Skip to content

Commit

Permalink
update test instructions
Browse files Browse the repository at this point in the history
  • Loading branch information
chlowell committed Apr 17, 2020
1 parent 90ee53d commit fd2a00e
Show file tree
Hide file tree
Showing 4 changed files with 7 additions and 7 deletions.
4 changes: 2 additions & 2 deletions sdk/identity/azure-identity/tests/azure-functions/readme.md
Original file line number Diff line number Diff line change
Expand Up @@ -94,7 +94,7 @@ Allow the system-assigned identity to access the Key Vault:
```sh
az keyvault set-policy -n $KEY_VAULT_NAME \
--object-id $(az functionapp identity show -g $RESOURCE_GROUP -n $FUNCTION_APP_SYSTEM_ASSIGNED --query principalId -o tsv) \
--secret-permissions set delete
--secret-permissions list
```


Expand All @@ -108,7 +108,7 @@ Allow it to access the Key Vault:
```sh
az keyvault set-policy -n $KEY_VAULT_NAME \
--object-id $(az identity show -g $RESOURCE_GROUP -n $MANAGED_IDENTITY_NAME --query principalId -o tsv) \
--secret-permissions set delete
--secret-permissions list
```


Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -88,7 +88,7 @@ Allow the system-assigned identity to access the Key Vault:
```sh
az keyvault set-policy -n $KEY_VAULT_NAME -g $RESOURCE_GROUP \
--object-id $(az webapp show -n $WEB_APP_SYSTEM_ASSIGNED -g $RESOURCE_GROUP --query identity.principalId -o tsv) \
--secret-permissions set delete
--secret-permissions list
```

### Managed identity
Expand All @@ -103,7 +103,7 @@ Allow it to access the Key Vault:
```sh
az keyvault set-policy -n $KEY_VAULT_NAME \
--object-id $(az identity show -g $RESOURCE_GROUP -n $MANAGED_IDENTITY_NAME --query principalId -o tsv) \
--secret-permissions set delete
--secret-permissions list
```

### Web app: user-assigned identity
Expand Down
4 changes: 2 additions & 2 deletions sdk/identity/azure-identity/tests/managed-identity-live/vm.md
Original file line number Diff line number Diff line change
Expand Up @@ -82,14 +82,14 @@ Allow the VM with system-assigned identity to access the Key Vault's secrets:
```sh
az keyvault set-policy -n $KEY_VAULT_NAME \
--object-id $(az vm show -n $VM_NAME_SYSTEM_ASSIGNED -g $RESOURCE_GROUP --query identity.principalId -o tsv) \
--secret-permissions set delete
--secret-permissions list
```

Do the same for the user-assigned identity:
```sh
az keyvault set-policy -n $KEY_VAULT_NAME \
--object-id $(az identity show -g $RESOURCE_GROUP -n $MANAGED_IDENTITY_NAME --query principalId -o tsv) \
--secret-permissions set delete
--secret-permissions list
```

# Install dependencies
Expand Down
2 changes: 1 addition & 1 deletion sdk/identity/azure-identity/tests/pod-identity/readme.md
Original file line number Diff line number Diff line change
Expand Up @@ -69,7 +69,7 @@ az keyvault create -g $RESOURCE_GROUP -n $KEY_VAULT_NAME --sku standard

Add an access policy for the managed identity:
```sh
az keyvault set-policy -n $KEY_VAULT_NAME --object-id $MANAGED_IDENTITY_PRINCIPAL_ID --secret-permissions set delete
az keyvault set-policy -n $KEY_VAULT_NAME --object-id $MANAGED_IDENTITY_PRINCIPAL_ID --secret-permissions list
```

### container registry
Expand Down

0 comments on commit fd2a00e

Please sign in to comment.