Skip to content

Commit d8cdb3d

Browse files
committed
Fix em-dash usage
1 parent 4d5a5e5 commit d8cdb3d

3 files changed

Lines changed: 9 additions & 9 deletions

File tree

learn-pr/wwl-azure/guided-project-new-employee-access/includes/2-exercise-create-user-group.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ Create a storage account inside the resource group. This resource provides a sco
4747

4848
## Task 3: Create the security group
4949

50-
Set up a security group that serves as a container for your new user. Using groups makes permission management scalableyou assign permissions once to a group, then add or remove users as needed.
50+
Set up a security group that serves as a container for your new user. Using groups makes permission management scalableyou assign permissions once to a group, then add or remove users as needed.
5151

5252
1. In the portal search bar, search for **Microsoft Entra ID** and select **Microsoft Entra ID**.
5353
2. In the left menu under **Manage**, select **Groups**.
@@ -61,7 +61,7 @@ Set up a security group that serves as a container for your new user. Using grou
6161
> **Validation step:** Verify the **gp-rg-readers** security group now exists in your tenant.
6262
6363
> [!NOTE]
64-
> Each exercise includes validation steps like this one. Track your results as you goyou'll review them all in the validation unit at the end of this module.
64+
> Each exercise includes validation steps like this one. Track your results as you goyou'll review them all in the validation unit at the end of this module.
6565
6666
## Task 4: Create the user account
6767

@@ -70,7 +70,7 @@ Create a new identity in Entra ID for the team member. This user account will be
7070
1. In the portal search bar, search for **Microsoft Entra ID** and select **Microsoft Entra ID**.
7171
2. In the left menu under **Manage**, select **Users**.
7272
3. Select **New user** and then select **Create new user**.
73-
4. For **User principal name**, enter a unique name (for example, **alexgp**). This is the sign-in name the user would use to access Azure (combined with your tenant domain, it becomes something like **[email protected]**). Record this valueyou need it for later validation.
73+
4. For **User principal name**, enter a unique name (for example, **alexgp**). This is the sign-in name the user would use to access Azure (combined with your tenant domain, it becomes something like **[email protected]**). Record this valueyou need it for later validation.
7474
5. For **Display name**, enter **Alex Guided Project**.
7575
6. Select **Review + create** and then select **Create**.
7676
7. The Users list may not refresh automatically. Select **Refresh** to confirm the new user appears in the list.

learn-pr/wwl-azure/guided-project-new-employee-access/includes/3-exercise-assign-role.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ This guided project consists of the following exercises:
44
- **Assign RBAC role at scope**
55
- Verify least-privilege model
66

7-
In this exercise, you assign the Reader role to your security group at the resource group scope. This single assignment gives every member of the group permission to view resourcesdemonstrating how group-based RBAC simplifies access management.
7+
In this exercise, you assign the Reader role to your security group at the resource group scope. This single assignment gives every member of the group permission to view resourcesdemonstrating how group-based RBAC simplifies access management.
88

99
This exercise includes the following tasks:
1010

@@ -14,7 +14,7 @@ This exercise includes the following tasks:
1414

1515
## Task 1: Assign Reader role to the group
1616

17-
Grant the Reader role to your security group at the resource group scope. This gives all members of the group permission to view resources but not to create, modify, or delete themimplementing the principle of least privilege.
17+
Grant the Reader role to your security group at the resource group scope. This gives all members of the group permission to view resources but not to create, modify, or delete themimplementing the principle of least privilege.
1818

1919
1. In the portal search bar, search for **Resource groups** and select **Resource groups**.
2020
2. Select **rg-gp-access-model** from the list.

learn-pr/wwl-azure/guided-project-new-employee-access/includes/4-exercise-verify-least-privilege.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -69,14 +69,14 @@ Create a TAP for Alex. This one-time passcode lets Alex sign in to the portal wi
6969
5. Select **+ Add authentication method**.
7070
6. For **Choose method**, select **Temporary Access Pass**.
7171
7. Leave the defaults (1 hour lifetime, one-time use) and select **Add**.
72-
8. Copy the **Temporary Access Pass** code that appears and save itthis is the only time you can see it.
72+
8. Copy the **Temporary Access Pass** code that appears and save itthis is the only time you can see it.
7373

7474
> [!NOTE]
7575
> **Validation step:** Confirm the TAP code is generated and saved. You need it for the next task.
7676
7777
## Task 5: Sign in as Alex and test permissions
7878

79-
Sign in as Alex to experience the Reader role firsthand. This is the strongest validationyou see exactly what Alex can and cannot do in the portal.
79+
Sign in as Alex to experience the Reader role firsthand. This is the strongest validationyou see exactly what Alex can and cannot do in the portal.
8080

8181
1. Open a new **InPrivate** (Edge) or **Incognito** (Chrome) browser window.
8282
2. Go to [https://portal.azure.com](https://portal.azure.com).
@@ -85,7 +85,7 @@ Sign in as Alex to experience the Reader role firsthand. This is the strongest v
8585
5. Paste the **Temporary Access Pass** code and select **Sign in**.
8686
6. When prompted to update your password, create a new password and select **Sign in**.
8787
6. After signing in, search for **Resource groups** in the portal search bar and select **Resource groups**.
88-
7. Select **rg-gp-access-model** from the list. Confirm you can view the resource group and its resourcesthis proves read access works.
88+
7. Select **rg-gp-access-model** from the list. Confirm you can view the resource group and its resourcesthis proves read access works.
8989
8. In the portal search bar, search for **Storage accounts** and select **Storage accounts**.
9090
9. Select **+ Create**.
9191
10. On the **Basics** tab, select **rg-gp-access-model** as the resource group.
@@ -95,7 +95,7 @@ Sign in as Alex to experience the Reader role firsthand. This is the strongest v
9595
14. For **Performance**, select **Standard**.
9696
15. For **Redundancy**, select **Locally-redundant storage (LRS)**.
9797
16. Select **Review + create**.
98-
16. Confirm the creation fails with a permissions errorAlex has Reader access only and cannot create resources.
98+
16. Confirm the creation fails with a permissions errorAlex has Reader access only and cannot create resources.
9999
13. Close the InPrivate/Incognito window and return to your main browser session.
100100

101101
> [!NOTE]

0 commit comments

Comments
 (0)