Skip to content

Commit b382798

Browse files
committed
fix
1 parent e4a3c09 commit b382798

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/container-registry/container-registry-tasks-authentication-key-vault.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -131,7 +131,7 @@ az acr task create \
131131

132132
[!INCLUDE [container-registry-tasks-system-id-properties](../../includes/container-registry-tasks-system-id-properties.md)]
133133

134-
## Give identity access to key vault
134+
## Grant identity access to key vault
135135

136136
Run the following [az keyvault set-policy][az-keyvault-set-policy] command to set an access policy on the key vault. The following example allows the identity to read secrets from the key vault.
137137

@@ -144,7 +144,7 @@ az keyvault set-policy --name mykeyvault \
144144

145145
## Manually run the task
146146

147-
To verify that the task in which you enabled a managed identity runs successfully, manually trigger the task with the [az acr task run][az-acr-task-run] command.
147+
To verify that the task in which you enabled a managed identity runs successfully, manually trigger the task with the [az acr task run][az-acr-task-run] command. The `--set` parameter is used to pass the private repo name to the task. In this example, the placeholder repo name is *hubuser/hubrepo*.
148148

149149
```azurecli
150150
az acr task run --name dockerhubtask --registry myregistry --set PrivateRepo=hubuser/hubrepo

0 commit comments

Comments
 (0)