@@ -144,20 +144,29 @@ If you don't have a managed identity yet, you should go ahead and create one for
144144``` azurecli-interactive
145145az identity create --name myIdentity --resource-group myResourceGroup
146146```
147+
148+ Assign "Managed Identity Operator" role to the identity.
149+
150+ ``` azurecli-interactive
151+ az role assignment create --assignee <id> --role "Managed Identity Operator" --scope <id>
152+
153+
147154The result should look like:
148155
149156```output
150- {
151- "clientId": "<client-id>",
152- "clientSecretUrl": "<clientSecretUrl>",
153- "id": "/subscriptions/<subscriptionid>/resourcegroups/myResourceGroup/providers/Microsoft.ManagedIdentity/userAssignedIdentities/myIdentity",
154- "location": "westus2",
155- "name": "myIdentity",
157+ {
158+ "canDelegate": null,
159+ "condition": null,
160+ "conditionVersion": null,
161+ "description": null,
162+ "id": "/subscriptions/<subscriptionid>/resourcegroups/myResourceGroup/providers/Microsoft.ManagedIdentity/userAssignedIdentities/myIdentity",
163+ "name": "myIdentity,
156164 "principalId": "<principalId>",
157- "resourceGroup": "myResourceGroup",
158- "tags": {},
159- "tenantId": "<tenant-id>",
160- "type": "Microsoft.ManagedIdentity/userAssignedIdentities"
165+ "principalType": "ServicePrincipal",
166+ "resourceGroup": "myResourceGroup",
167+ "roleDefinitionId": "/subscriptions/<subscriptionid>/providers/Microsoft.Authorization/roleDefinitions/<definitionid>",
168+ "scope": "<resourceid>",
169+ "type": "Microsoft.Authorization/roleAssignments"
161170}
162171```
163172
0 commit comments