You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/howto-create-service-principal-portal.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,9 +36,9 @@ Let's jump straight into creating the identity. If you run into a problem, check
36
36
37
37
You've created your Azure AD application and service principal.
38
38
39
-
## Assign the application to a role
39
+
## Assign a role to the application
40
40
41
-
To access resources in your subscription, you must assign the application to a role. Decide which role offers the right permissions for the application. To learn about the available roles, see [RBAC: Built in Roles](../../role-based-access-control/built-in-roles.md).
41
+
To access resources in your subscription, you must assign a role to the application. Decide which role offers the right permissions for the application. To learn about the available roles, see [RBAC: Built in Roles](../../role-based-access-control/built-in-roles.md).
42
42
43
43
You can set the scope at the level of the subscription, resource group, or resource. Permissions are inherited to lower levels of scope. For example, adding an application to the Reader role for a resource group means it can read the resource group and any resources it contains.
44
44
@@ -58,7 +58,7 @@ You can set the scope at the level of the subscription, resource group, or resou
58
58
59
59

60
60
61
-
1. Select **Save** to finish assigning the role. You see your application in the list of users assigned to a role for that scope.
61
+
1. Select **Save** to finish assigning the role. You see your application in the list of users with a role for that scope.
62
62
63
63
Your service principal is set up. You can start using it to run your scripts or apps. The next section shows how to get values that are needed when signing in programmatically.
64
64
@@ -108,7 +108,7 @@ If you choose not to use a certificate, you can create a new application secret.
108
108
1. Select **Client secrets -> New client secret**.
109
109
1. Provide a description of the secret, and a duration. When done, select **Add**.
110
110
111
-
After saving the client secret, the value of the client secret is displayed. Copy this value because you aren't able to retrieve the key later. You provide the key value with the application ID to sign in as the application. Store the key value where your application can retrieve it.
111
+
After saving the client secret, the value of the client secret is displayed. Copy this value because you won't be able to retrieve the key later. You will provide the key value with the application ID to sign in as the application. Store the key value where your application can retrieve it.
112
112
113
113

114
114
@@ -122,7 +122,7 @@ Keep in mind, you might need to configure addition permissions on resources that
122
122
123
123
## Required permissions
124
124
125
-
You must have sufficient permissions to register an application with your Azure AD tenant, and assign the application to a role in your Azure subscription.
125
+
You must have sufficient permissions to register an application with your Azure AD tenant, and assign to the application a role in your Azure subscription.
126
126
127
127
### Check Azure AD permissions
128
128
@@ -134,11 +134,11 @@ You must have sufficient permissions to register an application with your Azure
134
134
1. In the left pane, select **User settings**.
135
135
1. Check the **App registrations** setting. This value can only be set by an administrator. If set to **Yes**, any user in the Azure AD tenant can register an app.
136
136
137
-
If the app registrations setting is set to **No**, only users with an administrator role may register these types of applications. See [available roles](../users-groups-roles/directory-assign-admin-roles.md#available-roles) and [role permissions](../users-groups-roles/directory-assign-admin-roles.md#role-permissions) to learn about available administrator roles and the specific permissions in Azure AD that are given to each role. If your account is assigned to the User role, but the app registration setting is limited to admin users, ask your administrator to either assign you to one of the administrator roles that can create and manage all aspects of app registrations, or to enable users to register apps.
137
+
If the app registrations setting is set to **No**, only users with an administrator role may register these types of applications. See [available roles](../users-groups-roles/directory-assign-admin-roles.md#available-roles) and [role permissions](../users-groups-roles/directory-assign-admin-roles.md#role-permissions) to learn about available administrator roles and the specific permissions in Azure AD that are given to each role. If your account is assigned the User role, but the app registration setting is limited to admin users, ask your administrator to either assign you one of the administrator roles that can create and manage all aspects of app registrations, or to enable users to register apps.
138
138
139
139
### Check Azure subscription permissions
140
140
141
-
In your Azure subscription, your account must have `Microsoft.Authorization/*/Write` access to assign an AD app to a role. This action is granted through the [Owner](../../role-based-access-control/built-in-roles.md#owner) role or [User Access Administrator](../../role-based-access-control/built-in-roles.md#user-access-administrator) role. If your account is assigned to the **Contributor** role, you don't have adequate permission. You receive an error when attempting to assign the service principal to a role.
141
+
In your Azure subscription, your account must have `Microsoft.Authorization/*/Write` access to assign a role to an AD app. This action is granted through the [Owner](../../role-based-access-control/built-in-roles.md#owner) role or [User Access Administrator](../../role-based-access-control/built-in-roles.md#user-access-administrator) role. If your account is assigned the **Contributor** role, you don't have adequate permission. You will receive an error when attempting to assign the service principal a role.
142
142
143
143
To check your subscription permissions:
144
144
@@ -150,9 +150,9 @@ To check your subscription permissions:
150
150
151
151

152
152
153
-
1. Select **Role assignments** to view your assigned roles, and determine if you have adequate permissions to assign an AD app to a role. If not, ask your subscription administrator to add you to User Access Administrator role. In the following image, the user is assigned to the Owner role, which means that user has adequate permissions.
153
+
1. Select **Role assignments** to view your assigned roles, and determine if you have adequate permissions to assign a role to an AD app. If not, ask your subscription administrator to add you to User Access Administrator role. In the following image, the user is assigned the Owner role, which means that user has adequate permissions.
154
154
155
-

155
+

0 commit comments