Skip to content

Commit 5b28846

Browse files
authoredNov 8, 2018
Merge pull request MicrosoftDocs#57539 from daveba/update-user-assigned-tutorials
[Azure AD MI] Update user assigned tutorials
2 parents fef91e2 + 916a1d0 commit 5b28846

File tree

2 files changed

+8
-5
lines changed

2 files changed

+8
-5
lines changed
 

‎articles/active-directory/managed-identities-azure-resources/how-to-manage-ua-identity-arm.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -33,8 +33,6 @@ It is not possible to list and delete a user-assigned managed identity using an
3333

3434
- If you're unfamiliar with managed identities for Azure resources, check out the [overview section](overview.md). **Be sure to review the [difference between a system-assigned and user-assigned managed identity](overview.md#how-does-it-work)**.
3535
- If you don't already have an Azure account, [sign up for a free account](https://azure.microsoft.com/free/) before continuing.
36-
- To perform the operations in this article, your account needs the following role assignment:
37-
- [Managed Identity Contributor](/azure/role-based-access-control/built-in-roles#managed-identity-contributor) role to create, read (list), update, and delete a user-assigned managed identity.
3836

3937
## Template creation and editing
4038

@@ -47,6 +45,8 @@ As with the Azure portal and scripting, Azure Resource Manager templates provide
4745

4846
## Create a user-assigned managed identity
4947

48+
To create a user-assigned managed identity, your account needs the [Managed Identity Contributor](/azure/role-based-access-control/built-in-roles#managed-identity-contributor) role assignment.
49+
5050
To create a user-assigned managed identity, use the following template. Replace the `<USER ASSIGNED IDENTITY NAME>` value with your own values:
5151

5252
[!INCLUDE [ua-character-limit](~/includes/managed-identity-ua-character-limits.md)]

‎articles/active-directory/managed-identities-azure-resources/how-to-manage-ua-identity-rest.md

+6-3
Original file line numberDiff line numberDiff line change
@@ -31,15 +31,14 @@ In this article, you learn how to create, list, and delete a user-assigned manag
3131
- If you are using Windows, install the [Windows Subsystem for Linux](https://msdn.microsoft.com/commandline/wsl/about) or use the [Azure Cloud Shell](../../cloud-shell/overview.md) in the Azure portal.
3232
- If you use the [Windows Subsystem for Linux](https://msdn.microsoft.com/commandline/wsl/about) or a [Linux distribution OS](/cli/azure/install-azure-cli-apt?view=azure-cli-latest), [Install the Azure CLI local console](/cli/azure/install-azure-cli).
3333
- If you are using Azure CLI local console, sign in to Azure using `az login` with an account that is associated with the Azure subscription you would like to deploy or retrieve user-assigned managed identity information.
34-
- To perform the management operations in this article, your account needs the following role assignments:
35-
- [Managed Identity Contributor](/azure/role-based-access-control/built-in-roles#managed-identity-contributor) role to create, read (list), update, and delete a user-assigned managed identity.
36-
- [Managed Identity Operator](/azure/role-based-access-control/built-in-roles#managed-identity-operator) role to read (list) the properties of a user-assigned managed identity.
3734
- Retrieve a Bearer access token using `az account get-access-token` to perform the following user-assigned managed identity operations.
3835

3936
[!INCLUDE [cloud-shell-try-it.md](../../../includes/cloud-shell-try-it.md)]
4037

4138
## Create a user-assigned managed identity
4239

40+
To create a user-assigned managed identity, your account needs the [Managed Identity Contributor](/azure/role-based-access-control/built-in-roles#managed-identity-contributor) role assignment.
41+
4342
To create a user-assigned managed identity, use the following CURL request to the Azure Resource Manager API. Replace the `<SUBSCRIPTION ID>`, `<RESOURCE GROUP>`, `<USER ASSIGNED IDENTITY NAME>`,`<LOCATION>`, and `<ACCESS TOKEN>` values with your own values:
4443

4544
[!INCLUDE [ua-character-limit](~/includes/managed-identity-ua-character-limits.md)]
@@ -52,13 +51,17 @@ ation": "<LOCATION>"}' -H "Content-Type: application/json" -H "Authorization: Be
5251

5352
## List user-assigned managed identities
5453

54+
To list/read a user-assigned managed identity, your account needs the [Managed Identity Operator](/azure/role-based-access-control/built-in-roles#managed-identity-operator) or [Managed Identity Contributor](/azure/role-based-access-control/built-in-roles#managed-identity-contributor) role assignment.
55+
5556
To list user-assigned managed identities, use the following CURL request to the Azure Resource Manager API. Replace the `<SUBSCRIPTION ID>`, `<RESOURCE GROUP>`, and `<ACCESS TOKEN>` values with your own values:
5657

5758
```bash
5859
curl 'https://management.azure.com/subscriptions/<SUBSCRIPTION ID>/resourceGroups/<RESOURCE GROUP>/providers/Microsoft.ManagedIdentity/userAssignedIdentities?api-version=2015-08-31-preview' -H "Authorization: Bearer <ACCESS TOKEN>"
5960
```
6061
## Delete a user-assigned managed identity
6162

63+
To delete a user-assigned managed identity, your account needs the [Managed Identity Contributor](/azure/role-based-access-control/built-in-roles#managed-identity-contributor) role assignment.
64+
6265
To delete a user-assigned managed identity, use the following CURL request to the Azure Resource Manager API. Replace the `<SUBSCRIPTION ID>`, `<RESOURCE GROUP>`, and `<ACCESS TOKEN>` parameters values with your own values:
6366

6467
> [!NOTE]

0 commit comments

Comments
 (0)
Please sign in to comment.