Skip to content

Commit

Permalink
Revise minor issues in doc and example (#19082)
Browse files Browse the repository at this point in the history
Co-authored-by: Beisi Zhou <[email protected]>
  • Loading branch information
dingmeng-xue and BethanyZhou authored Jul 28, 2022
1 parent e2796e0 commit 54ff51b
Show file tree
Hide file tree
Showing 3 changed files with 7 additions and 7 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -204,13 +204,13 @@ public class SetAzureKeyVaultAccessPolicy : KeyVaultManagementCmdletBase
/// </summary>
[Parameter(Mandatory = true,
ParameterSetName = ByObjectId,
HelpMessage = "Specifies the object ID of the user or service principal in Azure Active Directory for which to grant permissions.")]
HelpMessage = "Specifies the object ID of the user or service principal in Azure Active Directory for which to grant permissions. Its value is in the format of GUID.")]
[Parameter(Mandatory = true,
ParameterSetName = InputObjectByObjectId,
HelpMessage = "Specifies the object ID of the user or service principal in Azure Active Directory for which to grant permissions.")]
HelpMessage = "Specifies the object ID of the user or service principal in Azure Active Directory for which to grant permissions. Its value is in the format of GUID.")]
[Parameter(Mandatory = true,
ParameterSetName = ResourceIdByObjectId,
HelpMessage = "Specifies the object ID of the user or service principal in Azure Active Directory for which to grant permissions.")]
HelpMessage = "Specifies the object ID of the user or service principal in Azure Active Directory for which to grant permissions. Its value is in the format of GUID.")]
[ValidateNotNullOrEmpty()]
public string ObjectId { get; set; }

Expand Down
6 changes: 3 additions & 3 deletions src/KeyVault/KeyVault/help/Set-AzKeyVaultAccessPolicy.md
Original file line number Diff line number Diff line change
Expand Up @@ -293,11 +293,11 @@ This example picks the first one, indicated by index \[0\] in the returned list.

### Example 7: Grant Azure Information Protection access to the customer-managed tenant key (BYOK)
```powershell
Set-AzKeyVaultAccessPolicy -VaultName 'Contoso04Vault' -ServicePrincipalName 00000012-0000-0000-c000-000000000000 -PermissionsToKeys decrypt,sign,get
Set-AzKeyVaultAccessPolicy -VaultName 'Contoso04Vault' -ServicePrincipalName 'MyServicePrincipal' -PermissionsToKeys decrypt,sign,get
```

This command authorizes Azure Information Protection to use a customer-managed key (the bring your own key, or "BYOK" scenario) as the Azure Information Protection tenant key.
When you run this command, specify your own key vault name but you must specify the *ServicePrincipalName* parameter with the GUID **00000012-0000-0000-c000-000000000000** and specify the permissions in the example.
When you run this command, specify your own key vault name but you must specify the *ServicePrincipalName* parameter and specify the permissions in the example.

## PARAMETERS

Expand Down Expand Up @@ -424,7 +424,7 @@ Accept wildcard characters: False
```
### -ObjectId
Specifies the object ID of the user or service principal in Azure Active Directory for which to grant permissions.
Specifies the object ID of the user or service principal in Azure Active Directory for which to grant permissions. Its value is in the format of GUID.
```yaml
Type: System.String
Expand Down
2 changes: 1 addition & 1 deletion src/Network/Network/ChangeLog.md
Original file line number Diff line number Diff line change
Expand Up @@ -30,7 +30,7 @@
- Added `CustomV2` to the validation set of `PolicyType`
- Added `TLSv1_3` to the validation set of `MinProtocolVersion`
- Removed validation for null or empty cipher suites list since there can be empty cipher suites list for min protocol version of tls1.3
* Network Watcher Feature Change: Added new paramenter i.e. AzureVMSS as source endpoint in ConnectionMonitor.
* Network Watcher Feature Change: Added new parameter i.e. AzureVMSS as source endpoint in ConnectionMonitor.
- `New-AzNetworkWatcherConnectionMonitorEndpointObject`
* Added `IdentifyTopFatFlow` parameter to `AzureFirewall`
- `New-AzFirewall`
Expand Down

0 comments on commit 54ff51b

Please sign in to comment.