Skip to content

Commit 55a4f33

Browse files
committed
remove role from blocks with skip assignment
1 parent cf77edb commit 55a4f33

File tree

5 files changed

+5
-5
lines changed

5 files changed

+5
-5
lines changed

articles/databox-online/azure-stack-edge-gpu-deploy-arc-kubernetes-cluster.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ You can also register resource providers via the `az cli`. For more information,
9191
Here is an example.
9292

9393
```azurecli
94-
PS /home/user> az ad sp create-for-rbac --skip-assignment --name "https://azure-arc-for-ase-k8s" --role Contributor
94+
PS /home/user> az ad sp create-for-rbac --skip-assignment --name "https://azure-arc-for-ase-k8s"
9595
{
9696
"appId": "aa8a082e-0fa1-4a82-b51c-e8b2a9fdaa8b",
9797
"displayName": "azure-arc-for-ase-k8s",

articles/key-vault/general/manage-with-cli2.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -195,7 +195,7 @@ For detailed steps on registering an application with Azure Active Directory you
195195
To register an application in Azure Active Directory:
196196

197197
```azurecli
198-
az ad sp create-for-rbac -n "MyApp" --password "hVFkk965BuUv" --role Contributor --skip-assignment
198+
az ad sp create-for-rbac -n "MyApp" --password "hVFkk965BuUv" --skip-assignment
199199
# If you don't specify a password, one will be created for you.
200200
```
201201

articles/virtual-machines/linux/disk-encryption-key-vault-aad.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ You can manage your service principals with Azure CLI using the [az ad sp](/cli/
114114
1. Create a new service principal.
115115
116116
```azurecli-interactive
117-
az ad sp create-for-rbac --name "ServicePrincipalName" --role Contributor --password "My-AAD-client-secret" --skip-assignment
117+
az ad sp create-for-rbac --name "ServicePrincipalName" --password "My-AAD-client-secret" --skip-assignment
118118
```
119119
3. The appId returned is the Azure AD ClientID used in other commands. It's also the SPN you'll use for az keyvault set-policy. The password is the client secret that you should use later to enable Azure Disk Encryption. Safeguard the Azure AD client secret appropriately.
120120

articles/virtual-machines/windows/disk-encryption-key-vault-aad.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ You can manage your service principals with Azure CLI using the [az ad sp](/cli/
114114
1. Create a new service principal.
115115
116116
```azurecli-interactive
117-
az ad sp create-for-rbac --name "ServicePrincipalName" --role Contributor --password "My-AAD-client-secret" --skip-assignment
117+
az ad sp create-for-rbac --name "ServicePrincipalName" --password "My-AAD-client-secret" --skip-assignment
118118
```
119119
3. The appId returned is the Azure AD ClientID used in other commands. It's also the SPN you'll use for az keyvault set-policy. The password is the client secret that you should use later to enable Azure Disk Encryption. Safeguard the Azure AD client secret appropriately.
120120

includes/key-vault-sp-creation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ For the sake of simplicity however, this quickstart creates a desktop applicatio
1616
Create a service principal using the Azure CLI [az ad sp create-for-rbac](/cli/azure/ad/sp#az_ad_sp_create_for_rbac) command:
1717

1818
```azurecli
19-
az ad sp create-for-rbac --skip-assignment -n "http://<my-unique-service-principal-name>" --role Contributor --sdk-auth
19+
az ad sp create-for-rbac --skip-assignment -n "http://<my-unique-service-principal-name>" --sdk-auth
2020
```
2121

2222
This operation will return a series of key / value pairs.

0 commit comments

Comments
 (0)