Skip to content

Commit 46dd446

Browse files
Merge pull request #109837 from BobHamburg/patch-2
Update tutorial-windows-vm-ua-arm.md
2 parents 0a6f233 + ef76914 commit 46dd446

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/active-directory/managed-identities-azure-resources/tutorial-windows-vm-ua-arm.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,7 @@ Update-AzVM -ResourceGroupName TestRG -VM $vm -IdentityType "UserAssigned" -Iden
118118

119119
This section shows how to grant your user-assigned identity access to a Resource Group in Azure Resource Manager. Managed identities for Azure resources provide identities that your code can use to request access tokens to authenticate to resource APIs that support Azure AD authentication. In this tutorial, your code will access the Azure Resource Manager API.
120120

121-
Before your code can access the API, you need to grant the identity access to a resource in Azure Resource Manager. In this case, the Resource Group in which the VM is contained. Update the value for `<SUBSCRIPTION ID>` as appropriate for your environment.
121+
Before your code can access the API, you need to grant the identity access to a resource in Azure Resource Manager. In this case, the Resource Group in which the VM is contained. Update the value for `<SUBSCRIPTIONID>` as appropriate for your environment.
122122

123123
```azurepowershell-interactive
124124
$spID = (Get-AzUserAssignedIdentity -ResourceGroupName myResourceGroupVM -Name ID1).principalid
@@ -128,8 +128,8 @@ New-AzRoleAssignment -ObjectId $spID -RoleDefinitionName "Reader" -Scope "/subsc
128128
The response contains details for the role assignment created, similar to the following example:
129129

130130
```azurepowershell
131-
RoleAssignmentId: /subscriptions/80c696ff-5efa-4909-a64d-f1b616f423ca/resourcegroups/myResourceGroupVM/providers/Microsoft.Authorization/roleAssignments/f9cc753d-265e-4434-ae19-0c3e2ead62ac
132-
Scope: /subscriptions/80c696ff-5efa-4909-a64d-f1b616f423ca/resourcegroups/myResourceGroupVM
131+
RoleAssignmentId: /subscriptions/<SUBSCRIPTIONID>/resourcegroups/myResourceGroupVM/providers/Microsoft.Authorization/roleAssignments/f9cc753d-265e-4434-ae19-0c3e2ead62ac
132+
Scope: /subscriptions/<SUBSCRIPTIONID>/resourcegroups/myResourceGroupVM
133133
DisplayName: ID1
134134
SignInName:
135135
RoleDefinitionName: Reader

0 commit comments

Comments
 (0)