You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: documentation/previous-versions-quickstart.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -163,7 +163,7 @@ options offered by the SDK because it allows seamless use of both service
163
163
principals and [Azure Managed Service Identity][]. Other options are listed
164
164
below.
165
165
166
-
> Note: If you need to create a new service principal, run `az ad sp create-for-rbac -n "<app_name>" --role Contributor` in the
166
+
> Note: If you need to create a new service principal, run `az ad sp create-for-rbac -n "<app_name>" --role Contributor --scopes /subscriptions/<subscription_id>` in the
167
167
> [azure-cli](https://github.com/Azure/azure-cli). See [these
> for more info. Copy the new principal's ID, secret, and tenant ID for use in
@@ -205,7 +205,7 @@ below.
205
205
credentials from an auth file created by the [Azure CLI][]. Follow these
206
206
steps to utilize:
207
207
208
-
1. Create a service principal and output an auth file using `az ad sp create-for-rbac --role Contributor --sdk-auth > client_credentials.json`.
208
+
1. Create a service principal and output an auth file using `az ad sp create-for-rbac --role Contributor --scopes /subscriptions/<subscription_id> --sdk-auth > client_credentials.json`.
209
209
2. Set environment variable `AZURE_AUTH_LOCATION` to the path of the saved
210
210
output file.
211
211
3. Use the authorizer returned by `auth.NewAuthorizerFromFile()` in your
0 commit comments