Skip to content

Commit bd0c389

Browse files
authored
Merge pull request #111813 from MarkusVi/publicpr01
publicpr01
2 parents d342ac4 + 3367d31 commit bd0c389

File tree

1 file changed

+7
-1
lines changed

1 file changed

+7
-1
lines changed

articles/active-directory/managed-identities-azure-resources/how-to-manage-ua-identity-cli.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.devlang: na
1313
ms.topic: conceptual
1414
ms.tgt_pltfrm: na
1515
ms.workload: identity
16-
ms.date: 10/15/2019
16+
ms.date: 04/17/2020
1717
ms.author: markvi
1818
ms.collection: M365-identity-device-management
1919
---
@@ -34,6 +34,12 @@ In this article, you learn how to create, list and delete a user-assigned manage
3434
- Use the embedded Azure Cloud Shell via the "Try It" button, located in the top right corner of each code block.
3535
- [Install the latest version of the Azure CLI](https://docs.microsoft.com/cli/azure/install-azure-cli) (2.0.13 or later) if you prefer to use a local CLI console. Sign in to Azure using `az login`, using an account that is associated with the Azure subscription under which you would like to deploy the user-assigned managed identity.
3636

37+
38+
> [!NOTE]
39+
> In order to modify user permissions when using an app servivce principal using CLI you must provide the service principal additional permissions in Azure AD Graph API as portions of CLI perform GET requests against the Graph API. Otherwise, you may end up recieving a 'Insufficient privileges to complete the operation' message. To do this you will need to go into the App registration in Azure Active Directory, select your app, click on API permissions, scroll down and select Azure Active Directory Graph. From there select Application permissions, and then add the appropriate permissions.
40+
41+
42+
3743
[!INCLUDE [cloud-shell-try-it.md](../../../includes/cloud-shell-try-it.md)]
3844

3945
## Create a user-assigned managed identity

0 commit comments

Comments
 (0)