You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -170,7 +170,8 @@ Before configuring the registry endpoint, ensure the Azure IoT Operations system
170
170
1. Copy the name of the extension listed after **Azure IoT Operations Arc extension**. For example, *azure-iot-operations-xxxx7*.
171
171
1. Go to your container registry > **Access control (IAM)** > **Add role assignment**.
172
172
1. On the **Role** tab, select `AcrPull` role.
173
-
1. On the **Members** tab, for **Assign access to**, select **User, group, or service principal**, then select **+ Select members** and search for the Azure IoT Operations Arc extension name.
173
+
1. On the **Members** tab, for **Assign access to**, select **User, group, or service principal**, then select **+ Select members** and search for the Azure IoT Operations Arc extension name. Choose the extension and select **Select**.
174
+
1. Select **Review + assign** to complete the role assignment.
174
175
175
176
<!--
176
177
# [Operations experience](#tab/portal)
@@ -279,7 +280,7 @@ The operator attempts to infer the scope from the endpoint if not provided.
279
280
280
281
#### Artifact pull secret
281
282
282
-
Artifact pull secrets allow you to use username and password authentication for registries that don't support managed identity authentication.
283
+
Artifact pull secrets lets you use username and password authentication for registries that don't support managed identity authentication.
283
284
284
285
First, create a Kubernetes secret containing the registry credentials:
0 commit comments