-
Notifications
You must be signed in to change notification settings - Fork 3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support az ad {app,sp} create
#631
Comments
Given the poor discoverability and the constant confusion that users have regarding AzureAD, ServiceAccount (aka ServicePrincipals) and "Apps", it important that the CLI tooling can be scripted to create these things on users' behalves. |
@colemickens if you create them just want to assign role for rbac, you can use |
Hm, that sounds helpful, but I don't really understand the distinction. What does CC @ahmetalpbalkan for usability feedback given that we both need to make this process easy for our users. |
I agree, we need one and clean way of creating SPs. Look at this 3rd party doc explaining creating AAD SP accounts. It is nothing but confusion* . I very much appreciate if this experience could be unified with one well-known command (preferably *: what's an app?, what is homepage uri?, why is username actually client_id?, why am I providing a password? why is password a client_secret? why am I calling all these cmds? why is sp id same as app id? |
Some context, before address your concerns
Because of #2, several concepts such as "redirecturi", "homepage" were exposed from commands which are hard to understand and useless for people which just want to manage azure in azure-cli. So simplification like the |
This sounds great! I love how simple this is: $ az account create-sp
Service principal has been configured with name: 'http://azure-cli-2016-08-05-14-31-15', secret: '[redacted]'
Useful commands to manage azure:
Assign a role: "az role assignment create --assignee af73d34f-7cde-4c73-a4d5-redact --role Contributor"
Log in: "az login --service-principal -u http://azure-cli-2016-08-05-14-31-15 -p [redacted] --tenant 72f988bf-86f1-41af-91ab-2d7cd011db47"
Reset credentials: "az account reset-sp-credentials --name http://azure-cli-2016-08-05-14-31-15" And I can override the name, duration and password (client_secret). Excellent! |
So I am submitting #664 which should address all I mentioned early on
|
That sounds great as well. Only other thing might be letting me do the RBAC assignment in the I can file a separate issue for that though? |
Please file a separate issue. Sort of hack, but we can have |
I filed: #667 I'll close this, if you don't, when your PR goes in. Thanks @yugangw-msft, I think these are going to be popular. |
#664 is merged. |
Only
delete
,show
andlist
are available.The text was updated successfully, but these errors were encountered: