Skip to content

Commit 18cbc0c

Browse files
status
1 parent aacc0ad commit 18cbc0c

9 files changed

Lines changed: 16 additions & 16 deletions

File tree

support/azure/azure-monitor/log-analytics/windows-agents/ssl-connectivity-mma-windows-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -203,7 +203,7 @@ Issuer : CN=Microsoft RSA TLS CA 01, O=Microsoft Corporation, C=US
203203
FriendlyName :
204204
NotBefore : 9/26/2021 2:30:43 PM
205205
NotAfter : 9/26/2022 2:30:43 PM
206-
Thumbprint : F84E9C8A41CF8C7E62A594F1E95961107C33A30D
206+
Thumbprint : AA11BB22CC33DD44EE55FF66AA77BB88CC99DD00
207207

208208
Subject Alternative Name
209209
DNS Name=ODS-SSL201712EUS.azure.com

support/azure/azure-storage/files/file-sync/file-sync-troubleshoot-sync-errors.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,7 @@ Look at the most recent 9302 event in the telemetry log on the server (in the Ev
103103
```output
104104
Replica Sync Progress.
105105
ServerEndpointName: <CI>sename</CI>, SyncGroupName: <CI>sgname</CI>, ReplicaName: <CI>rname</CI>,
106-
SyncDirection: Upload, CorrelationId: {AB4BA07D-5B5C-461D-AAE6-4ED724762B65}.
106+
SyncDirection: Upload, CorrelationId: {aaaa0000-bb11-2222-33cc-444444dddddd}.
107107
AppliedItemCount: 172473, TotalItemCount: 624196. AppliedBytes: 51473711577,
108108
TotalBytes: 293363829906.
109109
AreTotalCountsFinal: true.

support/azure/cloud-services/extended/availability/update-or-change-certificate-used.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ To make your certificate update or change go into effect, use the instructions f
3535
<Certificates>
3636
<Certificate
3737
name="Certificate1"
38-
thumbprint="0123456789ABCDEF0123456789ABCDEF01234567"
38+
thumbprint="AA11BB22CC33DD44EE55FF66AA77BB88CC99DD00"
3939
thumbprintAlgorithm="sha1"
4040
/>
4141
</Certificates>
@@ -58,7 +58,7 @@ To make your certificate update or change go into effect, use the instructions f
5858
<Certificates>
5959
<Certificate
6060
name="Certificate1"
61-
thumbprint="0123456789ABCDEF0123456789ABCDEF01234567"
61+
thumbprint="AA11BB22CC33DD44EE55FF66AA77BB88CC99DD00"
6262
thumbprintAlgorithm="sha1"
6363
/>
6464
</Certificates>
@@ -128,7 +128,7 @@ To make your certificate update or change go into effect, use the instructions f
128128
<Certificates>
129129
<Certificate
130130
name="Certificate1"
131-
thumbprint="0123456789ABCDEF0123456789ABCDEF01234567"
131+
thumbprint="AA11BB22CC33DD44EE55FF66AA77BB88CC99DD00"
132132
thumbprintAlgorithm="sha1"
133133
/>
134134
</Certificates>

support/azure/cloud-services/extended/deploy/enable-https-communication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ To make the code changes to prepare your certificate and configure your project,
6767
<Certificates>
6868
<Certificate
6969
name="Certificate1"
70-
thumbprint="0123456789ABCDEF0123456789ABCDEF01234567"
70+
thumbprint="AA11BB22CC33DD44EE55FF66AA77BB88CC99DD00"
7171
thumbprintAlgorithm="sha1"
7272
/>
7373
</Certificates>

support/azure/data-api-builder/usage.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -199,15 +199,15 @@ Here's a sample configuration:
199199
"provider": "AzureAD",
200200
"jwt": {
201201
"issuer": "https://login.microsoftonline.com/24c24d79-9790-4a32-bbb4-a5a5c3ffedd5/v2.0/",
202-
"audience": "b455fa3c-15fa-4864-8bcd-88fd83d686f3"
202+
"audience": "00001111-aaaa-2222-bbbb-3333cccc4444"
203203
}
204204
}
205205
```
206206

207207
You must generate a valid token for the defined audience. When using the Azure CLI, you can get an access token by specifying the audience in the `resource` parameter:
208208

209209
```azurecli
210-
az account get-access-token --resource "b455fa3c-15fa-4864-8bcd-88fd83d686f3"
210+
az account get-access-token --resource "00001111-aaaa-2222-bbbb-3333cccc4444"
211211
```
212212

213213
### HTTP 403 "Forbidden" error

support/azure/devops/azure-rm-service-connection-not-listed-for-a-task.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,13 +34,13 @@ The **Azure PowerShell task** screen shows that the Azure RM Service connection
3434
You receive the following error message:
3535

3636
```output
37-
Failed to obtain the Json Web Token(JWT) using service principal client ID. Exception message: AADSTS700016: **Application with identifier 'xxxxxxf9-xxxx-xxxx-xxxx-c05xxxxxxxxx' was not found in the directory 'Microsoft'. This can happen if the application has not been installed by the administrator of the tenant or consented to by any user in the tenant**. You may have sent your authentication request to the wrong tenant. Trace ID: xxxxxx2c-xxxx-xxxx-xxxx-e04xxxxxxxxx Correlation ID: xxxxxx72-xxxx-xxxx-xxxx-244xxxxxxxxxx Timestamp: 2022-05-19 09:08:53Z
37+
Failed to obtain the Json Web Token(JWT) using service principal client ID. Exception message: AADSTS700016: **Application with identifier '00001111-aaaa-2222-bbbb-3333cccc4444' was not found in the directory 'Microsoft'. This can happen if the application has not been installed by the administrator of the tenant or consented to by any user in the tenant**. You may have sent your authentication request to the wrong tenant. Trace ID: 0000aaaa-11bb-cccc-dd22-eeeeee333333 Correlation ID: xxxxxx72-xxxx-xxxx-xxxx-244xxxxxxxxxx Timestamp: 2022-05-19 09:08:53Z
3838
```
3939
4040
You will see the following response for the POST call in the trace:
4141
4242
```output
43-
{"result":[],"statusCode":400,"errorMessage":"Failed to obtain the Json Web Token(JWT) using service principal client ID. Exception message: AADSTS700016: **Application with identifier 'xxxxxxf9-xxxx-xxxx-xxxx-c05xxxxxxxxx' was not found in the directory 'Microsoft'. This can happen if the application has not been installed by the administrator of the tenant or consented to by any user in the tenant**. You may have sent your authentication request to the wrong tenant.\r\nTrace ID: xxxxxx31-xxxx-xxxx-xxxx-32bxxxxxxxxx\r\nCorrelation ID: xxxxxx49-xxxx-xxxx-xxxx-725xxxxxxxxx\r\nTimestamp: 2022-05-19 09:11:35Z"}
43+
{"result":[],"statusCode":400,"errorMessage":"Failed to obtain the Json Web Token(JWT) using service principal client ID. Exception message: AADSTS700016: **Application with identifier '00001111-aaaa-2222-bbbb-3333cccc4444' was not found in the directory 'Microsoft'. This can happen if the application has not been installed by the administrator of the tenant or consented to by any user in the tenant**. You may have sent your authentication request to the wrong tenant.\r\nTrace ID: 22223333-cccc-4444-dddd-5555eeee6666\r\nCorrelation ID: 33334444-dddd-5555-eeee-6666ffff7777\r\nTimestamp: 2022-05-19 09:11:35Z"}
4444
```
4545
4646
For more information, see [Get the API response of GET endpoints](/rest/api/azure/devops/serviceendpoint/endpoints/get?view=azure-devops-rest-6.0&tabs=HTTP&preserve-view=true).

support/azure/devops/create-azure-rm-service-principal-manual.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ To get this information, download and run this [PowerShell script](https://githu
4646
After you provide the details to create a manual Azure RM service connection, select the **Verify** button, verification fails. You may receive the following error message:
4747

4848
```output
49-
Failed to query service connection API: ''https://management.azure.com/subscriptions/xxxxxx08-xxxx-xxxx-xxxx-eadxxxxxxxxx?api-version=2016-06-01 '. Status Code: 'Forbidden', Response from server: '{"error":{"code":"AuthorizationFailed","message":"The client 'xxxxxxaf-xxxx-xxxx-xxxx-6bexxxxxxxxx' with object id 'xxxxxxaf-xxxx-xxxx-xxxx-6bexxxxxxxxx' does not have authorization to perform action 'Microsoft.Resources/subscriptions/read' over scope '/subscriptions/xxxxxx08-xxxx-48ec-xxxx-eadxxxxxxxxx' or the scope is invalid. If access was recently granted, please refresh your credentials."}}'
49+
Failed to query service connection API: ''https://management.azure.com/subscriptions/xxxxxx08-xxxx-xxxx-xxxx-eadxxxxxxxxx?api-version=2016-06-01 '. Status Code: 'Forbidden', Response from server: '{"error":{"code":"AuthorizationFailed","message":"The client 'bbbbcccc-1111-dddd-2222-eeee3333ffff' with object id 'aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb' does not have authorization to perform action 'Microsoft.Resources/subscriptions/read' over scope '/subscriptions/bbbbbbbb-1111-2222-3333-cccccccccccc' or the scope is invalid. If access was recently granted, please refresh your credentials."}}'
5050
```
5151

5252
:::image type="content" source="media/failed-to-get-azure-devops-service-access-token/new-service-connection-errormessage.png" alt-text="Screenshot that shows the creation of new service connection.":::
@@ -58,7 +58,7 @@ Capture [F12/Fiddler trace](overview-of-azure-resource-manager-service-connectio
5858
You will see the following response for the POST call in the trace:
5959

6060
```output
61-
{"result":[],"statusCode":403,"errorMessage":"Failed to query service connection API: 'https://management.azure.com/subscriptions/xxxxxx08-xxxx-xxxx-xxxx-eadxxxxxxxxx?api-version=2016-06-01 '. Status Code: 'Forbidden', Response from server: '{"error":{"code":"AuthorizationFailed","message":"The client 'xxxxxxaf-xxxx-xxxx-xxxx-6bexxxxxxxxx' with object id 'xxxxxxaf-xxxx-xxxx-xxxx-6bexxxxxxxxx' does not have authorization to perform action 'Microsoft.Resources/subscriptions/read' over scope '/subscriptions/xxxxxx08-xxxx-xxxx-xxxx-eadxxxxxxxxx' or the scope is invalid. If access was recently granted, please refresh your credentials."}}'"}
61+
{"result":[],"statusCode":403,"errorMessage":"Failed to query service connection API: 'https://management.azure.com/subscriptions/xxxxxx08-xxxx-xxxx-xxxx-eadxxxxxxxxx?api-version=2016-06-01 '. Status Code: 'Forbidden', Response from server: '{"error":{"code":"AuthorizationFailed","message":"The client 'bbbbcccc-1111-dddd-2222-eeee3333ffff' with object id 'aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb' does not have authorization to perform action 'Microsoft.Resources/subscriptions/read' over scope '/subscriptions/aaaabbbb-0000-cccc-1111-dddd2222eeee' or the scope is invalid. If access was recently granted, please refresh your credentials."}}'"}
6262
```
6363

6464
### Resolution

support/azure/devops/troubleshoot-subscription-related-scenarios.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -53,16 +53,16 @@ To resolve this issue, follow these steps:
5353
When you create a service connection and try to save it by selecting the **Save** button, you might receive the following error message:
5454

5555
```output
56-
Failed to set Azure permission 'RoleAssignmentId: xxxxxx26-xxxx-xxxx-xxxx-8f0xxxxxxx' for the service principal 'xxxxxx06-xxxx-xxxx-xxxx-6fbxxxxxxxxx' on subscription ID 'xxxxxxb6-xxxx-xxxx-xxxx-23xxxxxxxxx': error code: Forbidden, inner error code: AuthorizationFailed, inner error message The client '[email protected]' with object id 'xxxxxx74-xxxx-xxxx-xxxx-477xxxxxxxxx' does not have authorization to perform action 'Microsoft.Authorization/roleAssignments/write' over scope '/subscriptions/xxxxxxb6-xxxx-xxxx-xxxx-234xxxxxxxxx' or the scope is invalid. If access was recently granted, please refresh your credentials. Ensure that the user has 'Owner' or 'User Access Administrator' permissions on the Subscription.
56+
Failed to set Azure permission 'RoleAssignmentId: xxxxxx26-xxxx-xxxx-xxxx-8f0xxxxxxx' for the service principal 'dddd3d3d-ee4e-ff5f-aa6a-bbbbbb7b7b7b' on subscription ID 'xxxxxxb6-xxxx-xxxx-xxxx-23xxxxxxxxx': error code: Forbidden, inner error code: AuthorizationFailed, inner error message The client '[email protected]' with object id 'aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb' does not have authorization to perform action 'Microsoft.Authorization/roleAssignments/write' over scope '/subscriptions/bbbbbbbb-1111-2222-3333-cccccccccccc' or the scope is invalid. If access was recently granted, please refresh your credentials. Ensure that the user has 'Owner' or 'User Access Administrator' permissions on the Subscription.
5757
```
5858

5959
### Debugging steps
6060

6161
1. Capture an F12 or Fiddler trace.
62-
1. In a GET call (similar to `https://devopsdevil.visualstudio.com/xxxxfa-xxxx-xxxx-xxxx-76dxxxxxxxxx/_apis/serviceendpoint/endpoints/xxxxxxxbb-xxxx-xxxx-xxxx-df4xxxxxxxxx`), the following response is returned:
62+
1. In a GET call (similar to `https://devopsdevil.visualstudio.com/xxxxfa-xxxx-xxxx-xxxx-76dxxxxxxxxx/_apis/serviceendpoint/endpoints/xa0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1`), the following response is returned:
6363

6464
```output
65-
{"data":{"environment":"AzureCloud","scopeLevel":"Subscription","subscriptionId":"xxxxxxb6-xxxx-xxxx-xxxx-234xxxxxxxxx","subscriptionName":"SIxxxxA","resourceGroupName":"","mlWorkspaceName":"","mlWorkspaceLocation":"","managementGroupId":"","managementGroupName":"","oboAuthorization":"","creationMode":"Automatic","azureSpnRoleAssignmentId":"","azureSpnPermissions":"[{"roleAssignmentId":"xxxxxx26-xxxx-xxxx-xxxx-8f0xxxxxxxxx","resourceProvider":"Microsoft.RoleAssignment","provisioned":false}]","spnObjectId":"xxxxxx06-xxxx-xxxx-xxxx-6fbxxxxxxxxx","appObjectId":"xxxxxx01-xxxx-xxxx-xxxx-36axxxxxxxxx","resourceId":""},"id":"xxxxxxbb-xxxx-xxxx-xxxx-df4xxxxxxxxx","name":"Sixxxxda-subscription","type":"azurerm","url":https://management.azure.com/,"createdBy":{"displayName":<name>,"url":https://spsprodwus21.vssps.visualstudio.com/xxxxxx52-xxxx-xxxx-xxxx-b65xxxxxxxxx/_apis/Identities/xxxxxx71-xxxx-xxxx-xxxx-6b2xxxxxxxxx,"_links":{"avatar":{"href":https://devopsdevil.visualstudio.com/_apis/GraphProfile/MemberAvatars/aad.N2RmZxxxxxxxNi03MWUzLWJlNzItZWYzMTA5YzRjZTA3} },"id":"xxxxxx71-xxxx-xxxx-xxxxx-6b2xxxxxxxxx","uniqueName":[email protected],"imageUrl":https://devopsdevil.visualstudio.com/_apis/GraphProfile/MemberAvatars/aad.N2RmZWEyNDctxxxxxi03MWUzLWJxxxxxxxxxMTA5YzRjZTA3,"descriptor":"aad.N2RmxxxxxxxxxxxxMWUzLWJlNzItZWYzMTA5YzRjZTA3" },"description":"","authorization":{"parameters":{"tenantid":"xxxxxxxbf-xxxx-xxxx-xxxx-2d7xxxxxxxxx","serviceprincipalid":"xxxxxx5d-xxxx-xxxx-xxxx-dfaxxxxxxxxx","authenticationType":"spnKey","serviceprincipalkey":null},"scheme":"ServicePrincipal"},"isShared":false,"isReady":false,"operationStatus":{"state":"Failed","statusMessage":" Failed to set Azure permission 'RoleAssignmentId: xxxxxx26-xxxx-xxxx-xxxx-8f0fxxxxxxxxx' for the service principal 'xxxxxx06-xxxx-xxxx-xxxx-6fbxxxxxxxxxx' on subscription ID 'xxxxxxxb6-xxxx-xxxx-xxxx-234xxxxxxxxx': error code: Forbidden, inner error code: AuthorizationFailed, inner error message The client '[email protected]' with object id 'xxxxxx74-xxxx-xxxx-xxxx-477xxxxxxxxx' does not have authorization to perform action 'Microsoft.Authorization/roleAssignments/write' over scope '/subscriptions/xxxxxxxb6-xxxx-xxxx-xxxx-234xxxxxxxxx' or the scope is invalid. If access was recently granted, please refresh your credentials. Ensure that the user has 'Owner' or 'User Access Administrator' permissions on the Subscription."},"owner":"Library","serviceEndpointProjectReferences":[{"projectReference":{"id":"xxxxxxfa-xxxx-xxxx-xxxx-76dxxxxxxxxx","name":"IIS"},"name":"Sxxxxxxxda-subscription","description":""}]}
65+
{"data":{"environment":"AzureCloud","scopeLevel":"Subscription","subscriptionId":"aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb","subscriptionName":"SIxxxxA","resourceGroupName":"","mlWorkspaceName":"","mlWorkspaceLocation":"","managementGroupId":"","managementGroupName":"","oboAuthorization":"","creationMode":"Automatic","azureSpnRoleAssignmentId":"","azureSpnPermissions":"[{"roleAssignmentId":"cccc2c2c-dd3d-ee4e-ff5f-aaaaaa6a6a6a","resourceProvider":"Microsoft.RoleAssignment","provisioned":false}]","spnObjectId":"dddd3d3d-ee4e-ff5f-aa6a-bbbbbb7b7b7b","appObjectId":"eeee4efe-ff5f-aa6a-bb7b-cccccc8c8c8c","resourceId":""},"id":"a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1","name":"Sixxxxda-subscription","type":"azurerm","url":https://management.azure.com/,"createdBy":{"displayName":<name>,"url":https://spsprodwus21.vssps.visualstudio.com/b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2/_apis/Identities/c2c2c2c2-dddd-eeee-ffff-a3a3a3a3a3a3,"_links":{"avatar":{"href":https://devopsdevil.visualstudio.com/_apis/GraphProfile/MemberAvatars/aad.N2RmZxxxxxxxNi03MWUzLWJlNzItZWYzMTA5YzRjZTA3} },"id":"xxxxxx71-xxxx-xxxx-xxxxx-6b2xxxxxxxxx","uniqueName":[email protected],"imageUrl":https://devopsdevil.visualstudio.com/_apis/GraphProfile/MemberAvatars/aad.N2RmZWEyNDctxxxxxi03MWUzLWJxxxxxxxxxMTA5YzRjZTA3,"descriptor":"aad.N2RmxxxxxxxxxxxxMWUzLWJlNzItZWYzMTA5YzRjZTA3" },"description":"","authorization":{"parameters":{"tenantid":"xxxxxxxbf-xxxx-xxxx-xxxx-2d7xxxxxxxxx","serviceprincipalid":"aaaaaaaa-bbbb-cccc-1111-222222222222","authenticationType":"spnKey","serviceprincipalkey":null},"scheme":"ServicePrincipal"},"isShared":false,"isReady":false,"operationStatus":{"state":"Failed","statusMessage":" Failed to set Azure permission 'RoleAssignmentId: xxxxxx26-xxxx-xxxx-xxxx-8f0fxxxxxxxxx' for the service principal 'xxxxxx06-xxxx-xxxx-xxxx-6fbxxxxxxxxxx' on subscription ID 'xxxxxxxb6-xxxx-xxxx-xxxx-234xxxxxxxxx': error code: Forbidden, inner error code: AuthorizationFailed, inner error message The client '[email protected]' with object id 'aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb' does not have authorization to perform action 'Microsoft.Authorization/roleAssignments/write' over scope '/subscriptions/xxxxxxxb6-xxxx-xxxx-xxxx-234xxxxxxxxx' or the scope is invalid. If access was recently granted, please refresh your credentials. Ensure that the user has 'Owner' or 'User Access Administrator' permissions on the Subscription."},"owner":"Library","serviceEndpointProjectReferences":[{"projectReference":{"id":"cccccccc-2222-3333-4444-dddddddddddd","name":"IIS"},"name":"Sxxxxxxxda-subscription","description":""}]}
6666
```
6767

6868
### Resolution

support/azure/general/cannot-see-users-groups-list-iam.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ To resolve this issue, use one of the following methods:
4242
1. Run the [Update-MgUser](/powershell/module/microsoft.graph.users/update-mguser) cmdlet:
4343

4444
```powershell
45-
Update-MgUser -UserId '0ba17ca9-0000-0000-0000-a5e34bc4803b' -UserType Member
45+
Update-MgUser -UserId '00aa00aa-bb11-cc22-dd33-44ee44ee44ee' -UserType Member
4646
```
4747
You can get the users Object ID by looking at the Users Profile page within the Azure portal.
4848

0 commit comments

Comments
 (0)