Skip to content

Commit

Permalink
Add role for CLI. (#16074)
Browse files Browse the repository at this point in the history
  • Loading branch information
jdmartinez36 authored Nov 3, 2021
1 parent 6f3bfc1 commit 4769432
Showing 1 changed file with 2 additions and 2 deletions.
4 changes: 2 additions & 2 deletions documentation/previous-versions-quickstart.md
Original file line number Diff line number Diff line change
Expand Up @@ -163,7 +163,7 @@ options offered by the SDK because it allows seamless use of both service
principals and [Azure Managed Service Identity][]. Other options are listed
below.

> Note: If you need to create a new service principal, run `az ad sp create-for-rbac -n "<app_name>"` in the
> Note: If you need to create a new service principal, run `az ad sp create-for-rbac -n "<app_name>" --role Contributor` in the
> [azure-cli](https://github.com/Azure/azure-cli). See [these
> docs](https://docs.microsoft.com/cli/azure/create-an-azure-service-principal-azure-cli?view=azure-cli-latest)
> for more info. Copy the new principal's ID, secret, and tenant ID for use in
Expand Down Expand Up @@ -205,7 +205,7 @@ below.
credentials from an auth file created by the [Azure CLI][]. Follow these
steps to utilize:

1. Create a service principal and output an auth file using `az ad sp create-for-rbac --sdk-auth > client_credentials.json`.
1. Create a service principal and output an auth file using `az ad sp create-for-rbac --role Contributor --sdk-auth > client_credentials.json`.
2. Set environment variable `AZURE_AUTH_LOCATION` to the path of the saved
output file.
3. Use the authorizer returned by `auth.NewAuthorizerFromFile()` in your
Expand Down

0 comments on commit 4769432

Please sign in to comment.