Added support to pass multiple UAMI to Azure Firewall Policy#29419
Added support to pass multiple UAMI to Azure Firewall Policy#29419VeryEarly merged 13 commits intoAzure:mainfrom
Conversation
| Thanks for your contribution! The pull request validation has started. Please revisit this comment for updated status. |
|
|
@microsoft-github-policy-service agree company="Microsoft" |
|
To the author of the pull request, |
0cb7e8c to
785997f
Compare
|
LGTM. |
|
+1 again to @cshahra , LGTM |
|
/azp run |
|
Azure Pipelines successfully started running 3 pipeline(s). |
|
Remove the new parameter and make existing |
There was a problem hiding this comment.
Pull request overview
Note
Copilot was unable to run its full agentic suite in this review.
This PR extends Azure Firewall Policy cmdlets to support assigning multiple user-assigned managed identities (UAMIs) (enabling scenarios like explicit proxy PAC file access + TLS inspection), and updates related help/test assets.
Changes:
- Updated
New-AzFirewallPolicy/Set-AzFirewallPolicyto accept multiple values for-UserAssignedIdentityIdand map them intoIdentity.UserAssignedIdentities. - Updated markdown help to reflect the parameter type change and added
-ProgressActiondocumentation blocks. - Updated/added scenario tests and recordings around explicit proxy + identity assignment.
Reviewed changes
Copilot reviewed 8 out of 10 changed files in this pull request and generated 12 comments.
Show a summary per file
| File | Description |
|---|---|
| src/Network/Network/help/Set-AzFirewallPolicy.md | Updates syntax/type docs for -UserAssignedIdentityId and adds -ProgressAction section. |
| src/Network/Network/help/New-AzFirewallPolicy.md | Updates syntax/type docs for -UserAssignedIdentityId and adds -ProgressAction section. |
| src/Network/Network/ChangeLog.md | Notes the UserAssignedIdentityId type change. |
| src/Network/Network/AzureFirewallPolicy/SetAzureFirewallPolicyCommand.cs | Implements multi-UAMI mapping for set/update paths. |
| src/Network/Network/AzureFirewallPolicy/NewAzureFirewallPolicyCommand.cs | Implements multi-UAMI mapping on create path. |
| src/Network/Network/AzureFirewallPolicy/ExplicitProxy/NewAzureFirewallPolicyExplicitProxyCommand.cs | Updates PAC file help message from SAS URL to URL. |
| src/Network/Network.Test/ScenarioTests/AzureFirewallPolicyTests.ps1 | Updates explicit proxy CRUD test and adds a multi-UAMI scenario test. |
| src/Network/Network.Test/ScenarioTests/AzureFirewallPolicyTests.cs | Wires up the new multi-UAMI scenario test. |
| src/Network/Network.Test/SessionRecords/.../TestAzureFirewallPolicyExplicitProxyCRUD.json | Updates recordings for explicit proxy CRUD. |
|
/azp run |
|
Azure Pipelines successfully started running 3 pipeline(s). |
|
/azp run |
|
Azure Pipelines successfully started running 3 pipeline(s). |
|
/azp run |
|
Azure Pipelines successfully started running 3 pipeline(s). |
|
/azp run |
|
Azure Pipelines successfully started running 3 pipeline(s). |

Description
Mandatory Checklist
Please choose the target release of Azure PowerShell. (⚠️ Target release is a different concept from API readiness. Please click below links for details.)
Check this box to confirm: I have read the Submitting Changes section of
CONTRIBUTING.mdand reviewed the following information:ChangeLog.mdfile(s) appropriatelysrc/{{SERVICE}}/{{SERVICE}}/ChangeLog.md.## Upcoming Releaseheader in the past tense.ChangeLog.mdif no new release is required, such as fixing test case only.