You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/iot-operations/deploy-iot-ops/howto-manage-secrets.md
-4Lines changed: 0 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -109,9 +109,7 @@ The newly created service principal needs **Secret** `list` and `get` access pol
109
109
Run the following to assign **secret**`get` and `list` permissions to the service principal.
110
110
111
111
```bash
112
-
113
112
az keyvault set-policy --name "<your unique key vault name>" --resource-group "<the name of the resource group>" --object-id <Object ID copied from Enterprise Application SP in Microsoft Entra ID> --secret-permissions get list --key-permissions get list
114
-
115
113
```
116
114
117
115
### Pass service principal and Key Vault arguments to Azure IoT Operations deployment
@@ -121,14 +119,12 @@ When following the guide [Deploy Azure IoT Operations extensions](./howto-deploy
121
119
The following example shows how to prepare the cluster for Azure IoT Operations without fully deploying it by using `--no-deploy` flag. You can also run the command without this argument for a default Azure IoT Operations deployment.
122
120
123
121
```bash
124
-
125
122
az iot ops init --name "<your unique key vault name>" --resource-group "<the name of the resource group>" \
126
123
--kv-id <Key Vault Resource ID> \
127
124
--sp-app-id <Application registration App ID (client ID) from Microsoft Entra ID> \
128
125
--sp-object-id <Object ID copied from Enterprise Application in Microsoft Entra ID> \
129
126
--sp-secret "<Client Secret from App registration in Microsoft Entra ID>" \
130
127
--no-deploy
131
-
132
128
```
133
129
134
130
## Add a secret to an Azure IoT Operations component
0 commit comments