diff --git a/sdk/identity/Azure.Identity/TROUBLESHOOTING.md b/sdk/identity/Azure.Identity/TROUBLESHOOTING.md
index 8769d8779cec8..36fb355d30425 100644
--- a/sdk/identity/Azure.Identity/TROUBLESHOOTING.md
+++ b/sdk/identity/Azure.Identity/TROUBLESHOOTING.md
@@ -102,7 +102,7 @@ DefaultAzureCredentialOptions options = new DefaultAzureCredentialOptions()
| Error |Description| Mitigation |
|---|---|---|
|`CredentialUnavailableException` raised with message. "DefaultAzureCredential failed to retrieve a token from the included credentials."|All credentials in the `DefaultAzureCredential` chain failed to retrieve a token, each throwing a `CredentialUnavailableException`|
- [Enable logging](#enable-and-configure-logging) to verify the credentials being tried, and get further diagnostic information.
- Consult the troubleshooting guide for underlying credential types for more information.
- [EnvironmentCredential](#troubleshoot-environmentcredential-authentication-issues)
- [ManagedIdentityCredential](#troubleshoot-managedidentitycredential-authentication-issues)
- [VisualStudioCodeCredential](#troubleshoot-visualstudiocodecredential-authentication-issues)
- [VisualStudioCredential](#troubleshoot-visualstudiocredential-authentication-issues)
- [AzureCLICredential](#troubleshoot-azureclicredential-authentication-issues)
- [AzurePowershellCredential](#troubleshoot-azurepowershellcredential-authentication-issues)
|
-|`RequestFailedExcpetion` raised from the client with a status code of 401 or 403|Authentication succeeded but the authorizing Azure service responded with a 401 (Authenticate), or 403 (Forbidden) status code. This can often be caused by the `DefaultAzureCredential` authenticating an account other than the intended or that the intended account does not have the correct permissions or roles assigned.|- [Enable logging](#enable-and-configure-logging) to determine which credential in the chain returned the authenticating token.
- In the case a credential other than the expected is returning a token, bypass this by either signing out of the corresponding development tool, or excluding the credential with the ExcludeXXXCredential property in the `DefaultAzureCredentialOptions`
- Ensure that the correct role is assigned to the account being used. For example, a service specific role rather than the subscription Owner role.
|
+|`RequestFailedException` raised from the client with a status code of 401 or 403|Authentication succeeded but the authorizing Azure service responded with a 401 (Authenticate), or 403 (Forbidden) status code. This can often be caused by the `DefaultAzureCredential` authenticating an account other than the intended or that the intended account does not have the correct permissions or roles assigned.|- [Enable logging](#enable-and-configure-logging) to determine which credential in the chain returned the authenticating token.
- In the case a credential other than the expected is returning a token, bypass this by either signing out of the corresponding development tool, or excluding the credential with the ExcludeXXXCredential property in the `DefaultAzureCredentialOptions`
- Ensure that the correct role is assigned to the account being used. For example, a service specific role rather than the subscription Owner role.
|
## Troubleshoot `EnvironmentCredential` authentication issues
`CredentialUnavailableException`