Skip to content

Commit 1c34745

Browse files
committed
final fixes
1 parent 4c4b9d4 commit 1c34745

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/iot-operations/deploy-iot-ops/howto-manage-secrets.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: kgremban
55
ms.author: kgremban
66
ms.subservice: orchestrator
77
ms.topic: how-to
8-
ms.date: 03/12/2024
8+
ms.date: 03/21/2024
99
ms.custom: ignite-2023, devx-track-azurecli
1010

1111
#CustomerIntent: As an IT professional, I want prepare an Azure-Arc enabled Kubernetes cluster with Key Vault secrets so that I can deploy Azure IoT Operations to it.
@@ -57,7 +57,7 @@ First, register an application with Microsoft Entra ID:
5757

5858
1. Copy the **Application (client) ID** from the app registration overview page. You'll use this value as an argument when running Azure IoT Operations deployment with the `az iot ops init` command.
5959

60-
Next, give your application permissions for key vault:
60+
Next, give your application permissions for Key Vault:
6161

6262
1. On the resource page for your app, select **API permissions** from the **Manage** section of the app menu.
6363

@@ -105,14 +105,14 @@ az keyvault show --name "<your unique key vault name>" --resource-group "<the na
105105

106106
### Set service principal access policy in Key Vault
107107

108-
The newly created service principal needs **Secret** `list` and `get` access policy for the Azure IoT Operations to work with the secret store.
108+
The newly created service principal needs **secret** `list` and `get` access policy for the Azure IoT Operations to work with the secret store.
109109

110-
To manage key vault access policies, the principal logged in to the CLI needs sufficient Azure permissions. In the Role Based Access Control (RBAC) model, this permission is included in key vault contributor or higher roles.
110+
To manage Key Vault access policies, the principal logged in to the CLI needs sufficient Azure permissions. In the Role Based Access Control (RBAC) model, this permission is included in Key Vault contributor or higher roles.
111111

112112
>[!TIP]
113-
>If you used the logged-in CLI principal to create the Key Vault, then you probably already have the right permissions. However, if you're pointing to a different or existing Key Vault then you should check that you have sufficient permissions to set access policies.
113+
>If you used the logged-in CLI principal to create the key vault, then you probably already have the right permissions. However, if you're pointing to a different or existing key vault then you should check that you have sufficient permissions to set access policies.
114114
115-
Run the following to assign **secret** `get` and `list` permissions to the service principal.
115+
Run the following to assign **secret** `list` and `get` permissions to the service principal.
116116

117117
```bash
118118
az keyvault set-policy --name "<your unique key vault name>" --resource-group "<the name of the resource group>" --object-id <Object ID copied from Enterprise Application SP in Microsoft Entra ID> --secret-permissions get list

0 commit comments

Comments
 (0)