Skip to content

Commit c65f845

Browse files
authored
Merge pull request #105714 from rwike77/refresh
refreshed article
2 parents 9ff23a1 + 50669d9 commit c65f845

File tree

2 files changed

+22
-6
lines changed

2 files changed

+22
-6
lines changed

articles/active-directory/develop/howto-create-service-principal-portal.md

Lines changed: 22 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.subservice: develop
1111
ms.topic: conceptual
12-
ms.date: 10/14/2019
12+
ms.date: 02/26/2020
1313
ms.author: ryanwi
1414
ms.reviewer: tomfitz
1515
ms.custom: aaddev, seoapril2019, identityplatformtop40
@@ -81,16 +81,26 @@ Daemon applications can use two forms of credentials to authenticate with Azure
8181

8282
### Upload a certificate
8383

84-
You can use an existing certificate if you have one. Optionally, you can create a self-signed certificate for testing purposes. Open PowerShell and run [New-SelfSignedCertificate](/powershell/module/pkiclient/new-selfsignedcertificate) with the following parameters to create a self-signed certificate in the user certificate store on your computer:
84+
You can use an existing certificate if you have one. Optionally, you can create a self-signed certificate for *testing purposes only*. Open PowerShell and run [New-SelfSignedCertificate](/powershell/module/pkiclient/new-selfsignedcertificate) with the following parameters to create a self-signed certificate in the user certificate store on your computer:
8585

8686
```powershell
8787
$cert=New-SelfSignedCertificate -Subject "CN=DaemonConsoleCert" -CertStoreLocation "Cert:\CurrentUser\My" -KeyExportPolicy Exportable -KeySpec Signature
8888
```
8989

9090
Export this certificate to a file using the [Manage User Certificate](/dotnet/framework/wcf/feature-details/how-to-view-certificates-with-the-mmc-snap-in) MMC snap-in accessible from the Windows Control Panel.
9191

92+
1. Select **Run** from the **Start** menu, and then enter **certmgr.msc**.
93+
94+
The Certificate Manager tool for the current user appears.
95+
96+
1. To view your certificates, under **Certificates - Current User** in the left pane, expand the **Personal** directory.
97+
1. Right-click on the cert you created, select **All tasks->Export**.
98+
1. Follow the Certificate Export wizard. Export the private key, specify a password for the cert file, and export to a file.
99+
92100
To upload the certificate:
93101

102+
1. Select **Azure Active Directory**.
103+
1. From **App registrations** in Azure AD, select your application.
94104
1. Select **Certificates & secrets**.
95105
1. Select **Upload certificate** and select the certificate (an existing certificate or the self-signed certificate you exported).
96106

@@ -142,15 +152,21 @@ In your Azure subscription, your account must have `Microsoft.Authorization/*/Wr
142152

143153
To check your subscription permissions:
144154

145-
1. Select your account in the upper right corner, and select **... -> My permissions**.
155+
1. Search for and select **Subscriptions**, or select **Subscriptions** on the **Home** page.
146156

147-
![Select your account and your user permissions](./media/howto-create-service-principal-portal/select-my-permissions.png)
157+
![Search](./media/howto-create-service-principal-portal/select-subscription.png)
158+
159+
1. Select the subscription you want to create the service principal in.
160+
161+
![Select subscription for assignment](./media/howto-create-service-principal-portal/select-one-subscription.png)
162+
163+
If you don't see the subscription you're looking for, select **global subscriptions filter**. Make sure the subscription you want is selected for the portal.
148164

149-
1. From the drop-down list, select the subscription you want to create the service principal in. Then, select **Click here to view complete access details for this subscription**.
165+
1. Select **My permissions**. Then, select **Click here to view complete access details for this subscription**.
150166

151167
![Select the subscription you want to create the service principal in](./media/howto-create-service-principal-portal/view-details.png)
152168

153-
1. Select **Role assignments** to view your assigned roles, and determine if you have adequate permissions to assign a role to an AD app. If not, ask your subscription administrator to add you to User Access Administrator role. In the following image, the user is assigned the Owner role, which means that user has adequate permissions.
169+
1. Select **View** in **Role assignments** to view your assigned roles, and determine if you have adequate permissions to assign a role to an AD app. If not, ask your subscription administrator to add you to User Access Administrator role. In the following image, the user is assigned the Owner role, which means that user has adequate permissions.
154170

155171
![This example shows the user is assigned the Owner role](./media/howto-create-service-principal-portal/view-user-role.png)
156172

75.3 KB
Loading

0 commit comments

Comments
 (0)