Skip to content

Commit b3d9555

Browse files
committed
revise service principal doc
1 parent c7ecd05 commit b3d9555

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/firmware-analysis/automate-firmware-analysis-service-principals.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,15 +9,15 @@ ms.date: 11/04/2024
99

1010
# How to Use Service Principals to Automate Workflows in Firmware analysis
1111

12-
Many users of the firmware analysis service may need to automate their workflow. The command `az login` creates an interactive login experience with two-factor authentication that makes it difficult for users to fully automate their workflow. A service principal [Apps & service principals in Microsoft Entra ID](/entra/identity-platform/app-objects-and-service-principals) is a secure identity with proper permissions that authenticates to Azure in the command line without requiring two-factor authentication or an interactive log-in. This article explains how to create a service principal and use it to interact with the firmware analysis service. For more information on creating service principals, visit [Create Azure service principals using the Azure CLI](/cli/azure/azure-cli-sp-tutorial-1#create-a-service-principal). To authenticate securely, we recommend creating a service principal and authenticating using certificates. To learn more, visit [Create a service principal containing a certificate using Azure CLI](/cli/azure/azure-cli-sp-tutorial-3).
12+
Many users of the firmware analysis service may need to automate their workflow. The command `az login` creates an interactive login experience with two-factor authentication that makes it difficult for users to fully automate their workflow. A [service principal](/entra/identity-platform/app-objects-and-service-principals) is a secure identity with proper permissions that authenticates to Azure in the command line without requiring two-factor authentication or an interactive log-in. This article explains how to create a service principal and use it to interact with the firmware analysis service. For more information on creating service principals, visit [Create Azure service principals using the Azure CLI](/cli/azure/azure-cli-sp-tutorial-1#create-a-service-principal). To authenticate securely, we recommend creating a service principal and authenticating using certificates. To learn more, visit [Create a service principal containing a certificate using Azure CLI](/cli/azure/azure-cli-sp-tutorial-3).
1313

14-
1. Log in to your Azure account using the portal.
14+
1. Log in to your Azure account using the Azure portal.
1515

1616
2. Navigate to your subscription and assign yourself `User Access Administrator` or `Role Based Access Control Administrator` permissions, or higher, in your subscription. This gives you permission to create a service principal.
1717

1818
3. Navigate to your command line
1919

20-
1. Log in, specifying the tenant ID during login
20+
1. Log in, specifying your tenant ID during login
2121

2222
```azurecli
2323
az login --tenant <TENANT_ID>
@@ -40,7 +40,7 @@ Many users of the firmware analysis service may need to automate their workflow.
4040
5. Log in to your service principal
4141

4242
```azurecli
43-
az login --service-principal --username $clientID --password $secret --tenant $tenantID
43+
az login --service-principal --username <CLIENT_ID> --password <SECRET> --tenant <TENANT_ID>
4444
```
4545

4646
6. Once logged in, refer to the following Quickstarts for scripts to interact with the Firmware analysis service via Azure PowerShell, Azure CLI, or Python:

0 commit comments

Comments
 (0)