Skip to content

Commit b074fe4

Browse files
committed
Fixed invisible characters
1 parent 45b49ce commit b074fe4

File tree

8 files changed

+16
-16
lines changed

8 files changed

+16
-16
lines changed

articles/key-vault/certificates/quick-create-python.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -65,12 +65,12 @@ az keyvault create --name <your-unique-keyvault-name> -g "myResourceGroup"
6565

6666
The simplest way to authenticate a cloud-based .NET application is with a managed identity; see [Use an App Service managed identity to access Azure Key Vault](../general/managed-identity.md) for details.
6767

68-
For the sake of simplicity however, this quickstart creates a desktop application, which requires the use of a service principal and an access control policy. Your service principle requires a unique name in the format "http://<my-unique-service-principle-name>".
68+
For the sake of simplicity however, this quickstart creates a desktop application, which requires the use of a service principal and an access control policy. Your service principle requires a unique name in the format "http://&lt;my-unique-service-principle-name&gt;".
6969

7070
Create a service principle using the Azure CLI [az ad sp create-for-rbac](/cli/azure/ad/sp?view=azure-cli-latest#az-ad-sp-create-for-rbac) command:
7171

7272
```azurecli
73-
az ad sp create-for-rbac -n "http://<my-unique-service-principle-name>" --sdk-auth
73+
az ad sp create-for-rbac -n "http://&lt;my-unique-service-principle-name&gt;" --sdk-auth
7474
```
7575

7676
This operation will return a series of key / value pairs.

articles/key-vault/general/group-permissions-for-apps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ The objectId for an applications corresponds with its associated service princip
5656

5757
There are two ways to obtain an objectId for an application. The first is to register your application with Azure Active Directory. To do so, follow the steps in the quickstart [Register an application with the Microsoft identity platform](../../active-directory/develop/quickstart-register-app.md). When registration is complete, the objectID will be listed as the "Application (client) ID".
5858

59-
The second is to create a service principal in a terminal window. With the Azure CLI, use the [az ad sp create-for-rbac](/cli/azure/ad/sp?view=azure-cli-latest#az-ad-sp-create-for-rbac) command, and provide a unique service principle name to the -n flag in the format "http://<my-unique-service-principle-name>".
59+
The second is to create a service principal in a terminal window. With the Azure CLI, use the [az ad sp create-for-rbac](/cli/azure/ad/sp?view=azure-cli-latest#az-ad-sp-create-for-rbac) command, and provide a unique service principle name to the -n flag in the format "http://&lt;my-unique-service-principle-name&gt;".
6060

6161
```azurecli-interactive
6262
az ad sp create-for-rbac -n "http://<my-unique-service-principle-name"

articles/key-vault/keys/quick-create-python.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -65,12 +65,12 @@ az keyvault create --name <your-unique-keyvault-name> -g "myResourceGroup"
6565

6666
The simplest way to authenticate a cloud-based .NET application is with a managed identity; see [Use an App Service managed identity to access Azure Key Vault](../general/managed-identity.md) for details.
6767

68-
For the sake of simplicity however, this quickstart creates a desktop application, which requires the use of a service principal and an access control policy. Your service principle requires a unique name in the format "http://<my-unique-service-principle-name>".
68+
For the sake of simplicity however, this quickstart creates a desktop application, which requires the use of a service principal and an access control policy. Your service principle requires a unique name in the format "http://&lt;my-unique-service-principle-name&gt;".
6969

7070
Create a service principle using the Azure CLI [az ad sp create-for-rbac](/cli/azure/ad/sp?view=azure-cli-latest#az-ad-sp-create-for-rbac) command:
7171

7272
```azurecli
73-
az ad sp create-for-rbac -n "http://<my-unique-service-principle-name>" --sdk-auth
73+
az ad sp create-for-rbac -n "http://&lt;my-unique-service-principle-name&gt;" --sdk-auth
7474
```
7575

7676
This operation will return a series of key / value pairs.

articles/key-vault/secrets/quick-create-java.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -112,12 +112,12 @@ az keyvault create --name <your-unique-keyvault-name> -g "myResourceGroup"
112112

113113
The simplest way to authenticate a cloud-based application is with a managed identity; see [Use an App Service managed identity to access Azure Key Vault](../general/managed-identity.md) for details.
114114

115-
For the sake of simplicity however, this quickstart creates a desktop application, which requires the use of a service principal and an access control policy. Your service principle requires a unique name in the format "http://<my-unique-service-principle-name>".
115+
For the sake of simplicity however, this quickstart creates a desktop application, which requires the use of a service principal and an access control policy. Your service principle requires a unique name in the format "http://&lt;my-unique-service-principle-name&gt;".
116116

117117
Create a service principle using the Azure CLI [az ad sp create-for-rbac](/cli/azure/ad/sp?view=azure-cli-latest#az-ad-sp-create-for-rbac) command:
118118

119119
```azurecli
120-
az ad sp create-for-rbac -n "http://<my-unique-service-principle-name>" --sdk-auth
120+
az ad sp create-for-rbac -n "http://&lt;my-unique-service-principle-name&gt;" --sdk-auth
121121
```
122122

123123
This operation will return a series of key / value pairs.

articles/key-vault/secrets/quick-create-net-v3.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -97,12 +97,12 @@ az keyvault create --name <your-unique-keyvault-name> -g "myResourceGroup"
9797

9898
The simplest way to authenticate a cloud-based .NET application is with a managed identity; see [Use an App Service managed identity to access Azure Key Vault](../general/managed-identity.md) for details.
9999

100-
For the sake of simplicity however, this quickstart creates a .NET console application, which requires the use of a service principal and an access control policy. Your service principle requires a unique name in the format "http://<my-unique-service-principle-name>".
100+
For the sake of simplicity however, this quickstart creates a .NET console application, which requires the use of a service principal and an access control policy. Your service principle requires a unique name in the format "http://&lt;my-unique-service-principle-name&gt;".
101101

102102
Create a service principle using the Azure CLI [az ad sp create-for-rbac](/cli/azure/ad/sp?view=azure-cli-latest#az-ad-sp-create-for-rbac) command:
103103

104104
```azurecli
105-
az ad sp create-for-rbac -n "http://<my-unique-service-principle-name>" --sdk-auth
105+
az ad sp create-for-rbac -n "http://&lt;my-unique-service-principle-name&gt;" --sdk-auth
106106
```
107107

108108
This operation will return a series of key / value pairs.

articles/key-vault/secrets/quick-create-net.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -93,12 +93,12 @@ New-AzKeyVault -Name <your-unique-keyvault-name> -ResourceGroupName myResourceGr
9393

9494
The simplest way to authenticate a cloud-based .NET application is with a managed identity; see [Use an App Service managed identity to access Azure Key Vault](../general/managed-identity.md) for details.
9595

96-
For the sake of simplicity however, this quickstart creates a .NET console application, which requires the use of a service principal and an access control policy. Your service principle requires a unique name in the format "http://<my-unique-service-principle-name>".
96+
For the sake of simplicity however, this quickstart creates a .NET console application, which requires the use of a service principal and an access control policy. Your service principle requires a unique name in the format "http://&lt;my-unique-service-principle-name&gt;".
9797

9898
Create a service principle using the Azure CLI [az ad sp create-for-rbac](/cli/azure/ad/sp?view=azure-cli-latest#az-ad-sp-create-for-rbac) command:
9999

100100
```azurecli
101-
az ad sp create-for-rbac -n "http://<my-unique-service-principle-name>" --sdk-auth
101+
az ad sp create-for-rbac -n "http://&lt;my-unique-service-principle-name&gt;" --sdk-auth
102102
```
103103

104104
This operation will return a series of key / value pairs.
@@ -121,7 +121,7 @@ Create a service principal using Azure PowerShell [New-AzADServicePrincipal](/po
121121

122122
```azurepowershell
123123
# Create a new service principal
124-
$spn = New-AzADServicePrincipal -DisplayName "http://<my-unique-service-principle-name>"
124+
$spn = New-AzADServicePrincipal -DisplayName "http://&lt;my-unique-service-principle-name&gt;"
125125
126126
# Get the tenant ID and subscription ID of the service principal
127127
$tenantId = (Get-AzContext).Tenant.Id

articles/key-vault/secrets/quick-create-node.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -65,12 +65,12 @@ az keyvault create --name <your-unique-keyvault-name> -g "myResourceGroup"
6565

6666
The simplest way to authenticate an cloud-based application is with a managed identity; see [Use an App Service managed identity to access Azure Key Vault](../general/managed-identity.md) for details.
6767

68-
For the sake of simplicity however, this quickstart creates a desktop application, which requires the use of a service principal and an access control policy. Your service principle requires a unique name in the format "http://<my-unique-service-principle-name>".
68+
For the sake of simplicity however, this quickstart creates a desktop application, which requires the use of a service principal and an access control policy. Your service principle requires a unique name in the format "http://&lt;my-unique-service-principle-name&gt;".
6969

7070
Create a service principle using the Azure CLI [az ad sp create-for-rbac](/cli/azure/ad/sp?view=azure-cli-latest#az-ad-sp-create-for-rbac) command:
7171

7272
```azurecli
73-
az ad sp create-for-rbac -n "http://<my-unique-service-principle-name>" --sdk-auth
73+
az ad sp create-for-rbac -n "http://&lt;my-unique-service-principle-name&gt;" --sdk-auth
7474
```
7575

7676
This operation will return a series of key / value pairs.

articles/key-vault/secrets/quick-create-python.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -65,12 +65,12 @@ az keyvault create --name <your-unique-keyvault-name> -g "myResourceGroup"
6565

6666
The simplest way to authenticate a cloud-based Python application is with a managed identity; see [Use an App Service managed identity to access Azure Key Vault](../general/managed-identity.md) for details.
6767

68-
For the sake of simplicity however, this quickstart creates a desktop application, which requires the use of a service principal and an access control policy. Your service principle requires a unique name in the format "http://<my-unique-service-principle-name>".
68+
For the sake of simplicity however, this quickstart creates a desktop application, which requires the use of a service principal and an access control policy. Your service principle requires a unique name in the format "http://&lt;my-unique-service-principle-name&gt;".
6969

7070
Create a service principle using the Azure CLI [az ad sp create-for-rbac](/cli/azure/ad/sp?view=azure-cli-latest#az-ad-sp-create-for-rbac) command:
7171

7272
```azurecli
73-
az ad sp create-for-rbac -n "http://<my-unique-service-principle-name>" --sdk-auth
73+
az ad sp create-for-rbac -n "http://&lt;my-unique-service-principle-name&gt;" --sdk-auth
7474
```
7575

7676
This operation will return a series of key / value pairs.

0 commit comments

Comments
 (0)