Skip to content

Commit b39899f

Browse files
authored
Bulk fix adding --scopes parameter (Azure#17202)
1 parent 7f35ecd commit b39899f

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

documentation/previous-versions-quickstart.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -163,7 +163,7 @@ options offered by the SDK because it allows seamless use of both service
163163
principals and [Azure Managed Service Identity][]. Other options are listed
164164
below.
165165

166-
> Note: If you need to create a new service principal, run `az ad sp create-for-rbac -n "<app_name>" --role Contributor` in the
166+
> Note: If you need to create a new service principal, run `az ad sp create-for-rbac -n "<app_name>" --role Contributor --scopes /subscriptions/<subscription_id>` in the
167167
> [azure-cli](https://github.com/Azure/azure-cli). See [these
168168
> docs](https://docs.microsoft.com/cli/azure/create-an-azure-service-principal-azure-cli?view=azure-cli-latest)
169169
> for more info. Copy the new principal's ID, secret, and tenant ID for use in
@@ -205,7 +205,7 @@ below.
205205
credentials from an auth file created by the [Azure CLI][]. Follow these
206206
steps to utilize:
207207

208-
1. Create a service principal and output an auth file using `az ad sp create-for-rbac --role Contributor --sdk-auth > client_credentials.json`.
208+
1. Create a service principal and output an auth file using `az ad sp create-for-rbac --role Contributor --scopes /subscriptions/<subscription_id> --sdk-auth > client_credentials.json`.
209209
2. Set environment variable `AZURE_AUTH_LOCATION` to the path of the saved
210210
output file.
211211
3. Use the authorizer returned by `auth.NewAuthorizerFromFile()` in your

0 commit comments

Comments
 (0)