Skip to content

Commit f9f6236

Browse files
committed
refresh updates
1 parent d2f1be6 commit f9f6236

1 file changed

Lines changed: 6 additions & 6 deletions

File tree

articles/azure-vmware/rotate-cloudadmin-credentials.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -10,16 +10,16 @@ ms.date: 3/25/2026
1010

1111
# Rotate the cloud admin credentials for Azure VMware Solution
1212

13-
In this article, you learn how to rotate the cloud admin credentials (vCenter Server and VMware NSX cloud admin credentials) for your Azure VMware Solution private cloud. Although the password for this account doesn't expire, you can generate a new one at any time.
13+
In this article, learn how to rotate the cloud admin credentials (vCenter Server and VMware NSX cloud admin credentials) for your Azure VMware Solution private cloud. Although the password for this account doesn't expire, you can generate a new one at any time.
1414

1515
>[!CAUTION]
16-
>If you use your cloud admin credentials to connect services to vCenter Server or NSX in your private cloud, those connections stop working after you rotate your password. Those connections also lock out the cloud admin account unless you stop those services before you rotate the password.
16+
>When you use your cloud admin credentials to connect services to vCenter Server or NSX in your private cloud, those connections stop working after you rotate your password. Those connections also lock out the cloud admin account unless you stop those services before you rotate the password.
1717
1818
## Prerequisites
1919

2020
Consider and determine which services connect to vCenter Server as `[email protected]` or NSX as cloud admin before you rotate the password. Services can include VMware services like HCX, vRealize Orchestrator, vRealize Operations Manager, VMware Horizon, or other non-Microsoft tools that are used for monitoring or provisioning.
2121

22-
One way to determine which services authenticate to vCenter Server with the cloud admin user is to inspect vSphere events by using the vSphere Client for your private cloud. After you identify such services, and before you rotate the password, you must stop these services. Otherwise, the services won't work after you rotate the password. You can also experience temporary locks on your vCenter Server cloud admin account. Locks occur because these services continuously attempt to authenticate by using a cached version of the old credentials.
22+
One way to determine which services authenticate to vCenter Server with the cloud admin user is to inspect vSphere events by using the vSphere Client for your private cloud. After you identify those services, you need to stop them before rotating the password. If you dont stop those services, they won't work after you rotate the password. You can also experience temporary locks on your vCenter Server cloud admin account. Locks occur because these services continuously attempt to authenticate by using a cached version of the old credentials.
2323

2424
Instead of using the cloud admin user to connect services to vCenter Server or NSX, we recommend that you use individual accounts for each service. For more information about setting up separate accounts for connected services, see [Access and identity architecture](./architecture-identity.md).
2525

@@ -49,7 +49,7 @@ To begin using the Azure CLI:
4949

5050
### Update HCX Connector
5151

52-
1. Go to the on-premises HCX Connector and sign in by using the new credentials.
52+
1. Go to the on-premises HCX Connector and sign in using the new credentials.
5353

5454
Be sure to use port **443**.
5555

@@ -59,13 +59,13 @@ To begin using the Azure CLI:
5959

6060
1. Select the correct connection to Azure VMware Solution and select **Edit Connection**.
6161

62-
1. Provide the new vCenter Server user credentials. Select **Edit** to save the credentials. Save should show as successful.
62+
1. Provide the new vCenter Server user credentials, then select **Edit** to save the credentials. Save should show as successful.
6363

6464
## Reset your NSX Manager credentials
6565

6666
1. In your Azure VMware Solution private cloud, select **VMware credentials**.
6767
1. Under NSX Manager credentials, select **Generate new password**.
68-
1. Select the confirmation checkbox and then select **Generate password**.
68+
1. Select the confirmation checkbox, then select **Generate password**.
6969

7070
## Next steps
7171

0 commit comments

Comments
 (0)