Skip to content

Commit f313c08

Browse files
Fix terms and score
1 parent 1890226 commit f313c08

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

articles/iot-operations/deploy-iot-ops/howto-manage-secrets.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -27,13 +27,13 @@ For more information, see [Deploy Azure IoT Operations extensions](./howto-deplo
2727

2828
## Configure service principal and Azure Key Vault upfront
2929

30-
If the Azure account executing the `az iot ops init` command does not have permissions to query the Microsoft Graph and create service principals, you can prepare these upfront and use extra arguments when running the CLI command as described in [Deploy Azure IoT Operations extensions](./howto-deploy-iot-operations.md?tabs=cli).
30+
If the Azure account executing the `az iot ops init` command doesn't have permissions to query the Microsoft Graph and create service principals, you can prepare these upfront and use extra arguments when running the CLI command as described in [Deploy Azure IoT Operations extensions](./howto-deploy-iot-operations.md?tabs=cli).
3131

3232
### Configure service principal for interacting with Azure Key Vault via Microsoft Entra ID
3333

3434
Follow these steps to create a new Application Registration that will be used by the AIO application to authenticate to Key Vault.
3535

36-
First, register an application with Microsoft Entra ID.
36+
First, register an application with Microsoft Entra ID:
3737

3838
1. In the Azure portal search bar, search for and select **Microsoft Entra ID**.
3939

@@ -51,11 +51,11 @@ First, register an application with Microsoft Entra ID.
5151

5252
1. Select **Register**.
5353

54-
When your application is created, you are directed to its resource page.
54+
When your application is created, you're directed to its resource page.
5555

5656
1. Copy the **Application (client) ID** from the app registration overview page. You'll use this value as an argument when running Azure IoT Operations deployment with the `az iot ops init` command.
5757

58-
Next, give your application permissions for key vault.
58+
Next, give your application permissions for key vault:
5959

6060
1. On the resource page for your app, select **API permissions** from the **Manage** section of the app menu.
6161

@@ -69,7 +69,7 @@ Next, give your application permissions for key vault.
6969

7070
1. Select **Add permissions**.
7171

72-
Create a client secret that will be added to your Kubernetes cluster to authenticate to your key vault.
72+
Create a client secret that will be added to your Kubernetes cluster to authenticate to your key vault:
7373

7474
1. On the resource page for your app, select **Certificates & secrets** from the **Manage** section of the app menu.
7575

@@ -79,9 +79,9 @@ Create a client secret that will be added to your Kubernetes cluster to authenti
7979

8080
1. Copy the **Value** from your new secret. You'll use this value later when you run `az iot ops init`.
8181

82-
Retrieve the service principal Object Id
82+
Retrieve the service principal Object ID:
8383

84-
1. On the **Overview** page for your app, under the section **Essentials**, click on the **Application name** link under **Managed application in local directory**. This opens the Enterprise Application properties. Copy the Object Id to use when you run `az iot ops init`.
84+
1. On the **Overview** page for your app, under the section **Essentials**, click on the **Application name** link under **Managed application in local directory**. This opens the Enterprise Application properties. Copy the Object ID to use when you run `az iot ops init`.
8585

8686
### Create an Azure Key Vault
8787

@@ -95,7 +95,7 @@ If you have an existing key vault, you can change the permission model by execut
9595
```bash
9696
az keyvault update --name "<your unique key vault name>" --resource-group "<the name of the resource group>" --enable-rbac-authorization false
9797
```
98-
You will need the Key Vault resource ID when you run `az iot ops init`. To retrieve the resource ID, run:
98+
You'll need the Key Vault resource ID when you run `az iot ops init`. To retrieve the resource ID, run:
9999

100100
```bash
101101
az keyvault show --name "<your unique key vault name>" --resource-group "<the name of the resource group>" --query id -o tsv
@@ -113,7 +113,7 @@ az keyvault set-policy --name "<your unique key vault name>" --resource-group "<
113113

114114
### Pass service principal and Key Vault arguments to Azure IoT Operations deployment
115115

116-
When following the guide [Deploy Azure IoT Operations extensions](./howto-deploy-iot-operations.md?tabs=cli), you will need to pass in additional flags to the `az iot ops init` command in order to use the pre-configured service principal and key vault.
116+
When following the guide [Deploy Azure IoT Operations extensions](./howto-deploy-iot-operations.md?tabs=cli), you'll need to pass in additional flags to the `az iot ops init` command in order to use the pre-configured service principal and key vault.
117117

118118
The following example shows how to prepare the cluster for Azure IoT Operations without fully deploying it by using `--no-deploy` flag. You can also run the command without this argument for a default Azure IoT Operations deployment.
119119

0 commit comments

Comments
 (0)