Skip to content

Commit 67c212a

Browse files
authored
fix code block indentation, markdown showing on staging
1 parent 1a362ae commit 67c212a

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

articles/automation/manage-runas-account.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@ The script uses multiple Azure Resource Manager cmdlets to create resources. For
125125

126126
Save the script on your computer using the filename **New-RunAsAccount.ps1**.
127127

128-
```powershell
128+
```powershell
129129
#Requires -RunAsAdministrator
130130
Param (
131131
[Parameter(Mandatory = $true)]
@@ -302,7 +302,7 @@ Save the script on your computer using the filename **New-RunAsAccount.ps1**.
302302
303303
Write-Host -ForegroundColor red $UploadMessage
304304
}
305-
```
305+
```
306306

307307
>[!NOTE]
308308
>**Add-AzAccount** and **Add-AzureRMAccount** are aliases for [Connect-AzAccount](https://docs.microsoft.com/powershell/module/az.accounts/connect-azaccount?view=azps-3.5.0). You can use these cmdlets or you can [update your modules](automation-update-azure-modules.md) in your Automation account to the latest versions. You might need to update your modules even if you have just created a new Automation account.
@@ -318,29 +318,29 @@ After the script has executed, you will be prompted to authenticate with Azure.
318318

319319
#### Create a Run As account by using a self-signed certificate
320320

321-
```powershell
321+
```powershell
322322
.\New-RunAsAccount.ps1 -ResourceGroup <ResourceGroupName> -AutomationAccountName <NameofAutomationAccount> -SubscriptionId <SubscriptionId> -ApplicationDisplayName <DisplayNameofAADApplication> -SelfSignedCertPlainPassword <StrongPassword> -CreateClassicRunAsAccount $false
323-
```
323+
```
324324

325325
#### Create a Run As account and a Classic Run As account by using a self-signed certificate
326326

327-
```powershell
327+
```powershell
328328
.\New-RunAsAccount.ps1 -ResourceGroup <ResourceGroupName> -AutomationAccountName <NameofAutomationAccount> -SubscriptionId <SubscriptionId> -ApplicationDisplayName <DisplayNameofAADApplication> -SelfSignedCertPlainPassword <StrongPassword> -CreateClassicRunAsAccount $true
329-
```
329+
```
330330

331331
#### Create a Run As account and a Classic Run As account by using an enterprise certificate
332332

333-
```powershell
333+
```powershell
334334
.\New-RunAsAccount.ps1 -ResourceGroup <ResourceGroupName> -AutomationAccountName <NameofAutomationAccount> -SubscriptionId <SubscriptionId> -ApplicationDisplayName <DisplayNameofAADApplication> -SelfSignedCertPlainPassword <StrongPassword> -CreateClassicRunAsAccount $true -EnterpriseCertPathForRunAsAccount <EnterpriseCertPfxPathForRunAsAccount> -EnterpriseCertPlainPasswordForRunAsAccount <StrongPassword> -EnterpriseCertPathForClassicRunAsAccount <EnterpriseCertPfxPathForClassicRunAsAccount> -EnterpriseCertPlainPasswordForClassicRunAsAccount <StrongPassword>
335-
```
335+
```
336336

337-
If you have created a Classic Run As account with an enterprise public certificate (.cer file), use this certificate. Follow the instructions for [uploading a management API certificate to the Azure portal](../azure-api-management-certs.md).
337+
If you have created a Classic Run As account with an enterprise public certificate (.cer file), use this certificate. Follow the instructions for [uploading a management API certificate to the Azure portal](../azure-api-management-certs.md).
338338

339339
#### Create a Run As account and a Classic Run As account by using a self-signed certificate in the Azure Government cloud
340340

341-
```powershell
341+
```powershell
342342
.\New-RunAsAccount.ps1 -ResourceGroup <ResourceGroupName> -AutomationAccountName <NameofAutomationAccount> -SubscriptionId <SubscriptionId> -ApplicationDisplayName <DisplayNameofAADApplication> -SelfSignedCertPlainPassword <StrongPassword> -CreateClassicRunAsAccount $true -EnvironmentName AzureUSGovernment
343-
```
343+
```
344344

345345
If you have created a Classic Run As account with a self-signed public certificate (.cer file), the script creates and saves it to the temporary files folder on your computer. It can be found in the user profile **%USERPROFILE%\AppData\Local\Temp**, which you used to execute the PowerShell session.
346346

0 commit comments

Comments
 (0)