Skip to content

Commit 20ee6e6

Browse files
authored
Merge pull request #4313 from danoleary/patch-1
Corrected error in docs for Set-AzureRmKeyVaultAccessPolicy
2 parents f2b5c5f + 808d7b6 commit 20ee6e6

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

src/ResourceManager/KeyVault/Commands.KeyVault/help/Set-AzureRmKeyVaultAccessPolicy.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ Note that although specifying the resource group is optional for this cmdlet, yo
7676
### Example 1: Grant permissions to a user for a key vault Key Vault and modify the permissionskey vault
7777
```
7878
PS C:\>Set-AzureRmKeyVaultAccessPolicy -VaultName 'Contoso03Vault' -UserPrincipalName '[email protected]' -PermissionsToKeys create,import,delete,list -PermissionsToSecrets 'set,delete'
79-
PS C:\> Set-AzureRmKeyVaultAccessPolicy -VaultName 'Contoso03Vault' -UserPrincipalName '[email protected]' -PermissionsToSecrets 'set,delete,get' -PassThru
79+
PS C:\> Set-AzureRmKeyVaultAccessPolicy -VaultName 'Contoso03Vault' -UserPrincipalName '[email protected]' -PermissionsToSecrets set,delete,get -PassThru
8080
PS C:\> Set-AzureRmKeyVaultAccessPolicy -VaultName 'Contoso03Vault' -UserPrincipalName '[email protected]' -PermissionsToKeys @() -PassThru
8181
```
8282

@@ -92,7 +92,7 @@ The *PassThru* parameter results in the updated object being returned by the cmd
9292

9393
### Example 2: Grant permissions for an application service principal to read and write secrets
9494
```
95-
PS C:\>Set-AzureRmKeyVaultAccessPolicy -VaultName 'Contoso03Vault' -ServicePrincipalName 'http://payroll.contoso.com' -PermissionsToSecrets 'Get,Set'
95+
PS C:\>Set-AzureRmKeyVaultAccessPolicy -VaultName 'Contoso03Vault' -ServicePrincipalName 'http://payroll.contoso.com' -PermissionsToSecrets Get,Set
9696
```
9797

9898
This command grants permissions for an application for a key vault named Contoso03Vault.
@@ -103,15 +103,15 @@ This example specifies the service principal name http://payroll.contoso.com, an
103103

104104
### Example 3: Grant permissions for an application using its object ID
105105
```
106-
PS C:\>Set-AzureRmKeyVaultAccessPolicy -VaultName 'Contoso03Vault' -ObjectId 34595082-9346-41b6-8d6b-295a2808b8db -PermissionsToSecrets 'Get,Set'
106+
PS C:\>Set-AzureRmKeyVaultAccessPolicy -VaultName 'Contoso03Vault' -ObjectId 34595082-9346-41b6-8d6b-295a2808b8db -PermissionsToSecrets Get,Set
107107
```
108108

109109
This command grants the application permissions to read and write secrets.
110110
This example specifies the application using the object ID of the service principal of the application.
111111

112112
### Example 4: Grant permissions for a user principal name
113113
```
114-
PS C:\>Set-AzureRmKeyVaultAccessPolicy -VaultName 'Contoso03Vault' -UserPrincipalName '[email protected]' -PermissionsToSecrets 'Get,List,Set'
114+
PS C:\>Set-AzureRmKeyVaultAccessPolicy -VaultName 'Contoso03Vault' -UserPrincipalName '[email protected]' -PermissionsToSecrets Get,List,Set
115115
```
116116

117117
This command grants get, list, and set permissions for the specified user principal name for access to secrets.

0 commit comments

Comments
 (0)