Skip to content

Commit 30b7bb6

Browse files
committed
fixed PR review bugs
1 parent 12c2b1e commit 30b7bb6

3 files changed

Lines changed: 20 additions & 19 deletions

File tree

learn-pr/wwl-sci/introduction-entra-agent-id/includes/2-describe-agent-id-compare-identities.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -63,10 +63,10 @@ Managed identities are another type of identity used for Azure resources:
6363

6464
Agent identities provide specific security benefits designed for AI agents:
6565

66-
1. **Distinguish AI operations**: Operations performed by AI agents are clearly separated from operations performed by workforce, customer, or traditional workload identities in audit logs and monitoring
67-
2. **Right-sized access**: Enable AI agents to gain appropriate access across systems without excessive permissions
68-
3. **Prevent excessive privilege**: Block agents from accessing critical security roles and systems
69-
4. **Scale identity management**: Support large numbers of AI agents that can be quickly created and destroyed without leaving orphaned credentials
66+
- **Distinguish AI operations**: Operations performed by AI agents are clearly separated from operations performed by workforce, customer, or traditional workload identities in audit logs and monitoring
67+
- **Right-sized access**: Enable AI agents to gain appropriate access across systems without excessive permissions
68+
- **Prevent excessive privilege**: Block agents from accessing critical security roles and systems
69+
- **Scale identity management**: Support large numbers of AI agents that can be quickly created and destroyed without leaving orphaned credentials
7070

7171
## Authentication scenarios
7272

learn-pr/wwl-sci/introduction-entra-agent-id/includes/3-identify-products-use-agent-identities.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -44,8 +44,8 @@ Agents in Microsoft Foundry access remote resources and tools by using agent ide
4444
> When you publish an agent, you must reassign RBAC permissions to the new agent identity for any resources that the agent needs to access. Permissions assigned to the shared identity don't automatically transfer.
4545
4646
Currently, the tools that support authentication with agent identity are:
47-
1. **Model Context Protocol (MCP)**: Use your agent's identity to authenticate with MCP servers that support agent identity authentication
48-
2. **Agent-to-Agent (A2A)**: Enable secure communication between agents using agent identities
47+
- **Model Context Protocol (MCP)**: Use your agent's identity to authenticate with MCP servers that support agent identity authentication
48+
- **Agent-to-Agent (A2A)**: Enable secure communication between agents using agent identities
4949

5050
## Azure App Service and Azure Functions
5151

@@ -123,8 +123,8 @@ Key features:
123123

124124
When planning your agent deployments, consider:
125125

126-
1. **Which platforms will you use?** Determine which Microsoft products host your agents
127-
2. **Identity governance requirements**: Understand how agent identities are created, managed, and governed
128-
3. **Permission management**: Plan how permissions are assigned, especially when publishing agents or moving them between environments
129-
4. **Audit and monitoring**: Ensure you have processes to monitor agent identity activity in the Microsoft Entra admin center
130-
5. **Lifecycle management**: Plan for how agent identities are created and deleted as agents are deployed and retired
126+
- **Which platforms will you use?** Determine which Microsoft products host your agents
127+
- **Identity governance requirements**: Understand how agent identities are created, managed, and governed
128+
- **Permission management**: Plan how permissions are assigned, especially when publishing agents or moving them between environments
129+
- **Audit and monitoring**: Ensure you have processes to monitor agent identity activity in the Microsoft Entra admin center
130+
- **Lifecycle management**: Plan for how agent identities are created and deleted as agents are deployed and retired

learn-pr/wwl-sci/introduction-entra-agent-id/includes/5-understand-access-permissions.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ Managing agent identities requires specific Microsoft Entra roles and understand
22

33
## Required roles for managing agent identities
44

5-
There are several different types of roles that can perform operations on agent identies, from viewing to managing.
5+
There are several different types of roles that can perform operations on agent identities, from viewing to managing.
66

77
### Roles for viewing agent identities
88

@@ -13,11 +13,11 @@ To view agent identities in the Microsoft Entra admin center:
1313

1414
To manage agent identities (create, update, disable, delete), you need one of the following roles:
1515

16-
1. **Agent ID Administrator**: Full permissions to manage agent identities, agent identity blueprints, and related configurations. Use the role for agent identity management (recommended).
16+
- **Agent ID Administrator**: Full permissions to manage agent identities, agent identity blueprints, and related configurations. Use the role for agent identity management (recommended).
1717

18-
2. **Cloud Application Administrator**: Can manage enterprise applications and agent identities. This role has broader application management permissions beyond just agent identities.
18+
- **Cloud Application Administrator**: Can manage enterprise applications and agent identities. This role has broader application management permissions beyond just agent identities.
1919

20-
3. **Owner of the agent identity**: If you're designated as an owner of a specific agent identity, you can manage that agent identity without holding a tenant-wide administrator role.
20+
- **Owner of the agent identity**: If you're designated as an owner of a specific agent identity, you can manage that agent identity without holding a tenant-wide administrator role.
2121

2222
### Roles for creating agent identity blueprints
2323

@@ -77,9 +77,9 @@ A critical scenario for permission management occurs when publishing agents in p
7777

7878
When you publish an agent:
7979

80-
1. **RBAC permissions don't transfer**: Permissions assigned to the shared project identity don't automatically transfer to the new distinct identity
81-
2. **You must reassign permissions**: Navigate to each Azure resource the agent accesses and assign the required RBAC role to the new agent identity
82-
3. **Verify access**: Test that the published agent can still access all required resources
80+
- **RBAC permissions don't transfer**: Permissions assigned to the shared project identity don't automatically transfer to the new distinct identity
81+
- **You must reassign permissions**: Navigate to each Azure resource the agent accesses and assign the required RBAC role to the new agent identity
82+
- **Verify access**: Test that the published agent can still access all required resources
8383

8484
### Example: Publishing a Microsoft Foundry agent
8585

@@ -103,7 +103,8 @@ Agent identities can be assigned Azure RBAC roles just like service principals:
103103
5. **Search for the agent identity** by its name or object ID
104104
6. **Assign the role**
105105

106-
Note: You need the object ID of the agent identity for role assignments.
106+
> [!Note]
107+
> You need the object ID of the agent identity for role assignments.
107108
108109
## Microsoft Graph permissions
109110

0 commit comments

Comments
 (0)