You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs-conceptual/azps-1.5.0/create-azure-service-principal-azureps.md
+3-3Lines changed: 3 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -92,7 +92,7 @@ The object returned from `New-AzADServicePrincipal` contains the `Id` and `Displ
92
92
93
93
## Get an existing service principal
94
94
95
-
A list of service principals for the currently active tenant can be retrieved with [Get-AzADServicePrincipal](/module/az.resources/get-azadserviceprincipal). By default this command returns __all__ service principals in a tenant, so for large organizations, it may take a long time to return results. Instead, using one of the optional server-side filtering arguments is recommended:
95
+
A list of service principals for the currently active tenant can be retrieved with [Get-AzADServicePrincipal](/powershell/module/az.resources/get-azadserviceprincipal). By default this command returns __all__ service principals in a tenant, so for large organizations, it may take a long time to return results. Instead, using one of the optional server-side filtering arguments is recommended:
96
96
97
97
* `-DisplayNameBeginsWith` requests service principals that have a _prefix_ that match the provided value. The display name of a service principal is the value set with `-DisplayName` during creation.
98
98
* `-DisplayName` requests an _exact match_ of a service principal name.
> Role assignment cmdlets don't take the service principal object ID. They take the associated application ID, which is generated at creation time. To get the application ID for a service prinicpal, use `Get-AzADServicePrincipal`.
118
+
> Role assignment cmdlets don't take the service principal object ID. They take the associated application ID, which is generated at creation time. To get the application ID for a service principal, use `Get-AzADServicePrincipal`.
119
119
120
120
> [!NOTE]
121
121
> If your account doesn't have permission to assign a role, you see an error message that your account "does not have authorization to
@@ -126,7 +126,7 @@ Adding a role _doesn't_ restrict previously assigned permissions. When restricti
126
126
The changes can be verified by listing the assigned roles:
0 commit comments