Skip to content

Commit b2d058e

Browse files
committed
update
1 parent 8a55b45 commit b2d058e

File tree

4 files changed

+13
-5
lines changed

4 files changed

+13
-5
lines changed

articles/key-vault/general/rbac-guide.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -236,6 +236,7 @@ For full details, see [Assign Azure roles using Azure PowerShell](../../role-bas
236236
![Add role assignment page in Azure portal.](../../../includes/role-based-access-control/media/add-role-assignment-page.png)
237237

238238
# [Azure CLI](#tab/azure-cli)
239+
239240
```azurecli
240241
az role assignment create --role "Key Vault Secrets Officer" --assignee {i.e [email protected]} --scope /subscriptions/{subscriptionid}/resourcegroups/{resource-group-name}/providers/Microsoft.KeyVault/vaults/{key-vault-name}/secrets/RBACSecret
241242
```
@@ -294,11 +295,12 @@ For full details, see [Assign Azure roles using Azure PowerShell](../../role-bas
294295

295296
![Secret tab - error](../media/rbac/image-13.png)
296297

297-
### Creating custom roles
298+
### Creating custom roles
298299

299300
[az role definition create command](/cli/azure/role/definition#az-role-definition-create)
300301

301302
# [Azure CLI](#tab/azure-cli)
303+
302304
```azurecli
303305
az role definition create --role-definition '{ \
304306
"Name": "Backup Keys Operator", \
@@ -315,6 +317,7 @@ az role definition create --role-definition '{ \
315317
"AssignableScopes": ["/subscriptions/{subscriptionId}"] \
316318
}'
317319
```
320+
318321
# [Azure PowerShell](#tab/azurepowershell)
319322

320323
```azurepowershell
@@ -339,6 +342,11 @@ $roleDefinition | Out-File role.json
339342
340343
New-AzRoleDefinition -InputFile role.json
341344
```
345+
346+
# [Azure portal](#tab/azure-portal)
347+
348+
test
349+
342350
---
343351

344352
For more Information about how to create custom roles, see:

includes/key-vault-quickstart-rbac-cli.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,4 +15,4 @@ To grant your user account permissions to your key vault through Role-Based Acce
1515
az role assignment create --role "Key Vault Secrets User" --assignee "<your-email-address>" --scope "/subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.KeyVault/vaults/<your-unique-keyvault-name>"
1616
```
1717

18-
Replace `<your-email-address>`, `<subscription-id>`, `<resource-group-name>`, and `<your-unique-keyvault-name>` with your actual values. `<your-email-address>` is your sign-in name.
18+
Replace \<your-email-address\>, \<subscription-id\>, \<resource-group-name\> and \<your-unique-keyvault-name\> with your actual values. \<your-email-address\> is your sign-in name.

includes/key-vault-quickstart-rbac-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,4 +15,4 @@ To grant your user account permissions to your key vault through Role-Based Acce
1515
New-AzRoleAssignment -RoleDefinitionName "Key Vault Secrets User" -SignInName "<your-email-address>" -Scope "/subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.KeyVault/vaults/<your-unique-keyvault-name>"
1616
```
1717

18-
Replace `<your-email-address>`, `<subscription-id>`, `<resource-group-name>`, and `<your-unique-keyvault-name>` with your actual values. `<your-email-address>` is your sign-in name; you can instead use the `-ObjectId` parameter and a Microsoft Entra Object ID.
18+
Replace \<your-email-address\>, \<subscription-id\>, \<resource-group-name\> and \<your-unique-keyvault-name\> with your actual values. \<your-email-address\> is your sign-in name; you can instead use the `-ObjectId` parameter and a Microsoft Entra Object ID.

includes/key-vault-quickstart-rbac.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,12 +19,12 @@ az role assignment create --role "Key Vault Secrets User" --assignee "<app-id>"
1919

2020
### [Azure PowerShell](#tab/azure-powershell)
2121

22-
To grant your application permissions to your key vault through Role-Based Access Control (RBAC), assign a role using the Azure PowerShell cmdlet [New-AzRoleAssignment](//powershell/module/az.keyvault/new-azRoleAssignment).
22+
To grant your application permissions to your key vault through Role-Based Access Control (RBAC), assign a role using the Azure PowerShell cmdlet [New-AzRoleAssignment](/powershell/module/az.keyvault/new-azRoleAssignment).
2323

2424
```
2525
New-AzRoleAssignment -ObjectId "<app-id>" -RoleDefinitionName "Key Vault Secrets User" -Scope "/subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.KeyVault/vaults/<your-unique-keyvault-name>"
2626
```
2727

2828
---
2929

30-
Replace `<app-id>`, `<subscription-id>`, `<resource-group-name>`, and `<your-unique-keyvault-name>` with your actual values. `<app-id>` is the Application (client) ID of your registered application in Azure AD.
30+
Replace \<app-id\>, \<subscription-id\>, \<resource-group-name\> and \<your-unique-keyvault-name\> with your actual values. \<app-id\> is the Application (client) ID of your registered application in Azure AD.

0 commit comments

Comments
 (0)