Skip to content

Commit 8571af2

Browse files
kgrembandigimaun
andauthored
Update articles/iot-operations/deploy-iot-ops/howto-manage-secrets.md
Co-authored-by: Paymaun <[email protected]>
1 parent 4c4b9d4 commit 8571af2

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/iot-operations/deploy-iot-ops/howto-manage-secrets.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -133,7 +133,7 @@ az iot ops init --name "<your unique key vault name>" --resource-group "<the nam
133133
--no-deploy
134134
```
135135

136-
One step that the `init` command takes is to create a Key Vault secret to use for the Azure IoT Operations service account. This step requires that the principal logged in to the CLI has secret `set` permissions. If you want to use an existing secret, you can specify it with the `--kv-sat-secret-name` parameter, in which case the logged in principal only needs secret `get` permissions.
136+
One step that the `init` command takes is to ensure all Secret Provider Classes (SPCs) required by Azure IoT Operations have a default secret configured in key vault. If a value for the default secret does not exist `init` will create one. This step requires that the principal logged in to the CLI has secret `set` permissions. If you want to use an existing secret as the default SPC secret, you can specify it with the `--kv-sat-secret-name` parameter, in which case the logged in principal only needs secret `get` permissions.
137137

138138
## Add a secret to an Azure IoT Operations component
139139

0 commit comments

Comments
 (0)