Skip to content

Commit 87af9e8

Browse files
authored
Update howto-manage-secrets.md space usage
1 parent df845e5 commit 87af9e8

File tree

1 file changed

+0
-4
lines changed

1 file changed

+0
-4
lines changed

articles/iot-operations/deploy-iot-ops/howto-manage-secrets.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -109,9 +109,7 @@ The newly created service principal needs **Secret** `list` and `get` access pol
109109
Run the following to assign **secret** `get` and `list` permissions to the service principal.
110110

111111
```bash
112-
113112
az keyvault set-policy --name "<your unique key vault name>" --resource-group "<the name of the resource group>" --object-id <Object ID copied from Enterprise Application SP in Microsoft Entra ID> --secret-permissions get list --key-permissions get list
114-
115113
```
116114

117115
### Pass service principal and Key Vault arguments to Azure IoT Operations deployment
@@ -121,14 +119,12 @@ When following the guide [Deploy Azure IoT Operations extensions](./howto-deploy
121119
The following example shows how to prepare the cluster for Azure IoT Operations without fully deploying it by using `--no-deploy` flag. You can also run the command without this argument for a default Azure IoT Operations deployment.
122120

123121
```bash
124-
125122
az iot ops init --name "<your unique key vault name>" --resource-group "<the name of the resource group>" \
126123
--kv-id <Key Vault Resource ID> \
127124
--sp-app-id <Application registration App ID (client ID) from Microsoft Entra ID> \
128125
--sp-object-id <Object ID copied from Enterprise Application in Microsoft Entra ID> \
129126
--sp-secret "<Client Secret from App registration in Microsoft Entra ID>" \
130127
--no-deploy
131-
132128
```
133129

134130
## Add a secret to an Azure IoT Operations component

0 commit comments

Comments
 (0)