Skip to content

Commit ddc602e

Browse files
Acrolinx flags
1 parent 63d5373 commit ddc602e

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/communication-services/quickstarts/identity/includes/active-directory/service-principal-cli.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,13 +15,13 @@ When using Active Directory for other Azure Resources, you should be using Manag
1515

1616
## Authenticate a registered application in the development environment
1717

18-
If your development environment does not support single sign-on or login via a web browser, then you can use a registered application to authenticate from the development environment.
18+
If your development environment doesn't support single sign-on or login via a web browser, then you can use a registered application to authenticate from the development environment.
1919

2020
### Creating an Azure Active Directory Registered Application
2121

22-
To create a registered application from the Azure CLI, you need to be logged in to the Azure account where you want the operations to take place. To do this, you can use the `az login` command and enter your credentials in the browser. Once you are logged in to your Azure account from the CLI, we can call the `az ad sp create-for-rbac` command to create the registered application and service principal.
22+
To create a registered application from the Azure CLI, you need to be logged in to the Azure account where you want the operations to take place. To do this, you can use the `az login` command and enter your credentials in the browser. Once you're logged in to your Azure account from the CLI, we can call the `az ad sp create-for-rbac` command to create the registered application and service principal.
2323

24-
The following examples uses the Azure CLI to create a new registered application
24+
The following example uses the Azure CLI to create a new registered application:
2525

2626
```azurecli
2727
az ad sp create-for-rbac --name <application-name> --role Contributor --scopes /subscriptions/<subscription-id>
@@ -52,6 +52,6 @@ The Azure Identity SDK reads values from three environment variables at runtime
5252
| `AZURE_CLIENT_SECRET` | `password` value from the generated JSON |
5353

5454
> [!IMPORTANT]
55-
> After you set the environment variables, close and re-open your console window. If you are using Visual Studio or another development environment, you may need to restart it in order for it to register the new environment variables.
55+
> After you set the environment variables, close and re-open your console window. If you're using Visual Studio or another development environment, you may need to restart it in order for it to register the new environment variables.
5656
5757
Once these variables have been set, you should be able to use the DefaultAzureCredential object in your code to authenticate to the service client of your choice.

0 commit comments

Comments
 (0)