Skip to content

Commit 1deee1c

Browse files
committed
typo
1 parent 7322ca6 commit 1deee1c

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/azure-arc/kubernetes/tutorial-akv-secrets-provider.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -279,7 +279,7 @@ Before you move on to the next section, take note of the following properties:
279279

280280
Currently, the Secrets Store CSI Driver on Arc-enabled clusters can be accessed through a service principal. Follow these steps to provide an identity that can access your Key Vault.
281281

282-
1. Follow the steps [to create a service principal in Azure](/entra/identity-platform/howto-create-service-principal-porta). Take note of the Client ID and Client Secret generated in this step.
282+
1. Follow the steps [to create a service principal in Azure](/entra/identity-platform/howto-create-service-principal-portal). Take note of the Client ID and Client Secret generated in this step.
283283
1. Next, [ensure Azure Key Vault has GET permission to the created service principal](../../key-vault/general/assign-access-policy.md#assign-an-access-policy).
284284
1. Use the client ID and Client Secret from the first step to create a Kubernetes secret on the connected cluster:
285285

0 commit comments

Comments
 (0)