Skip to content

Commit 6b5343c

Browse files
fix typo
1 parent 57c2a2a commit 6b5343c

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

includes/active-directory-msi-cross-tenant-cmk-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ Operations in Phase 1 would be a one-time setup for most service provider applic
4747
| Step | Description | Minimum role in Azure RBAC | Minimum role in Azure AD RBAC |
4848
| -- | ----------------------------------- | -------------- | --------------|
4949
| 1. | Create a new multi-tenant Azure AD application registration or start with an existing application registration. Note the application ID (client ID) of the application registration using [Azure portal](/azure/active-directory/develop/quickstart-register-app), [Microsoft Graph API](/graph/api/application-post-applications), [Azure PowerShell](/powershell/module/azuread/new-azureadapplication), or [Azure CLI](/cli/azure/ad/app#az_ad_app_create)| None | [Application Developer](/azure/active-directory/roles/permissions-reference#application-developer) |
50-
| 2. | Create a user-assigned managed identity (to be used as a Federated Identity Credential). <br> [Azure portal](/azure/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-azp&preserve-view=true) / [Azure CLI](/azure/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-azcli&preserve-view=true) / [Azure PowerShell](/azure/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-powershell&preserve-view=true)/ [Azure Resource Manager Templates](/azure/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-arm&preserve-view=true) | [Manage identity contributor](/azure/role-based-access-control/built-in-role#managed-identity-contributor&preserve-view=true) | None |
50+
| 2. | Create a user-assigned managed identity (to be used as a Federated Identity Credential). <br> [Azure portal](/azure/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-azp&preserve-view=true) / [Azure CLI](/azure/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-azcli&preserve-view=true) / [Azure PowerShell](/azure/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-powershell&preserve-view=true)/ [Azure Resource Manager Templates](/azure/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-arm&preserve-view=true) | [Manage identity contributor](/azure/role-based-access-control/built-in-roles#managed-identity-contributor&preserve-view=true) | None |
5151
| 3. | Configure user-assigned managed identity as a *federated identity credential* on the application, so that it can impersonate the identity of the application. <br> [Graph API reference](https://aka.ms/fedcredentialapi)/ [Azure portal](/azure/active-directory/develop/workload-identity-federation-create-trust?pivots=identity-wif-apps-methods-azp)/ [Azure CLI](/azure/active-directory/develop/workload-identity-federation-create-trust?pivots=identity-wif-apps-methods-azcli)/ [Azure PowerShell](/azure/active-directory/develop/workload-identity-federation-create-trust?pivots=identity-wif-apps-methods-powershell) | None | Owner of the application |
5252
| 4. | Share the application name and application ID with the customer, so that they can install and authorize the application. | None | None|
5353

0 commit comments

Comments
 (0)