@@ -144,20 +144,29 @@ If you don't have a managed identity yet, you should go ahead and create one for
144
144
``` azurecli-interactive
145
145
az identity create --name myIdentity --resource-group myResourceGroup
146
146
```
147
+
148
+ Assign "Managed Identity Operator" role to the identity.
149
+
150
+ ``` azurecli-interactive
151
+ az role assignment create --assignee <id> --role "Managed Identity Operator" --scope <id>
152
+
153
+
147
154
The result should look like:
148
155
149
156
```output
150
- {
151
- "clientId": "<client-id>",
152
- "clientSecretUrl": "<clientSecretUrl>",
153
- "id": "/subscriptions/<subscriptionid>/resourcegroups/myResourceGroup/providers/Microsoft.ManagedIdentity/userAssignedIdentities/myIdentity",
154
- "location": "westus2",
155
- "name": "myIdentity",
157
+ {
158
+ "canDelegate": null,
159
+ "condition": null,
160
+ "conditionVersion": null,
161
+ "description": null,
162
+ "id": "/subscriptions/<subscriptionid>/resourcegroups/myResourceGroup/providers/Microsoft.ManagedIdentity/userAssignedIdentities/myIdentity",
163
+ "name": "myIdentity,
156
164
"principalId": "<principalId>",
157
- "resourceGroup": "myResourceGroup",
158
- "tags": {},
159
- "tenantId": "<tenant-id>",
160
- "type": "Microsoft.ManagedIdentity/userAssignedIdentities"
165
+ "principalType": "ServicePrincipal",
166
+ "resourceGroup": "myResourceGroup",
167
+ "roleDefinitionId": "/subscriptions/<subscriptionid>/providers/Microsoft.Authorization/roleDefinitions/<definitionid>",
168
+ "scope": "<resourceid>",
169
+ "type": "Microsoft.Authorization/roleAssignments"
161
170
}
162
171
```
163
172
0 commit comments