diff --git a/README.md b/README.md index b50cda69..3ba2f119 100644 --- a/README.md +++ b/README.md @@ -207,11 +207,13 @@ Follow the steps to configure Azure Service Principal with a secret: # The command should output a JSON object similar to this: + { "clientId": "", "clientSecret": "", "subscriptionId": "", "tenantId": "", + "resourceManagerEndpointUrl": (...) } @@ -219,6 +221,10 @@ Follow the steps to configure Azure Service Principal with a secret: * Now in the workflow file in your branch: `.github/workflows/workflow.yml` replace the secret in Azure login action with your secret (Refer to the example above) * Note: The above `az ad sp create-for-rbac` command will give you the `--sdk-auth` deprecation warning. As we are working with CLI for this deprecation process, we strongly recommend users to use this `--sdk-auth` flag as the result dictionary output changes and not accepted by login action if `--sdk-auth` is not used. +### Manually creating the Credentials object + +If you already created and assigned a Service Principal in Azure you can manually create the .json object above by finding the `clientId` and `clientSecret` on the Service Principal, and your `subscriptionId` and `tenantId` of the subscription and tenant respectively. The `resourceManagerEndpointUrl` will be `https://management.azure.com/` if you are using the public Azure cloud. + ### Configure a service principal with a Federated Credential to use OIDC based authentication: