Skip to content

Commit

Permalink
Updated guids to approved versions (#25730)
Browse files Browse the repository at this point in the history
Co-authored-by: Mike F. Robbins <mikefrobbins@users.noreply.github.com>
  • Loading branch information
mikefrobbins and mikefrobbins authored Aug 8, 2024
1 parent 9b9d498 commit 4681328
Show file tree
Hide file tree
Showing 83 changed files with 254 additions and 254 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -44,7 +44,7 @@ $resourceGroupName="contosogroup2";
$apiManagementName="contosoapi";
$containerName="apimbackupcontainer";
$backupName="test-sdk-backup-1";
$msiClientId="a6270d0c-7d86-478b-8cbe-dc9047ba54f7"
$msiClientId="00001111-aaaa-2222-bbbb-3333cccc4444"
Backup-AzApiManagement -ResourceGroupName $resourceGroupName -Name $apiManagementName -StorageContext $storageContext -TargetContainerName $containerName -TargetBlobName $backupName -AccessType "UserAssignedManagedIdentity" -IdentityClientId $msiClientId -PassThru
```

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -71,7 +71,7 @@ Get-AzApiManagementIdentityProvider -Context $context -Type AadB2C

```output
Type : AadB2C
ClientId : f02dafe2-b8b8-48ec-a38e-27e5c16c51e5
ClientId : 00001111-aaaa-2222-bbbb-3333cccc4444
ClientSecret : xxxxxx
AllowedTenants : {contosoaadb2c.onmicrosoft.com}
Authority : login.microsoftonline.com
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -37,12 +37,12 @@ This takes as input the ClientId and ClientSecret of the Facebook app.
### Example 2: Configures adB2C as an identity Provider for Developer Portal Logins
```powershell
$apimContext = New-AzApiManagementContext -ResourceGroupName "Api-Default-WestUS" -ServiceName "contoso"
New-AzApiManagementIdentityProvider -Context $context -Type AadB2C -ClientId 6b1fc750-9e68-450c-97d2-ba6acd0fbc20 -ClientSecret "foobar" -AllowedTenants 'samirtestbc.onmicrosoft.com' -SignupPolicyName B2C_1_signup-policy
New-AzApiManagementIdentityProvider -Context $context -Type AadB2C -ClientId 00001111-aaaa-2222-bbbb-3333cccc4444 -ClientSecret "foobar" -AllowedTenants 'samirtestbc.onmicrosoft.com' -SignupPolicyName B2C_1_signup-policy
```

```output
Type : AadB2C
ClientId : 6b1fc750-9e68-450c-97d2-ba6acd0fbc20
ClientId : 00001111-aaaa-2222-bbbb-3333cccc4444
ClientSecret : foobar
AllowedTenants : {samirtestbc.onmicrosoft.com}
Authority : login.microsoftonline.com
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -44,7 +44,7 @@ $resourceGroupName="ContosoGroup02";
$apiManagementName="contosoapi";
$containerName="apimbackupcontainer";
$backupName="test-sdk-backup-1";
$msiClientId="a6270d0c-7d86-478b-8cbe-dc9047ba54f7"
$msiClientId="00001111-aaaa-2222-bbbb-3333cccc4444"
Restore-AzApiManagement -ResourceGroupName $resourceGroupName -Name $apiManagementName -StorageContext $storageContext -SourceContainerName $containerName -SourceBlobName $backupName -AccessType "UserAssignedManagedIdentity" -IdentityClientId $msiClientId -PassThru
```

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -45,7 +45,7 @@ Get Api Keys for an application insights resource

### Example 2: Get specific API key for an application insights resource
```powershell
Get-AzApplicationInsightsApiKey -ResourceGroupName "testGroup" -Name "test" -ApiKeyId 7c4c61dc-b392-4aa4-992f-ee92b84e5dee
Get-AzApplicationInsightsApiKey -ResourceGroupName "testGroup" -Name "test" -ApiKeyId 00001111-aaaa-2222-bbbb-3333cccc4444
```

Get specific API key for an application insights resource
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -32,7 +32,7 @@ Delete an API Key of an Application Insights component.

### Example 1: Remove an application insights api key for an application insights resource
```powershell
Remove-AzApplicationInsightsApiKey -ResourceGroupName "testGroup" -Name "test" -ApiKeyId dd173f38-4fd1-4c75-8af5-99c29aa0f867
Remove-AzApplicationInsightsApiKey -ResourceGroupName "testGroup" -Name "test" -ApiKeyId 00001111-aaaa-2222-bbbb-3333cccc4444
```

Remove an application insights api key for an application insights resource
Expand Down
4 changes: 2 additions & 2 deletions src/Automation/Automation/help/New-AzAutomationConnection.md
Original file line number Diff line number Diff line change
Expand Up @@ -37,8 +37,8 @@ The command uses the connection field values in $FieldValues.
### Example 2: Create a connection for ConnectionTypeName=AzureServicePrincipal
```powershell
$Thumbprint = "0SZTNJ34TCCMUJ5MJZGR8XQD3S0RVHJBA33Z8ZXV"
$TenantId = "4cd76576-b611-43d0-8f2b-adcb139531bf"
$ApplicationId = "3794a65a-e4e4-493d-ac1d-f04308d712dd"
$TenantId = "00001111-aaaa-2222-bbbb-3333cccc4444"
$ApplicationId = "00001111-aaaa-2222-bbbb-3333cccc4444"
$SubscriptionId = "81b59010-dc55-45b7-89cd-5ca26db62472"
$RunAsAccountConnectionFieldValues = @{"ApplicationId" = $ApplicationId; "TenantId" = $TenantId; "CertificateThumbprint" = $Thumbprint; "SubscriptionId" = $SubscriptionId}
New-AzAutomationConnection -Name "Connection13" -ConnectionTypeName AzureServicePrincipal -ConnectionFieldValues $RunAsAccountConnectionFieldValues -ResourceGroupName "ResourceGroup01" -AutomationAccountName "AutomationAccount01"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -37,7 +37,7 @@ Invoke-AzBillingBenefitsElevateSavingPlanOrder -SavingsPlanOrderId "e0b1f446-568
```output
Name PrincipalId RoleDefinitionId Scope
---- ----------- ---------------- -----
5c545baf-2ef5-4016-9c31-6e0e23c397a0 067e7443-3a55-40b6-a2d8-0a7a12a9da2d /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635 /providers/Microsoft.BillingBenefits/savingsplanorders/e45905d2-9207-4f24-8549-f615c203b49b
00001111-aaaa-2222-bbbb-3333cccc4444 067e7443-3a55-40b6-a2d8-0a7a12a9da2d /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635 /providers/Microsoft.BillingBenefits/savingsplanorders/e45905d2-9207-4f24-8549-f615c203b49b
```

Elevate savings plan order
Expand All @@ -54,7 +54,7 @@ $response = Invoke-AzBillingBenefitsElevateSavingPlanOrder -InputObject $identit
```output
Name PrincipalId RoleDefinitionId Scope
---- ----------- ---------------- -----
5c545baf-2ef5-4016-9c31-6e0e23c397a0 067e7443-3a55-40b6-a2d8-0a7a12a9da2d /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635 /providers/Microsoft.BillingBenefits/savingsplanorders/e45905d2-9207-4f24-8549-f615c203b49b
00001111-aaaa-2222-bbbb-3333cccc4444 067e7443-3a55-40b6-a2d8-0a7a12a9da2d /providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635 /providers/Microsoft.BillingBenefits/savingsplanorders/e45905d2-9207-4f24-8549-f615c203b49b
```

Elevate savings plan order
Expand Down
4 changes: 2 additions & 2 deletions src/BotService/BotService/help/New-AzBotService.md
Original file line number Diff line number Diff line change
Expand Up @@ -35,7 +35,7 @@ Returns a BotService specified by the parameters.

### Example 1: Create a new bot
```powershell
New-AzBotService -resourcegroupname BotTest-rg -name BotTest1 -ApplicationId "af5fce4d-ee68-4b25-be09-f3222582e133" -Location global -Sku F0 -Description "123134" -Registration
New-AzBotService -resourcegroupname BotTest-rg -name BotTest1 -ApplicationId "00001111-aaaa-2222-bbbb-3333cccc4444" -Location global -Sku F0 -Description "123134" -Registration
```

```output
Expand All @@ -48,7 +48,7 @@ Create a new Bot by ResourceGroupName and ApplicationId

### Example 2: Create a new Web App
```powershell
New-AzBotService -resourcegroupname BotTest-rg -name BotTest2 -ApplicationId "b1ab1727-0465-4255-a1bb-976210af972c" -Location global -Sku F0 -Description "123134" -Webapp
New-AzBotService -resourcegroupname BotTest-rg -name BotTest2 -ApplicationId "00001111-aaaa-2222-bbbb-3333cccc4444" -Location global -Sku F0 -Description "123134" -Webapp
```

```output
Expand Down
8 changes: 4 additions & 4 deletions src/Chaos/Chaos/help/New-AzChaosExperiment.md
Original file line number Diff line number Diff line change
Expand Up @@ -38,8 +38,8 @@ New-AzChaosExperiment -Name experiment-test -ResourceGroupName azps_test_group_c

```output
Id : /subscriptions/{subId}/resourceGroups/azps_test_group_chaos/providers/Microsoft.Chaos/experiments/EXPERIMENT-TEST
IdentityPrincipalId : 72f14040-8265-4f10-b5ea-377c6fc2671c
IdentityTenantId : 72f988bf-86f1-41af-91ab-2d7cd011db47
IdentityPrincipalId : 00001111-aaaa-2222-bbbb-3333cccc4444
IdentityTenantId : 00001111-aaaa-2222-bbbb-3333cccc4444
IdentityType : SystemAssigned
IdentityUserAssignedIdentity : {
}
Expand Down Expand Up @@ -146,8 +146,8 @@ New-AzChaosExperiment -Name experiment-test -ResourceGroupName azps_test_group_c

```output
Id : /subscriptions/{subId}/resourceGroups/azps_test_group_chaos/providers/Microsoft.Chaos/experiments/EXPERIMENT-TEST
IdentityPrincipalId : 72f14040-8265-4f10-b5ea-377c6fc2671c
IdentityTenantId : 72f988bf-86f1-41af-91ab-2d7cd011db47
IdentityPrincipalId : 00001111-aaaa-2222-bbbb-3333cccc4444
IdentityTenantId : 00001111-aaaa-2222-bbbb-3333cccc4444
IdentityType : SystemAssigned
IdentityUserAssignedIdentity : {
}
Expand Down
4 changes: 2 additions & 2 deletions src/Chaos/Chaos/help/Update-AzChaosExperiment.md
Original file line number Diff line number Diff line change
Expand Up @@ -40,8 +40,8 @@ Update-AzChaosExperiment -Name experiment-test -ResourceGroupName azps_test_grou

```output
Id : /subscriptions/{subId}/resourceGroups/azps_test_group_chaos/providers/Microsoft.Chaos/experiments/EXPERIMENT-TEST
IdentityPrincipalId : 72f14040-8265-4f10-b5ea-377c6fc2671c
IdentityTenantId : 72f988bf-86f1-41af-91ab-2d7cd011db47
IdentityPrincipalId : 00001111-aaaa-2222-bbbb-3333cccc4444
IdentityTenantId : 00001111-aaaa-2222-bbbb-3333cccc4444
IdentityType : SystemAssigned
IdentityUserAssignedIdentity : {
}
Expand Down
2 changes: 1 addition & 1 deletion src/Compute/Compute/help/Set-AzVMOSDisk.md
Original file line number Diff line number Diff line change
Expand Up @@ -141,7 +141,7 @@ $cred = New-Object System.Management.Automation.PSCredential ($user, $securePass
# Create Key Vault
New-AzKeyVault -Name $keyVaultName -Location $Location -ResourceGroupName $ResourceGroupName -Sku Premium -EnablePurgeProtection -EnabledForDiskEncryption;
$cvmAgent = Get-AzADServicePrincipal -ApplicationId 'bf7b6499-ff71-4aa2-97a4-f372087be7f0';
$cvmAgent = Get-AzADServicePrincipal -ApplicationId '00001111-aaaa-2222-bbbb-3333cccc4444';
Set-AzKeyVaultAccessPolicy -VaultName $keyVaultName -ResourceGroupName $ResourceGroupName -ObjectId $cvmAgent.id -PermissionsToKeys get,release;
# Add Key vault Key
Expand Down
2 changes: 1 addition & 1 deletion src/Compute/Compute/help/Set-AzVmssSecurityProfile.md
Original file line number Diff line number Diff line change
Expand Up @@ -262,7 +262,7 @@ The second command sets the SecurityType enum to "TrustedLaunch".
$keyVaultName = "kv" + $rgname;
$keyName = "k" + $rgname;
$desName = "des" + $rgname;
$cvmAgent = Get-AzADServicePrincipal -ApplicationId "bf7b6499-ff71-4aa2-97a4-f372087be7f0";
$cvmAgent = Get-AzADServicePrincipal -ApplicationId "00001111-aaaa-2222-bbbb-3333cccc4444";
$kv = New-AzKeyVault -Name $keyVaultName -ResourceGroupName $rgName -Location $loc -Sku "Premium" -EnablePurgeProtection -SoftDeleteRetentionInDays 7;
Set-AzKeyVaultAccessPolicy -ObjectId $cvmAgent.Id -VaultName $keyVaultName -ResourceGroupName $rgName -PermissionsToKeys "get","release";
Start-BitsTransfer -Source https://cvmprivatepreviewsa.blob.core.windows.net/cvmpublicpreviewcontainer/skr-policy.json -Destination ".\skr-policy.json";
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -34,8 +34,8 @@ New-AzConfidentialLedger `
-AadBasedSecurityPrincipal `
@{
LedgerRoleName="Administrator";
PrincipalId="34621747-6fc8-4771-a2eb-72f31c461f2e";
TenantId="bce123b9-2b7b-4975-8360-5ca0b9b1cd08"
PrincipalId="00001111-aaaa-2222-bbbb-3333cccc4444";
TenantId="00001111-aaaa-2222-bbbb-3333cccc4444"
} `
-CertBasedSecurityPrincipal `
@{
Expand All @@ -58,8 +58,8 @@ Creates a new Confidential Ledger.
```powershell
$aadSecurityPrincipal = New-AzConfidentialLedgerAADBasedSecurityPrincipalObject `
-LedgerRoleName "Administrator" `
-PrincipalId "34621747-6fc8-4771-a2eb-72f31c461f2e" `
-TenantId "bce123b9-2b7b-4975-8360-5ca0b9b1cd08"
-PrincipalId "00001111-aaaa-2222-bbbb-3333cccc4444" `
-TenantId "00001111-aaaa-2222-bbbb-3333cccc4444"
$certSecurityPrincipal = New-AzConfidentialLedgerCertBasedSecurityPrincipalObject `
-Cert "-----BEGIN CERTIFICATE-----********************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************-----END CERTIFICATE-----" `
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -26,14 +26,14 @@ Create an in-memory object for AADBasedSecurityPrincipal.
```powershell
New-AzConfidentialLedgerAADBasedSecurityPrincipalObject `
-LedgerRoleName "Administrator" `
-PrincipalId "34621747-6fc8-4771-a2eb-72f31c461f2e" `
-TenantId "bce123b9-2b7b-4975-8360-5ca0b9b1cd08"
-PrincipalId "00001111-aaaa-2222-bbbb-3333cccc4444" `
-TenantId "00001111-aaaa-2222-bbbb-3333cccc4444"
```

```output
LedgerRoleName PrincipalId TenantId
-------------- ----------- --------
Administrator 34621747-6fc8-4771-a2eb-72f31c461f2e bce123b9-2b7b-4975-8360-5ca0b9b1cd08
Administrator 00001111-aaaa-2222-bbbb-3333cccc4444 00001111-aaaa-2222-bbbb-3333cccc4444
```

Creates an AadBasedSecurityPrincipalObject that may be used for `Az.ConfidentialLedger` commands.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -44,8 +44,8 @@ Update-AzConfidentialLedger `
-AadBasedSecurityPrincipal `
@{
LedgerRoleName="Administrator";
PrincipalId="34621747-6fc8-4771-a2eb-72f31c461f2e";
TenantId="bce123b9-2b7b-4975-8360-5ca0b9b1cd08"
PrincipalId="00001111-aaaa-2222-bbbb-3333cccc4444";
TenantId="00001111-aaaa-2222-bbbb-3333cccc4444"
} `
-CertBasedSecurityPrincipal `
@{
Expand Down
Loading

0 comments on commit 4681328

Please sign in to comment.