You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/operator-nexus/howto-set-up-defender-for-cloud-security.md
+2-18Lines changed: 2 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -66,7 +66,6 @@ The required permission is ```Microsoft.Security/mdeOnboardings/read```. Assign
66
66
67
67
> [!IMPORTANT]
68
68
> The user or identity creating the role assignment must have the ```Microsoft.Authorization/roleAssignments/write``` permission at the subscription level.
69
-
> Executing the commands to show the principal ID object ID requires the Microsoft Entra role assignment of Directory Reader or equivalent.
70
69
71
70
Below is an example bash script using the Azure CLI for granting the nc-platform-extension identity permission to onboard the MDE agent on your behalf.
72
71
@@ -107,27 +106,12 @@ PRINCIPAL_ID=$(az k8s-extension show \
107
106
--output tsv)
108
107
echo"Extension Principal ID: $PRINCIPAL_ID"
109
108
110
-
# 5. Show the full service principal object
111
-
echo"Showing service principal details"
112
-
az ad sp show --id "$PRINCIPAL_ID"
113
-
114
-
# 6. Show just the object ID
115
-
OBJECT_ID=$(az ad sp show --id "$PRINCIPAL_ID" --query "id" --output tsv)
116
-
echo"Service Principal Object ID: $OBJECT_ID"
117
-
118
-
# 7. Show additional properties (ObjectID, AppID, DisplayName) in a table
0 commit comments