You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-azure/guided-project-new-employee-access/includes/2-exercise-create-user-group.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,7 +47,7 @@ Create a storage account inside the resource group. This resource provides a sco
47
47
48
48
## Task 3: Create the security group
49
49
50
-
Set up a security group that serves as a container for your new user. Using groups makes permission management scalable — you assign permissions once to a group, then add or remove users as needed.
50
+
Set up a security group that serves as a container for your new user. Using groups makes permission management scalable—you assign permissions once to a group, then add or remove users as needed.
51
51
52
52
1. In the portal search bar, search for **Microsoft Entra ID** and select **Microsoft Entra ID**.
53
53
2. In the left menu under **Manage**, select **Groups**.
@@ -61,7 +61,7 @@ Set up a security group that serves as a container for your new user. Using grou
61
61
> **Validation step:** Verify the **gp-rg-readers** security group now exists in your tenant.
62
62
63
63
> [!NOTE]
64
-
> Each exercise includes validation steps like this one. Track your results as you go — you'll review them all in the validation unit at the end of this module.
64
+
> Each exercise includes validation steps like this one. Track your results as you go—you'll review them all in the validation unit at the end of this module.
65
65
66
66
## Task 4: Create the user account
67
67
@@ -70,7 +70,7 @@ Create a new identity in Entra ID for the team member. This user account will be
70
70
1. In the portal search bar, search for **Microsoft Entra ID** and select **Microsoft Entra ID**.
71
71
2. In the left menu under **Manage**, select **Users**.
72
72
3. Select **New user** and then select **Create new user**.
73
-
4. For **User principal name**, enter a unique name (for example, **alexgp**). This is the sign-in name the user would use to access Azure (combined with your tenant domain, it becomes something like **[email protected]**). Record this value — you need it for later validation.
73
+
4. For **User principal name**, enter a unique name (for example, **alexgp**). This is the sign-in name the user would use to access Azure (combined with your tenant domain, it becomes something like **[email protected]**). Record this value—you need it for later validation.
74
74
5. For **Display name**, enter **Alex Guided Project**.
75
75
6. Select **Review + create** and then select **Create**.
76
76
7. The Users list may not refresh automatically. Select **Refresh** to confirm the new user appears in the list.
Copy file name to clipboardExpand all lines: learn-pr/wwl-azure/guided-project-new-employee-access/includes/3-exercise-assign-role.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ This guided project consists of the following exercises:
4
4
-**Assign RBAC role at scope**
5
5
- Verify least-privilege model
6
6
7
-
In this exercise, you assign the Reader role to your security group at the resource group scope. This single assignment gives every member of the group permission to view resources — demonstrating how group-based RBAC simplifies access management.
7
+
In this exercise, you assign the Reader role to your security group at the resource group scope. This single assignment gives every member of the group permission to view resources—demonstrating how group-based RBAC simplifies access management.
8
8
9
9
This exercise includes the following tasks:
10
10
@@ -14,7 +14,7 @@ This exercise includes the following tasks:
14
14
15
15
## Task 1: Assign Reader role to the group
16
16
17
-
Grant the Reader role to your security group at the resource group scope. This gives all members of the group permission to view resources but not to create, modify, or delete them — implementing the principle of least privilege.
17
+
Grant the Reader role to your security group at the resource group scope. This gives all members of the group permission to view resources but not to create, modify, or delete them—implementing the principle of least privilege.
18
18
19
19
1. In the portal search bar, search for **Resource groups** and select **Resource groups**.
0 commit comments