Skip to content

Commit 4fd408f

Browse files
committed
status
1 parent 5e2e635 commit 4fd408f

File tree

4 files changed

+7
-7
lines changed

4 files changed

+7
-7
lines changed

articles/devtest-labs/add-artifact-repository.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -220,7 +220,7 @@ Personal access token for the GitHub or Azure Repos repository.
220220
Whether the artifact repository is a VSOGit (Azure Repos) or GitHub repository.
221221
222222
.EXAMPLE
223-
Set-AzContext -SubscriptionId 11111111-1111-1111-1111-111111111111
223+
Set-AzContext -SubscriptionId aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e
224224
.\New-DevTestLabArtifactRepository.ps1 -LabName "mydevtestlab" -LabResourceGroupName "mydtlrg" -ArtifactRepositoryName "MyTeam Repository" -RepositoryUri "https://github.com/<myteam>/<nameofrepo>.git" -PersonalAccessToken "1111...." -SourceType "GitHub"
225225
226226
.NOTES

articles/devtest-labs/automate-add-lab-user.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -139,7 +139,7 @@ First, create a parameter file (for example: azuredeploy.parameters.json) that p
139139
"contentVersion": "1.0.0.0",
140140
"parameters": {
141141
"principalId": {
142-
"value": "11111111-1111-1111-1111-111111111111"
142+
"value": "aaaaaaaa-bbbb-cccc-1111-222222222222"
143143
},
144144
"labName": {
145145
"value": "MyLab"
@@ -163,7 +163,7 @@ New-AzureRmResourceGroupDeployment -Name "MyLabResourceGroup-$(New-Guid)" -Resou
163163
If you plan to use the template several times to add several Active Directory objects to the DevTest Labs User role for your lab, consider using dynamic objects in your PowerShell command. The following example uses the [New-Guid](/powershell/module/Microsoft.PowerShell.Utility/New-Guid) cmdlet to specify the resource group deployment name and role assignment GUID dynamically.
164164

165165
```powershell
166-
New-AzureRmResourceGroupDeployment -Name "MyLabResourceGroup-$(New-Guid)" -ResourceGroupName 'MyLabResourceGroup' -TemplateFile .\azuredeploy.json -roleAssignmentGuid "$(New-Guid)" -labName "MyLab" -principalId "11111111-1111-1111-1111-111111111111"
166+
New-AzureRmResourceGroupDeployment -Name "MyLabResourceGroup-$(New-Guid)" -ResourceGroupName 'MyLabResourceGroup' -TemplateFile .\azuredeploy.json -roleAssignmentGuid "$(New-Guid)" -labName "MyLab" -principalId "aaaaaaaa-bbbb-cccc-1111-222222222222"
167167
```
168168

169169
## Use Azure PowerShell

articles/devtest-labs/configure-shared-image-gallery.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -124,7 +124,7 @@ You can use an ARM template to attach a shared image gallery to your lab. You ne
124124
"name":"myGallery",
125125
"type":"sharedGalleries",
126126
"properties": {
127-
"galleryId":"/subscriptions/11111111-1111-1111-1111-111111111111/resourceGroups/mySharedGalleryRg/providers/Microsoft.Compute/galleries/mySharedGallery",
127+
"galleryId":"/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/mySharedGalleryRg/providers/Microsoft.Compute/galleries/mySharedGallery",
128128
"allowAllImages": "Enabled"
129129
}
130130
}

articles/devtest-labs/devtest-lab-grant-user-permissions-to-specific-lab-policies.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -53,20 +53,20 @@ $policyRoleDef = (New-AzRoleDefinition -Role $policyRoleDef)
5353
## Assigning permissions to a user for a specific policy using custom roles
5454
Once you’ve defined your custom roles, you can assign them to users. In order to assign a custom role to a user, you must first obtain the **ObjectId** representing that user. To do that, use the **Get-AzADUser** cmdlet.
5555

56-
In the following example, the **ObjectId** of the *SomeUser* user is 05DEFF7B-0AC3-4ABF-B74D-6A72CD5BF3F3.
56+
In the following example, the **ObjectId** of the *SomeUser* user is aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb.
5757

5858
```azurepowershell
5959
PS C:\>Get-AzADUser -SearchString "SomeUser"
6060
6161
DisplayName Type ObjectId
6262
----------- ---- --------
63-
[email protected] 05DEFF7B-0AC3-4ABF-B74D-6A72CD5BF3F3
63+
[email protected] aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb
6464
```
6565

6666
Once you have the **ObjectId** for the user and a custom role name, you can assign that role to the user with the **New-AzRoleAssignment** cmdlet:
6767

6868
```azurepowershell
69-
PS C:\>New-AzRoleAssignment -ObjectId 05DEFF7B-0AC3-4ABF-B74D-6A72CD5BF3F3 -RoleDefinitionName "Policy Contributor" -Scope /subscriptions/<SubscriptionID>/resourceGroups/<ResourceGroupName>/providers/Microsoft.DevTestLab/labs/<LabName>/policySets/default/policies/AllowedVmSizesInLab
69+
PS C:\>New-AzRoleAssignment -ObjectId aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb -RoleDefinitionName "Policy Contributor" -Scope /subscriptions/<SubscriptionID>/resourceGroups/<ResourceGroupName>/providers/Microsoft.DevTestLab/labs/<LabName>/policySets/default/policies/AllowedVmSizesInLab
7070
```
7171

7272
In the previous example, the **AllowedVmSizesInLab** policy is used. You can use any of the following policies:

0 commit comments

Comments
 (0)