Skip to content

Commit 400e759

Browse files
authored
Merge pull request #179437 from jdmartinez36/cliskipassign
1876839: Remove deprecated --skip-assignment parameter
2 parents bed507e + b52d017 commit 400e759

13 files changed

+17
-17
lines changed

articles/aks/configure-kubenet.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -121,7 +121,7 @@ az network vnet create \
121121
To allow an AKS cluster to interact with other Azure resources, an Azure Active Directory service principal is used. The service principal needs to have permissions to manage the virtual network and subnet that the AKS nodes use. To create a service principal, use the [az ad sp create-for-rbac][az-ad-sp-create-for-rbac] command:
122122

123123
```azurecli-interactive
124-
az ad sp create-for-rbac --skip-assignment
124+
az ad sp create-for-rbac
125125
```
126126

127127
The following example output shows the application ID and password for your service principal. These values are used in additional steps to assign a role to the service principal and then create the AKS cluster:

articles/aks/kubernetes-service-principal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -61,10 +61,10 @@ New-AzAksCluster -Name myAKSCluster -ResourceGroupName myResourceGroup
6161

6262
### [Azure CLI](#tab/azure-cli)
6363

64-
To manually create a service principal with the Azure CLI, use the [az ad sp create-for-rbac][az-ad-sp-create] command. In the following example, the `--skip-assignment` parameter prevents any additional default assignments being assigned:
64+
To manually create a service principal with the Azure CLI, use the [az ad sp create-for-rbac][az-ad-sp-create] command.
6565

6666
```azurecli-interactive
67-
az ad sp create-for-rbac --skip-assignment --name myAKSClusterServicePrincipal
67+
az ad sp create-for-rbac --name myAKSClusterServicePrincipal
6868
```
6969

7070
The output is similar to the following example. Make a note of your own `appId` and `password`. These values are used when you create an AKS cluster in the next section.

articles/aks/limit-egress-traffic.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -423,7 +423,7 @@ A cluster identity (managed identity or service principal) is used by AKS to cre
423423
```azurecli
424424
# Create SP and Assign Permission to Virtual Network
425425
426-
az ad sp create-for-rbac -n "${PREFIX}sp" --skip-assignment
426+
az ad sp create-for-rbac -n "${PREFIX}sp"
427427
```
428428

429429
Now replace the `APPID` and `PASSWORD` below with the service principal appid and service principal password autogenerated by the previous command output. We'll reference the VNET resource ID to grant the permissions to the service principal so AKS can deploy resources into it.

articles/aks/update-credentials.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -64,10 +64,10 @@ Now continue on to [update AKS cluster with new service principal credentials](#
6464

6565
If you chose to update the existing service principal credentials in the previous section, skip this step. Continue to [update AKS cluster with new service principal credentials](#update-aks-cluster-with-new-service-principal-credentials).
6666

67-
To create a service principal and then update the AKS cluster to use these new credentials, use the [az ad sp create-for-rbac][az-ad-sp-create] command. In the following example, the `--skip-assignment` parameter prevents any additional default assignments being assigned:
67+
To create a service principal and then update the AKS cluster to use these new credentials, use the [az ad sp create-for-rbac][az-ad-sp-create] command.
6868

6969
```azurecli-interactive
70-
az ad sp create-for-rbac --skip-assignment
70+
az ad sp create-for-rbac
7171
```
7272

7373
The output is similar to the following example. Make a note of your own `appId` and `password`. These values are used in the next step.

articles/aks/virtual-nodes-cli.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -83,10 +83,10 @@ az network vnet subnet create \
8383

8484
To allow an AKS cluster to interact with other Azure resources, a cluster identity is used. This cluster identity can be automatically created by the Azure CLI or portal, or you can pre-create one and assign additional permissions. By default, this cluster identity is a managed identity. For more information, see [Use managed identities](use-managed-identity.md). You can also use a service principal as your cluster identity. The following steps show you how to manually create and assign the service principal to your cluster.
8585

86-
Create a service principal using the [az ad sp create-for-rbac][az-ad-sp-create-for-rbac] command. The `--skip-assignment` parameter limits any additional permissions from being assigned.
86+
Create a service principal using the [az ad sp create-for-rbac][az-ad-sp-create-for-rbac] command.
8787

8888
```azurecli-interactive
89-
az ad sp create-for-rbac --skip-assignment
89+
az ad sp create-for-rbac
9090
```
9191

9292
The output is similar to the following example:

articles/application-gateway/ingress-controller-install-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ Follow the steps below to create an Azure Active Directory (AAD) [service princi
3939

4040
1. Create AD service principal ([Read more about Azure RBAC](../role-based-access-control/overview.md)):
4141
```azurecli
42-
az ad sp create-for-rbac --skip-assignment -o json > auth.json
42+
az ad sp create-for-rbac -o json > auth.json
4343
appId=$(jq -r ".appId" auth.json)
4444
password=$(jq -r ".password" auth.json)
4545
```

articles/cognitive-services/containers/azure-kubernetes-recipe.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -173,7 +173,7 @@ The following steps are needed to get the required information to connect your c
173173
1. Create service principal.
174174
175175
```azurecli-interactive
176-
az ad sp create-for-rbac --skip-assignment
176+
az ad sp create-for-rbac
177177
```
178178
179179
Save the results `appId` value for the assignee parameter in step 3, `<appId>`. Save the `password` for the next section's client-secret parameter `<client-secret>`.

articles/databox-online/azure-stack-edge-gpu-deploy-arc-kubernetes-cluster.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -84,14 +84,14 @@ You can also register resource providers via the `az cli`. For more information,
8484

8585
1. To create a service principal, use the following command via the `az cli`.
8686

87-
`az ad sp create-for-rbac --skip-assignment --name "<Informative name for service principal>"`
87+
`az ad sp create-for-rbac --name "<Informative name for service principal>"`
8888

8989
For information on how to log into the `az cli`, [Start Cloud Shell in Azure portal](../cloud-shell/quickstart-powershell.md#start-cloud-shell)
9090

9191
Here is an example.
9292

9393
```azurecli
94-
PS /home/user> az ad sp create-for-rbac --skip-assignment --name "https://azure-arc-for-ase-k8s"
94+
PS /home/user> az ad sp create-for-rbac --name "https://azure-arc-for-ase-k8s"
9595
{
9696
"appId": "aa8a082e-0fa1-4a82-b51c-e8b2a9fdaa8b",
9797
"displayName": "azure-arc-for-ase-k8s",

articles/key-vault/general/manage-with-cli2.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -195,7 +195,7 @@ For detailed steps on registering an application with Azure Active Directory you
195195
To register an application in Azure Active Directory:
196196

197197
```azurecli
198-
az ad sp create-for-rbac -n "MyApp" --password "hVFkk965BuUv" --skip-assignment
198+
az ad sp create-for-rbac -n "MyApp" --password "hVFkk965BuUv"
199199
# If you don't specify a password, one will be created for you.
200200
```
201201

articles/sentinel/sap-solution-deploy-snc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ spname=<sp-name>
5050
kvname=<keyvaultname>
5151
# Optional when Azure MI not enabled - Create sp user for AZ cli connection, save details for env.list file
5252
53-
az ad sp create-for-rbac –name $spname
53+
az ad sp create-for-rbac –name $spname --role Contributor
5454
5555
SpID=$(az ad sp list –display-name $spname –query “[].appId” --output tsv
5656

0 commit comments

Comments
 (0)