Skip to content
This repository was archived by the owner on Nov 14, 2025. It is now read-only.

Commit 3fe5aee

Browse files
authored
Merge pull request #671 from MicrosoftLearning/copilot/fix-615
Fix Lab M04-L10: Replace missing service principal references with service connection prerequisites
2 parents 4d41b7b + baaa4a0 commit 3fe5aee

File tree

1 file changed

+4
-2
lines changed

1 file changed

+4
-2
lines changed

Instructions/Labs/AZ400_M04_L10_Integrate_Azure_Key_Vault_with_Azure_DevOps.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,8 @@ lab:
1010

1111
- This lab requires **Microsoft Edge** or an [Azure DevOps supported browser.](https://learn.microsoft.com/azure/devops/server/compatibility)
1212

13+
- **Complete the lab environment validation:** Before starting this lab, ensure you have completed the [Validate lab environment](AZ400_M00_Validate_lab_environment.md) which sets up the Azure DevOps organization, project, and service connection required for this lab.
14+
1315
- **Set up an Azure DevOps organization:** If you don't already have an Azure DevOps organization that you can use for this lab, create one by following the instructions available at [Create an organization or project collection](https://learn.microsoft.com/azure/devops/organizations/accounts/create-organization).
1416
- Identify an existing Azure subscription or create a new one.
1517

@@ -129,10 +131,10 @@ For this lab scenario, we will have a Azure Container Instance (ACI) that pulls
129131

130132
1. On the **Access configuration** tab of the **Create a key vault** blade, select **Vault access policy** and then in the **Access policies** section, click on **+ Create** to setup a new policy.
131133

132-
> **Note**: You need to secure access to your key vaults by allowing only authorized applications and users. To access the data from the vault, you will need to provide read (Get/List) permissions to the previously created service principal that you will be using for authentication in the pipeline.
134+
> **Note**: You need to secure access to your key vaults by allowing only authorized applications and users. To access the data from the vault, you will need to provide read (Get/List) permissions to the service connection that you created during the lab environment validation for authentication in the pipeline.
133135
134136
1. On the **Permission** blade, below **Secret permissions**, check **Get** and **List** permissions. Click on **Next**.
135-
2. On the **Principal** blade, search for the **previously created Service Principal**, either by using the Id or Name given, and select it from the list. Click on **Next**, **Next**, **Create** (access policy).
137+
2. On the **Principal** blade, search for your **Azure subscription service connection** (the one created during lab environment validation, typically named "azure subs"), and select it from the list. You can find the service principal name in Azure DevOps under Project Settings > Service connections > azure subs > Manage service principal. Click on **Next**, **Next**, **Create** (access policy).
136138
3. On the **Review + create** blade, click on **Create**
137139

138140
1. Back on the **Create a key vault** blade, click on **Review + Create > Create**

0 commit comments

Comments
 (0)