Skip to content

Commit f5bb457

Browse files
committed
Edits and corrections
1 parent ab34f5f commit f5bb457

File tree

1 file changed

+6
-8
lines changed

1 file changed

+6
-8
lines changed

articles/search/search-security-rbac.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -216,32 +216,30 @@ When testing roles, remember that roles are cumulative and inherited roles that
216216

217217
### [**REST API**](#tab/test-rest)
218218

219-
This approach assumes Postman as the REST client and uses a Postman collection and variables to provided the bearer token. You'll need Azure CLI or another tool to create a security principal for the REST client.
219+
This approach assumes Postman as the REST client and uses a Postman collection and variables to provide the bearer token. You'll need Azure CLI or another tool to create a security principal for the REST client.
220220

221-
1. Open a command shell for Azure CLI. If you don't have Azure CLI installed, you can open [Create a service principal](/cli/azure/create-an-azure-service-principal-azure-cli#1-create-a-service-principal), select **Try It**.
222-
223-
1. Sign in to your Azure subscription.
221+
1. Open a command shell for Azure CLI and sign in to your Azure subscription.
224222

225223
```azurecli
226224
az login
227225
```
228226

229-
1. First, get your subscription ID. In the console, enter the following command:
227+
1. Get your subscription ID. You'll provide this value as variable in a future step.
230228

231229
```azurecli
232230
az account show --query id -o tsv
233231
````
234232
235-
1. Create a resource group for your security principal, specifying a location and name. This example uses the West US region.
233+
1. Create a resource group for your security principal, specifying a location and name. This example uses the West US region. You'll provide this value as variable in a future step.
236234
237235
```azurecli
238236
az group create -l westus -n MyResourceGroup
239237
```
240238

241-
1. Create the service principal, replacing the placeholder values with valid values. You'll need a descriptive security principal name, subscription ID, resource group name. This example uses the "Search Service Contributor" (quote enclosed) role.
239+
1. Create the service principal, replacing the placeholder values with valid values. You'll need a descriptive security principal name, subscription ID, and resource group name. This example uses the "Search Index Data Reader" (quote enclosed) role.
242240

243241
```azurecli
244-
az ad sp create-for-rbac --name mySecurityPrincipalName --role "Search Service Contributor" --scopes /subscriptions/mySubscriptionID/resourceGroups/myResourceGroupName
242+
az ad sp create-for-rbac --name mySecurityPrincipalName --role "Search Index Data Reader" --scopes /subscriptions/mySubscriptionID/resourceGroups/myResourceGroupName
245243
```
246244
247245
A successful response includes "appId", "password", and "tenant". You'll use these values for the variables "clientId", "clientSecret", and "tenant".

0 commit comments

Comments
 (0)