Skip to content

Commit eeaf8f5

Browse files
committed
Updated service principle step
1 parent 494dfb5 commit eeaf8f5

File tree

5 files changed

+10
-10
lines changed

5 files changed

+10
-10
lines changed

articles/key-vault/secrets/quick-create-java.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -112,10 +112,10 @@ az keyvault create --name <your-unique-keyvault-name> -g "myResourceGroup"
112112

113113
The simplest way to authenticate a cloud-based application is with a managed identity; see [Use an App Service managed identity to access Azure Key Vault](../general/managed-identity.md) for details. For the sake of simplicity however, this quickstart creates a desktop application, which requires the use of a service principal and an access control policy.
114114

115-
Create a service principle using the Azure CLI [az ad sp create-for-rbac](/cli/azure/ad/sp?view=azure-cli-latest#az-ad-sp-create-for-rbac) command:
115+
Create a service principle using the Azure CLI [az ad sp create-for-rbac](/cli/azure/ad/sp?view=azure-cli-latest#az-ad-sp-create-for-rbac) command. You will need to provide a unique URL to the -n flag.
116116

117117
```azurecli
118-
az ad sp create-for-rbac -n "http://mySP" --sdk-auth
118+
az ad sp create-for-rbac -n "http://<my-unique-service-principle-name>" --sdk-auth
119119
```
120120

121121
This operation will return a series of key / value pairs.

articles/key-vault/secrets/quick-create-net-v3.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -97,10 +97,10 @@ az keyvault create --name <your-unique-keyvault-name> -g "myResourceGroup"
9797

9898
The simplest way to authenticate a cloud-based .NET application is with a managed identity; see [Use an App Service managed identity to access Azure Key Vault](../general/managed-identity.md) for details. For the sake of simplicity however, this quickstart creates a .NET console application. Authenticating a desktop application with Azure requires the use of a service principal and an access control policy.
9999

100-
Create a service principle using the Azure CLI [az ad sp create-for-rbac](/cli/azure/ad/sp?view=azure-cli-latest#az-ad-sp-create-for-rbac) command:
100+
Create a service principle using the Azure CLI [az ad sp create-for-rbac](/cli/azure/ad/sp?view=azure-cli-latest#az-ad-sp-create-for-rbac) command. You will need to provide a unique URL to the -n flag.
101101

102102
```azurecli
103-
az ad sp create-for-rbac -n "http://mySP" --sdk-auth
103+
az ad sp create-for-rbac -n "http://<my-unique-service-principle-name>" --sdk-auth
104104
```
105105

106106
This operation will return a series of key / value pairs.

articles/key-vault/secrets/quick-create-net.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -93,10 +93,10 @@ New-AzKeyVault -Name <your-unique-keyvault-name> -ResourceGroupName myResourceGr
9393

9494
The simplest way to authenticate a cloud-based .NET application is with a managed identity; see [Use an App Service managed identity to access Azure Key Vault](../general/managed-identity.md) for details. For the sake of simplicity however, this quickstart creates a .NET console application. Authenticating a desktop application with Azure requires the use of a service principal and an access control policy.
9595

96-
Create a service principle using the Azure CLI [az ad sp create-for-rbac](/cli/azure/ad/sp?view=azure-cli-latest#az-ad-sp-create-for-rbac) command:
96+
Create a service principle using the Azure CLI [az ad sp create-for-rbac](/cli/azure/ad/sp?view=azure-cli-latest#az-ad-sp-create-for-rbac) command. You will need to provide a unique URL to the -n flag.
9797

9898
```azurecli
99-
az ad sp create-for-rbac -n "http://mySP" --sdk-auth
99+
az ad sp create-for-rbac -n "http://<my-unique-service-principle-name>" --sdk-auth
100100
```
101101

102102
This operation will return a series of key / value pairs.

articles/key-vault/secrets/quick-create-node.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -65,10 +65,10 @@ az keyvault create --name <your-unique-keyvault-name> -g "myResourceGroup"
6565

6666
The simplest way to authenticate an cloud-based application is with a managed identity; see [Use an App Service managed identity to access Azure Key Vault](../general/managed-identity.md) for details. For the sake of simplicity however, this quickstarts creates a console application. Authenticating a desktop application with Azure requires the use of a service principal and an access control policy.
6767

68-
Create a service principle using the Azure CLI [az ad sp create-for-rbac](/cli/azure/ad/sp?view=azure-cli-latest#az-ad-sp-create-for-rbac) command:
68+
Create a service principle using the Azure CLI [az ad sp create-for-rbac](/cli/azure/ad/sp?view=azure-cli-latest#az-ad-sp-create-for-rbac) command. You will need to provide a unique URL to the -n flag.
6969

7070
```azurecli
71-
az ad sp create-for-rbac -n "http://mySP" --sdk-auth
71+
az ad sp create-for-rbac -n "http://<my-unique-service-principle-name>" --sdk-auth
7272
```
7373

7474
This operation will return a series of key / value pairs.

articles/key-vault/secrets/quick-create-python.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -66,10 +66,10 @@ az keyvault create --name <your-unique-keyvault-name> -g "myResourceGroup"
6666

6767
The simplest way to authenticate a cloud-based Python application is with a managed identity; see [Use an App Service managed identity to access Azure Key Vault](../general/managed-identity.md) for details. For the sake of simplicity however, this quickstart creates a Python console application. Authenticating a desktop application with Azure requires the use of a service principal and an access control policy.
6868

69-
Create a service principle using the Azure CLI [az ad sp create-for-rbac](/cli/azure/ad/sp?view=azure-cli-latest#az-ad-sp-create-for-rbac) command:
69+
Create a service principle using the Azure CLI [az ad sp create-for-rbac](/cli/azure/ad/sp?view=azure-cli-latest#az-ad-sp-create-for-rbac) command. You will need to provide a unique URL to the -n flag.
7070

7171
```azurecli
72-
az ad sp create-for-rbac -n "http://mySP" --sdk-auth
72+
az ad sp create-for-rbac -n "http://<my-unique-service-principle-name>" --sdk-auth
7373
```
7474

7575
This operation will return a series of key / value pairs.

0 commit comments

Comments
 (0)