Skip to content

Commit e573602

Browse files
authored
Merge pull request MicrosoftDocs#997 from sptramer/triage/bugs-190318
Fixes the following issues: MicrosoftDocs#982, MicrosoftDocs#986, MicrosoftDocs#989
2 parents 97f76eb + 6692b2b commit e573602

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

docs-conceptual/azps-1.5.0/create-azure-service-principal-azureps.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,7 @@ The object returned from `New-AzADServicePrincipal` contains the `Id` and `Displ
9292
9393
## Get an existing service principal
9494
95-
A list of service principals for the currently active tenant can be retrieved with [Get-AzADServicePrincipal](/module/az.resources/get-azadserviceprincipal). By default this command returns __all__ service principals in a tenant, so for large organizations, it may take a long time to return results. Instead, using one of the optional server-side filtering arguments is recommended:
95+
A list of service principals for the currently active tenant can be retrieved with [Get-AzADServicePrincipal](/powershell/module/az.resources/get-azadserviceprincipal). By default this command returns __all__ service principals in a tenant, so for large organizations, it may take a long time to return results. Instead, using one of the optional server-side filtering arguments is recommended:
9696
9797
* `-DisplayNameBeginsWith` requests service principals that have a _prefix_ that match the provided value. The display name of a service principal is the value set with `-DisplayName` during creation.
9898
* `-DisplayName` requests an _exact match_ of a service principal name.
@@ -115,7 +115,7 @@ Delete-AzRoleAssignment -ApplicationId <service principal application ID> -RoleD
115115
```
116116
117117
> [!IMPORTANT]
118-
> Role assignment cmdlets don't take the service principal object ID. They take the associated application ID, which is generated at creation time. To get the application ID for a service prinicpal, use `Get-AzADServicePrincipal`.
118+
> Role assignment cmdlets don't take the service principal object ID. They take the associated application ID, which is generated at creation time. To get the application ID for a service principal, use `Get-AzADServicePrincipal`.
119119
120120
> [!NOTE]
121121
> If your account doesn't have permission to assign a role, you see an error message that your account "does not have authorization to
@@ -126,7 +126,7 @@ Adding a role _doesn't_ restrict previously assigned permissions. When restricti
126126
The changes can be verified by listing the assigned roles:
127127

128128
```azurepowershell-interactive
129-
Get-AzRoleAssignment -ServicePrinicpalName ServicePrincipalName
129+
Get-AzRoleAssignment -ServicePrincipalName ServicePrincipalName
130130
```
131131

132132
## Sign in using a service principal

docs-conceptual/azps-1.5.0/using-psjobs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ with `Connect-AzAccount`, pass the context to a job.
2424

2525
```azurepowershell-interactive
2626
$creds = Get-Credential
27-
$job = Start-Job { param($context,$vmadmin) New-AzVM -Name MyVm -AzureRmContext $context -Credential $vmadmin} -Arguments (Get-AzContext),$creds
27+
$job = Start-Job { param($context,$vmadmin) New-AzVM -Name MyVm -AzContext $context -Credential $vmadmin} -Arguments (Get-AzContext),$creds
2828
```
2929

3030
However, if you have chosen to have your context automatically saved with

0 commit comments

Comments
 (0)