diff --git a/docs/guides/service_principal_client_certificate.md b/docs/guides/service_principal_client_certificate.md index 85b90649dd..09415360b4 100644 --- a/docs/guides/service_principal_client_certificate.md +++ b/docs/guides/service_principal_client_certificate.md @@ -40,7 +40,7 @@ $ openssl req -subj '/CN=myclientcertificate/O=HashiCorp, Inc./ST=CA/C=US' \ Next we generate a PKCS#12 bundle (.pfx file) which can be used by the AzureAD provider to authenticate with Azure: ```shell -$ openssl pkcs12 -export -password pass:Pa55w0rd123 -out "client.pfx" -inkey "client.key" -in "client.crt" +$ openssl pkcs12 -export -password pass:"Pa55w0rd123" -out client.pfx -inkey client.key -in client.crt ``` Now that we've generated a certificate, we can create the Azure Active Directory Application. @@ -83,10 +83,10 @@ $ export ARM_CLIENT_CERTIFICATE_PASSWORD="Pa55w0rd123" $ export ARM_TENANT_ID="10000000-2000-3000-4000-500000000000" # PowerShell -$env:ARM_CLIENT_ID = 00000000-0000-0000-0000-000000000000 -$env:ARM_CLIENT_CERTIFICATE_PATH = /path/to/my/client/certificate.pfx -$env:ARM_CLIENT_CERTIFICATE_PASSWORD = Pa55w0rd123 -$env:ARM_TENANT_ID = 10000000-2000-3000-4000-500000000000 +$env:ARM_CLIENT_ID = "00000000-0000-0000-0000-000000000000" +$env:ARM_CLIENT_CERTIFICATE_PATH = "/path/to/my/client/certificate.pfx" +$env:ARM_CLIENT_CERTIFICATE_PASSWORD = "Pa55w0rd123" +$env:ARM_TENANT_ID = "10000000-2000-3000-4000-500000000000" ``` At this point running either `terraform plan` or `terraform apply` should allow Terraform to authenticate using the Client Certificate. diff --git a/docs/guides/service_principal_client_secret.md b/docs/guides/service_principal_client_secret.md index ddde6743e9..b54311500f 100644 --- a/docs/guides/service_principal_client_secret.md +++ b/docs/guides/service_principal_client_secret.md @@ -59,7 +59,7 @@ Our recommended approach is storing the credentials as Environment Variables, fo ```bash # sh $ export ARM_CLIENT_ID="00000000-0000-0000-0000-000000000000" -$ export ARM_CLIENT_SECRET="03MWPmH2W3i008UVcucO1E1vifY_bR" +$ export ARM_CLIENT_SECRET="MyCl1eNtSeCr3t" $ export ARM_TENANT_ID="10000000-2000-3000-4000-500000000000" # PowerShell diff --git a/docs/resources/application.md b/docs/resources/application.md index 85b5024ce9..ed22147a08 100644 --- a/docs/resources/application.md +++ b/docs/resources/application.md @@ -78,24 +78,24 @@ resource "azuread_application" "example" { } required_resource_access { - resource_app_id = "00000003-0000-0000-c000-000000000000" + resource_app_id = "00000003-0000-0000-c000-000000000000" # Microsoft Graph resource_access { - id = "df021288-bdef-4463-88db-98f22de89214" + id = "df021288-bdef-4463-88db-98f22de89214" # User.Read.All type = "Role" } resource_access { - id = "b4e74841-8e56-480b-be8b-910348b18b4c" + id = "b4e74841-8e56-480b-be8b-910348b18b4c" # User.ReadWrite type = "Scope" } } required_resource_access { - resource_app_id = "c5393580-f805-4401-95e8-94b7a6ef2fc2" + resource_app_id = "c5393580-f805-4401-95e8-94b7a6ef2fc2" # Office 365 Management resource_access { - id = "594c1fb6-4f81-4475-ae41-0c394909246c" + id = "594c1fb6-4f81-4475-ae41-0c394909246c" # ActivityFeed.Read type = "Role" } }