Skip to content

Commit 8a55b45

Browse files
committed
update
1 parent 65685bb commit 8a55b45

File tree

3 files changed

+7
-7
lines changed

3 files changed

+7
-7
lines changed

includes/key-vault-quickstart-rbac-cli.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.author: msmbaldwin
1212
To grant your user account permissions to your key vault through Role-Based Access Control (RBAC), assign a role using the Azure CLI command [az role assignment create](/cli/azure/role/assignment#az-role-assignment-create).
1313

1414
```azurecli
15-
az role assignment create --role "Key Vault Secrets User" --assignee <your-email-address> --scope /subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.KeyVault/vaults/<your-unique-keyvault-name>
15+
az role assignment create --role "Key Vault Secrets User" --assignee "<your-email-address>" --scope "/subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.KeyVault/vaults/<your-unique-keyvault-name>"
1616
```
1717

18-
Replace <your-email-address>, <subscription-id>, <resource-group-name>, and <your-unique-keyvault-name> with your actual values. <your-email-address> is your sign-in name.
18+
Replace `<your-email-address>`, `<subscription-id>`, `<resource-group-name>`, and `<your-unique-keyvault-name>` with your actual values. `<your-email-address>` is your sign-in name.

includes/key-vault-quickstart-rbac-powershell.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.author: msmbaldwin
1212
To grant your user account permissions to your key vault through Role-Based Access Control (RBAC), assign a role using the Azure CLI command [az role assignment create](/cli/azure/role/assignment#az-role-assignment-create).
1313

1414
```
15-
New-AzRoleAssignment -RoleDefinitionName "Key Vault Secrets User" -SignInName <your-email-address> -Scope "/subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.KeyVault/vaults/<your-unique-keyvault-name>"
15+
New-AzRoleAssignment -RoleDefinitionName "Key Vault Secrets User" -SignInName "<your-email-address>" -Scope "/subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.KeyVault/vaults/<your-unique-keyvault-name>"
1616
```
1717

18-
Replace <your-email-address>, <subscription-id>, <resource-group-name>, and <your-unique-keyvault-name> with your actual values. <your-email-address> is your sign-in name; you can instead use the `-ObjectId` parameter and a Microsoft Entra Object ID.
18+
Replace `<your-email-address>`, `<subscription-id>`, `<resource-group-name>`, and `<your-unique-keyvault-name>` with your actual values. `<your-email-address>` is your sign-in name; you can instead use the `-ObjectId` parameter and a Microsoft Entra Object ID.

includes/key-vault-quickstart-rbac.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,17 +14,17 @@ ms.author: msmbaldwin
1414
To grant your application permissions to your key vault through Role-Based Access Control (RBAC), assign a role using the Azure CLI command [az role assignment create](/cli/azure/role/assignment#az-role-assignment-create).
1515

1616
```azurecli
17-
az role assignment create --role "Key Vault Secrets User" --assignee <app-id> --scope /subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.KeyVault/vaults/<your-unique-keyvault-name>
17+
az role assignment create --role "Key Vault Secrets User" --assignee "<app-id>" --scope "/subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.KeyVault/vaults/<your-unique-keyvault-name>"
1818
```
1919

2020
### [Azure PowerShell](#tab/azure-powershell)
2121

2222
To grant your application permissions to your key vault through Role-Based Access Control (RBAC), assign a role using the Azure PowerShell cmdlet [New-AzRoleAssignment](//powershell/module/az.keyvault/new-azRoleAssignment).
2323

2424
```
25-
New-AzRoleAssignment -ObjectId <app-id> -RoleDefinitionName "Key Vault Secrets User" -Scope "/subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.KeyVault/vaults/<your-unique-keyvault-name>"
25+
New-AzRoleAssignment -ObjectId "<app-id>" -RoleDefinitionName "Key Vault Secrets User" -Scope "/subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.KeyVault/vaults/<your-unique-keyvault-name>"
2626
```
2727

2828
---
2929

30-
Replace <app-id>, <subscription-id>, <resource-group-name>, and <your-unique-keyvault-name> with your actual values. <app-id> is the Application (client) ID of your registered application in Azure AD.
30+
Replace `<app-id>`, `<subscription-id>`, `<resource-group-name>`, and `<your-unique-keyvault-name>` with your actual values. `<app-id>` is the Application (client) ID of your registered application in Azure AD.

0 commit comments

Comments
 (0)