From 5ffb488a1a756d82756e35120377636fda30280f Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?McCoy=20Pati=C3=B1o?= <39780829+mccoyp@users.noreply.github.com> Date: Tue, 17 May 2022 10:37:52 -0700 Subject: [PATCH] Remove locale from links (#24490) --- doc/dev/mgmt/tests.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/doc/dev/mgmt/tests.md b/doc/dev/mgmt/tests.md index dddb71f66fb0..5899b513490d 100644 --- a/doc/dev/mgmt/tests.md +++ b/doc/dev/mgmt/tests.md @@ -52,14 +52,14 @@ There are several ways to authenticate to Azure, but to be able to record test H ### Get a token with Active Directory application and service principal Follow this detailed tutorial to set up an Active Directory application and service principal: -https://docs.microsoft.com/en-us/azure/active-directory/develop/howto-create-service-principal-portal +https://docs.microsoft.com/azure/active-directory/develop/howto-create-service-principal-portal To use the credentials from Python, you need: * Application ID (a.k.a. client ID) * Authentication key (a.k.a. client secret) * Tenant ID * Subscription ID from the Azure portal -[This section of the above tutorial](https://docs.microsoft.com/en-us/azure/active-directory/develop/howto-create-service-principal-portal#get-tenant-and-app-id-values-for-signing-in) describes where to find them (besides the subscription ID, which is in the "Overview" section of the "Subscriptions" blade.) +[This section of the above tutorial](https://docs.microsoft.com/azure/active-directory/develop/howto-create-service-principal-portal#get-tenant-and-app-id-values-for-signing-in) describes where to find them (besides the subscription ID, which is in the "Overview" section of the "Subscriptions" blade.) The recommended practice is to store these three values in environment variables called `AZURE_TENANT_ID`, `AZURE_CLIENT_ID`, and `AZURE_CLIENT_SECRET`. To set an environment variable use the following commands: ```Shell