I remember having some statistics inside azure but it doesn't appear anymore. Like - the number of registrations.
Or to make it back? and is it possible to simply have more detailed statistics?
You could try the Azure PowerShell to list the registered applications :
Get-AzureRmADApplication
For more details, refer to this link.
Related
Is it possible to reproduce the steps to "Configure Azure AD Connect cloud sync" from the Azure portal, in another way using an API?
The steps are described at this link:
https://learn.microsoft.com/en-us/azure/active-directory/cloud-sync/tutorial-single-forest#configure-azure-ad-connect-cloud-sync
I would like to automate this process to have no user interaction. Is it possible with the Graph API? Any example?
Thank you Marilee Turscak - MSFT for providing the reference Link.
I don't understand this sentence: "You need to use this application
ID 1a4721b3-e57f-4451-ae87-ef078703ec94. The displayName is the AD
domain url, if used in the portal (for example, contoso.com), but it
may be named something else." What is the application id I should use?
And what is the display name? I get 401 or 403 errors. Is there an
additional step before this?
You have to use the same application ID as its the Application templateID by default which is used to provision entries from active directory to Azure active directory.
But You can use any Display name that you want and Please make sure to have the required permissions as shown below. You can perform the post operation with Graph explorer.
After you have done the above post operation you will get the service principal ID which can be used for further steps mentioned in the document provided by Marilee Turscak - MSFT.
Reference:
How to programmatically configure cloud sync using MS Graph API | Microsoft Docs
So I manage Azure stack and I want to put a cap on the number of Windows VMs that could be created per subscription and I also need it in template form for automation. So far I have not been able to do that. Could I please get some help?
Such restrictions on Azure Subscriptions are usually applied by implementing Azure Policies (which can also be programmatically created and managed) but looks like it is not yet supported on Azure Stack. Check this similar thread for details.
I'm just looking for a yes or no answer here, and I can't seem to find anything online...
Can I upload B2B users into Azure AD using the new portal (i.e. The resource manager approach - portal.azure.com), or do I have to continue using the classic portal (manage.windowsazure.com)?
https://github.com/Azure/azure-content/blob/master/articles/active-directory/active-directory-b2b-what-is-azure-ad-b2b.md
You can now add guest users via the new portal, although it's on a one-by-one basis, if you want to do it in bulk you can with a new PowerShell command.
New-AzureADMSInvitation
More info here: https://learn.microsoft.com/en-us/powershell/azuread/v2/new-azureadmsinvitation
And a sample here: https://github.com/Microsoft/azure-docs/blob/master/articles/active-directory/active-directory-b2b-code-samples.md#powershell-example
You'll need this package: https://www.powershellgallery.com/packages/AzureADPreview/2.0.0.38
As far as I know, this feature is not support for the new portal. And if you want to the new portal to support this feature, you can submit the feedback from here.
I need to assign publish permission to one of my developers so that he should be able to publish to only one cloud service & do not affect others.
Azure websites have these concepts called download publishing profile.
I could not find anything similar for cloud service. Can it be
achieved?
As you know Azure Management Portal does not have any role defined where we could map a user account login to manage a set of resources (say cloud service 1 & 2)
It is not possible as of today. It seems that it should be possible with Resource Groups and Role Based Access Control (RBAC) however currently cloud services can't be added in resource groups and assigned RBAC.
One way you could achieve this is have a custom application consuming Service Management API and implement your own RBAC in that application. However it is still a "hack" and not proper solution.
Why don't you try using "publish from source control"? When the developer checks in it will auto publish the code.
I believe the new portal will allow the creation of roles for publishing profiles; it already allows adding additional users to your organization; but to get what you want for now; publishing from source code should do the trick.
I am trying to figure out how to create a windows azure active directory group and/or role from the web portal. Am I missing something obvious here or? I can create users, and assign them to the 2 built in roles, but how do I create a new role? or group?
Admittedly I haven't tried this yet, but the PowerShell extensions should be able to do this:
http://technet.microsoft.com/en-us/library/jj151815.aspx
Look under "Manage group and role membership" for details on the relevant commands.
I would also assume that the Graph API could handle it. I too was hoping that the Azure Management Portal would let us do it in their GUI.
Seems the way to add groups, etc is via the graph api or as suggested above by PS scripts. The graph api is amazingly powerful, albeit not as convenient as if this funcitonality lived within the Azure portal.
Basically you have 2 options:
create app roles and assign security groups to them (AAD Premium is
required)
enable security groups as claims (AAD Free is enough)
Follow this official manual: https://learn.microsoft.com/en-us/azure/active-directory/develop/howto-add-app-roles-in-azure-ad-apps