Skip to content

Commit 154a434

Browse files
Merge pull request #229854 from rwike77/createspfix
freshness update
2 parents a0f3c64 + c04d2cd commit 154a434

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/active-directory/develop/howto-authenticate-service-principal-powershell.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.subservice: develop
1010
ms.custom: aaddev, devx-track-azurepowershell
1111
ms.topic: how-to
1212
ms.tgt_pltfrm: multiple
13-
ms.date: 11/09/2022
13+
ms.date: 03/07/2023
1414
ms.author: ryanwi
1515
ms.reviewer: tomfitz
1616
---
@@ -63,7 +63,7 @@ Sleep 20
6363
New-AzRoleAssignment -RoleDefinitionName Reader -ServicePrincipalName $sp.AppId
6464
```
6565

66-
The example sleeps for 20 seconds to allow some time for the new service principal to propagate throughout Azure AD. If your script doesn't wait long enough, you'll see an error stating: "Principal {ID} does not exist in the directory {DIR-ID}." To resolve this error, wait a moment then run the **New-AzRoleAssignment** command again.
66+
The example sleeps for 20 seconds to allow some time for the new service principal to propagate throughout Azure AD. If your script doesn't wait long enough, you'll see an error stating: "Principal {ID} doesn't exist in the directory {DIR-ID}." To resolve this error, wait a moment then run the **New-AzRoleAssignment** command again.
6767

6868
You can scope the role assignment to a specific resource group by using the **ResourceGroupName** parameter. You can scope to a specific resource by also using the **ResourceType** and **ResourceName** parameters.
6969

0 commit comments

Comments
 (0)