Skip to content

Commit 9d5ef53

Browse files
committed
Add contributor role for CLI, edit code block tags
1 parent 5596f72 commit 9d5ef53

File tree

10 files changed

+11
-11
lines changed

10 files changed

+11
-11
lines changed

articles/application-gateway/ingress-controller-multiple-namespace-support.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -174,7 +174,7 @@ options:
174174
## Alternatively you can use Service Principal credentials
175175
# armAuth:
176176
# type: servicePrincipal
177-
# secretJSON: <<Generate this value with: "az ad sp create-for-rbac --subscription <subscription-uuid> --sdk-auth | base64 -w0" >>
177+
# secretJSON: <<Generate this value with: "az ad sp create-for-rbac --subscription <subscription-uuid> --role Contributor --sdk-auth | base64 -w0" >>
178178
179179
################################################################################
180180
# Specify if the cluster is Kubernetes RBAC enabled or not

articles/application-gateway/ingress-controller-troubleshoot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -313,7 +313,7 @@ armAuth:
313313
## Alternatively you can use Service Principal credentials
314314
# armAuth:
315315
# type: servicePrincipal
316-
# secretJSON: <<Generate this value with: "az ad sp create-for-rbac --subscription <subscription-uuid> --sdk-auth | base64 -w0" >>
316+
# secretJSON: <<Generate this value with: "az ad sp create-for-rbac --subscription <subscription-uuid> --role Contributor --sdk-auth | base64 -w0" >>
317317
318318
################################################################################
319319
# Specify if the cluster is Kubernetes RBAC enabled or not

articles/azure-app-configuration/use-key-vault-references-spring-boot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ To add a secret to the vault, you need to take just a few additional steps. In t
9393
1. In this tutorial, you use a service principal for authentication to Key Vault. To create this service principal, use the Azure CLI [az ad sp create-for-rbac](/cli/azure/ad/sp#az_ad_sp_create_for_rbac) command:
9494

9595
```azurecli
96-
az ad sp create-for-rbac -n "http://mySP" --sdk-auth
96+
az ad sp create-for-rbac -n "http://mySP" --role Contributor --sdk-auth
9797
```
9898
9999
This operation returns a series of key/value pairs:

articles/azure-arc/kubernetes/create-onboarding-service-principal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,8 +23,8 @@ Walk through the following steps to learn how to use service principals for conn
2323

2424
Create a new service principal with an informative name that is unique for your Azure Active Directory tenant.
2525

26-
```console
27-
az ad sp create-for-RBAC --skip-assignment --name "https://azure-arc-for-k8s-onboarding"
26+
```azurecli
27+
az ad sp create-for-RBAC --skip-assignment --name "https://azure-arc-for-k8s-onboarding" --role Contributor
2828
```
2929

3030
**Output:**

articles/azure-netapp-files/azacsnap-installation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,7 @@ Create RBAC Service Principal
109109
1. Create a service principal using Azure CLI per the following example
110110
111111
```azurecli-interactive
112-
az ad sp create-for-rbac --sdk-auth
112+
az ad sp create-for-rbac --role Contributor --sdk-auth
113113
```
114114
115115
1. This should generate an output like the following example:

articles/azure-netapp-files/azure-netapp-files-develop-with-rest-api.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ The REST API specification for Azure NetApp Files is published through [GitHub](
4343
2. Enter the following command in the Azure CLI:
4444

4545
```azurecli
46-
az ad sp create-for-rbac --name $YOURSPNAMEGOESHERE
46+
az ad sp create-for-rbac --name $YOURSPNAMEGOESHERE --role Contributor
4747
```
4848
4949
The command output is similar to the following example:

articles/azure-netapp-files/develop-rest-api-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ The REST API specification for Azure NetApp Files is published through [GitHub](
3636
2. Enter the following command in the Azure CLI:
3737

3838
```azurecli
39-
$RBAC_SP = az ad sp create-for-rbac --name <YOURSPNAMEGOESHERE> | ConvertFrom-Json
39+
$RBAC_SP = az ad sp create-for-rbac --name <YOURSPNAMEGOESHERE> --role Contributor | ConvertFrom-Json
4040
```
4141
4242
To display the service principal information, type `$RBAC_SP` and press Enter.

articles/cognitive-services/Computer-vision/spatial-analysis-logging.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ After setting up Azure Monitor, you will need to create credentials that enable
5353
> [!NOTE]
5454
> This command requires you to have Owner privileges on the subscription.
5555
56-
```bash
56+
```azurecli
5757
# Find your Azure IoT Hub resource ID by running this command. The resource ID should start with something like
5858
# "/subscriptions/b60d6458-1234-4be4-9885-c7e73af9ced8/resourceGroups/..."
5959
az iot hub list

articles/cognitive-services/Custom-Vision-Service/logo-detector-mobile.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -113,7 +113,7 @@ az account set --subscription "<subscription name or subscription id>"
113113
Then create your service principal. (This process might take some time to finish.)
114114

115115
```azurecli
116-
az ad sp create-for-rbac --name <servicePrincipalName> --password <yourSPStrongPassword>
116+
az ad sp create-for-rbac --name <servicePrincipalName> --role Contributor --password <yourSPStrongPassword>
117117
```
118118

119119
Upon successful completion, you should see the following JSON output, including the necessary credentials.

articles/cognitive-services/containers/azure-kubernetes-recipe.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -173,7 +173,7 @@ The following steps are needed to get the required information to connect your c
173173
1. Create service principal.
174174
175175
```azurecli-interactive
176-
az ad sp create-for-rbac --skip-assignment
176+
az ad sp create-for-rbac --role Contributor --skip-assignment
177177
```
178178
179179
Save the results `appId` value for the assignee parameter in step 3, `<appId>`. Save the `password` for the next section's client-secret parameter `<client-secret>`.

0 commit comments

Comments
 (0)