Validate Azure identity
Use the Azure Stack Hub Readiness Checker tool (AzsReadinessChecker) to validate that your Microsoft Entra ID is ready to use with Azure Stack Hub. Validate your Azure identity solution before you begin an Azure Stack Hub deployment.
The readiness checker validates:
- Microsoft Entra ID as an identity provider for Azure Stack Hub.
- The Microsoft Entra account that you plan to use can sign in as an application administrator of your Microsoft Entra ID.
Validation ensures your environment is ready for Azure Stack Hub to store information about users, applications, groups, and service principals from Azure Stack Hub in your Microsoft Entra ID.
Get the readiness checker tool
Download the latest version of the Azure Stack Hub Readiness Checker tool (AzsReadinessChecker) from the PowerShell Gallery.
Install and configure
Prerequisites
The following prerequisites are required:
Az PowerShell modules
You will need to have the Az PowerShell modules installed. For instructions, see Install PowerShell Az preview module.
Microsoft Entra environment
- Identify the Microsoft Entra account to use for Azure Stack Hub and ensure it's a Microsoft Entra Application Administrator.
- Identify your Microsoft Entra tenant name. The tenant name must be the primary domain name for your Microsoft Entra ID. For example, contoso.partner.onmschina.cn.
Steps to validate Azure identity
On a computer that meets the prerequisites, open an elevated PowerShell command prompt, and then run the following command to install AzsReadinessChecker:
Install-Module -Name Az.BootStrapper -Force -AllowPrerelease Install-AzProfile -Profile 2020-09-01-hybrid -Force Install-Module -Name Microsoft.AzureStack.ReadinessChecker -AllowPrerelease
From the PowerShell prompt, run the following command. Replace
contoso.partner.onmschina.cn
with your Microsoft Entra tenant name:Connect-AzAccount -tenant contoso.partner.onmschina.cn -Environment AzureChinaCloud
From the PowerShell prompt, run the following command to start validation of your Microsoft Entra ID. Replace
contoso.partner.onmschina.cn
with your Microsoft Entra tenant name:Invoke-AzsAzureIdentityValidation -AADDirectoryTenantName contoso.partner.onmschina.cn
After the tool runs, review the output. Confirm the status is OK for installation requirements. A successful validation appears like the following example:
Invoke-AzsAzureIdentityValidation v1.2100.1448.484 started. Starting Azure Identity Validation Checking Installation Requirements: OK Finished Azure Identity Validation Log location (contains PII): C:\Users\[*redacted*]\AppData\Local\Temp\AzsReadinessChecker\AzsReadinessChecker.log Report location (contains PII): C:\Users\[*redacted*]\AppData\Local\Temp\AzsReadinessChecker\AzsReadinessCheckerReport.json Invoke-AzsAzureIdentityValidation Completed
Report and log file
Each time validation runs, it logs results to AzsReadinessChecker.log and AzsReadinessCheckerReport.json. The location of these files displays with the validation results in PowerShell.
These files can help you share validation status before you deploy Azure Stack Hub or investigate validation problems. Both files persist the results of each subsequent validation check. The report provides your deployment team confirmation of the identity configuration. The log file can help your deployment or support team investigate validation issues.
By default, both files are written to C:\Users\<username>\AppData\Local\Temp\AzsReadinessChecker\AzsReadinessCheckerReport.json
.
- Use the
-OutputPath <path>
parameter at the end of the run command line to specify a different report location. - Use the
-CleanReport
parameter at the end of the run command to clear information about previous runs of the tool from AzsReadinessCheckerReport.json.
For more information, see Azure Stack Hub validation report.
Validation failures
If a validation check fails, details about the failure display in the PowerShell window. The tool also logs information to the AzsReadinessChecker.log file.
The following examples provide guidance on common validation failures.
Expired or temporary password
Invoke-AzsAzureIdentityValidation v1.1809.1005.1 started.
Starting Azure Identity Validation
Checking Installation Requirements: Fail
Error Details for Service Administrator Account admin@contoso.partner.onmschina.cn
The password for account has expired or is a temporary password that needs to be reset before continuing. Run Login-AzureRMAccount -EnvironmentName AzureChinaCloud , login with credentials and follow the prompts to reset.
Additional help URL https://aka.ms/AzsRemediateAzureIdentity
Finished Azure Identity Validation
Log location (contains PII): C:\Users\username\AppData\Local\Temp\AzsReadinessChecker\AzsReadinessChecker.log
Report location (contains PII): C:\Users\username\AppData\Local\Temp\AzsReadinessChecker\AzsReadinessCheckerReport.json
Invoke-AzsAzureIdentityValidation Completed
Cause - The account can't sign in because the password is either expired or temporary.
Resolution - In PowerShell, run the following command and then follow the prompts to reset the password:
Login-AzureRMAccount -EnvironmentName AzureChinaCloud
Another way is to sign in to the Azure portal as the account owner and the user will be forced to change the password.
Unknown user type
Invoke-AzsAzureIdentityValidation v1.1809.1005.1 started.
Starting Azure Identity Validation
Checking Installation Requirements: Fail
Error Details for Service Administrator Account admin@contoso.partner.onmschina.cn
Unknown user type detected. Check the account is valid for AzureChinaCloud
Additional help URL https://aka.ms/AzsRemediateAzureIdentity
Finished Azure Identity Validation
Log location (contains PII): C:\Users\username\AppData\Local\Temp\AzsReadinessChecker\AzsReadinessChecker.log
Report location (contains PII): C:\Users\username\AppData\Local\Temp\AzsReadinessChecker\AzsReadinessCheckerReport.json
Invoke-AzsAzureIdentityValidation Completed
Cause - The account can't sign in to the specified Microsoft Entra ID (AADDirectoryTenantName). In this example, AzureChinaCloud is specified as the AzureEnvironment.
Resolution - Confirm that the account is valid for the specified Azure environment. In PowerShell, run the following command to verify the account is valid for a specific environment:
Login-AzureRmAccount -EnvironmentName AzureChinaCloud
Next Steps
Validate Azure registration
View the readiness report
General Azure Stack Hub integration considerations