocationType "CustomLocation" -InfrastructureProfileTemplateId "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/virtualMachineTemplates/test-vmtmpl" -InfrastructureProfileVCenterId "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/vcenters/test-vc" -PlacementProfileClusterId "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/clusters/test-cluster" -MachineId "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.HybridCompute/machines/test-machine" ``` ```output -ExtendedLocationName : /subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourcegroups/test-rg/providers/microsoft.extendedlocation/customlocations/test-cl +ExtendedLocationName : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourcegroups/test-rg/providers/microsoft.extendedlocation/customlocations/test-cl ExtendedLocationType : CustomLocation HardwareProfileCpuHotAddEnabled : True HardwareProfileCpuHotRemoveEnabled : False @@ -159,7 +159,7 @@ HardwareProfileMemoryHotAddEnabled : True HardwareProfileMemorySizeMb : 1024 HardwareProfileNumCoresPerSocket : 1 HardwareProfileNumCpUs : 1 -Id : /subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.HybridCompute/machines/test-machine/providers/Microsoft.ConnectedVMwarevSphere/virtualMachineInstances/default +Id : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.HybridCompute/machines/test-machine/providers/Microsoft.ConnectedVMwarevSphere/virtualMachineInstances/default InfrastructureProfileCustomResourceName : d04a3534-2dfa-42c8-8959-83796a1bcac1 InfrastructureProfileFirmwareType : bios InfrastructureProfileFolderPath : ArcPrivateClouds-67 @@ -168,8 +168,8 @@ InfrastructureProfileInventoryItemId : InfrastructureProfileMoName : test-machine InfrastructureProfileMoRefId : vm-1529269 InfrastructureProfileSmbiosUuid : 4215b305-5f69-959b-0620-16a5bd8c5fc9 -InfrastructureProfileTemplateId : /subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/virtualMachineTemplates/test-vmtmpl -InfrastructureProfileVCenterId : /subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/vcenters/test-vc +InfrastructureProfileTemplateId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/virtualMachineTemplates/test-vmtmpl +InfrastructureProfileVCenterId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/vcenters/test-vc Name : default NetworkProfileNetworkInterface : {{ "ipSettings": { @@ -178,7 +178,7 @@ NetworkProfileNetworkInterface : {{ "name": "nic_1", "label": "Network adapter 1", "macAddress": "00:50:56:95:ec:bc", - "networkId": "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/VirtualNetworks/test-vnet", + "networkId": "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/VirtualNetworks/test-vnet", "nicType": "vmxnet3", "powerOnBoot": "enabled", "networkMoRefId": "network-563661", @@ -194,7 +194,7 @@ OSProfileOstype : Linux OSProfileToolsRunningStatus : guestToolsNotRunning OSProfileToolsVersion : 10304 OSProfileToolsVersionStatus : guestToolsUnmanaged -PlacementProfileClusterId : /subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/Clusters/test-cluster +PlacementProfileClusterId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/Clusters/test-cluster PlacementProfileDatastoreId : PlacementProfileHostId : PlacementProfileResourcePoolId : @@ -246,11 +246,11 @@ This command create a VM Instances of machine named `test-machine` in a resource ### Example 3: Create Virtual Machine on the given Host ```powershell -New-AzConnectedVMwareVM -ExtendedLocationName "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourcegroups/test-rg/providers/microsoft.extendedlocation/customlocations/test-cl" -ExtendedLocationType "CustomLocation" -InfrastructureProfileTemplateId "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/virtualMachineTemplates/test-vmtmpl" -InfrastructureProfileVCenterId "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/vcenters/test-vc" -PlacementProfileHostId "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/hosts/test-host" -MachineId "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.HybridCompute/machines/test-machine" +New-AzConnectedVMwareVM -ExtendedLocationName "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourcegroups/test-rg/providers/microsoft.extendedlocation/customlocations/test-cl" -ExtendedLocationType "CustomLocation" -InfrastructureProfileTemplateId "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/virtualMachineTemplates/test-vmtmpl" -InfrastructureProfileVCenterId "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/vcenters/test-vc" -PlacementProfileHostId "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/hosts/test-host" -MachineId "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.HybridCompute/machines/test-machine" ``` ```output -ExtendedLocationName : /subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourcegroups/test-rg/providers/microsoft.extendedlocation/customlocations/test-cl +ExtendedLocationName : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourcegroups/test-rg/providers/microsoft.extendedlocation/customlocations/test-cl ExtendedLocationType : CustomLocation HardwareProfileCpuHotAddEnabled : True HardwareProfileCpuHotRemoveEnabled : False @@ -258,7 +258,7 @@ HardwareProfileMemoryHotAddEnabled : True HardwareProfileMemorySizeMb : 1024 HardwareProfileNumCoresPerSocket : 1 HardwareProfileNumCpUs : 1 -Id : /subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.HybridCompute/machines/test-machine/providers/Microsoft.ConnectedVMwarevSphere/virtualMachineInstances/default +Id : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.HybridCompute/machines/test-machine/providers/Microsoft.ConnectedVMwarevSphere/virtualMachineInstances/default InfrastructureProfileCustomResourceName : d04a3534-2dfa-42c8-8959-83796a1bcac1 InfrastructureProfileFirmwareType : bios InfrastructureProfileFolderPath : ArcPrivateClouds-67 @@ -267,8 +267,8 @@ InfrastructureProfileInventoryItemId : InfrastructureProfileMoName : test-machine InfrastructureProfileMoRefId : vm-1529269 InfrastructureProfileSmbiosUuid : 4215b305-5f69-959b-0620-16a5bd8c5fc9 -InfrastructureProfileTemplateId : /subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/virtualMachineTemplates/test-vmtmpl -InfrastructureProfileVCenterId : /subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/vcenters/test-vc +InfrastructureProfileTemplateId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/virtualMachineTemplates/test-vmtmpl +InfrastructureProfileVCenterId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/vcenters/test-vc Name : default NetworkProfileNetworkInterface : {{ "ipSettings": { @@ -277,7 +277,7 @@ NetworkProfileNetworkInterface : {{ "name": "nic_1", "label": "Network adapter 1", "macAddress": "00:50:56:95:ec:bc", - "networkId": "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/VirtualNetworks/test-vnet", + "networkId": "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/VirtualNetworks/test-vnet", "nicType": "vmxnet3", "powerOnBoot": "enabled", "networkMoRefId": "network-563661", @@ -295,7 +295,7 @@ OSProfileToolsVersion : 10304 OSProfileToolsVersionStatus : guestToolsUnmanaged PlacementProfileClusterId : PlacementProfileDatastoreId : -PlacementProfileHostId : /subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/Hosts/test-host +PlacementProfileHostId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/Hosts/test-host PlacementProfileResourcePoolId : PowerState : poweredOn ProvisioningState : Succeeded @@ -345,11 +345,11 @@ This command create a VM Instances of machine named `test-machine` in a resource ### Example 4: Create Virtual Machine with a VM Inventory ```powershell -New-AzConnectedVMwareVM -ExtendedLocationName "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourcegroups/test-rg/providers/microsoft.extendedlocation/customlocations/test-cl" -ExtendedLocationType "CustomLocation" -InfrastructureProfileInventoryItemId "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/VCenters/test-vc/InventoryItems/vm-1528583" -MachineId "/subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.HybridCompute/machines/test-machine-ps" +New-AzConnectedVMwareVM -ExtendedLocationName "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourcegroups/test-rg/providers/microsoft.extendedlocation/customlocations/test-cl" -ExtendedLocationType "CustomLocation" -InfrastructureProfileInventoryItemId "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/VCenters/test-vc/InventoryItems/vm-1528583" -MachineId "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.HybridCompute/machines/test-machine-ps" ``` ```output -ExtendedLocationName : /subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourcegroups/test-rg/providers/microsoft.extendedlocation/customlocations/test-cl +ExtendedLocationName : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourcegroups/test-rg/providers/microsoft.extendedlocation/customlocations/test-cl ExtendedLocationType : CustomLocation HardwareProfileCpuHotAddEnabled : False HardwareProfileCpuHotRemoveEnabled : False @@ -357,17 +357,17 @@ HardwareProfileMemoryHotAddEnabled : False HardwareProfileMemorySizeMb : 8192 HardwareProfileNumCoresPerSocket : 1 HardwareProfileNumCpUs : 4 -Id : /subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.HybridCompute/machines/test-machine-ps/providers/Microsoft.ConnectedVMwarevSphere/virtualMachineInstances/default +Id : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.HybridCompute/machines/test-machine-ps/providers/Microsoft.ConnectedVMwarevSphere/virtualMachineInstances/default InfrastructureProfileCustomResourceName : 9d8766c2-6e02-4553-8ae2-7c37a19cb45b InfrastructureProfileFirmwareType : bios InfrastructureProfileFolderPath : ArcPrivateClouds-67/test-folder InfrastructureProfileInstanceUuid : 5015d462-e12c-623f-45ad-ddfecc541d51 -InfrastructureProfileInventoryItemId : /subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/VCenters/test-vc/InventoryItems/vm-1528583 +InfrastructureProfileInventoryItemId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/VCenters/test-vc/InventoryItems/vm-1528583 InfrastructureProfileMoName : test-ps-vm InfrastructureProfileMoRefId : vm-1528583 InfrastructureProfileSmbiosUuid : 421532ab-22b5-67b4-41fd-829f0e7355b9 InfrastructureProfileTemplateId : -InfrastructureProfileVCenterId : /subscriptions/204898ee-cd13-4332-b9d4-55ca5c25496d/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/VCenters/test-vc +InfrastructureProfileVCenterId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/test-rg/providers/Microsoft.ConnectedVMwarevSphere/VCenters/test-vc Name : default NetworkProfileNetworkInterface : {{ "ipSettings": { diff --git a/src/CustomLocation/CustomLocation/help/New-AzCustomLocation.md b/src/CustomLocation/CustomLocation/help/New-AzCustomLocation.md index 6cbb531d31e6..790dc5d1bba4 100644 --- a/src/CustomLocation/CustomLocation/help/New-AzCustomLocation.md +++ b/src/CustomLocation/CustomLocation/help/New-AzCustomLocation.md @@ -73,8 +73,8 @@ HostResourceId : /subscriptions/11111111-2222-3333-4444-1234567891 HostType : Kubernetes Id : /subscriptions/11111111-2222-3333-4444-123456789101/resourcegroups/group01/providers/microsoft.extendedlocation/customlocations/az ps-customlocation -IdentityPrincipalId : 11111111-2222-3333-4444-123456789123 -IdentityTenantId : 11111111-2222-3333-4444-123456789876 +IdentityPrincipalId : 00001111-aaaa-2222-bbbb-3333cccc4444 +IdentityTenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 IdentityType : SystemAssigned Location : eastus Name : azps-customlocation diff --git a/src/DataProtection/DataProtection/help/Get-AzDataProtectionBackupVault.md b/src/DataProtection/DataProtection/help/Get-AzDataProtectionBackupVault.md index 1ca5e7a92f7c..dab88aa9404f 100644 --- a/src/DataProtection/DataProtection/help/Get-AzDataProtectionBackupVault.md +++ b/src/DataProtection/DataProtection/help/Get-AzDataProtectionBackupVault.md @@ -111,7 +111,7 @@ CmkInfrastructureEncryption : Enabled CmkKeyVaultProperty : Microsoft.Azure.PowerShell.Cmdlets.DataProtection.Models.Api20240401.CmkKeyVaultProperties State : Enabled -IdentityId : /subscriptions/191973cd-9c54-41e0-ac19-25dd9a92d5a8/resourcegroups/jeevan-wrk-vms/providers/Microsoft.ManagedIdentity/userAssignedIdentities +IdentityId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourcegroups/jeevan-wrk-vms/providers/Microsoft.ManagedIdentity/userAssignedIdentities /userMSIpstest IdentityType : UserAssigned diff --git a/src/Databricks/Databricks/help/New-AzDatabricksWorkspaceProviderAuthorizationObject.md b/src/Databricks/Databricks/help/New-AzDatabricksWorkspaceProviderAuthorizationObject.md index 1d83466872a2..2fc54562ff9a 100644 --- a/src/Databricks/Databricks/help/New-AzDatabricksWorkspaceProviderAuthorizationObject.md +++ b/src/Databricks/Databricks/help/New-AzDatabricksWorkspaceProviderAuthorizationObject.md @@ -24,13 +24,13 @@ Create an in-memory object for WorkspaceProviderAuthorization. ### Example 1: Create an in-memory object for WorkspaceProviderAuthorization. ```powershell -New-AzDatabricksWorkspaceProviderAuthorizationObject -PrincipalId 024d7367-0890-4ad3-8140-e37374722820 -RoleDefinitionId 2124844c-7e23-48cc-bc52-a3af25f7a4ae +New-AzDatabricksWorkspaceProviderAuthorizationObject -PrincipalId 00001111-aaaa-2222-bbbb-3333cccc4444 -RoleDefinitionId 2124844c-7e23-48cc-bc52-a3af25f7a4ae ``` ```output PrincipalId RoleDefinitionId ----------- ---------------- -024d7367-0890-4ad3-8140-e37374722820 2124844c-7e23-48cc-bc52-a3af25f7a4ae +00001111-aaaa-2222-bbbb-3333cccc4444 2124844c-7e23-48cc-bc52-a3af25f7a4ae ``` Create an in-memory object for WorkspaceProviderAuthorization. diff --git a/src/Fleet/Fleet/help/New-AzFleet.md b/src/Fleet/Fleet/help/New-AzFleet.md index cd50120e0173..ae6249f20295 100644 --- a/src/Fleet/Fleet/help/New-AzFleet.md +++ b/src/Fleet/Fleet/help/New-AzFleet.md @@ -84,8 +84,8 @@ New-AzFleet -Name testfleet02 -ResourceGroupName joyer-test -Location eastus -Ta ```output ETag : "0a006dc9-0000-0100-0000-661cd4f70000" Id : /subscriptions/9e223dbe-3399-4e19-88eb-0975f02ac87f/resourceGroups/joyer-test/providers/Microsoft.ContainerService/fleets/testfleet02 -IdentityPrincipalId : 978528a9-fa0f-4cdb-8282-95b3b30bb883 -IdentityTenantId : 72f988bf-86f1-41af-91ab-2d7cd011db47 +IdentityPrincipalId : 00001111-aaaa-2222-bbbb-3333cccc4444 +IdentityTenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 IdentityType : SystemAssigned IdentityUserAssignedIdentity : { } diff --git a/src/FluidRelay/FluidRelay/help/New-AzFluidRelayServer.md b/src/FluidRelay/FluidRelay/help/New-AzFluidRelayServer.md index 8ea36a277c90..538f8ae0293d 100644 --- a/src/FluidRelay/FluidRelay/help/New-AzFluidRelayServer.md +++ b/src/FluidRelay/FluidRelay/help/New-AzFluidRelayServer.md @@ -28,7 +28,7 @@ Create or Update a Fluid Relay server. ### Example 1: Create or Update a Fluid Relay server. ```powershell -New-AzFluidRelayServer -Name azps-fluidrelay -ResourceGroup azpstest-gp -Location westus2 -Storagesku 'basic' -ProvisioningState 'Succeeded' -IdentityUserAssignedIdentity @{"/subscriptions/9e223dbe-3399-4e19-88eb-0975f02ac87f/resourcegroups/azpstest-gp/providers/Microsoft.ManagedIdentity/userAssignedIdentities/azpstest-uami" = @{};} -IdentityType 'UserAssigned' -KeyEncryptionKeyIdentityUserAssignedIdentityResourceId "/subscriptions/9e223dbe-3399-4e19-88eb-0975f02ac87f/resourcegroups/azpstest-gp/providers/Microsoft.ManagedIdentity/userAssignedIdentities/azpstest-uami" -KeyEncryptionKeyIdentityType 'SystemAssigned' +New-AzFluidRelayServer -Name azps-fluidrelay -ResourceGroup azpstest-gp -Location westus2 -Storagesku 'basic' -ProvisioningState 'Succeeded' -IdentityUserAssignedIdentity @{"/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourcegroups/azpstest-gp/providers/Microsoft.ManagedIdentity/userAssignedIdentities/azpstest-uami" = @{};} -IdentityType 'UserAssigned' -KeyEncryptionKeyIdentityUserAssignedIdentityResourceId "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourcegroups/azpstest-gp/providers/Microsoft.ManagedIdentity/userAssignedIdentities/azpstest-uami" -KeyEncryptionKeyIdentityType 'SystemAssigned' ``` ```output diff --git a/src/FluidRelay/FluidRelay/help/Update-AzFluidRelayServer.md b/src/FluidRelay/FluidRelay/help/Update-AzFluidRelayServer.md index c4ea3a2552cd..0f39a1040140 100644 --- a/src/FluidRelay/FluidRelay/help/Update-AzFluidRelayServer.md +++ b/src/FluidRelay/FluidRelay/help/Update-AzFluidRelayServer.md @@ -37,7 +37,7 @@ Update a Fluid Relay server. ### Example 1: Update a Fluid Relay server. ```powershell -Update-AzFluidRelayServer -Name azps-fluidrelay -ResourceGroup azpstest-gp -KeyEncryptionKeyIdentityUserAssignedIdentityResourceId "/subscriptions/9e223dbe-3399-4e19-88eb-0975f02ac87f/resourcegroups/azpstest-gp/providers/Microsoft.ManagedIdentity/userAssignedIdentities/azpstest-uami" -KeyEncryptionKeyIdentityType 'SystemAssigned' -Tag @{"Category"="sales"} -IdentityUserAssignedIdentity @{"/subscriptions/9e223dbe-3399-4e19-88eb-0975f02ac87f/resourcegroups/azpstest-gp/providers/Microsoft.ManagedIdentity/userAssignedIdentities/azpstest-uami" = @{};} -IdentityType 'UserAssigned' +Update-AzFluidRelayServer -Name azps-fluidrelay -ResourceGroup azpstest-gp -KeyEncryptionKeyIdentityUserAssignedIdentityResourceId "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourcegroups/azpstest-gp/providers/Microsoft.ManagedIdentity/userAssignedIdentities/azpstest-uami" -KeyEncryptionKeyIdentityType 'SystemAssigned' -Tag @{"Category"="sales"} -IdentityUserAssignedIdentity @{"/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourcegroups/azpstest-gp/providers/Microsoft.ManagedIdentity/userAssignedIdentities/azpstest-uami" = @{};} -IdentityType 'UserAssigned' ``` ```output diff --git a/src/HanaOnAzure/HanaOnAzure/help/New-AzSapMonitorProviderInstance.md b/src/HanaOnAzure/HanaOnAzure/help/New-AzSapMonitorProviderInstance.md index 827ad382a773..476d46e67c72 100644 --- a/src/HanaOnAzure/HanaOnAzure/help/New-AzSapMonitorProviderInstance.md +++ b/src/HanaOnAzure/HanaOnAzure/help/New-AzSapMonitorProviderInstance.md @@ -60,7 +60,7 @@ This command creates an instance of SAP monitor by string for HANA. ### Example 2: Create an instance of SAP monitor by key vault for HANA ```powershell -New-AzSapMonitorProviderInstance -ResourceGroupName nancyc-hn1 -SapMonitorName sapMonitor-vayh7q-test -ProviderType SapHana -HanaHostname 'hdb1-0' -HanaDatabaseName 'SYSTEMDB' -HanaDatabaseSqlPort 30015 -HanaDatabaseUsername SYSTEM -HanaDatabasePasswordSecretId https://kv-9gosjc-test.vault.azure.net/secrets/hanaPassword/bf516d1dfcc144138e5cf55114f3344b -HanaDatabasePasswordKeyVaultResourceId /subscriptions/9e223dbe-3399-4e19-88eb-0975f02ac87f/resourceGroups/costmanagement-rg-8p50xe/providers/Microsoft.KeyVault/vaults/kv-9gosjc-test -Name sapins-kv-test +New-AzSapMonitorProviderInstance -ResourceGroupName nancyc-hn1 -SapMonitorName sapMonitor-vayh7q-test -ProviderType SapHana -HanaHostname 'hdb1-0' -HanaDatabaseName 'SYSTEMDB' -HanaDatabaseSqlPort 30015 -HanaDatabaseUsername SYSTEM -HanaDatabasePasswordSecretId https://kv-9gosjc-test.vault.azure.net/secrets/hanaPassword/bf516d1dfcc144138e5cf55114f3344b -HanaDatabasePasswordKeyVaultResourceId /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/costmanagement-rg-8p50xe/providers/Microsoft.KeyVault/vaults/kv-9gosjc-test -Name sapins-kv-test ``` ```output diff --git a/src/KeyVault/KeyVault/help/Add-AzKeyVaultKey.md b/src/KeyVault/KeyVault/help/Add-AzKeyVaultKey.md index b65f67b3c96f..7b2eadda76c3 100644 --- a/src/KeyVault/KeyVault/help/Add-AzKeyVaultKey.md +++ b/src/KeyVault/KeyVault/help/Add-AzKeyVaultKey.md @@ -395,7 +395,7 @@ Create a secure key in managed hsm named testmhsm. Its name is test-key and type ### Example 10: Add a key for a Confidential VM to a key vault. ```powershell New-AzKeyVault -Name $keyVaultName -Location $location -ResourceGroupName $resourceGroupName -Sku Premium -EnablePurgeProtection -EnabledForDiskEncryption; -$cvmAgent = Get-AzADServicePrincipal -ApplicationId 'bf7b6499-ff71-4aa2-97a4-f372087be7f0'; +$cvmAgent = Get-AzADServicePrincipal -ApplicationId '00001111-aaaa-2222-bbbb-3333cccc4444'; Set-AzKeyVaultAccessPolicy -VaultName $keyVaultName -ResourceGroupName $resourceGroupName -ObjectId $cvmAgent.id -PermissionsToKeys get,release; $keySize = 3072; diff --git a/src/KeyVault/KeyVault/help/New-AzKeyVaultManagedHsm.md b/src/KeyVault/KeyVault/help/New-AzKeyVaultManagedHsm.md index fe1f9c143619..783e1afc64f7 100644 --- a/src/KeyVault/KeyVault/help/New-AzKeyVaultManagedHsm.md +++ b/src/KeyVault/KeyVault/help/New-AzKeyVaultManagedHsm.md @@ -71,7 +71,7 @@ Location : eastus2euap Resource ID : /subscriptions/0b1f6471-1bf0-4dda-aec3-cb9272f09590/resourceGroups/bez-rg/pro viders/Microsoft.KeyVault/managedHSMs/bezmhsm HSM Pool URI : -Tenant ID : 54826b22-38d6-4fb2-bad9-b7b93a3e9c5a +Tenant ID : 00001111-aaaa-2222-bbbb-3333cccc4444 Initial Admin Object Ids : {xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx} SKU : StandardB1 Soft Delete Enabled? : True diff --git a/src/Kusto/Kusto/help/New-AzKustoClusterPrincipalAssignment.md b/src/Kusto/Kusto/help/New-AzKustoClusterPrincipalAssignment.md index 0da49258eef7..497fe0475ee9 100644 --- a/src/Kusto/Kusto/help/New-AzKustoClusterPrincipalAssignment.md +++ b/src/Kusto/Kusto/help/New-AzKustoClusterPrincipalAssignment.md @@ -27,7 +27,7 @@ Create a Kusto cluster principalAssignment. ### Example 1: Create a Kusto cluster principalAssignment ```powershell -New-AzKustoClusterPrincipalAssignment -ResourceGroupName testrg -ClusterName testnewkustocluster -PrincipalAssignmentName kustoprincipal1 -PrincipalId "7e1cb39f-d2cb-4f0d-801a-c9ea1f376e96" -PrincipalType App -Role AllDatabasesAdmin +New-AzKustoClusterPrincipalAssignment -ResourceGroupName testrg -ClusterName testnewkustocluster -PrincipalAssignmentName kustoprincipal1 -PrincipalId "00001111-aaaa-2222-bbbb-3333cccc4444" -PrincipalType App -Role AllDatabasesAdmin ``` ```output diff --git a/src/Kusto/Kusto/help/New-AzKustoDatabasePrincipalAssignment.md b/src/Kusto/Kusto/help/New-AzKustoDatabasePrincipalAssignment.md index 5a605af6e4e2..e695b509806a 100644 --- a/src/Kusto/Kusto/help/New-AzKustoDatabasePrincipalAssignment.md +++ b/src/Kusto/Kusto/help/New-AzKustoDatabasePrincipalAssignment.md @@ -27,7 +27,7 @@ Creates a Kusto cluster database principalAssignment. ### Example 1: Create a Kusto cluster database principalAssignment ```powershell -New-AzKustoDatabasePrincipalAssignment -ResourceGroupName testrg -ClusterName testnewkustocluster -DatabaseName mykustodatabase -PrincipalAssignmentName kustoprincipal1 -PrincipalId "7e1cb39f-d2cb-4f0d-801a-c9ea1f376e96" -PrincipalType App -Role Admin +New-AzKustoDatabasePrincipalAssignment -ResourceGroupName testrg -ClusterName testnewkustocluster -DatabaseName mykustodatabase -PrincipalAssignmentName kustoprincipal1 -PrincipalId "00001111-aaaa-2222-bbbb-3333cccc4444" -PrincipalType App -Role Admin ``` ```output diff --git a/src/LogicApp/LogicApp/help/Get-AzLogicAppRunHistory.md b/src/LogicApp/LogicApp/help/Get-AzLogicAppRunHistory.md index 0df9513a46ce..af239bd9b9cb 100644 --- a/src/LogicApp/LogicApp/help/Get-AzLogicAppRunHistory.md +++ b/src/LogicApp/LogicApp/help/Get-AzLogicAppRunHistory.md @@ -38,7 +38,7 @@ Get-AzLogicAppRunHistory -ResourceGroupName "Resourcegroup11" -Name "LogicApp03" ``` ```output -CorrelationId : 55830326-9042-404d-a4c3-fab198106a57 +CorrelationId : 00001111-aaaa-2222-bbbb-3333cccc4444 EndTime : 1/13/2016 2:46:55 PM Error : {code, message} Name : 08587489104702792076 @@ -49,7 +49,7 @@ TriggerName : LogicAppName : LogicApp03 LogicAppVersion : 08587489107859952540 -CorrelationId : d3ddc917-9aaa-47b3-8814-c621c2ae530b +CorrelationId : 00001111-aaaa-2222-bbbb-3333cccc4444 EndTime : 1/13/2016 2:42:56 PM Error : {code, message} Name : 08587489107100664541 @@ -70,7 +70,7 @@ Get-AzLogicAppRunHistory -ResourceGroupName "Resourcegroup11" -Name "LogicApp03" ``` ```output -CorrelationId : 55830326-9042-404d-a4c3-fab198106a57 +CorrelationId : 00001111-aaaa-2222-bbbb-3333cccc4444 EndTime : 1/13/2016 2:46:55 PM Error : {code, message} Name : 08587489104702792076 diff --git a/src/ManagedNetworkFabric/ManagedNetworkFabric/help/New-AzNetworkFabricL3Domain.md b/src/ManagedNetworkFabric/ManagedNetworkFabric/help/New-AzNetworkFabricL3Domain.md index 9b11c56828f7..4551930dc06a 100644 --- a/src/ManagedNetworkFabric/ManagedNetworkFabric/help/New-AzNetworkFabricL3Domain.md +++ b/src/ManagedNetworkFabric/ManagedNetworkFabric/help/New-AzNetworkFabricL3Domain.md @@ -45,8 +45,8 @@ Create isolation domain resources for layer 3 connectivity between compute nodes ```powershell $connectedSubnetRoutePolicy = @{ ExportRoutePolicy = @(@{ - ExportIpv4RoutePolicyId = "/subscriptions/9531faa8-8c39-4165-b033-48697fe943db/resourceGroups/nfa-tool-ts-powershell-rg092123/providers/Microsoft.ManagedNetworkFabric/routePolicies/RoutePolicyName" - ExportIpv6RoutePolicyId = "/subscriptions/9531faa8-8c39-4165-b033-48697fe943db/resourceGroups/nfa-tool-ts-powershell-rg092123/providers/Microsoft.ManagedNetworkFabric/routePolicies/RoutePolicyName" + ExportIpv4RoutePolicyId = "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/nfa-tool-ts-powershell-rg092123/providers/Microsoft.ManagedNetworkFabric/routePolicies/RoutePolicyName" + ExportIpv6RoutePolicyId = "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/nfa-tool-ts-powershell-rg092123/providers/Microsoft.ManagedNetworkFabric/routePolicies/RoutePolicyName" }) } $aggregateRouteConfiguration = @{ diff --git a/src/ManagementPartner/ManagementPartner/help/Get-AzManagementPartner.md b/src/ManagementPartner/ManagementPartner/help/Get-AzManagementPartner.md index a26e702114de..13d8eea527ef 100644 --- a/src/ManagementPartner/ManagementPartner/help/Get-AzManagementPartner.md +++ b/src/ManagementPartner/ManagementPartner/help/Get-AzManagementPartner.md @@ -29,7 +29,7 @@ Get-AzManagementPartner ```output PartnerId : 4977985 PartnerName : Test_Test_DPORTest -TenantId : 1b1121dd-6900-412a-af73-e8d44f81e1c1 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 ObjectId : aa67f786-0552-423e-8849-244ed12bf581 State : Active ``` @@ -44,7 +44,7 @@ Get-AzManagementPartner -PartnerId 4977985 ```output PartnerId : 4977985 PartnerName : Test_Test_DPORTest -TenantId : 1b1121dd-6900-412a-af73-e8d44f81e1c1 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 ObjectId : aa67f786-0552-423e-8849-244ed12bf581 State : Active ``` @@ -102,4 +102,4 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable [New-AzManagementPartner](./New-AzManagementPartner.md) -[Update-AzManagementPartner](./Update-AzManagementPartner.md) \ No newline at end of file +[Update-AzManagementPartner](./Update-AzManagementPartner.md) diff --git a/src/ManagementPartner/ManagementPartner/help/New-AzManagementPartner.md b/src/ManagementPartner/ManagementPartner/help/New-AzManagementPartner.md index 8f62a1c98041..58caa6157897 100644 --- a/src/ManagementPartner/ManagementPartner/help/New-AzManagementPartner.md +++ b/src/ManagementPartner/ManagementPartner/help/New-AzManagementPartner.md @@ -30,7 +30,7 @@ New-AzManagementPartner -PartnerId 4977985 ```output PartnerId : 4977985 PartnerName : Test_Test_DPORTest -TenantId : 1b1121dd-6900-412a-af73-e8d44f81e1c1 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 ObjectId : aa67f786-0552-423e-8849-244ed12bf581 State : Active ``` @@ -119,4 +119,4 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable [Get-AzManagementPartner](./Get-AzManagementPartner.md) -[Update-AzManagementPartner](./Update-AzManagementPartner.md) \ No newline at end of file +[Update-AzManagementPartner](./Update-AzManagementPartner.md) diff --git a/src/ManagementPartner/ManagementPartner/help/Update-AzManagementPartner.md b/src/ManagementPartner/ManagementPartner/help/Update-AzManagementPartner.md index b2ba6b213a80..977c0fa042d7 100644 --- a/src/ManagementPartner/ManagementPartner/help/Update-AzManagementPartner.md +++ b/src/ManagementPartner/ManagementPartner/help/Update-AzManagementPartner.md @@ -30,7 +30,7 @@ Update-AzManagementPartner -PartnerId 4977985 ```output PartnerId : 4977985 PartnerName : Test_Test_DPORTest -TenantId : 1b1121dd-6900-412a-af73-e8d44f81e1c1 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 ObjectId : aa67f786-0552-423e-8849-244ed12bf581 State : Active ``` @@ -119,4 +119,4 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable [New-AzManagementPartner](./New-AzManagementPartner.md) -[Get-AzManagementPartner](./Get-AzManagementPartner.md) \ No newline at end of file +[Get-AzManagementPartner](./Get-AzManagementPartner.md) diff --git a/src/Migrate/Migrate/help/Get-AzMigrateServerReplication.md b/src/Migrate/Migrate/help/Get-AzMigrateServerReplication.md index ad4909a9e65a..fcb19beb062b 100644 --- a/src/Migrate/Migrate/help/Get-AzMigrateServerReplication.md +++ b/src/Migrate/Migrate/help/Get-AzMigrateServerReplication.md @@ -66,7 +66,7 @@ CurrentJobId : /Subscriptions/xxx-xxx-xxx/resourceGroups/azmigrat ices/vaults/AzMigrateTestProjectPWSH02aarsvault/replicationJobs/None CurrentJobName : None CurrentJobStartTime : 1/1/53 1:01:01 AM -EventCorrelationId : d8b110c6-3be9-4798-b2d4-9a1cd068adfb +EventCorrelationId : 00001111-aaaa-2222-bbbb-3333cccc4444 Health : Normal HealthError : {101883a0-23f7-538a-bbd5-6d8b4fa900e2} Id : /Subscriptions/xxx-xxx-xxx/resourceGroups/azmigratepwshtestasr13072020/providers/Microsoft.RecoveryServ @@ -102,7 +102,7 @@ CurrentJobId : /Subscriptions/xxx-xxx-xxx/resourceGroups/azmigrat ices/vaults/AzMigrateTestProjectPWSH02aarsvault/replicationJobs/None CurrentJobName : None CurrentJobStartTime : 1/1/53 1:01:01 AM -EventCorrelationId : d8b110c6-3be9-4798-b2d4-9a1cd068adfb +EventCorrelationId : 00001111-aaaa-2222-bbbb-3333cccc4444 Health : Normal HealthError : {101883a0-23f7-538a-bbd5-6d8b4fa900e2} Id : /Subscriptions/xxx-xxx-xxx/resourceGroups/azmigratepwshtestasr13072020/providers/Microsoft.RecoveryServ @@ -129,7 +129,7 @@ CurrentJobId : /Subscriptions/xxx-xxx-xxx/resourceGroups/azmigrat ices/vaults/AzMigrateTestProjectPWSH02aarsvault/replicationJobs/None CurrentJobName : None CurrentJobStartTime : 1/1/53 1:01:01 AM -EventCorrelationId : 57b59212-6a2f-4333-8882-461647bb05f9 +EventCorrelationId : 00001111-aaaa-2222-bbbb-3333cccc4444 Health : Normal HealthError : {593b735d-2a34-53b2-b8ed-e33da5650703} Id : /Subscriptions/xxx-xxx-xxx/resourceGroups/azmigratepwshtestasr13072020/providers/Microsoft.RecoveryServ @@ -165,7 +165,7 @@ CurrentJobId : /Subscriptions/xxx-xxx-xxx/resourceGroups/azmigrat ices/vaults/AzMigrateTestProjectPWSH02aarsvault/replicationJobs/None CurrentJobName : None CurrentJobStartTime : 1/1/53 1:01:01 AM -EventCorrelationId : d8b110c6-3be9-4798-b2d4-9a1cd068adfb +EventCorrelationId : 00001111-aaaa-2222-bbbb-3333cccc4444 Health : Normal HealthError : {101883a0-23f7-538a-bbd5-6d8b4fa900e2} Id : /Subscriptions/xxx-xxx-xxx/resourceGroups/azmigratepwshtestasr13072020/providers/Microsoft.RecoveryServ @@ -192,7 +192,7 @@ CurrentJobId : /Subscriptions/xxx-xxx-xxx/resourceGroups/azmigrat ices/vaults/AzMigrateTestProjectPWSH02aarsvault/replicationJobs/None CurrentJobName : None CurrentJobStartTime : 1/1/53 1:01:01 AM -EventCorrelationId : 57b59212-6a2f-4333-8882-461647bb05f9 +EventCorrelationId : 00001111-aaaa-2222-bbbb-3333cccc4444 Health : Normal HealthError : {593b735d-2a34-53b2-b8ed-e33da5650703} Id : /Subscriptions/xxx-xxx-xxx/resourceGroups/azmigratepwshtestasr13072020/providers/Microsoft.RecoveryServ diff --git a/src/Monitor/Monitor/help/Get-AzActivityLog.md b/src/Monitor/Monitor/help/Get-AzActivityLog.md index a70be6bac9ec..37899ec88a4d 100644 --- a/src/Monitor/Monitor/help/Get-AzActivityLog.md +++ b/src/Monitor/Monitor/help/Get-AzActivityLog.md @@ -82,7 +82,7 @@ This command lists at most 1000 of the events associated with the user's subscri ### Example 5: Get an event log by correlation ID ```powershell -Get-AzActivityLog -CorrelationId "60c694d0-e46f-4c12-bed1-9b7aef541c23" +Get-AzActivityLog -CorrelationId "00001111-aaaa-2222-bbbb-3333cccc4444" ``` This command lists at most 1000 events associated with the specified correlation ID that took place 7 days from the current date/time. @@ -90,7 +90,7 @@ This command lists at most 1000 events associated with the specified correlation ### Example 6: Get an event log by correlation ID with a maximum number of events ```powershell -Get-AzActivityLog -CorrelationId "60c694d0-e46f-4c12-bed1-9b7aef541c23" -MaxRecord 100 +Get-AzActivityLog -CorrelationId "00001111-aaaa-2222-bbbb-3333cccc4444" -MaxRecord 100 ``` This command lists at most 100 events associated with the specified correlation ID that took place 7 days from the current date/time. @@ -98,7 +98,7 @@ This command lists at most 100 events associated with the specified correlation ### Example 7: Get an event log by correlation ID and start time ```powershell -Get-AzActivityLog -CorrelationId "60c694d0-e46f-4c12-bed1-9b7aef541c23" -StartTime 2017-05-22T04:30:00 +Get-AzActivityLog -CorrelationId "00001111-aaaa-2222-bbbb-3333cccc4444" -StartTime 2017-05-22T04:30:00 ``` This command lists at most 1000 events associated with the specified correlation ID that took place on or after 2017-05-22T04:30:00 local time if the start time is not older than 90 days from the current date/time. @@ -106,7 +106,7 @@ This command lists at most 1000 events associated with the specified correlation ### Example 8: Get an event log by correlation ID with start time and end time ```powershell -Get-AzActivityLog -CorrelationId "60c694d0-e46f-4c12-bed1-9b7aef541c23" -StartTime 2017-04-15T04:30:00 -EndTime 2017-04-25T12:30:00 +Get-AzActivityLog -CorrelationId "00001111-aaaa-2222-bbbb-3333cccc4444" -StartTime 2017-04-15T04:30:00 -EndTime 2017-04-25T12:30:00 ``` This command lists at most 1000 events associated with the specified correlation ID that took place on or after 2017-04-15T04:30 local time, but before 2017-04-25T12:30 local time if the whole date/time range is not older than 90 days from the current date/time, i.e.: the retention period. diff --git a/src/Monitor/Monitor/help/Get-AzAlertHistory.md b/src/Monitor/Monitor/help/Get-AzAlertHistory.md index 9d77f441b56e..1dc2fa8a33df 100644 --- a/src/Monitor/Monitor/help/Get-AzAlertHistory.md +++ b/src/Monitor/Monitor/help/Get-AzAlertHistory.md @@ -34,7 +34,7 @@ Authorization : Caller : Microsoft.Insights/alertRules Claims : http://schemas.xmlsoap.org/ws/2005/05/identity/claims/spn: Microsoft.Insights/alertRules -CorrelationId : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/ +CorrelationId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/ Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d/incidents/L3N1YnNj cmlwdGlvbnMvYTkzZmIwN2MtNmM5My00MGJlLWJmM2ItNGYwZGViYTEwZjRiL3Jlc291cmNlR3JvdXBzL0RlZmF1bHQtV2Vi LUVhc3RVUy9wcm92aWRlcnMvbWljcm9zb2Z0Lmluc2lnaHRzL2FsZXJ0cnVsZXMvY2hlY2tydWxlMy00YjEzNTQwMS1hMzBj @@ -46,18 +46,18 @@ EventName : Alert EventSource : Microsoft.Insights/alertrules EventTimestamp : 2/11/2015 7:14:45 PM HttpRequest : -Id : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/ +Id : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/ Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d/events/769fab1c-fc 9f-4e18-bc3a-fa79fbdd3616/ticks/635592788857929926 Level : Informational -OperationId : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/ +OperationId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/ Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d/incidents/L3N1YnNj cmlwdGlvbnMvYTkzZmIwN2MtNmM5My00MGJlLWJmM2ItNGYwZGViYTEwZjRiL3Jlc291cmNlR3JvdXBzL0RlZmF1bHQtV2Vi LUVhc3RVUy9wcm92aWRlcnMvbWljcm9zb2Z0Lmluc2lnaHRzL2FsZXJ0cnVsZXMvY2hlY2tydWxlMy00YjEzNTQwMS1hMzBj LTQyMjQtYWUyMS1mYTUzYTViZDI1M2QwNjM1NTkyNzg4ODU3OTI5OTI2 OperationName : ResolveAlert Properties : - RuleUri : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web- + RuleUri : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web- EastUS/providers/Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d RuleName : checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d RuleDescription: @@ -69,17 +69,17 @@ Properties : MetricUnit : Count ResourceGroupName : Default-Web-EastUS ResourceProviderName : Microsoft.Insights -ResourceId : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/ +ResourceId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/ Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d Status : Resolved SubmissionTimestamp : 2/11/2015 7:14:45 PM -SubscriptionId : b93fb07a-6f93-30be-bf3e-4f0deca15f4f +SubscriptionId : 00001111-aaaa-2222-bbbb-3333cccc4444 SubStatus : Authorization : Caller : Microsoft.Insights/alertRules Claims : http://schemas.xmlsoap.org/ws/2005/05/identity/claims/spn: Microsoft.Insights/alertRules -CorrelationId : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/ +CorrelationId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/ Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d/incidents/L3N1YnNj cmlwdGlvbnMvYTkzZmIwN2MtNmM5My00MGJlLWJmM2ItNGYwZGViYTEwZjRiL3Jlc291cmNlR3JvdXBzL0RlZmF1bHQtV2Vi LUVhc3RVUy9wcm92aWRlcnMvbWljcm9zb2Z0Lmluc2lnaHRzL2FsZXJ0cnVsZXMvY2hlY2tydWxlMy00YjEzNTQwMS1hMzBj @@ -91,18 +91,18 @@ EventName : Alert EventSource : Microsoft.Insights/alertrules EventTimestamp : 2/11/2015 7:04:46 PM HttpRequest : -Id : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/ +Id : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/ microsoft.web/sites/garyyang1/events/66277c94-2097-4f5f-860d-e585f1206cd7/ticks/6355927828650595 14 Level : Error -OperationId : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/ +OperationId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/ Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d/incidents/L3N1YnNj cmlwdGlvbnMvYTkzZmIwN2MtNmM5My00MGJlLWJmM2ItNGYwZGViYTEwZjRiL3Jlc291cmNlR3JvdXBzL0RlZmF1bHQtV2Vi LUVhc3RVUy9wcm92aWRlcnMvbWljcm9zb2Z0Lmluc2lnaHRzL2FsZXJ0cnVsZXMvY2hlY2tydWxlMy00YjEzNTQwMS1hMzBj LTQyMjQtYWUyMS1mYTUzYTViZDI1M2QwNjM1NTkyNzgyODY1MDU5NTE0 OperationName : ActivateAlert Properties : - RuleUri : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web- + RuleUri : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web- EastUS/providers/Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d RuleName : checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d RuleDescription: @@ -114,17 +114,17 @@ Properties : MetricUnit : Count ResourceGroupName : Default-Web-EastUS ResourceProviderName : microsoft.web -ResourceId : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/ +ResourceId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/ microsoft.web/sites/garyyang1 Status : Activated SubmissionTimestamp : 2/11/2015 7:04:46 PM -SubscriptionId : b93fb07a-6f93-30be-bf3e-4f0deca15f4f +SubscriptionId : 00001111-aaaa-2222-bbbb-3333cccc4444 SubStatus : Authorization : Caller : Microsoft.Insights/alertRules Claims : http://schemas.xmlsoap.org/ws/2005/05/identity/claims/spn: Microsoft.Insights/alertRules -CorrelationId : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/ +CorrelationId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/ Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d/incidents/L3N1YnNj cmlwdGlvbnMvYTkzZmIwN2MtNmM5My00MGJlLWJmM2ItNGYwZGViYTEwZjRiL3Jlc291cmNlR3JvdXBzL0RlZmF1bHQtV2Vi LUVhc3RVUy9wcm92aWRlcnMvbWljcm9zb2Z0Lmluc2lnaHRzL2FsZXJ0cnVsZXMvY2hlY2tydWxlMy00YjEzNTQwMS1hMzBj @@ -136,18 +136,18 @@ EventName : Alert EventSource : Microsoft.Insights/alertrules EventTimestamp : 2/11/2015 7:04:46 PM HttpRequest : -Id : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/ +Id : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/ Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d/events/ec9f7b3c-c6 ea-4b45-bd15-ff43e38491e3/ticks/635592782865059514 Level : Error -OperationId : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/ +OperationId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/ Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d/incidents/L3N1YnNj cmlwdGlvbnMvYTkzZmIwN2MtNmM5My00MGJlLWJmM2ItNGYwZGViYTEwZjRiL3Jlc291cmNlR3JvdXBzL0RlZmF1bHQtV2Vi LUVhc3RVUy9wcm92aWRlcnMvbWljcm9zb2Z0Lmluc2lnaHRzL2FsZXJ0cnVsZXMvY2hlY2tydWxlMy00YjEzNTQwMS1hMzBj LTQyMjQtYWUyMS1mYTUzYTViZDI1M2QwNjM1NTkyNzgyODY1MDU5NTE0 OperationName : ActivateAlert Properties : - RuleUri : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web- + RuleUri : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web- EastUS/providers/Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d RuleName : checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d RuleDescription: @@ -159,11 +159,11 @@ Properties : MetricUnit : Count ResourceGroupName : Default-Web-EastUS ResourceProviderName : Microsoft.Insights -ResourceId : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/ +ResourceId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/ Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d Status : Activated SubmissionTimestamp : 2/11/2015 7:04:46 PM -SubscriptionId : b93fb07a-6f93-30be-bf3e-4f0deca15f4f +SubscriptionId : 00001111-aaaa-2222-bbbb-3333cccc4444 SubStatus : ``` @@ -171,7 +171,7 @@ This command gets the alert history for the specified time frame for the current ### Example 2: Get alert history for a specified resource ```powershell -Get-AzAlertHistory -StartTime 2015-02-11T11:00:00 -EndTime 2015-02-11T12:00:00 -ResourceId "/subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d" -DetailedOutput +Get-AzAlertHistory -StartTime 2015-02-11T11:00:00 -EndTime 2015-02-11T12:00:00 -ResourceId "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d" -DetailedOutput ``` ```output @@ -179,7 +179,7 @@ Authorization : Caller : Microsoft.Insights/alertRules Claims : http://schemas.xmlsoap.org/ws/2005/05/identity/claims/spn: Microsoft.Insights/alertRules -CorrelationId : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/ +CorrelationId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/ Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d/incidents/L3N1YnNj cmlwdGlvbnMvYTkzZmIwN2MtNmM5My00MGJlLWJmM2ItNGYwZGViYTEwZjRiL3Jlc291cmNlR3JvdXBzL0RlZmF1bHQtV2Vi LUVhc3RVUy9wcm92aWRlcnMvbWljcm9zb2Z0Lmluc2lnaHRzL2FsZXJ0cnVsZXMvY2hlY2tydWxlMy00YjEzNTQwMS1hMzBj @@ -191,18 +191,18 @@ EventName : Alert EventSource : Microsoft.Insights/alertrules EventTimestamp : 2/11/2015 7:14:45 PM HttpRequest : -Id : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/ +Id : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/ Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d/events/769fab1c-fc 9f-4e18-bc3a-fa79fbdd3616/ticks/635592788857929926 Level : Informational -OperationId : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/ +OperationId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/ Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d/incidents/L3N1YnNj cmlwdGlvbnMvYTkzZmIwN2MtNmM5My00MGJlLWJmM2ItNGYwZGViYTEwZjRiL3Jlc291cmNlR3JvdXBzL0RlZmF1bHQtV2Vi LUVhc3RVUy9wcm92aWRlcnMvbWljcm9zb2Z0Lmluc2lnaHRzL2FsZXJ0cnVsZXMvY2hlY2tydWxlMy00YjEzNTQwMS1hMzBj LTQyMjQtYWUyMS1mYTUzYTViZDI1M2QwNjM1NTkyNzg4ODU3OTI5OTI2 OperationName : ResolveAlert Properties : -RuleUri : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web- +RuleUri : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web- EastUS/providers/Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d RuleName : checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d RuleDescription: @@ -214,17 +214,17 @@ MetricName : CpuTime MetricUnit : Count ResourceGroupName : Default-Web-EastUS ResourceProviderName : Microsoft.Insights -ResourceId : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/ +ResourceId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/ Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d Status : Resolved SubmissionTimestamp : 2/11/2015 7:14:45 PM -SubscriptionId : b93fb07a-6f93-30be-bf3e-4f0deca15f4f +SubscriptionId : 00001111-aaaa-2222-bbbb-3333cccc4444 SubStatus : Authorization : Caller : Microsoft.Insights/alertRules Claims : http://schemas.xmlsoap.org/ws/2005/05/identity/claims/spn: Microsoft.Insights/alertRules -CorrelationId : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/ +CorrelationId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/ Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d/incidents/L3N1YnNj cmlwdGlvbnMvYTkzZmIwN2MtNmM5My00MGJlLWJmM2ItNGYwZGViYTEwZjRiL3Jlc291cmNlR3JvdXBzL0RlZmF1bHQtV2Vi LUVhc3RVUy9wcm92aWRlcnMvbWljcm9zb2Z0Lmluc2lnaHRzL2FsZXJ0cnVsZXMvY2hlY2tydWxlMy00YjEzNTQwMS1hMzBj @@ -236,18 +236,18 @@ EventName : Alert EventSource : Microsoft.Insights/alertrules EventTimestamp : 2/11/2015 7:04:46 PM HttpRequest : -Id : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/ +Id : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/ Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d/events/ec9f7b3c-c6 ea-4b45-bd15-ff43e38491e3/ticks/635592782865059514 Level : Error -OperationId : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/ +OperationId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/ Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d/incidents/L3N1YnNj cmlwdGlvbnMvYTkzZmIwN2MtNmM5My00MGJlLWJmM2ItNGYwZGViYTEwZjRiL3Jlc291cmNlR3JvdXBzL0RlZmF1bHQtV2Vi LUVhc3RVUy9wcm92aWRlcnMvbWljcm9zb2Z0Lmluc2lnaHRzL2FsZXJ0cnVsZXMvY2hlY2tydWxlMy00YjEzNTQwMS1hMzBj LTQyMjQtYWUyMS1mYTUzYTViZDI1M2QwNjM1NTkyNzgyODY1MDU5NTE0 OperationName : ActivateAlert Properties : -RuleUri : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web- +RuleUri : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web- EastUS/providers/Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d RuleName : checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d RuleDescription: @@ -259,11 +259,11 @@ MetricName : CpuTime MetricUnit : Count ResourceGroupName : Default-Web-EastUS ResourceProviderName : Microsoft.Insights -ResourceId : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resourceGroups/Default-Web-EastUS/providers/ +ResourceId : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/Default-Web-EastUS/providers/ Microsoft.Insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d Status : Activated SubmissionTimestamp : 2/11/2015 7:04:46 PM -SubscriptionId : b93fb07a-6f93-30be-bf3e-4f0deca15f4f +SubscriptionId : 00001111-aaaa-2222-bbbb-3333cccc4444 SubStatus : ``` diff --git a/src/Monitor/Monitor/help/Get-AzAutoscaleHistory.md b/src/Monitor/Monitor/help/Get-AzAutoscaleHistory.md index df54003db98e..2307cd734444 100644 --- a/src/Monitor/Monitor/help/Get-AzAutoscaleHistory.md +++ b/src/Monitor/Monitor/help/Get-AzAutoscaleHistory.md @@ -40,7 +40,7 @@ Get-AzAutoscaleHistory -StartTime 2015-02-09T18:35:00 -EndTime 2015-02-09T18:40: Authorization : Caller : Microsoft.Insights/autoscaleSettings Claims : http://schemas.xmlsoap.org/ws/2005/05/identity/claims/spn: Microsoft.Insights/autoscaleSettings -CorrelationId : ac5b03ca-05d4-4811-9c27-0314a145f785 +CorrelationId : 00001111-aaaa-2222-bbbb-3333cccc4444 Description : The autoscale engine attempting to scale resource '/subscriptions/a93fb07c-6c93-40be-bf3b-4f0deb a10f4b/resourceGroups/Default-Web-EastUS/providers/microsoft.web/serverFarms/DefaultServerFarm' from 1 instances count to 2 instances count. @@ -53,7 +53,7 @@ Id : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resou Microsoft.Insights/autoscalesettings/DefaultServerFarm-Default-Web-EastUS/events/c554f7ed-514c-4 49c-9338-13e15b4b56a3/ticks/635591326997519815 Level : Informational -OperationId : ac5b03ca-05d4-4811-9c27-0314a145f785 +OperationId : 00001111-aaaa-2222-bbbb-3333cccc4444 OperationName : ScaleUp Properties : Description : The autoscale engine attempting to scale resource '/subscriptions/a93fb07c-6c93 diff --git a/src/Monitor/Monitor/help/New-AzActionGroupEventHubReceiverObject.md b/src/Monitor/Monitor/help/New-AzActionGroupEventHubReceiverObject.md index 9a3bde5163ed..09572b4de43c 100644 --- a/src/Monitor/Monitor/help/New-AzActionGroupEventHubReceiverObject.md +++ b/src/Monitor/Monitor/help/New-AzActionGroupEventHubReceiverObject.md @@ -25,15 +25,15 @@ Create an in-memory object for EventHubReceiver. ### Example 1: create action group event hub receiver ```powershell -New-AzActionGroupEventHubReceiverObject -EventHubName "testEventHub" -EventHubNameSpace "testEventHubNameSpace" -Name "sample eventhub" -SubscriptionId "187f412d-1758-44d9-b052-169e2564721d" -TenantId "68a4459a-ccb8-493c-b9da-dd30457d1b84" +New-AzActionGroupEventHubReceiverObject -EventHubName "testEventHub" -EventHubNameSpace "testEventHubNameSpace" -Name "sample eventhub" -SubscriptionId "00001111-aaaa-2222-bbbb-3333cccc4444" -TenantId "00001111-aaaa-2222-bbbb-3333cccc4444" ``` ```output EventHubName : testEventHub EventHubNameSpace : testEventHubNameSpace Name : sample eventhub -SubscriptionId : 187f412d-1758-44d9-b052-169e2564721d -TenantId : 68a4459a-ccb8-493c-b9da-dd30457d1b84 +SubscriptionId : 00001111-aaaa-2222-bbbb-3333cccc4444 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 UseCommonAlertSchema : ``` diff --git a/src/Monitor/Monitor/help/New-AzActionGroupWebhookReceiverObject.md b/src/Monitor/Monitor/help/New-AzActionGroupWebhookReceiverObject.md index 92d83df90a73..6e94cb3532ad 100644 --- a/src/Monitor/Monitor/help/New-AzActionGroupWebhookReceiverObject.md +++ b/src/Monitor/Monitor/help/New-AzActionGroupWebhookReceiverObject.md @@ -25,15 +25,15 @@ Create an in-memory object for WebhookReceiver. ### Example 1: create action group webhook receiver with aad auth ```powershell -New-AzActionGroupWebhookReceiverObject -Name "sample webhook" -ServiceUri "http://www.example.com/webhook1" -IdentifierUri "http://someidentifier/d7811ba3-7996-4a93-99b6-6b2f3f355f8a" -ObjectId "d3bb868c-fe44-452c-aa26-769a6538c808" -TenantId 68a4459a-ccb8-493c-b9da-dd30457d1b84 -UseAadAuth $true -UseCommonAlertSchema $true +New-AzActionGroupWebhookReceiverObject -Name "sample webhook" -ServiceUri "http://www.example.com/webhook1" -IdentifierUri "http://someidentifier/00001111-aaaa-2222-bbbb-3333cccc4444" -ObjectId "d3bb868c-fe44-452c-aa26-769a6538c808" -TenantId 00001111-aaaa-2222-bbbb-3333cccc4444 -UseAadAuth $true -UseCommonAlertSchema $true ``` ```output -IdentifierUri : http://someidentifier/d7811ba3-7996-4a93-99b6-6b2f3f355f8a +IdentifierUri : http://someidentifier/00001111-aaaa-2222-bbbb-3333cccc4444 Name : sample webhook ObjectId : d3bb868c-fe44-452c-aa26-769a6538c808 ServiceUri : http://www.example.com/webhook1 -TenantId : 68a4459a-ccb8-493c-b9da-dd30457d1b84 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 UseAadAuth : True UseCommonAlertSchema : True ``` diff --git a/src/Monitor/Monitor/help/Update-AzActionGroup.md b/src/Monitor/Monitor/help/Update-AzActionGroup.md index 0c873e699108..71dc35ff011b 100644 --- a/src/Monitor/Monitor/help/Update-AzActionGroup.md +++ b/src/Monitor/Monitor/help/Update-AzActionGroup.md @@ -63,7 +63,7 @@ EventHubReceiver : {{ "eventHubNameSpace": "actiongrouptest", "eventHubName": "testEventHub", "useCommonAlertSchema": false, - "tenantId": "72f988bf-86f1-41af-91ab-2d7cd011db47", + "tenantId": "00001111-aaaa-2222-bbbb-3333cccc4444", "subscriptionId": "{subid}" }} GroupShortName : ag1 diff --git a/src/Network/Network/help/Get-AzNetworkManagerScopeConnection.md b/src/Network/Network/help/Get-AzNetworkManagerScopeConnection.md index fec5e46d9709..a54d64d9260e 100644 --- a/src/Network/Network/help/Get-AzNetworkManagerScopeConnection.md +++ b/src/Network/Network/help/Get-AzNetworkManagerScopeConnection.md @@ -64,7 +64,7 @@ Get-AzNetworkManagerScopeConnection -ResourceGroupName "psResourceGroup" -Networ ``` ```output -TenantId : 72f988bf-86f1-41af-91ab-2d7cd011db47 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 ResourceId : /subscriptions/0fd190fa-dd1c-4724-b7f6-c5cc3ba5c884 ConnectionState : Pending DisplayName : @@ -84,7 +84,7 @@ Name : subConnection Etag : Id : /subscriptions/f0dc2b34-dfad-40e4-83e0-2309fed8d00b/resourceGroups/psResourceGroup/providers/Microsoft.Network/networkManagers/psNetworkManager/scopeConnections/subConnection -TenantId : 72f988bf-86f1-41af-91ab-2d7cd011db47 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 ResourceId : /providers/Microsoft.Management/managementGroups/newMG ConnectionState : Pending DisplayName : diff --git a/src/Network/Network/help/New-AzNetworkManagerScopeConnection.md b/src/Network/Network/help/New-AzNetworkManagerScopeConnection.md index 6558a51a0002..0f3b4f99cb88 100644 --- a/src/Network/Network/help/New-AzNetworkManagerScopeConnection.md +++ b/src/Network/Network/help/New-AzNetworkManagerScopeConnection.md @@ -25,11 +25,11 @@ The **New-AzNetworkManagerScopeConnection** cmdlet creates a scope connection. ### Example 1 ```powershell -New-AzNetworkManagerScopeConnection -ResourceGroupName psResourceGroup -NetworkManagerName psNetworkManager -Name "subConnection" -TenantId "72f988bf-86f1-41af-91ab-2d7cd011db47" -ResourceId "/subscriptions/0fd190fa-dd1c-4724-b7f6-c5cc3ba5c884" -Description "SampleDescription" +New-AzNetworkManagerScopeConnection -ResourceGroupName psResourceGroup -NetworkManagerName psNetworkManager -Name "subConnection" -TenantId "00001111-aaaa-2222-bbbb-3333cccc4444" -ResourceId "/subscriptions/0fd190fa-dd1c-4724-b7f6-c5cc3ba5c884" -Description "SampleDescription" ``` ```output -TenantId : 72f988bf-86f1-41af-91ab-2d7cd011db47 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 ResourceId : /subscriptions/0fd190fa-dd1c-4724-b7f6-c5cc3ba5c884 ConnectionState : Pending DisplayName : @@ -54,11 +54,11 @@ Creates a scope connection to a cross-tenant subscription. ### Example 2 ```powershell -New-AzNetworkManagerScopeConnection -ResourceGroupName psResourceGroup -NetworkManagerName psNetworkManager -Name "mgConnection" -TenantId "72f988bf-86f1-41af-91ab-2d7cd011db47" -ResourceId "/providers/Microsoft.Management/managementGroups/newMG" -Description "SampleDescription" +New-AzNetworkManagerScopeConnection -ResourceGroupName psResourceGroup -NetworkManagerName psNetworkManager -Name "mgConnection" -TenantId "00001111-aaaa-2222-bbbb-3333cccc4444" -ResourceId "/providers/Microsoft.Management/managementGroups/newMG" -Description "SampleDescription" ``` ```output -TenantId : 72f988bf-86f1-41af-91ab-2d7cd011db47 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 ResourceId : /providers/Microsoft.Management/managementGroups/newMG ConnectionState : Pending DisplayName : @@ -269,4 +269,4 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable [Remove-AzNetworkManagerScopeConnection](./Remove-AzNetworkManagerScopeConnection.md) -[Set-AzNetworkManagerScopeConnection](./Set-AzNetworkManagerScopeConnection.md) \ No newline at end of file +[Set-AzNetworkManagerScopeConnection](./Set-AzNetworkManagerScopeConnection.md) diff --git a/src/Network/Network/help/Set-AzNetworkManagerScopeConnection.md b/src/Network/Network/help/Set-AzNetworkManagerScopeConnection.md index f69fb7eacf39..83b0e32d5b29 100644 --- a/src/Network/Network/help/Set-AzNetworkManagerScopeConnection.md +++ b/src/Network/Network/help/Set-AzNetworkManagerScopeConnection.md @@ -30,7 +30,7 @@ Set-AzNetworkManagerScopeConnection -InputObject $scopeConnection ``` ```output -TenantId : 72f988bf-86f1-41af-91ab-2d7cd011db47 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 ResourceId : /providers/Microsoft.Management/managementGroups/newMG ConnectionState : Pending DisplayName : @@ -152,4 +152,4 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable [New-AzNetworkManagerScopeConnection](./New-AzNetworkManagerScopeConnection.md) -[Remove-AzNetworkManagerScopeConnection](./Remove-AzNetworkManagerScopeConnection.md) \ No newline at end of file +[Remove-AzNetworkManagerScopeConnection](./Remove-AzNetworkManagerScopeConnection.md) diff --git a/src/NewRelic/NewRelic/help/Get-AzNewRelicBillingInfo.md b/src/NewRelic/NewRelic/help/Get-AzNewRelicBillingInfo.md index 7aa569d19554..4ac71dbf523f 100644 --- a/src/NewRelic/NewRelic/help/Get-AzNewRelicBillingInfo.md +++ b/src/NewRelic/NewRelic/help/Get-AzNewRelicBillingInfo.md @@ -40,8 +40,8 @@ MarketplaceSaaInfoMarketplaceResourceId : /subscriptions/11111111-2222-333 MarketplaceSaaInfoMarketplaceStatus : Subscribed MarketplaceSaaInfoMarketplaceSubscriptionId : 00000000-0000-0000-0000-000000000000 MarketplaceSaaInfoMarketplaceSubscriptionName : AzNewRelic_11111111-2222-3333-4444-123456789102_test-01 -PartnerBillingEntityOrganizationId : 11111111-2222-3333-4444-123456789103 -PartnerBillingEntityOrganizationName : 11111111-2222-3333-4444-123456789103 +PartnerBillingEntityOrganizationId : 00001111-aaaa-2222-bbbb-3333cccc4444 +PartnerBillingEntityOrganizationName : 00001111-aaaa-2222-bbbb-3333cccc4444 ``` This command gets marketplace info mapped to the given monitor. diff --git a/src/NewRelic/NewRelic/help/Get-AzNewRelicPlan.md b/src/NewRelic/NewRelic/help/Get-AzNewRelicPlan.md index 5f1f3c7875d9..433cdf648663 100644 --- a/src/NewRelic/NewRelic/help/Get-AzNewRelicPlan.md +++ b/src/NewRelic/NewRelic/help/Get-AzNewRelicPlan.md @@ -24,7 +24,7 @@ List plans data ### Example 1: List plans data associated with specified organization ```powershell -Get-AzNewRelicPlan -SubscriptionId 11111111-2222-3333-4444-123456789101 -OrganizationId 11111111-2222-3333-4444-123456789104 +Get-AzNewRelicPlan -SubscriptionId 00001111-aaaa-2222-bbbb-3333cccc4444 -OrganizationId 11111111-2222-3333-4444-123456789104 ``` ```output @@ -37,7 +37,7 @@ List plans data associated with specified Organization Id ### Example 2: Link plans account with specified organization in different subscription ```powershell -Get-AzNewRelicPlan -SubscriptionId 11111111-2222-3333-4444-123456789101 -OrganizationId 11111111-2222-3333-4444-123456789104 -AccountId 1234567 +Get-AzNewRelicPlan -SubscriptionId 00001111-aaaa-2222-bbbb-3333cccc4444 -OrganizationId 11111111-2222-3333-4444-123456789104 -AccountId 1234567 ``` Link plans account with specified organization in different subscription diff --git a/src/Reservations/Reservations/help/Move-AzReservationDirectory.md b/src/Reservations/Reservations/help/Move-AzReservationDirectory.md index f6fabe63b130..84dd106d7b5c 100644 --- a/src/Reservations/Reservations/help/Move-AzReservationDirectory.md +++ b/src/Reservations/Reservations/help/Move-AzReservationDirectory.md @@ -43,7 +43,7 @@ Change directory (tenant) of `ReservationOrder` and all `Reservation` under it t ### Example 1: Move reservation order from one tenant to another ```powershell -Move-AzReservationDirectory -ReservationOrderId "7c31a9e8-8490-4002-88cd-3a16b71362a9" -DestinationTenantId "f65fbe9a-14b0-44c6-8c0d-2ef2c4543040" +Move-AzReservationDirectory -ReservationOrderId "00001111-aaaa-2222-bbbb-3333cccc4444" -DestinationTenantId "f65fbe9a-14b0-44c6-8c0d-2ef2c4543040" ``` ```output @@ -61,7 +61,7 @@ Reservation : {{ "isSucceeded": true }} ReservationOrderError : -ReservationOrderId : 7c31a9e8-8490-4002-88cd-3a16b71362a9 +ReservationOrderId : 00001111-aaaa-2222-bbbb-3333cccc4444 ReservationOrderIsSucceeded : True ReservationOrderName : VM_RI_05-26-2022_16-53 ``` diff --git a/src/Resources/Resources/help/Get-AzADServicePrincipalAppRoleAssignment.md b/src/Resources/Resources/help/Get-AzADServicePrincipalAppRoleAssignment.md index 3c0adbaa1f82..12ce209f67e2 100644 --- a/src/Resources/Resources/help/Get-AzADServicePrincipalAppRoleAssignment.md +++ b/src/Resources/Resources/help/Get-AzADServicePrincipalAppRoleAssignment.md @@ -33,27 +33,27 @@ Get appRoleAssignments from servicePrincipals ### Example 1: List assigned app roles ```powershell -Get-AzADServicePrincipalAppRoleAssignment -ServicePrincipalId 71beb965-8347-495d-a589-c21cdde7a722 +Get-AzADServicePrincipalAppRoleAssignment -ServicePrincipalId 00001111-aaaa-2222-bbbb-3333cccc4444 ``` ```output Id AppRoleId PrincipalDisplayName PrincipalId CreatedDateTime -- --------- -------------------- ----------- --------------- -Zbm-cUeDXUmlicIc3eenIkgIm8kv9kJPj4MFhepACNE 649ae968-bdf9-4f22-bb2c-2aa1b4af0a83 funapp1214 71beb965-8347-495d-a589-c21cdde7a722 12/14/2023 7:04:28 AM -Zbm-cUeDXUmlicIc3eenIhHyPMkzw2VEh76fTc0bGtM e799a9e2-acac-4960-9ba0-6a17661fa16a funapp1214 71beb965-8347-495d-a589-c21cdde7a722 12/14/2023 6:56:52 AM +Zbm-cUeDXUmlicIc3eenIkgIm8kv9kJPj4MFhepACNE 649ae968-bdf9-4f22-bb2c-2aa1b4af0a83 funapp1214 00001111-aaaa-2222-bbbb-3333cccc4444 12/14/2023 7:04:28 AM +Zbm-cUeDXUmlicIc3eenIhHyPMkzw2VEh76fTc0bGtM e799a9e2-acac-4960-9ba0-6a17661fa16a funapp1214 00001111-aaaa-2222-bbbb-3333cccc4444 12/14/2023 6:56:52 AM ``` List assigned app roles. ### Example 2: Get by AppRoleAssignmentId ```powershell -Get-AzADServicePrincipalAppRoleAssignment -ServicePrincipalId 71beb965-8347-495d-a589-c21cdde7a722 -AppRoleAssignmentId Zbm-cUeDXUmlicIc3eenIkgIm8kv9kJPj4MFhepACNE +Get-AzADServicePrincipalAppRoleAssignment -ServicePrincipalId 00001111-aaaa-2222-bbbb-3333cccc4444 -AppRoleAssignmentId Zbm-cUeDXUmlicIc3eenIkgIm8kv9kJPj4MFhepACNE ``` ```output Id AppRoleId PrincipalDisplayName PrincipalId CreatedDateTime -- --------- -------------------- ----------- --------------- -Zbm-cUeDXUmlicIc3eenIkgIm8kv9kJPj4MFhepACNE 649ae968-bdf9-4f22-bb2c-2aa1b4af0a83 funapp1214 71beb965-8347-495d-a589-c21cdde7a722 12/14/2023 7:04:28 AM +Zbm-cUeDXUmlicIc3eenIkgIm8kv9kJPj4MFhepACNE 649ae968-bdf9-4f22-bb2c-2aa1b4af0a83 funapp1214 00001111-aaaa-2222-bbbb-3333cccc4444 12/14/2023 7:04:28 AM ``` Get an assigned app role by Id. diff --git a/src/Resources/Resources/help/Get-AzManagementGroup.md b/src/Resources/Resources/help/Get-AzManagementGroup.md index ab77949b38d0..8bcfd30d2e85 100644 --- a/src/Resources/Resources/help/Get-AzManagementGroup.md +++ b/src/Resources/Resources/help/Get-AzManagementGroup.md @@ -38,13 +38,13 @@ Get-AzManagementGroup Id : /providers/Microsoft.Management/managementGroups/TestGroup Type : /providers/Microsoft.Management/managementGroups Name : TestGroup -TenantId : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 DisplayName : TestGroupDisplayName Id : /providers/Microsoft.Management/managementGroups/TestGroupChild Type : /providers/Microsoft.Management/managementGroups Name : TestGroupChild -TenantId : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 DisplayName : TestGroupChildDisplayName ``` @@ -59,7 +59,7 @@ Get-AzManagementGroup -GroupName TestGroup Id : /providers/Microsoft.Management/managementGroups/TestGroup Type : /providers/Microsoft.Management/managementGroups Name : TestGroup -TenantId : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 DisplayName : TestGroupDisplayName UpdatedTime : 2/1/2018 11:16:12 AM UpdatedBy : 64360beb-ffb4-43a8-9314-01aa34db95a9 @@ -81,13 +81,13 @@ $response Id : /providers/Microsoft.Management/managementGroups/TestGroupParent Type : /providers/Microsoft.Management/managementGroups Name : TestGroupParent -TenantId : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 DisplayName : TestGroupParent UpdatedTime : 2/1/2018 11:15:46 AM UpdatedBy : 64360beb-ffb4-43a8-9314-01aa34db95a9 -ParentId : /providers/Microsoft.Management/managementGroups/6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 -ParentName : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 -ParentDisplayName : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 +ParentId : /providers/Microsoft.Management/managementGroups/00001111-aaaa-2222-bbbb-3333cccc4444 +ParentName : 00001111-aaaa-2222-bbbb-3333cccc4444 +ParentDisplayName : 00001111-aaaa-2222-bbbb-3333cccc4444 Children : {TestGroup1DisplayName, TestGroup2DisplayName} $response.Children[0] @@ -112,13 +112,13 @@ $response Id : /providers/Microsoft.Management/managementGroups/TestGroupParent Type : /providers/Microsoft.Management/managementGroups Name : TestGroupParent -TenantId : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 DisplayName : TestGroupParent UpdatedTime : 2/1/2018 11:15:46 AM UpdatedBy : 64360beb-ffb4-43a8-9314-01aa34db95a9 -ParentId : /providers/Microsoft.Management/managementGroups/6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 -ParentName : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 -ParentDisplayName : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 +ParentId : /providers/Microsoft.Management/managementGroups/00001111-aaaa-2222-bbbb-3333cccc4444 +ParentName : 00001111-aaaa-2222-bbbb-3333cccc4444 +ParentDisplayName : 00001111-aaaa-2222-bbbb-3333cccc4444 Children : {TestGroup1DisplayName, TestGroup2DisplayName} $response.Children[0] diff --git a/src/Resources/Resources/help/Get-AzManagementGroupEntity.md b/src/Resources/Resources/help/Get-AzManagementGroupEntity.md index c0906a306827..8754aac5673c 100644 --- a/src/Resources/Resources/help/Get-AzManagementGroupEntity.md +++ b/src/Resources/Resources/help/Get-AzManagementGroupEntity.md @@ -31,13 +31,13 @@ Get-AzManagementGroupEntity Id : /providers/Microsoft.Management/managementGroups/TestGroup Type : Microsoft.Management/managementGroups Name : TestGroup -TenantId : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 DisplayName : TestGroupDisplayName Id : /providers/Microsoft.Management/managementGroups/TestGroupChild Type : /providers/Microsoft.Management/managementGroups Name : TestGroupChild -TenantId : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 DisplayName : TestGroupChildDisplayName ``` diff --git a/src/Resources/Resources/help/Get-AzManagementGroupHierarchySetting.md b/src/Resources/Resources/help/Get-AzManagementGroupHierarchySetting.md index 0e8d8443990c..def2515eb50e 100644 --- a/src/Resources/Resources/help/Get-AzManagementGroupHierarchySetting.md +++ b/src/Resources/Resources/help/Get-AzManagementGroupHierarchySetting.md @@ -38,7 +38,7 @@ Get-AzManagementGroupHierarchySetting -GroupName c7a87cda-9a66-4920-b0f8-869baa0 Id : /providers/Microsoft.Management/managementGroups/c7a87cda-9a66-4920-b0f8-869baa04efe0/settings/default Type : Microsoft.Management/managementGroups/settings Name : default -TenantId : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 RequireAuthorizationForGroupCreation : true DefaultManagementGroup : TestGroup ``` diff --git a/src/Resources/Resources/help/Get-AzManagementGroupSubscription.md b/src/Resources/Resources/help/Get-AzManagementGroupSubscription.md index 28acca9f28a1..ef68674c17bb 100644 --- a/src/Resources/Resources/help/Get-AzManagementGroupSubscription.md +++ b/src/Resources/Resources/help/Get-AzManagementGroupSubscription.md @@ -32,7 +32,7 @@ Get-AzManagementGroupSubscription -GroupName "TestGroup" -SubscriptionId 5602fbd Name : 5602fbd9-fb0d-4fbb-98b3-10c8ea20b6de Type : Microsoft.Management/managementGroups/subscriptions Id : /providers/Microsoft.Management/managementGroups/TestGroup/subscriptions/5602fbd9-fb0d-4fbb-98b3-10c8ea20b6de -TenantId : 14307de0-5e6f-46cf-b2ba-64a062964d30 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 DisplayName : Visual Studio Enterprise Subscription ParentId : /providers/Microsoft.Management/managementGroups/TestGroup State : Active @@ -47,7 +47,7 @@ Get-AzManagementGroupSubscription -GroupName "TestGroup" Name : 5602fbd9-fb0d-4fbb-98b3-10c8ea20b6de Type : Microsoft.Management/managementGroups/subscriptions Id : /providers/Microsoft.Management/managementGroups/TestGroup/subscriptions/5602fbd9-fb0d-4fbb-98b3-10c8ea20b6de -TenantId : 14307de0-5e6f-46cf-b2ba-64a062964d30 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 DisplayName : Visual Studio Enterprise Subscription ParentId : /providers/Microsoft.Management/managementGroups/TestGroup State : Active @@ -55,7 +55,7 @@ State : Active Name : 2120692d-35c3-44c8-81f5-631fa7351726 Type : Microsoft.Management/managementGroups/subscriptions Id : /providers/Microsoft.Management/managementGroups/TestGroup/subscriptions/2120692d-35c3-44c8-81f5-631fa7351726 -TenantId : 14307de0-5e6f-46cf-b2ba-64a062964d30 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 DisplayName : Test Subscription ParentId : /providers/Microsoft.Management/managementGroups/TestGroup State : Active diff --git a/src/Resources/Resources/help/Get-AzRoleAssignmentSchedule.md b/src/Resources/Resources/help/Get-AzRoleAssignmentSchedule.md index dd0347d78aaa..f5c7ddf8609d 100644 --- a/src/Resources/Resources/help/Get-AzRoleAssignmentSchedule.md +++ b/src/Resources/Resources/help/Get-AzRoleAssignmentSchedule.md @@ -63,9 +63,9 @@ Get-AzRoleAssignmentSchedule -Scope $scope -Filter "asTarget()" Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 4cd7e26b-8eca-425c-969d-ec708c88bf18 Microsoft.Authorization/roleAssignmentSchedules /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorizatio… -a1f32976-b8f4-4606-a91d-af097a2473a2 Microsoft.Authorization/roleAssignmentSchedules /providers/Microsoft.Management/managementGroups/MG-3 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… -4f9bdc29-3bb9-4ad7-9c1d-3f3f5ba3e1d9 Microsoft.Authorization/roleAssignmentSchedules /providers/Microsoft.Management/managementGroups/MG-2 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… -529e4bba-621c-4309-a4b2-73e3364d4dd3 Microsoft.Authorization/roleAssignmentSchedules /providers/Microsoft.Management/managementGroups/MG-1 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… +00001111-aaaa-2222-bbbb-3333cccc4444 Microsoft.Authorization/roleAssignmentSchedules /providers/Microsoft.Management/managementGroups/MG-3 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… +00001111-aaaa-2222-bbbb-3333cccc4444 Microsoft.Authorization/roleAssignmentSchedules /providers/Microsoft.Management/managementGroups/MG-2 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… +00001111-aaaa-2222-bbbb-3333cccc4444 Microsoft.Authorization/roleAssignmentSchedules /providers/Microsoft.Management/managementGroups/MG-1 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… ``` Returns all `roleAssignmentSchedules` for the `scope` which are assigned to the calling user. diff --git a/src/Resources/Resources/help/Get-AzRoleAssignmentScheduleInstance.md b/src/Resources/Resources/help/Get-AzRoleAssignmentScheduleInstance.md index 4ebb119dde1f..62c2bc1950fd 100644 --- a/src/Resources/Resources/help/Get-AzRoleAssignmentScheduleInstance.md +++ b/src/Resources/Resources/help/Get-AzRoleAssignmentScheduleInstance.md @@ -63,9 +63,9 @@ Get-AzRoleAssignmentScheduleInstance -Scope $scope -Filter "asTarget()" Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 4cd7e26b-8eca-425c-969d-ec708c88bf18 Microsoft.Authorization/roleAssignmentScheduleInstances /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorizatio… -a1f32976-b8f4-4606-a91d-af097a2473a2 Microsoft.Authorization/roleAssignmentScheduleInstances /providers/Microsoft.Management/managementGroups/MG-3 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… -4f9bdc29-3bb9-4ad7-9c1d-3f3f5ba3e1d9 Microsoft.Authorization/roleAssignmentScheduleInstances /providers/Microsoft.Management/managementGroups/MG-2 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… -529e4bba-621c-4309-a4b2-73e3364d4dd3 Microsoft.Authorization/roleAssignmentScheduleInstances /providers/Microsoft.Management/managementGroups/MG-1 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… +00001111-aaaa-2222-bbbb-3333cccc4444 Microsoft.Authorization/roleAssignmentScheduleInstances /providers/Microsoft.Management/managementGroups/MG-3 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… +00001111-aaaa-2222-bbbb-3333cccc4444 Microsoft.Authorization/roleAssignmentScheduleInstances /providers/Microsoft.Management/managementGroups/MG-2 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… +00001111-aaaa-2222-bbbb-3333cccc4444 Microsoft.Authorization/roleAssignmentScheduleInstances /providers/Microsoft.Management/managementGroups/MG-1 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… ``` Returns all `roleAssignmentScheduleInstances` for the `scope` which are assigned to the calling user. diff --git a/src/Resources/Resources/help/Get-AzRoleEligibilitySchedule.md b/src/Resources/Resources/help/Get-AzRoleEligibilitySchedule.md index 1b89644b0906..b813834e4b99 100644 --- a/src/Resources/Resources/help/Get-AzRoleEligibilitySchedule.md +++ b/src/Resources/Resources/help/Get-AzRoleEligibilitySchedule.md @@ -63,9 +63,9 @@ Get-AzRoleEligibilitySchedule -Scope $scope -Filter "asTarget()" Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 4cd7e26b-8eca-425c-969d-ec708c88bf18 Microsoft.Authorization/roleEligibilitySchedules /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorizatio… -a1f32976-b8f4-4606-a91d-af097a2473a2 Microsoft.Authorization/roleEligibilitySchedules /providers/Microsoft.Management/managementGroups/MG-3 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… -4f9bdc29-3bb9-4ad7-9c1d-3f3f5ba3e1d9 Microsoft.Authorization/roleEligibilitySchedules /providers/Microsoft.Management/managementGroups/MG-2 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… -529e4bba-621c-4309-a4b2-73e3364d4dd3 Microsoft.Authorization/roleEligibilitySchedules /providers/Microsoft.Management/managementGroups/MG-1 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… +00001111-aaaa-2222-bbbb-3333cccc4444 Microsoft.Authorization/roleEligibilitySchedules /providers/Microsoft.Management/managementGroups/MG-3 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… +00001111-aaaa-2222-bbbb-3333cccc4444 Microsoft.Authorization/roleEligibilitySchedules /providers/Microsoft.Management/managementGroups/MG-2 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… +00001111-aaaa-2222-bbbb-3333cccc4444 Microsoft.Authorization/roleEligibilitySchedules /providers/Microsoft.Management/managementGroups/MG-1 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… ``` Returns all `roleEligibilitySchedules` for the `scope` which are assigned to the calling user. diff --git a/src/Resources/Resources/help/Get-AzRoleEligibilityScheduleInstance.md b/src/Resources/Resources/help/Get-AzRoleEligibilityScheduleInstance.md index ed51f1ffd9b6..f12aaa7ad1fa 100644 --- a/src/Resources/Resources/help/Get-AzRoleEligibilityScheduleInstance.md +++ b/src/Resources/Resources/help/Get-AzRoleEligibilityScheduleInstance.md @@ -63,9 +63,9 @@ Get-AzRoleEligibilityScheduleInstance -Scope $scope -Filter "asTarget()" Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 4cd7e26b-8eca-425c-969d-ec708c88bf18 Microsoft.Authorization/roleEligibilityScheduleInstances /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorizatio… -a1f32976-b8f4-4606-a91d-af097a2473a2 Microsoft.Authorization/roleEligibilityScheduleInstances /providers/Microsoft.Management/managementGroups/MG-3 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… -4f9bdc29-3bb9-4ad7-9c1d-3f3f5ba3e1d9 Microsoft.Authorization/roleEligibilityScheduleInstances /providers/Microsoft.Management/managementGroups/MG-2 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… -529e4bba-621c-4309-a4b2-73e3364d4dd3 Microsoft.Authorization/roleEligibilityScheduleInstances /providers/Microsoft.Management/managementGroups/MG-1 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… +00001111-aaaa-2222-bbbb-3333cccc4444 Microsoft.Authorization/roleEligibilityScheduleInstances /providers/Microsoft.Management/managementGroups/MG-3 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… +00001111-aaaa-2222-bbbb-3333cccc4444 Microsoft.Authorization/roleEligibilityScheduleInstances /providers/Microsoft.Management/managementGroups/MG-2 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… +00001111-aaaa-2222-bbbb-3333cccc4444 Microsoft.Authorization/roleEligibilityScheduleInstances /providers/Microsoft.Management/managementGroups/MG-1 /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb… ``` Returns all `roleEligibilityScheduleInstances` for the `scope` which are assigned to the calling user. diff --git a/src/Resources/Resources/help/New-AzADServicePrincipalAppRoleAssignment.md b/src/Resources/Resources/help/New-AzADServicePrincipalAppRoleAssignment.md index 12601f8d426a..62abdf50cb80 100644 --- a/src/Resources/Resources/help/New-AzADServicePrincipalAppRoleAssignment.md +++ b/src/Resources/Resources/help/New-AzADServicePrincipalAppRoleAssignment.md @@ -47,13 +47,13 @@ Create new navigation property to appRoleAssignments for servicePrincipals ### Example 1: ObjectIdWithResourceIdParameterSet ```powershell -New-AzADServicePrincipalAppRoleAssignment -ServicePrincipalId 71beb965-8347-495d-a589-c21cdde7a722 -ResourceId 351fa797-c81a-4998-9720-4c2ecb6c7abc -AppRoleId 649ae968-bdf9-4f22-bb2c-2aa1b4af0a83 +New-AzADServicePrincipalAppRoleAssignment -ServicePrincipalId 00001111-aaaa-2222-bbbb-3333cccc4444 -ResourceId 351fa797-c81a-4998-9720-4c2ecb6c7abc -AppRoleId 649ae968-bdf9-4f22-bb2c-2aa1b4af0a83 ``` ```output Id AppRoleId PrincipalDisplayName PrincipalId CreatedDateTime -- --------- -------------------- ----------- --------------- -Zbm-cUeDXUmlicIc3eenIkgIm8kv9kJPj4MFhepACNE 649ae968-bdf9-4f22-bb2c-2aa1b4af0a83 funapp1214 71beb965-8347-495d-a589-c21cdde7a722 12/14/2023 7:04:28 AM +Zbm-cUeDXUmlicIc3eenIkgIm8kv9kJPj4MFhepACNE 649ae968-bdf9-4f22-bb2c-2aa1b4af0a83 funapp1214 00001111-aaaa-2222-bbbb-3333cccc4444 12/14/2023 7:04:28 AM ``` Create an appRoleAssignment using ServicePrincipalId and ResourceId. @@ -66,7 +66,7 @@ New-AzADServicePrincipalAppRoleAssignment -ServicePrincipalDisplayName funapp121 ```output Id AppRoleId PrincipalDisplayName PrincipalId CreatedDateTime -- --------- -------------------- ----------- --------------- -Zbm-cUeDXUmlicIc3eenIlqgWRlWp2hFrXIJiqP2j78 649ae968-bdf9-4f22-bb2c-2aa1b4af0a83 funapp1214 71beb965-8347-495d-a589-c21cdde7a722 12/14/2023 7:07:16 AM +Zbm-cUeDXUmlicIc3eenIlqgWRlWp2hFrXIJiqP2j78 649ae968-bdf9-4f22-bb2c-2aa1b4af0a83 funapp1214 00001111-aaaa-2222-bbbb-3333cccc4444 12/14/2023 7:07:16 AM ``` Create an appRoleAssignment for service principal using ServicePrincipal DisplayName and Resource DisplayName. diff --git a/src/Resources/Resources/help/New-AzManagementGroup.md b/src/Resources/Resources/help/New-AzManagementGroup.md index 52503cc6dace..a40d25b43388 100644 --- a/src/Resources/Resources/help/New-AzManagementGroup.md +++ b/src/Resources/Resources/help/New-AzManagementGroup.md @@ -40,13 +40,13 @@ New-AzManagementGroup -GroupName "TestGroup" Id : /providers/Microsoft.Management/managementGroups/TestGroup Type : /providers/Microsoft.Management/managementGroups Name : TestGroup -TenantId : 14307de0-5e6f-46cf-b2ba-64a062964d30 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 DisplayName : TestGroup UpdatedTime : 2/1/2018 11:06:27 AM -UpdatedBy : 14307de0-5e6f-46cf-b2ba-64a062964d30 -ParentId : /providers/Microsoft.Management/managementGroups/14307de0-5e6f-46cf-b2ba-64a062964d30 -ParentName : 14307de0-5e6f-46cf-b2ba-64a062964d30 -ParentDisplayName : 14307de0-5e6f-46cf-b2ba-64a062964d30 +UpdatedBy : 00001111-aaaa-2222-bbbb-3333cccc4444 +ParentId : /providers/Microsoft.Management/managementGroups/00001111-aaaa-2222-bbbb-3333cccc4444 +ParentName : 00001111-aaaa-2222-bbbb-3333cccc4444 +ParentDisplayName : 00001111-aaaa-2222-bbbb-3333cccc4444 ``` Creation of a new group with `DisplayName` and `ParentId` set to `null`. The `DisplayName` will be same as the `GroupName` and the parent of the group will be the tenant. @@ -60,13 +60,13 @@ New-AzManagementGroup -GroupName "TestGroup" -DisplayName "TestGroupDisplayName" Id : /providers/Microsoft.Management/managementGroups/TestGroup Type : /providers/Microsoft.Management/managementGroups Name : TestGroup -TenantId : 14307de0-5e6f-46cf-b2ba-64a062964d30 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 DisplayName : TestGroup UpdatedTime : 2/1/2018 11:06:27 AM -UpdatedBy : 14307de0-5e6f-46cf-b2ba-64a062964d30 -ParentId : /providers/Microsoft.Management/managementGroups/14307de0-5e6f-46cf-b2ba-64a062964d30 -ParentName : 14307de0-5e6f-46cf-b2ba-64a062964d30 -ParentDisplayName : 14307de0-5e6f-46cf-b2ba-64a062964d30 +UpdatedBy : 00001111-aaaa-2222-bbbb-3333cccc4444 +ParentId : /providers/Microsoft.Management/managementGroups/00001111-aaaa-2222-bbbb-3333cccc4444 +ParentName : 00001111-aaaa-2222-bbbb-3333cccc4444 +ParentDisplayName : 00001111-aaaa-2222-bbbb-3333cccc4444 ``` In this case, the parent of the group will be the tenant and the `DisplayName` will be set to the value given. @@ -80,10 +80,10 @@ New-AzManagementGroup -GroupName "TestGroup" -DisplayName "TestGroupDisplayName" Id : /providers/Microsoft.Management/managementGroups/TestGroup Type : /providers/Microsoft.Management/managementGroups Name : TestGroup -TenantId : 14307de0-5e6f-46cf-b2ba-64a062964d30 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 DisplayName : TestGroupDisplayName UpdatedTime : 2/1/2018 11:16:12 AM -UpdatedBy : 14307de0-5e6f-46cf-b2ba-64a062964d30 +UpdatedBy : 00001111-aaaa-2222-bbbb-3333cccc4444 ParentId : /providers/Microsoft.Management/managementGroups/TestGroupParent ParentName : TestGroupParent ParentDisplayName : TestGroupParent @@ -99,10 +99,10 @@ New-AzManagementGroup -GroupName "TestGroup" -ParentObject $parentObject Id : /providers/Microsoft.Management/managementGroups/TestGroup Type : /providers/Microsoft.Management/managementGroups Name : TestGroup -TenantId : 14307de0-5e6f-46cf-b2ba-64a062964d30 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 DisplayName : TestGroupDisplayName UpdatedTime : 2/1/2018 11:16:12 AM -UpdatedBy : 14307de0-5e6f-46cf-b2ba-64a062964d30 +UpdatedBy : 00001111-aaaa-2222-bbbb-3333cccc4444 ParentId : /providers/Microsoft.Management/managementGroups/TestGroupParent ParentName : TestGroupParent ParentDisplayName : TestGroupParent diff --git a/src/Resources/Resources/help/New-AzManagementGroupHierarchySetting.md b/src/Resources/Resources/help/New-AzManagementGroupHierarchySetting.md index b855c17a60c8..9c8eca160c44 100644 --- a/src/Resources/Resources/help/New-AzManagementGroupHierarchySetting.md +++ b/src/Resources/Resources/help/New-AzManagementGroupHierarchySetting.md @@ -40,7 +40,7 @@ New-AzManagementGroupHierarchySetting -GroupName c7a87cda-9a66-4920-b0f8-869baa0 Id : /providers/Microsoft.Management/managementGroups/c7a87cda-9a66-4920-b0f8-869baa04efe0/settings/default Type : Microsoft.Management/managementGroups/settings Name : default -TenantId : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 RequireAuthorizationForGroupCreation : true DefaultManagementGroup : ``` @@ -54,7 +54,7 @@ New-AzManagementGroupHierarchySetting -GroupName c7a87cda-9a66-4920-b0f8-869baa0 Id : /providers/Microsoft.Management/managementGroups/c7a87cda-9a66-4920-b0f8-869baa04efe0/settings/default Type : Microsoft.Management/managementGroups/settings Name : default -TenantId : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 RequireAuthorizationForGroupCreation : false DefaultManagementGroup : TestGroup ``` @@ -68,7 +68,7 @@ New-AzManagementGroupHierarchySetting -GroupName c7a87cda-9a66-4920-b0f8-869baa0 Id : /providers/Microsoft.Management/managementGroups/c7a87cda-9a66-4920-b0f8-869baa04efe0/settings/default Type : Microsoft.Management/managementGroups/settings Name : default -TenantId : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 RequireAuthorizationForGroupCreation : true DefaultManagementGroup : TestGroup ``` diff --git a/src/Resources/Resources/help/New-AzManagementGroupSubscription.md b/src/Resources/Resources/help/New-AzManagementGroupSubscription.md index 606cf34b4a8a..a0fc74d514d7 100644 --- a/src/Resources/Resources/help/New-AzManagementGroupSubscription.md +++ b/src/Resources/Resources/help/New-AzManagementGroupSubscription.md @@ -32,7 +32,7 @@ New-AzManagementGroupSubscription -GroupName "TestGroup" -SubscriptionId 5602fbd Name : 5602fbd9-fb0d-4fbb-98b3-10c8ea20b6de Type : Microsoft.Management/managementGroups/subscriptions Id : /providers/Microsoft.Management/managementGroups/TestGroup/subscriptions/5602fbd9-fb0d-4fbb-98b3-10c8ea20b6de -TenantId : 14307de0-5e6f-46cf-b2ba-64a062964d30 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 DisplayName : Visual Studio Enterprise Subscription ParentId : /providers/Microsoft.Management/managementGroups/TestGroup State : Active diff --git a/src/Resources/Resources/help/New-AzRoleAssignment.md b/src/Resources/Resources/help/New-AzRoleAssignment.md index 29d74e070528..5c98dc506033 100644 --- a/src/Resources/Resources/help/New-AzRoleAssignment.md +++ b/src/Resources/Resources/help/New-AzRoleAssignment.md @@ -158,14 +158,14 @@ Grant access to a security group ### Example 3 ```powershell -New-AzRoleAssignment -SignInName john.doe@contoso.com -RoleDefinitionName Owner -Scope "/subscriptions/86f81fc3-b00f-48cd-8218-3879f51ff362/resourcegroups/rg1/providers/Microsoft.Web/sites/site1" +New-AzRoleAssignment -SignInName john.doe@contoso.com -RoleDefinitionName Owner -Scope "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourcegroups/rg1/providers/Microsoft.Web/sites/site1" ``` Grant access to a user at a resource (website) ### Example 4 ```powershell -New-AzRoleAssignment -ObjectId 5ac84765-1c8c-4994-94b2-629461bd191b -RoleDefinitionName "Virtual Machine Contributor" -ResourceName Devices-Engineering-ProjectRND -ResourceType Microsoft.Network/virtualNetworks/subnets -ParentResource virtualNetworks/VNET-EASTUS-01 -ResourceGroupName Network +New-AzRoleAssignment -ObjectId 00001111-aaaa-2222-bbbb-3333cccc4444 -RoleDefinitionName "Virtual Machine Contributor" -ResourceName Devices-Engineering-ProjectRND -ResourceType Microsoft.Network/virtualNetworks/subnets -ParentResource virtualNetworks/VNET-EASTUS-01 -ResourceGroupName Network ``` Grant access to a group at a nested resource (subnet) diff --git a/src/Resources/Resources/help/New-AzRoleAssignmentScheduleRequest.md b/src/Resources/Resources/help/New-AzRoleAssignmentScheduleRequest.md index bf54cdf7f868..c63bca90cd1e 100644 --- a/src/Resources/Resources/help/New-AzRoleAssignmentScheduleRequest.md +++ b/src/Resources/Resources/help/New-AzRoleAssignmentScheduleRequest.md @@ -32,7 +32,7 @@ Creates a role assignment schedule request. $guid = "12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" $startTime = Get-Date -Format o $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -New-AzRoleAssignmentScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType AdminAssign -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +New-AzRoleAssignmentScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 00001111-aaaa-2222-bbbb-3333cccc4444 -RequestType AdminAssign -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime ``` ```output @@ -48,7 +48,7 @@ Creates a request to provision an active assignment of `roleDefinition` on the ` $guid = "13f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" $startTime = Get-Date -Format o $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -New-AzRoleAssignmentScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType AdminRemove -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +New-AzRoleAssignmentScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 00001111-aaaa-2222-bbbb-3333cccc4444 -RequestType AdminRemove -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime ``` ```output @@ -64,7 +64,7 @@ Creates a request to remove an active assignment of `roleDefinition` on the `sco $guid = "12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" $startTime = Get-Date -Format o $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -New-AzRoleAssignmentScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType SelfActivate -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +New-AzRoleAssignmentScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 00001111-aaaa-2222-bbbb-3333cccc4444 -RequestType SelfActivate -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime ``` ```output @@ -80,7 +80,7 @@ Creates a request to activate an eligible assignment of `roleDefinition` on the $guid = "12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" $startTime = Get-Date -Format o $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -New-AzRoleAssignmentScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType SelfDeactivate -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +New-AzRoleAssignmentScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 00001111-aaaa-2222-bbbb-3333cccc4444 -RequestType SelfDeactivate -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime ``` ```output diff --git a/src/Resources/Resources/help/New-AzRoleEligibilityScheduleRequest.md b/src/Resources/Resources/help/New-AzRoleEligibilityScheduleRequest.md index 02ecb6d9b890..acb9dd65da55 100644 --- a/src/Resources/Resources/help/New-AzRoleEligibilityScheduleRequest.md +++ b/src/Resources/Resources/help/New-AzRoleEligibilityScheduleRequest.md @@ -32,7 +32,7 @@ Creates a role eligibility schedule request. $guid = "12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" $startTime = Get-Date -Format o $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -New-AzRoleEligibilityScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType AdminAssign -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +New-AzRoleEligibilityScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 00001111-aaaa-2222-bbbb-3333cccc4444 -RequestType AdminAssign -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime ``` ```output @@ -48,7 +48,7 @@ Creates a request to provision an eligible assignment of `roleDefinition` on the $guid = "13f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" $startTime = Get-Date -Format o $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -New-AzRoleEligibilityScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType AdminRemove -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +New-AzRoleEligibilityScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 00001111-aaaa-2222-bbbb-3333cccc4444 -RequestType AdminRemove -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime ``` ```output diff --git a/src/Resources/Resources/help/Remove-AzADServicePrincipalAppRoleAssignment.md b/src/Resources/Resources/help/Remove-AzADServicePrincipalAppRoleAssignment.md index 4c19ca366a02..610eaa3b993e 100644 --- a/src/Resources/Resources/help/Remove-AzADServicePrincipalAppRoleAssignment.md +++ b/src/Resources/Resources/help/Remove-AzADServicePrincipalAppRoleAssignment.md @@ -25,7 +25,7 @@ Delete navigation property appRoleAssignments for servicePrincipals ### Example 1: Remove an app role from service principal ```powershell -Remove-AzADServicePrincipalAppRoleAssignment -AppRoleAssignmentId Zbm-cUeDXUmlicIc3eenIlTWN1A5UVFMigS0D3ED-dk -ServicePrincipalId 71beb965-8347-495d-a589-c21cdde7a722 +Remove-AzADServicePrincipalAppRoleAssignment -AppRoleAssignmentId Zbm-cUeDXUmlicIc3eenIlTWN1A5UVFMigS0D3ED-dk -ServicePrincipalId 00001111-aaaa-2222-bbbb-3333cccc4444 ``` Remove an app role from service principal. diff --git a/src/Resources/Resources/help/Remove-AzRoleAssignment.md b/src/Resources/Resources/help/Remove-AzRoleAssignment.md index 91d377297b40..ee24368d516c 100644 --- a/src/Resources/Resources/help/Remove-AzRoleAssignment.md +++ b/src/Resources/Resources/help/Remove-AzRoleAssignment.md @@ -137,7 +137,7 @@ Removes a role assignment for john.doe@contoso.com who is assigned to the Reader ### Example 2 ```powershell -Remove-AzRoleAssignment -ObjectId 36f81fc3-b00f-48cd-8218-3879f51ff39f -RoleDefinitionName Reader +Remove-AzRoleAssignment -ObjectId 00001111-aaaa-2222-bbbb-3333cccc4444 -RoleDefinitionName Reader ``` Removes the role assignment to the group principal identified by the ObjectId and assigned to the Reader role. diff --git a/src/Resources/Resources/help/Remove-AzRoleDefinition.md b/src/Resources/Resources/help/Remove-AzRoleDefinition.md index c7dac0f2a265..987cce3e2429 100644 --- a/src/Resources/Resources/help/Remove-AzRoleDefinition.md +++ b/src/Resources/Resources/help/Remove-AzRoleDefinition.md @@ -52,7 +52,7 @@ Get-AzRoleDefinition -Name "Virtual Machine Operator" | Remove-AzRoleDefinition ### Example 2 ```powershell -Remove-AzRoleDefinition -Id "52a6cc13-ff92-47a8-a39b-2a8205c3087e" +Remove-AzRoleDefinition -Id "00001111-aaaa-2222-bbbb-3333cccc4444" ``` ## PARAMETERS diff --git a/src/Resources/Resources/help/Set-AzRoleAssignment.md b/src/Resources/Resources/help/Set-AzRoleAssignment.md index 8fbe808613bb..cfc623f61f28 100644 --- a/src/Resources/Resources/help/Set-AzRoleAssignment.md +++ b/src/Resources/Resources/help/Set-AzRoleAssignment.md @@ -50,7 +50,7 @@ $ConditionVersion = "2.0" $Description = "This is a new role assignment for John" $Condition = "@Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:Path] StringEqualsIgnoreCase 'foo_storage_container'" - $roleAssignment = Get-AzRoleAssignment -Scope "/subscriptions/4e5329a6-39ce-4e13-b12e-11b30f015986/resourceGroups/contoso_rg" -PrincipalId "0c0f6cdc-90dd-4664-83c0-a0d986c4c604" + $roleAssignment = Get-AzRoleAssignment -Scope "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/contoso_rg" -PrincipalId "0c0f6cdc-90dd-4664-83c0-a0d986c4c604" $roleAssignment.Description = $Description $roleAssignment.Condition = $Condition $roleAssignment.ConditionVersion = $ConditionVersion @@ -62,7 +62,7 @@ $ConditionVersion = "2.0" RoleAssignmentId : /providers/Microsoft.Management/managementGroups/1273adef-00a3 -4086-a51a-dbcce1857d36/providers/Microsoft.Authorization/role Assignments/926c2a76-be19-4281-94de-38777629b9dc - Scope : /subscriptions/4e5329a6-39ce-4e13-b12e-11b30f015986/resourceGroups/contoso_rg + Scope : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/contoso_rg DisplayName : John Doe SignInName : John.Doe@Contoso.com RoleDefinitionName : Owner @@ -86,7 +86,7 @@ Set-AzRoleAssignment -InputFile "C:\RoleAssignments\example.json" -PassThru RoleAssignmentId : /providers/Microsoft.Management/managementGroups/1273adef-00a3 -4086-a51a-dbcce1857d36/providers/Microsoft.Authorization/role Assignments/926c2a76-be19-4281-94de-38777629b9dc - Scope : /subscriptions/4e5329a6-39ce-4e13-b12e-11b30f015986/resourceGroups/contoso_rg + Scope : /subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourceGroups/contoso_rg DisplayName : John Doe SignInName : John.Doe@Contoso.com RoleDefinitionName : Owner diff --git a/src/Resources/Resources/help/Update-AzADServicePrincipalAppRoleAssignment.md b/src/Resources/Resources/help/Update-AzADServicePrincipalAppRoleAssignment.md index 09fb14436669..c5d807e34d9e 100644 --- a/src/Resources/Resources/help/Update-AzADServicePrincipalAppRoleAssignment.md +++ b/src/Resources/Resources/help/Update-AzADServicePrincipalAppRoleAssignment.md @@ -33,7 +33,7 @@ Update the navigation property appRoleAssignments in servicePrincipals ### Example 1: Update the AppRoleId ```powershell -Update-AzADServicePrincipalAppRoleAssignment -AppRoleAssignmentId Zbm-cUeDXUmlicIc3eenIoFW9pZ_gRBIudKgu0gaMIw -ServicePrincipalId 71beb965-8347-495d-a589-c21cdde7a722 -AppRoleId 649ae968-bdf9-4f22-bb2c-2aa1b4af0a83 +Update-AzADServicePrincipalAppRoleAssignment -AppRoleAssignmentId Zbm-cUeDXUmlicIc3eenIoFW9pZ_gRBIudKgu0gaMIw -ServicePrincipalId 00001111-aaaa-2222-bbbb-3333cccc4444 -AppRoleId 649ae968-bdf9-4f22-bb2c-2aa1b4af0a83 ``` Update the assigned App role id. diff --git a/src/Resources/Resources/help/Update-AzManagementGroup.md b/src/Resources/Resources/help/Update-AzManagementGroup.md index b7461395ed8c..4a444c2f2c4a 100644 --- a/src/Resources/Resources/help/Update-AzManagementGroup.md +++ b/src/Resources/Resources/help/Update-AzManagementGroup.md @@ -54,13 +54,13 @@ Update-AzManagementGroup -GroupName "TestGroup" -DisplayName "New Display Name" Id : /providers/Microsoft.Management/managementGroups/TestGroup Type : /providers/Microsoft.Management/managementGroups Name : TestGroup -TenantId : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 DisplayName : New Display Name UpdatedTime : 2/1/2018 12:03:37 PM UpdatedBy : 64360beb-ffb4-43a8-9314-01aa34db95a9 -ParentId : /providers/Microsoft.Management/managementGroups/6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 -ParentName : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 -ParentDisplayName : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 +ParentId : /providers/Microsoft.Management/managementGroups/00001111-aaaa-2222-bbbb-3333cccc4444 +ParentName : 00001111-aaaa-2222-bbbb-3333cccc4444 +ParentDisplayName : 00001111-aaaa-2222-bbbb-3333cccc4444 ``` ### Example 2: Update a Management Group's Parent @@ -72,7 +72,7 @@ Update-AzManagementGroup -GroupName "TestGroup" -ParentId "/providers/Microsoft. Id : /providers/Microsoft.Management/managementGroups/TestGroup Type : /providers/Microsoft.Management/managementGroups Name : TestGroup -TenantId : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 DisplayName : TestGroup UpdatedTime : 2/1/2018 12:03:37 PM UpdatedBy : 64360beb-ffb4-43a8-9314-01aa34db95a9 @@ -90,7 +90,7 @@ Get-AzManagementGroup -GroupName "TestGroup" | Update-AzManagementGroup -Display Id : /providers/Microsoft.Management/managementGroups/TestGroup Type : /providers/Microsoft.Management/managementGroups Name : TestGroup -TenantId : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 DisplayName : TestDisplayName UpdatedTime : 2/1/2018 12:03:37 PM UpdatedBy : 64360beb-ffb4-43a8-9314-01aa34db95a9 @@ -109,10 +109,10 @@ Update-AzManagementGroup -GroupName "TestGroup" -ParentObject $parentObject Id : /providers/Microsoft.Management/managementGroups/TestGroup Type : /providers/Microsoft.Management/managementGroups Name : TestGroup -TenantId : 14307de0-5e6f-46cf-b2ba-64a062964d30 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 DisplayName : TestGroupDisplayName UpdatedTime : 2/1/2018 11:16:12 AM -UpdatedBy : 14307de0-5e6f-46cf-b2ba-64a062964d30 +UpdatedBy : 00001111-aaaa-2222-bbbb-3333cccc4444 ParentId : /providers/Microsoft.Management/managementGroups/TestGroupParent ParentName : TestGroupParent ParentDisplayName : TestGroupParent diff --git a/src/Resources/Resources/help/Update-AzManagementGroupHierarchySetting.md b/src/Resources/Resources/help/Update-AzManagementGroupHierarchySetting.md index a367552fc869..b101c7525130 100644 --- a/src/Resources/Resources/help/Update-AzManagementGroupHierarchySetting.md +++ b/src/Resources/Resources/help/Update-AzManagementGroupHierarchySetting.md @@ -40,7 +40,7 @@ Update-AzManagementGroupHierarchySetting -GroupName c7a87cda-9a66-4920-b0f8-869b Id : /providers/Microsoft.Management/managementGroups/c7a87cda-9a66-4920-b0f8-869baa04efe0/settings/default Type : Microsoft.Management/managementGroups/settings Name : default -TenantId : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 RequireAuthorizationForGroupCreation : true DefaultManagementGroup : ``` @@ -54,7 +54,7 @@ Update-AzManagementGroupHierarchySetting -GroupName c7a87cda-9a66-4920-b0f8-869b Id : /providers/Microsoft.Management/managementGroups/c7a87cda-9a66-4920-b0f8-869baa04efe0/settings/default Type : Microsoft.Management/managementGroups/settings Name : default -TenantId : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 RequireAuthorizationForGroupCreation : false DefaultManagementGroup : TestGroup ``` @@ -68,7 +68,7 @@ Update-AzManagementGroupHierarchySetting -GroupName c7a87cda-9a66-4920-b0f8-869b Id : /providers/Microsoft.Management/managementGroups/c7a87cda-9a66-4920-b0f8-869baa04efe0/settings/default Type : Microsoft.Management/managementGroups/settings Name : default -TenantId : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 RequireAuthorizationForGroupCreation : true DefaultManagementGroup : TestGroup ``` diff --git a/src/SecurityInsights/SecurityInsights/help/Get-AzSentinelEntityInsight.md b/src/SecurityInsights/SecurityInsights/help/Get-AzSentinelEntityInsight.md index cebb3df2c008..d41f79e4c90a 100644 --- a/src/SecurityInsights/SecurityInsights/help/Get-AzSentinelEntityInsight.md +++ b/src/SecurityInsights/SecurityInsights/help/Get-AzSentinelEntityInsight.md @@ -45,7 +45,7 @@ This command gets insights for an Entity for a given time range. ```powershell $startTime = (Get-Date).AddDays(-7).ToUniversalTime() | Get-Date -Format "yyyy-MM-ddThh:00:00.000Z" $endTime = (Get-Date).ToUniversalTime() | Get-Date -Format "yyyy-MM-ddThh:00:00.000Z" - $Entity = Get-AzSentinelEntity -ResourceGroupName "myResourceGroupName" -workspaceName "myWorkspaceName" -EntityId "8d036a2d-f37d-e936-6cca-4e172687cb79" + $Entity = Get-AzSentinelEntity -ResourceGroupName "myResourceGroupName" -workspaceName "myWorkspaceName" -EntityId "00001111-aaaa-2222-bbbb-3333cccc4444" $Entity | Get-AzSentinelEntityInsight -EndTime $endTime -StartTime $startTime ``` diff --git a/src/SecurityInsights/SecurityInsights/help/New-AzSentinelIncidentTeam.md b/src/SecurityInsights/SecurityInsights/help/New-AzSentinelIncidentTeam.md index 166d5d4be593..312c575923ef 100644 --- a/src/SecurityInsights/SecurityInsights/help/New-AzSentinelIncidentTeam.md +++ b/src/SecurityInsights/SecurityInsights/help/New-AzSentinelIncidentTeam.md @@ -42,7 +42,7 @@ $incident = Get-AzSentinelIncident -ResourceGroupName "myResourceGroup" -Workspa Description : Name : Incident : NewIncident3 PrimaryChannelUrl : https://teams.microsoft.com/l/team/19:vYoGjeGlZmTEDmu0gTbrk9T_eDS4pKIkEU7UuM1IyZk1%40thread.tacv2/conversations?groupId=3c637cc5-caf1-46c7-93ac-069c6 - 4b05395&tenantId=8f21ced5-2eff-4f8d-aff1-4dbb4cee8e3d + 4b05395&tenantId=00001111-aaaa-2222-bbbb-3333cccc4444 TeamCreationTimeUtc : 2/4/2022 3:02:03 PM TeamId : 3c637cc5-caf1-46c7-93ac-069c64b05395 ``` diff --git a/src/Sql/Sql/help/Get-AzSqlInstance.md b/src/Sql/Sql/help/Get-AzSqlInstance.md index 7b1dc7d1dfa8..a019d3fd3f9c 100644 --- a/src/Sql/Sql/help/Get-AzSqlInstance.md +++ b/src/Sql/Sql/help/Get-AzSqlInstance.md @@ -383,14 +383,14 @@ AdministratorType : ActiveDirectory PrincipalType : Group Login : Dummy Sid : df7667b8-f9fd-4029-a0e3-b43c75ce9538 -TenantId : f553829b-6d84-481b-86a9-42db57c1dc73 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 AzureADOnlyAuthentication : True AdministratorType : ActiveDirectory PrincipalType : Group Login : Dummy2 Sid : df7667b8-f9fd-4029-a0e3-b43c75ce9538 -TenantId : f553829b-6d84-481b-86a9-42db57c1dc73 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 AzureADOnlyAuthentication : True ``` @@ -426,7 +426,7 @@ AdministratorType : ActiveDirectory PrincipalType : Group Login : Dummy Sid : df7667b8-f9fd-4029-a0e3-b43c75ce9538 -TenantId : f553829b-6d84-481b-86a9-42db57c1dc73 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 AzureADOnlyAuthentication : True ``` diff --git a/src/Sql/Sql/help/Get-AzSqlServer.md b/src/Sql/Sql/help/Get-AzSqlServer.md index 4f723454ad77..066cb27152af 100644 --- a/src/Sql/Sql/help/Get-AzSqlServer.md +++ b/src/Sql/Sql/help/Get-AzSqlServer.md @@ -172,14 +172,14 @@ AdministratorType : ActiveDirectory PrincipalType : Group Login : Dummy Sid : df7667b8-f9fd-4029-a0e3-b43c75ce9538 -TenantId : f553829b-6d84-481b-86a9-42db57c1dc73 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 AzureADOnlyAuthentication : True AdministratorType : ActiveDirectory PrincipalType : Group Login : Dummy2 Sid : df7667b8-f9fd-4029-a0e3-b43c75ce9538 -TenantId : f553829b-6d84-481b-86a9-42db57c1dc73 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 AzureADOnlyAuthentication : True ``` @@ -205,7 +205,7 @@ AdministratorType : ActiveDirectory PrincipalType : Group Login : Dummy Sid : df7667b8-f9fd-4029-a0e3-b43c75ce9538 -TenantId : f553829b-6d84-481b-86a9-42db57c1dc73 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 AzureADOnlyAuthentication : True ``` diff --git a/src/Sql/Sql/help/New-AzSqlInstance.md b/src/Sql/Sql/help/New-AzSqlInstance.md index f9091a45473b..9c65665bcb25 100644 --- a/src/Sql/Sql/help/New-AzSqlInstance.md +++ b/src/Sql/Sql/help/New-AzSqlInstance.md @@ -356,7 +356,7 @@ AdministratorType : ActiveDirectory PrincipalType : Group Login : DummyLogin Sid : df7667b8-f9fd-4029-a0e3-b43c75ce9538 -TenantId : f553829b-6d84-481b-86a9-42db57c1dc73 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 AzureADOnlyAuthentication : True ``` diff --git a/src/Sql/Sql/help/New-AzSqlServer.md b/src/Sql/Sql/help/New-AzSqlServer.md index 3029b40454b1..08022a97db16 100644 --- a/src/Sql/Sql/help/New-AzSqlServer.md +++ b/src/Sql/Sql/help/New-AzSqlServer.md @@ -74,7 +74,7 @@ AdministratorType : ActiveDirectory PrincipalType : Group Login : DummyLogin Sid : df7667b8-f9fd-4029-a0e3-b43c75ce9538 -TenantId : f553829b-6d84-481b-86a9-42db57c1dc73 +TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 AzureADOnlyAuthentication : True ``` diff --git a/src/SqlVirtualMachine/SqlVirtualMachine/help/Assert-AzSqlVMEntraAuth.md b/src/SqlVirtualMachine/SqlVirtualMachine/help/Assert-AzSqlVMEntraAuth.md index 12fab2ffc845..d81db66d370e 100644 --- a/src/SqlVirtualMachine/SqlVirtualMachine/help/Assert-AzSqlVMEntraAuth.md +++ b/src/SqlVirtualMachine/SqlVirtualMachine/help/Assert-AzSqlVMEntraAuth.md @@ -44,7 +44,7 @@ Validates system assigned managed identity for enabling Entra authentication on ### Example 2: ```powershell -Assert-AzSqlVMEntraAuth -ResourceGroupName 'ResourceGroup01' -Name 'sqlvm1' -IdentityType 'UserAssigned' -ManagedIdentityClientId '11111111-2222-3333-4444-555555555555' +Assert-AzSqlVMEntraAuth -ResourceGroupName 'ResourceGroup01' -Name 'sqlvm1' -IdentityType 'UserAssigned' -ManagedIdentityClientId '00001111-aaaa-2222-bbbb-3333cccc4444' ``` ```output @@ -68,7 +68,7 @@ Validates system assigned managed identity for enabling Entra authentication on ### Example 4: ```powershell $sqlVM = Get-AzSqlVM -ResourceGroupName 'ResourceGroup01' -Name 'sqlvm1' -$sqlVM | Assert-AzSqlVMEntraAuth -ResourceGroupName 'ResourceGroup01' -Name 'sqlvm1' -IdentityType 'UserAssigned' -ManagedIdentityClientId '11111111-2222-3333-4444-555555555555' +$sqlVM | Assert-AzSqlVMEntraAuth -ResourceGroupName 'ResourceGroup01' -Name 'sqlvm1' -IdentityType 'UserAssigned' -ManagedIdentityClientId '00001111-aaaa-2222-bbbb-3333cccc4444' ``` ```output diff --git a/src/SqlVirtualMachine/SqlVirtualMachine/help/Update-AzSqlVM.md b/src/SqlVirtualMachine/SqlVirtualMachine/help/Update-AzSqlVM.md index 51e5cb46270f..d80385c29e89 100644 --- a/src/SqlVirtualMachine/SqlVirtualMachine/help/Update-AzSqlVM.md +++ b/src/SqlVirtualMachine/SqlVirtualMachine/help/Update-AzSqlVM.md @@ -225,7 +225,7 @@ Update a SQL virtual machine to enable Microsoft Entra authentication using "Sys ### Example 12 ```powershell -Update-AzSqlVM -ResourceGroupName 'ResourceGroup01' -Name 'sqlvm1' -IdentityType 'UserAssigned' -ManagedIdentityClientId '11111111-2222-3333-4444-555555555555' +Update-AzSqlVM -ResourceGroupName 'ResourceGroup01' -Name 'sqlvm1' -IdentityType 'UserAssigned' -ManagedIdentityClientId '00001111-aaaa-2222-bbbb-3333cccc4444' ``` ```output diff --git a/src/StackHCI/StackHCI/help/New-AzStackHciCluster.md b/src/StackHCI/StackHCI/help/New-AzStackHciCluster.md index f8bac8753eef..afe4bc9e9499 100644 --- a/src/StackHCI/StackHCI/help/New-AzStackHciCluster.md +++ b/src/StackHCI/StackHCI/help/New-AzStackHciCluster.md @@ -30,7 +30,7 @@ Create an HCI cluster. ### Example 1: ```powershell -New-AzStackHciCluster -Name "myCluster" -ResourceGroupName "test-rg" -AadTenantId "c76bd4d1-bea3-45ea-be1b-4a745a675d07" -AadClientId "24a6e53d-04e5-44d2-b7cc-1b732a847dfc" -Location "eastus" +New-AzStackHciCluster -Name "myCluster" -ResourceGroupName "test-rg" -AadTenantId "00001111-aaaa-2222-bbbb-3333cccc4444" -AadClientId "24a6e53d-04e5-44d2-b7cc-1b732a847dfc" -Location "eastus" ``` ```output @@ -43,7 +43,7 @@ This command creates a Stack HCI cluster ### Example 2: ```powershell -New-AzStackHciCluster -Name "myCluster2" -ResourceGroupName "test-rg" -AadTenantId "c76bd4d1-bea3-45ea-be1b-4a745a675d07" -AadClientId "24a6e53d-04e5-44d2-b7cc-1b732a847dfc" -Location "westeurope" -DesiredPropertyDiagnosticLevel "Off" -DesiredPropertyWindowsServerSubscription "Enabled" +New-AzStackHciCluster -Name "myCluster2" -ResourceGroupName "test-rg" -AadTenantId "00001111-aaaa-2222-bbbb-3333cccc4444" -AadClientId "24a6e53d-04e5-44d2-b7cc-1b732a847dfc" -Location "westeurope" -DesiredPropertyDiagnosticLevel "Off" -DesiredPropertyWindowsServerSubscription "Enabled" ``` ```output diff --git a/src/StackHCI/StackHCI/help/Register-AzStackHCI.md b/src/StackHCI/StackHCI/help/Register-AzStackHCI.md index dcad7ec8ee7b..7bd183e293d7 100644 --- a/src/StackHCI/StackHCI/help/Register-AzStackHCI.md +++ b/src/StackHCI/StackHCI/help/Register-AzStackHCI.md @@ -36,7 +36,7 @@ Register-AzStackHCI -SubscriptionId "12a0f531-56cb-4340-9501-257726d741fd" -Regi Result: Success ResourceId: /subscriptions/12a0f531-56cb-4340-9501-257726d741fd/resourceGroups/DemoHCICluster1-rg/providers/Microsoft.AzureStackHCI/clusters/DemoHCICluster1 PortalResourceURL: https://portal.azure.com/#@c31c0dbb-ce27-4c78-ad26-a5f717c14557/resource/subscriptions/12a0f531-56cb-4340-9501-257726d741fd/resourceGroups/DemoHCICluster1-rg/providers/Microsoft.AzureStackHCI/clusters/DemoHCICluster1/overview -PortalAADAppPermissionsURL: https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/ApplicationMenuBlade/CallAnAPI/appId/980be58d-578c-4cff-b4cd-43e9c3a77826/isMSAApp/ +PortalAADAppPermissionsURL: https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/ApplicationMenuBlade/CallAnAPI/appId/00001111-aaaa-2222-bbbb-3333cccc4444/isMSAApp/ ``` Invoking on one of the cluster node. @@ -50,7 +50,7 @@ Register-AzStackHCI -SubscriptionId "12a0f531-56cb-4340-9501-257726d741fd" -Comp Result: Success ResourceId: /subscriptions/12a0f531-56cb-4340-9501-257726d741fd/resourceGroups/DemoHCICluster2-rg/providers/Microsoft.AzureStackHCI/clusters/DemoHCICluster2 PortalResourceURL: https://portal.azure.com/#@c31c0dbb-ce27-4c78-ad26-a5f717c14557/resource/subscriptions/12a0f531-56cb-4340-9501-257726d741fd/resourceGroups/DemoHCICluster2-rg/providers/Microsoft.AzureStackHCI/clusters/DemoHCICluster2/overview -PortalAADAppPermissionsURL: https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/ApplicationMenuBlade/CallAnAPI/appId/950be58d-578c-4cff-b4cd-43e9c3a77866/isMSAApp/ +PortalAADAppPermissionsURL: https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/ApplicationMenuBlade/CallAnAPI/appId/00001111-aaaa-2222-bbbb-3333cccc4444/isMSAApp/ ``` Invoking from the management node. @@ -64,7 +64,7 @@ Register-AzStackHCI -SubscriptionId "12a0f531-56cb-4340-9501-257726d741fd" -ArmA Result: PendingForAdminConsent ResourceId: /subscriptions/12a0f531-56cb-4340-9501-257726d741fd/resourceGroups/DemoHCIRG/providers/Microsoft.AzureStackHCI/clusters/DemoHCICluster3 PortalResourceURL: https://portal.azure.com/#@c31c0dbb-ce27-4c78-ad26-a5f717c14557/resource/subscriptions/12a0f531-56cb-4340-9501-257726d741fd/resourceGroups/DemoHCIRG/providers/Microsoft.AzureStackHCI/clusters/DemoHCICluster3/overview -PortalAADAppPermissionsURL: https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/ApplicationMenuBlade/CallAnAPI/appId/980be58d-578c-4cff-b4cd-43e9c3a77866/isMSAApp/ +PortalAADAppPermissionsURL: https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/ApplicationMenuBlade/CallAnAPI/appId/00001111-aaaa-2222-bbbb-3333cccc4444/isMSAApp/ ``` Invoking from WAC. @@ -78,7 +78,7 @@ Register-AzStackHCI -SubscriptionId "12a0f531-56cb-4340-9501-257726d741fd" -Regi Result: Success ResourceId: /subscriptions/12a0f531-56cb-4340-9501-257726d741fd/resourceGroups/HciRG/providers/Microsoft.AzureStackHCI/clusters/HciCluster1 PortalResourceURL: https://portal.azure.com/#@c31c0dbb-ce27-4c78-ad26-a5f717c14557/resource/subscriptions/12a0f531-56cb-4340-9501-257726d741fd/resourceGroups/HciRG/providers/Microsoft.AzureStackHCI/clusters/HciCluster1/overview -PortalAADAppPermissionsURL: https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/ApplicationMenuBlade/CallAnAPI/appId/990be58d-578c-4cff-b4cd-43e9c3a77866/isMSAApp/ +PortalAADAppPermissionsURL: https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/ApplicationMenuBlade/CallAnAPI/appId/00001111-aaaa-2222-bbbb-3333cccc4444/isMSAApp/ ``` Invoking with all the parameters. diff --git a/src/StorageAction/StorageAction/help/New-AzStorageActionTask.md b/src/StorageAction/StorageAction/help/New-AzStorageActionTask.md index add441cdab0c..76061b9b237b 100644 --- a/src/StorageAction/StorageAction/help/New-AzStorageActionTask.md +++ b/src/StorageAction/StorageAction/help/New-AzStorageActionTask.md @@ -161,7 +161,7 @@ ElseOperation : {{ }} Enabled : True Id : /subscriptions/11111111-2222-3333-4444-123456789101/resourceGroups/group001/providers/Microsoft.StorageActions/storageTasks/mytask3 -IdentityPrincipalId : 11111111-2222-3333-4444-123456789123 +IdentityPrincipalId : 00001111-aaaa-2222-bbbb-3333cccc4444 IdentityTenantId : 11111111-2222-3333-4444-123456789101 IdentityType : SystemAssigned IdentityUserAssignedIdentity : { diff --git a/src/StorageAction/StorageAction/help/Update-AzStorageActionTask.md b/src/StorageAction/StorageAction/help/Update-AzStorageActionTask.md index 2e27dfead341..547cf203e340 100644 --- a/src/StorageAction/StorageAction/help/Update-AzStorageActionTask.md +++ b/src/StorageAction/StorageAction/help/Update-AzStorageActionTask.md @@ -103,8 +103,8 @@ ElseOperation : {{ }} Enabled : True Id : /subscriptions/11111111-2222-3333-4444-123456789101/resourceGroups/group001/providers/Microsoft.StorageActions/storageTasks/mytask3 -IdentityPrincipalId : 11111111-2222-3333-4444-123456789123 -IdentityTenantId : 11111111-2222-3333-4444-987654321012 +IdentityPrincipalId : 00001111-aaaa-2222-bbbb-3333cccc4444 +IdentityTenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 IdentityType : SystemAssigned IdentityUserAssignedIdentity : { } @@ -147,8 +147,8 @@ ElseOperation : Enabled : True Id : /subscriptions/11111111-2222-3333-4444-123456789101/resourceGroups/group001/providers/Microsoft.StorageActions/storageTasks/myta sk1 -IdentityPrincipalId : 66aefa04-060e-4eeb-9342-7228e31d1596 -IdentityTenantId : 72f988bf-86f1-41af-91ab-2d7cd011db47 +IdentityPrincipalId : 00001111-aaaa-2222-bbbb-3333cccc4444 +IdentityTenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 IdentityType : SystemAssigned IdentityUserAssignedIdentity : { } diff --git a/src/Synapse/Synapse/help/New-AzSynapseRoleAssignment.md b/src/Synapse/Synapse/help/New-AzSynapseRoleAssignment.md index dc3aae82c70c..f0eb292093f0 100644 --- a/src/Synapse/Synapse/help/New-AzSynapseRoleAssignment.md +++ b/src/Synapse/Synapse/help/New-AzSynapseRoleAssignment.md @@ -82,7 +82,7 @@ The cmdlet may call below Microsoft Graph API according to input parameters: >[!Note] > To create a role assignment for a service principal, pass the object ID of the principal in the ObjectId parameter. -> When you are a user with permission to manage Azure RBAC role assignment on the workspace but not a Synapse Administrator, please create Synapse Administrator role by **-RoleDefinitionId** and **-ObjectId** directly but not by **-RoleDefinitionName**, for Synapse Administrator, RoleDefinitionId is "6e4bf58a-b8e1-4cc3-bbf9-d73143322b78", please take below Example 5 as reference. The reason for this is , when you try to add a "Synapse Administrator" role, the cmdlet needs to get the role ID from the role name which requires workspace read permission, which the current user does not have. +> When you are a user with permission to manage Azure RBAC role assignment on the workspace but not a Synapse Administrator, please create Synapse Administrator role by **-RoleDefinitionId** and **-ObjectId** directly but not by **-RoleDefinitionName**, for Synapse Administrator, RoleDefinitionId is "00001111-aaaa-2222-bbbb-3333cccc4444", please take below Example 5 as reference. The reason for this is , when you try to add a "Synapse Administrator" role, the cmdlet needs to get the role ID from the role name which requires workspace read permission, which the current user does not have. ## EXAMPLES @@ -118,7 +118,7 @@ This command assigns ContosoRole to the user whose principal name is ContosoName ### Example 5 ```powershell $ws = Get-AzSynapseWorkspace -Name ContosoWorkspace -$ws | New-AzSynapseRoleAssignment -RoleDefinitionId "6e4bf58a-b8e1-4cc3-bbf9-d73143322b78" -ObjectId ContosoObjectId +$ws | New-AzSynapseRoleAssignment -RoleDefinitionId "00001111-aaaa-2222-bbbb-3333cccc4444" -ObjectId ContosoObjectId ``` This command assigns Synapse Administrator role to the user whose object Id is ContosoObjectId through pipeline. diff --git a/src/Synapse/Synapse/help/Update-AzSynapseManagedVirtualNetworkConfig.md b/src/Synapse/Synapse/help/Update-AzSynapseManagedVirtualNetworkConfig.md index 21f29a65b3c1..e94a5fd43737 100644 --- a/src/Synapse/Synapse/help/Update-AzSynapseManagedVirtualNetworkConfig.md +++ b/src/Synapse/Synapse/help/Update-AzSynapseManagedVirtualNetworkConfig.md @@ -26,7 +26,7 @@ The **Update-AzSynapseManagedVirtualNetworkConfig** cmdlet updates managed virtu ### Example 1 ```powershell $ws = Get-AzSynapseWorkspace -ResourceGroupName ContosoResourceGroup -WorkspaceName ContosoWorkspace -$ws = $ws | Update-AzSynapseManagedVirtualNetworkConfig -AllowedAadTenantIdsForLinking a96040c4-18dd-4dde-8181-f70daca04919 +$ws = $ws | Update-AzSynapseManagedVirtualNetworkConfig -AllowedAadTenantIdsForLinking 00001111-aaaa-2222-bbbb-3333cccc4444 $ws | Update-AzSynapseWorkspace ```