Skip to content

Commit 42ba2fe

Browse files
committed
Apply quotation mark rules from SKILL.md to PowerShell commands
1 parent 24e73fa commit 42ba2fe

5 files changed

Lines changed: 31 additions & 31 deletions

File tree

articles/key-vault/general/apps-api-keys-secrets.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -135,9 +135,9 @@ New-AzScheduledQueryRule -ResourceGroupName "<resource-group>" `
135135
-Action `
136136
(New-AzScheduledQueryRuleAction -Severity 3 -Trigger `
137137
(New-AzScheduledQueryRuleTriggerCondition -ThresholdOperator GreaterThan -Threshold 0 -MetricTrigger `
138-
(New-AzScheduledQueryRuleMetricTrigger -MetricName "UnauthorizedAccess" -MetricResourceId <log-analytics-workspace-resource-id> -TimeAggregation "Count" -Operator "GreaterThan" -Threshold 0))) `
138+
(New-AzScheduledQueryRuleMetricTrigger -MetricName "UnauthorizedAccess" -MetricResourceId "<log-analytics-workspace-resource-id>" -TimeAggregation "Count" -Operator "GreaterThan" -Threshold 0))) `
139139
-Source `
140-
(New-AzScheduledQueryRuleSource -Query "AzureDiagnostics | where ResourceType == 'VAULTS' | where OperationName == 'SecretGet' | where ResultSignature == 'Unauthorized'" -DataSourceId <log-analytics-workspace-resource-id>) `
140+
(New-AzScheduledQueryRuleSource -Query "AzureDiagnostics | where ResourceType == 'VAULTS' | where OperationName == 'SecretGet' | where ResultSignature == 'Unauthorized'" -DataSourceId "<log-analytics-workspace-resource-id>") `
141141
-Schedule `
142142
(New-AzScheduledQueryRuleSchedule -FrequencyInMinutes 5 -TimeWindowInMinutes 5) `
143143
-Description "Alert for unauthorized access attempts to Key Vault secrets"

articles/key-vault/general/assign-access-policy.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -128,13 +128,13 @@ Determine the object ID of the application, group, or user to which you want to
128128
- Applications and other service principals: use the [Get-AzADServicePrincipal](/powershell/module/az.resources/get-azadserviceprincipal) cmdlet with the `-SearchString` parameter to filter results to the name of the desired service principal:
129129
130130
```azurepowershell-interactive
131-
Get-AzADServicePrincipal -SearchString <search-string>
131+
Get-AzADServicePrincipal -SearchString "<search-string>"
132132
```
133133
134134
- Groups: use the [Get-AzADGroup](/powershell/module/az.resources/get-azadgroup) cmdlet with the `-SearchString` parameter to filter results to the name of the desired group:
135135
136136
```azurepowershell-interactive
137-
Get-AzADGroup -SearchString <search-string>
137+
Get-AzADGroup -SearchString "<search-string>"
138138
```
139139
140140
In the output, the object ID is listed as `Id`.
@@ -152,7 +152,7 @@ Determine the object ID of the application, group, or user to which you want to
152152
Use the [Set-AzKeyVaultAccessPolicy](/powershell/module/az.keyvault/set-azkeyvaultaccesspolicy) cmdlet to assign the access policy:
153153
154154
```azurepowershell-interactive
155-
Set-AzKeyVaultAccessPolicy -VaultName <vault-name> -ObjectId <object-id> -PermissionsToSecrets <secrets-permissions> -PermissionsToKeys <keys-permissions> -PermissionsToCertificates <certificate-permissions
155+
Set-AzKeyVaultAccessPolicy -VaultName "<vault-name>" -ObjectId "<object-id>" -PermissionsToSecrets <secrets-permissions> -PermissionsToKeys <keys-permissions> -PermissionsToCertificates <certificate-permissions>
156156
```
157157

158158
You need only include `-PermissionsToSecrets`, `-PermissionsToKeys`, and `-PermissionsToCertificates` when assigning permissions to those particular types. The allowable values for `<secret-permissions>`, `<key-permissions>`, and `<certificate-permissions>` are given in the [Set-AzKeyVaultAccessPolicy - Parameters](/powershell/module/az.keyvault/set-azkeyvaultaccesspolicy#parameters) documentation.

articles/key-vault/general/key-vault-recovery.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -277,7 +277,7 @@ For more information about soft-delete, see [Azure Key Vault soft-delete overvie
277277
* Delete key vault
278278
279279
```azurepowershell
280-
Remove-AzKeyVault -VaultName '<vault-name>'
280+
Remove-AzKeyVault -VaultName "<vault-name>"
281281
```
282282
283283
* List all soft-deleted key vaults
@@ -289,19 +289,19 @@ For more information about soft-delete, see [Azure Key Vault soft-delete overvie
289289
* Recover soft-deleted key-vault
290290
291291
```azurepowershell
292-
Undo-AzKeyVaultRemoval -VaultName <vault-name> -ResourceGroupName <resource-group> -Location <location>
292+
Undo-AzKeyVaultRemoval -VaultName "<vault-name>" -ResourceGroupName "<resource-group>" -Location "<location>"
293293
```
294294
295295
* Purge soft-deleted key-vault **(WARNING! THIS OPERATION WILL PERMANENTLY DELETE YOUR KEY VAULT)**
296296
297297
```azurepowershell
298-
Remove-AzKeyVault -VaultName <vault-name> -InRemovedState -Location <location>
298+
Remove-AzKeyVault -VaultName "<vault-name>" -InRemovedState -Location "<location>"
299299
```
300300
301301
* Enable purge-protection on key-vault
302302
303303
```azurepowershell
304-
Update-AzKeyVault -VaultName <vault-name> -ResourceGroupName <resource-group> -EnablePurgeProtection
304+
Update-AzKeyVault -VaultName "<vault-name>" -ResourceGroupName "<resource-group>" -EnablePurgeProtection
305305
```
306306
307307
## Certificates (PowerShell)
@@ -315,25 +315,25 @@ For more information about soft-delete, see [Azure Key Vault soft-delete overvie
315315
* Delete a Certificate
316316
317317
```azurepowershell
318-
Remove-AzKeyVaultCertificate -VaultName <vault-name> -Name '<certificate-name>'
318+
Remove-AzKeyVaultCertificate -VaultName "<vault-name>" -Name "<certificate-name>"
319319
```
320320

321321
* List all deleted certificates in a key vault
322322

323323
```azurepowershell
324-
Get-AzKeyVaultCertificate -VaultName <vault-name> -InRemovedState
324+
Get-AzKeyVaultCertificate -VaultName "<vault-name>" -InRemovedState
325325
```
326326

327327
* Recover a certificate in the deleted state
328328

329329
```azurepowershell
330-
Undo-AzKeyVaultCertificateRemoval -VaultName <vault-name> -Name '<certificate-name>'
330+
Undo-AzKeyVaultCertificateRemoval -VaultName "<vault-name>" -Name "<certificate-name>"
331331
```
332332

333333
* Purge a soft-deleted certificate **(WARNING! THIS OPERATION WILL PERMANENTLY DELETE YOUR CERTIFICATE)**
334334

335335
```azurepowershell
336-
Remove-AzKeyVaultcertificate -VaultName <vault-name> -Name '<certificate-name>' -InRemovedState
336+
Remove-AzKeyVaultcertificate -VaultName "<vault-name>" -Name "<certificate-name>" -InRemovedState
337337
```
338338

339339
## Keys (PowerShell)
@@ -347,25 +347,25 @@ For more information about soft-delete, see [Azure Key Vault soft-delete overvie
347347
* Delete a key
348348
349349
```azurepowershell
350-
Remove-AzKeyVaultKey -VaultName <vault-name> -Name '<key-name>'
350+
Remove-AzKeyVaultKey -VaultName "<vault-name>" -Name "<key-name>"
351351
```
352352

353353
* List all deleted keys in a key vault
354354

355355
```azurepowershell
356-
Get-AzKeyVaultKey -VaultName <vault-name> -InRemovedState
356+
Get-AzKeyVaultKey -VaultName "<vault-name>" -InRemovedState
357357
```
358358

359359
* To recover a soft-deleted key
360360

361361
```azurepowershell
362-
Undo-AzKeyVaultKeyRemoval -VaultName <vault-name> -Name <key-name>
362+
Undo-AzKeyVaultKeyRemoval -VaultName "<vault-name>" -Name "<key-name>"
363363
```
364364
365365
* Purge a soft-deleted key **(WARNING! THIS OPERATION WILL PERMANENTLY DELETE YOUR KEY)**
366366
367367
```azurepowershell
368-
Remove-AzKeyVaultKey -VaultName <vault-name> -Name <key-name> -InRemovedState
368+
Remove-AzKeyVaultKey -VaultName "<vault-name>" -Name "<key-name>" -InRemovedState
369369
```
370370
371371
## Secrets (PowerShell)
@@ -379,25 +379,25 @@ For more information about soft-delete, see [Azure Key Vault soft-delete overvie
379379
* Delete a secret named SQLPassword
380380
381381
```azurepowershell
382-
Remove-AzKeyVaultSecret -VaultName <vault-name> -Name <secret-name>
382+
Remove-AzKeyVaultSecret -VaultName "<vault-name>" -Name "<secret-name>"
383383
```
384384

385385
* List all deleted secrets in a key vault
386386

387387
```azurepowershell
388-
Get-AzKeyVaultSecret -VaultName <vault-name> -InRemovedState
388+
Get-AzKeyVaultSecret -VaultName "<vault-name>" -InRemovedState
389389
```
390390

391391
* Recover a secret in the deleted state
392392

393393
```azurepowershell
394-
Undo-AzKeyVaultSecretRemoval -VaultName <vault-name> -Name <secret-name>
394+
Undo-AzKeyVaultSecretRemoval -VaultName "<vault-name>" -Name "<secret-name>"
395395
```
396396

397397
* Purge a secret in deleted state **(WARNING! THIS OPERATION WILL PERMANENTLY DELETE YOUR KEY)**
398398

399399
```azurepowershell
400-
Remove-AzKeyVaultSecret -VaultName <vault-name> -Name <secret-name> -InRemovedState
400+
Remove-AzKeyVaultSecret -VaultName "<vault-name>" -Name "<secret-name>" -InRemovedState
401401
```
402402
---
403403

articles/key-vault/general/rbac-guide.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -147,10 +147,10 @@ To create a role assignment using Azure PowerShell, use the [New-AzRoleAssignmen
147147

148148
```azurepowershell
149149
#Assign by User Principal Name
150-
New-AzRoleAssignment -RoleDefinitionName <role-name> -SignInName <user-principal-name> -Scope <scope>
150+
New-AzRoleAssignment -RoleDefinitionName "<role-name>" -SignInName <user-principal-name> -Scope "<scope>"
151151
152152
#Assign by Service Principal ApplicationId
153-
New-AzRoleAssignment -RoleDefinitionName Reader -ApplicationId <application-id> -Scope <scope>
153+
New-AzRoleAssignment -RoleDefinitionName "Reader" -ApplicationId <application-id> -Scope "<scope>"
154154
```
155155

156156
For full details, see [Assign Azure roles using Azure PowerShell](/azure/role-based-access-control/role-assignments-powershell).
@@ -194,10 +194,10 @@ For full details, see [Assign Azure roles using Azure CLI](/azure/role-based-acc
194194

195195
```azurepowershell
196196
#Assign by User Principal Name
197-
New-AzRoleAssignment -RoleDefinitionName 'Key Vault Reader' -SignInName <user-principal-name> -Scope /subscriptions/<subscription-id>/resourcegroups/<resource-group>
197+
New-AzRoleAssignment -RoleDefinitionName "Key Vault Reader" -SignInName <user-principal-name> -Scope "/subscriptions/<subscription-id>/resourcegroups/<resource-group>"
198198
199199
#Assign by Service Principal ApplicationId
200-
New-AzRoleAssignment -RoleDefinitionName 'Key Vault Reader' -ApplicationId <application-id> -Scope /subscriptions/<subscription-id>/resourcegroups/<resource-group>
200+
New-AzRoleAssignment -RoleDefinitionName "Key Vault Reader" -ApplicationId <application-id> -Scope "/subscriptions/<subscription-id>/resourcegroups/<resource-group>"
201201
```
202202
For full details, see [Assign Azure roles using Azure PowerShell](/azure/role-based-access-control/role-assignments-powershell).
203203

@@ -233,10 +233,10 @@ For full details, see [Assign Azure roles using Azure CLI](/azure/role-based-acc
233233

234234
```azurepowershell
235235
#Assign by User Principal Name
236-
New-AzRoleAssignment -RoleDefinitionName 'Key Vault Secrets Officer' -SignInName <user-principal-name> -Scope /subscriptions/<subscription-id>/resourcegroups/<resource-group>/providers/Microsoft.KeyVault/vaults/<vault-name>
236+
New-AzRoleAssignment -RoleDefinitionName "Key Vault Secrets Officer" -SignInName <user-principal-name> -Scope "/subscriptions/<subscription-id>/resourcegroups/<resource-group>/providers/Microsoft.KeyVault/vaults/<vault-name>"
237237
238238
#Assign by Service Principal ApplicationId
239-
New-AzRoleAssignment -RoleDefinitionName 'Key Vault Secrets Officer' -ApplicationId <application-id> -Scope /subscriptions/<subscription-id>/resourcegroups/<resource-group>/providers/Microsoft.KeyVault/vaults/<vault-name>
239+
New-AzRoleAssignment -RoleDefinitionName "Key Vault Secrets Officer" -ApplicationId <application-id> -Scope "/subscriptions/<subscription-id>/resourcegroups/<resource-group>/providers/Microsoft.KeyVault/vaults/<vault-name>"
240240
```
241241

242242
For full details, see [Assign Azure roles using Azure PowerShell](/azure/role-based-access-control/role-assignments-powershell).
@@ -280,10 +280,10 @@ For full details, see [Assign Azure roles using Azure CLI](/azure/role-based-acc
280280

281281
```azurepowershell
282282
#Assign by User Principal Name
283-
New-AzRoleAssignment -RoleDefinitionName 'Key Vault Secrets Officer' -SignInName <user-principal-name> -Scope /subscriptions/<subscription-id>/resourcegroups/<resource-group>/providers/Microsoft.KeyVault/vaults/<vault-name>/secrets/RBACSecret
283+
New-AzRoleAssignment -RoleDefinitionName "Key Vault Secrets Officer" -SignInName <user-principal-name> -Scope "/subscriptions/<subscription-id>/resourcegroups/<resource-group>/providers/Microsoft.KeyVault/vaults/<vault-name>/secrets/RBACSecret"
284284
285285
#Assign by Service Principal ApplicationId
286-
New-AzRoleAssignment -RoleDefinitionName 'Key Vault Secrets Officer' -ApplicationId <application-id> -Scope /subscriptions/<subscription-id>/resourcegroups/<resource-group>/providers/Microsoft.KeyVault/vaults/<vault-name>/secrets/RBACSecret
286+
New-AzRoleAssignment -RoleDefinitionName "Key Vault Secrets Officer" -ApplicationId <application-id> -Scope "/subscriptions/<subscription-id>/resourcegroups/<resource-group>/providers/Microsoft.KeyVault/vaults/<vault-name>/secrets/RBACSecret"
287287
```
288288

289289
For full details, see [Assign Azure roles using Azure PowerShell](/azure/role-based-access-control/role-assignments-powershell).

articles/key-vault/general/tutorial-net-virtual-machine.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -96,8 +96,8 @@ Note the system-assigned identity that's displayed in the following code. The ou
9696
# [Azure PowerShell](#tab/azurepowershell)
9797

9898
```azurepowershell
99-
$vm = Get-AzVM -Name <vm-name>
100-
Update-AzVM -ResourceGroupName <resource-group> -VM $vm -IdentityType SystemAssigned
99+
$vm = Get-AzVM -Name "<vm-name>"
100+
Update-AzVM -ResourceGroupName "<resource-group>" -VM $vm -IdentityType SystemAssigned
101101
```
102102

103103
Note the PrincipalId that's displayed in the following code. The output of the preceding command would be:

0 commit comments

Comments
 (0)