Skip to content

Commit

Permalink
Updated guids to approved versions
Browse files Browse the repository at this point in the history
  • Loading branch information
mikefrobbins committed Aug 1, 2024
1 parent 974cf3e commit a0b770c
Show file tree
Hide file tree
Showing 295 changed files with 1,022 additions and 1,022 deletions.
8 changes: 4 additions & 4 deletions azps-0.10.0/Az.Accounts/Connect-AzAccount.md
Original file line number Diff line number Diff line change
Expand Up @@ -170,18 +170,18 @@ More information about configuring Managed Identities can be found here: https:/
# and giving it proper permissions, please see the following:
# https://learn.microsoft.com/en-us/azure/active-directory/develop/howto-authenticate-service-principal-powershell
PS C:\> $Thumbprint = "0SZTNJ34TCCMUJ5MJZGR8XQD3S0RVHJBA33Z8ZXV"
PS C:\> $TenantId = "4cd76576-b611-43d0-8f2b-adcb139531bf"
PS C:\> $ApplicationId = "3794a65a-e4e4-493d-ac1d-f04308d712dd"
PS C:\> $TenantId = "00001111-aaaa-2222-bbbb-3333cccc4444"
PS C:\> $ApplicationId = "00001111-aaaa-2222-bbbb-3333cccc4444"
PS C:\> Connect-AzAccount -CertificateThumbprint $Thumbprint -ApplicationId $ApplicationId -Tenant $TenantId -ServicePrincipal
Account SubscriptionName TenantId Environment
------- ---------------- -------- -----------
xxxx-xxxx-xxxx-xxxx Subscription1 xxxx-xxxx-xxxx-xxxx AzureCloud
Account : 3794a65a-e4e4-493d-ac1d-f04308d712dd
Account : 00001111-aaaa-2222-bbbb-3333cccc4444
SubscriptionName : MyTestSubscription
SubscriptionId : 85f0f653-1f86-4d2c-a9f1-042efc00085c
TenantId : 4cd76576-b611-43d0-8f2b-adcb139531bf
TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444
Environment : AzureCloud
```

Expand Down
62 changes: 31 additions & 31 deletions azps-0.10.0/Az.Monitor/Get-AzAlertHistory.md

Large diffs are not rendered by default.

4 changes: 2 additions & 2 deletions azps-0.10.0/Az.Monitor/Get-AzAutoscaleHistory.md
Original file line number Diff line number Diff line change
Expand Up @@ -38,7 +38,7 @@ PS C:\>Get-AzAutoscaleHistory -StartTime 2015-02-09T18:35:00 -EndTime 2015-02-09
Authorization :
Caller : Microsoft.Insights/autoscaleSettings
Claims : http://schemas.xmlsoap.org/ws/2005/05/identity/claims/spn: Microsoft.Insights/autoscaleSettings
CorrelationId : ac5b03ca-05d4-4811-9c27-0314a145f785
CorrelationId : 00001111-aaaa-2222-bbbb-3333cccc4444
Description : The autoscale engine attempting to scale resource '/subscriptions/a93fb07c-6c93-40be-bf3b-4f0deb
a10f4b/resourceGroups/Default-Web-EastUS/providers/microsoft.web/serverFarms/DefaultServerFarm'
from 1 instances count to 2 instances count.
Expand All @@ -51,7 +51,7 @@ Id : /subscriptions/b93fb07a-6f93-30be-bf3e-4f0deca15f4f/resou
microsoft.insights/autoscalesettings/DefaultServerFarm-Default-Web-EastUS/events/c554f7ed-514c-4
49c-9338-13e15b4b56a3/ticks/635591326997519815
Level : Informational
OperationId : ac5b03ca-05d4-4811-9c27-0314a145f785
OperationId : 00001111-aaaa-2222-bbbb-3333cccc4444
OperationName : ScaleUp
Properties :
Description : The autoscale engine attempting to scale resource '/subscriptions/a93fb07c-6c93
Expand Down
8 changes: 4 additions & 4 deletions azps-0.10.0/Az.Monitor/Get-AzLog.md
Original file line number Diff line number Diff line change
Expand Up @@ -83,31 +83,31 @@ This command lists at most 1000 of the events associated with the user's subscri

### Example 5: Get an event log by correlation ID
```
PS C:\>Get-AzLog -CorrelationId "60c694d0-e46f-4c12-bed1-9b7aef541c23"
PS C:\>Get-AzLog -CorrelationId "00001111-aaaa-2222-bbbb-3333cccc4444"
```

This command lists at most 1000 events associated with the specified correlation ID that took place 7 days from the current date/time.
**NOTE**: this is usually only one event.

### Example 6: Get an event log by correlation ID with a maximum number of events
```
PS C:\>Get-AzLog -CorrelationId "60c694d0-e46f-4c12-bed1-9b7aef541c23" -MaxRecord 100
PS C:\>Get-AzLog -CorrelationId "00001111-aaaa-2222-bbbb-3333cccc4444" -MaxRecord 100
```

This command lists at most 100 events associated with the specified correlation ID that took place 7 days from the current date/time.
**NOTE**: this is usually only one event.

### Example 7: Get an event log by correlation ID and start time
```
PS C:\>Get-AzLog -CorrelationId "60c694d0-e46f-4c12-bed1-9b7aef541c23" -StartTime 2017-05-22T04:30:00
PS C:\>Get-AzLog -CorrelationId "00001111-aaaa-2222-bbbb-3333cccc4444" -StartTime 2017-05-22T04:30:00
```

This command lists at most 1000 events associated with the specified correlation ID that took place on or after 2017-05-22T04:30:00 local time if the start time is not older than 90 days from the current date/time.
**NOTE**: this is usually only one event.

### Example 8: Get an event log by correlation ID with start time and end time
```
PS C:\>Get-AzLog -CorrelationId "60c694d0-e46f-4c12-bed1-9b7aef541c23" -StartTime 2017-04-15T04:30:00 -EndTime 2017-04-25T12:30:00
PS C:\>Get-AzLog -CorrelationId "00001111-aaaa-2222-bbbb-3333cccc4444" -StartTime 2017-04-15T04:30:00 -EndTime 2017-04-25T12:30:00
```

This command lists at most 1000 events associated with the specified correlation ID that took place on or after 2017-04-15T04:30 local time, but before 2017-04-25T12:30 local time if the whole date/time range is not older than 90 days from the current date/time, i.e.: the retention period.
Expand Down
22 changes: 11 additions & 11 deletions azps-0.10.0/Az.Resources/Get-AzManagementGroup.md
Original file line number Diff line number Diff line change
Expand Up @@ -37,13 +37,13 @@ PS C:\> Get-AzManagementGroup
Id : /providers/Microsoft.Management/managementGroups/TestGroup
Type : /providers/Microsoft.Management/managementGroups
Name : TestGroup
TenantId : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0
TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444
DisplayName : TestGroupDisplayName
Id : /providers/Microsoft.Management/managementGroups/TestGroupChild
Type : /providers/Microsoft.Management/managementGroups
Name : TestGroupChild
TenantId : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0
TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444
DisplayName : TestGroupChildDisplayName
```

Expand All @@ -54,7 +54,7 @@ PS C:\> Get-AzManagementGroup -GroupName TestGroup
Id : /providers/Microsoft.Management/managementGroups/TestGroup
Type : /providers/Microsoft.Management/managementGroups
Name : TestGroup
TenantId : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0
TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444
DisplayName : TestGroupDisplayName
UpdatedTime : 2/1/2018 11:16:12 AM
UpdatedBy : 64360beb-ffb4-43a8-9314-01aa34db95a9
Expand All @@ -71,13 +71,13 @@ PS C:\> $response
Id : /providers/Microsoft.Management/managementGroups/TestGroupParent
Type : /providers/Microsoft.Management/managementGroups
Name : TestGroupParent
TenantId : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0
TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444
DisplayName : TestGroupParent
UpdatedTime : 2/1/2018 11:15:46 AM
UpdatedBy : 64360beb-ffb4-43a8-9314-01aa34db95a9
ParentId : /providers/Microsoft.Management/managementGroups/6b2064b9-34bd-46e6-9092-52f2dd5f7fc0
ParentName : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0
ParentDisplayName : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0
ParentId : /providers/Microsoft.Management/managementGroups/00001111-aaaa-2222-bbbb-3333cccc4444
ParentName : 00001111-aaaa-2222-bbbb-3333cccc4444
ParentDisplayName : 00001111-aaaa-2222-bbbb-3333cccc4444
Children : {TestGroup1DisplayName, TestGroup2DisplayName}
PS C:\> $response.Children[0]
Expand All @@ -99,13 +99,13 @@ PS C:\> $response
Id : /providers/Microsoft.Management/managementGroups/TestGroupParent
Type : /providers/Microsoft.Management/managementGroups
Name : TestGroupParent
TenantId : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0
TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444
DisplayName : TestGroupParent
UpdatedTime : 2/1/2018 11:15:46 AM
UpdatedBy : 64360beb-ffb4-43a8-9314-01aa34db95a9
ParentId : /providers/Microsoft.Management/managementGroups/6b2064b9-34bd-46e6-9092-52f2dd5f7fc0
ParentName : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0
ParentDisplayName : 6b2064b9-34bd-46e6-9092-52f2dd5f7fc0
ParentId : /providers/Microsoft.Management/managementGroups/00001111-aaaa-2222-bbbb-3333cccc4444
ParentName : 00001111-aaaa-2222-bbbb-3333cccc4444
ParentDisplayName : 00001111-aaaa-2222-bbbb-3333cccc4444
Children : {TestGroup1DisplayName, TestGroup2DisplayName}
PS C:\> $response.Children[0]
Expand Down
4 changes: 2 additions & 2 deletions azps-0.10.0/Az.Resources/New-AzADAppCredential.md
Original file line number Diff line number Diff line change
Expand Up @@ -86,10 +86,10 @@ PS C:\> $cer = New-Object System.Security.Cryptography.X509Certificates.X509Cert
PS C:\> $cer.Import("C:\myapp.cer")
PS C:\> $binCert = $cer.GetRawCertData()
PS C:\> $credValue = [System.Convert]::ToBase64String($binCert)
PS C:\> New-AzADAppCredential -ApplicationId 4589cd6b-3d79-4bb4-93b8-a0b99f3bfc58 -CertValue $credValue -StartDate $cer.GetEffectiveDateString() -EndDate $cer.GetExpirationDateString()
PS C:\> New-AzADAppCredential -ApplicationId 00001111-aaaa-2222-bbbb-3333cccc4444 -CertValue $credValue -StartDate $cer.GetEffectiveDateString() -EndDate $cer.GetExpirationDateString()
```

The supplied base64 encoded public X509 certificate ("myapp.cer") is added to the existing application with application id '4589cd6b-3d79-4bb4-93b8-a0b99f3bfc58'.
The supplied base64 encoded public X509 certificate ("myapp.cer") is added to the existing application with application id '00001111-aaaa-2222-bbbb-3333cccc4444'.

### Example 3 - Create a new application credential using piping

Expand Down
8 changes: 4 additions & 4 deletions azps-0.10.0/Az.Resources/New-AzADServicePrincipal.md
Original file line number Diff line number Diff line change
Expand Up @@ -195,16 +195,16 @@ The above command creates an AD service principal using the default values for p
### Example 5 - Create a new AD service principal using application id with role assignment

```
PS C:\> New-AzADServicePrincipal -ApplicationId 34a28ad2-dec4-4a41-bc3b-d22ddf90000e
PS C:\> New-AzADServicePrincipal -ApplicationId 00001111-aaaa-2222-bbbb-3333cccc4444
ServicePrincipalNames : {34a28ad2-dec4-4a41-bc3b-d22ddf90000e, http://my-temp-app}
ApplicationId : 34a28ad2-dec4-4a41-bc3b-d22ddf90000e
ServicePrincipalNames : {00001111-aaaa-2222-bbbb-3333cccc4444, http://my-temp-app}
ApplicationId : 00001111-aaaa-2222-bbbb-3333cccc4444
DisplayName : my-temp-app
Id : yyyyyyyy-yyyy-yyyy-yyyy-yyyyyyyyyyyy
Type : ServicePrincipal
```

Creates a new AD service principal for the application with application id '34a28ad2-dec4-4a41-bc3b-d22ddf90000e'. Since no values were provided for `Role` or `Scope`, the created service principal does not have any permissions.
Creates a new AD service principal for the application with application id '00001111-aaaa-2222-bbbb-3333cccc4444'. Since no values were provided for `Role` or `Scope`, the created service principal does not have any permissions.

### Example 6 - Create a new AD service principal using piping

Expand Down
30 changes: 15 additions & 15 deletions azps-0.10.0/Az.Resources/New-AzManagementGroup.md
Original file line number Diff line number Diff line change
Expand Up @@ -39,13 +39,13 @@ PS C:\> New-AzManagementGroup -GroupName "TestGroup"
Id : /providers/Microsoft.Management/managementGroups/TestGroup
Type : /providers/Microsoft.Management/managementGroups
Name : TestGroup
TenantId : 14307de0-5e6f-46cf-b2ba-64a062964d30
TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444
DisplayName : TestGroup
UpdatedTime : 2/1/2018 11:06:27 AM
UpdatedBy : 14307de0-5e6f-46cf-b2ba-64a062964d30
ParentId : /providers/Microsoft.Management/managementGroups/14307de0-5e6f-46cf-b2ba-64a062964d30
ParentName : 14307de0-5e6f-46cf-b2ba-64a062964d30
ParentDisplayName : 14307de0-5e6f-46cf-b2ba-64a062964d30
UpdatedBy : 00001111-aaaa-2222-bbbb-3333cccc4444
ParentId : /providers/Microsoft.Management/managementGroups/00001111-aaaa-2222-bbbb-3333cccc4444
ParentName : 00001111-aaaa-2222-bbbb-3333cccc4444
ParentDisplayName : 00001111-aaaa-2222-bbbb-3333cccc4444
```

Creation of a new group with `DisplayName` and `ParentId` set to `null`. The `DisplayName` will be same as the `GroupName` and the parent of the group will be the tenant.
Expand All @@ -57,13 +57,13 @@ PS C:\> New-AzManagementGroup -GroupName "TestGroup" -DisplayName "TestGroupDisp
Id : /providers/Microsoft.Management/managementGroups/TestGroup
Type : /providers/Microsoft.Management/managementGroups
Name : TestGroup
TenantId : 14307de0-5e6f-46cf-b2ba-64a062964d30
TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444
DisplayName : TestGroup
UpdatedTime : 2/1/2018 11:06:27 AM
UpdatedBy : 14307de0-5e6f-46cf-b2ba-64a062964d30
ParentId : /providers/Microsoft.Management/managementGroups/14307de0-5e6f-46cf-b2ba-64a062964d30
ParentName : 14307de0-5e6f-46cf-b2ba-64a062964d30
ParentDisplayName : 14307de0-5e6f-46cf-b2ba-64a062964d30
UpdatedBy : 00001111-aaaa-2222-bbbb-3333cccc4444
ParentId : /providers/Microsoft.Management/managementGroups/00001111-aaaa-2222-bbbb-3333cccc4444
ParentName : 00001111-aaaa-2222-bbbb-3333cccc4444
ParentDisplayName : 00001111-aaaa-2222-bbbb-3333cccc4444
```

In this case, the parent of the group will be the tenant and the `DisplayName` will be set to the value given.
Expand All @@ -75,10 +75,10 @@ PS C:\> New-AzManagementGroup -GroupName "TestGroup" -DisplayName "TestGroupDisp
Id : /providers/Microsoft.Management/managementGroups/TestGroup
Type : /providers/Microsoft.Management/managementGroups
Name : TestGroup
TenantId : 14307de0-5e6f-46cf-b2ba-64a062964d30
TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444
DisplayName : TestGroupDisplayName
UpdatedTime : 2/1/2018 11:16:12 AM
UpdatedBy : 14307de0-5e6f-46cf-b2ba-64a062964d30
UpdatedBy : 00001111-aaaa-2222-bbbb-3333cccc4444
ParentId : /providers/Microsoft.Management/managementGroups/TestGroupParent
ParentName : TestGroupParent
ParentDisplayName : TestGroupParent
Expand All @@ -92,10 +92,10 @@ PS C:\> New-AzManagementGroup -GroupName "TestGroup" -ParentObject $parentObject
Id : /providers/Microsoft.Management/managementGroups/TestGroup
Type : /providers/Microsoft.Management/managementGroups
Name : TestGroup
TenantId : 14307de0-5e6f-46cf-b2ba-64a062964d30
TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444
DisplayName : TestGroupDisplayName
UpdatedTime : 2/1/2018 11:16:12 AM
UpdatedBy : 14307de0-5e6f-46cf-b2ba-64a062964d30
UpdatedBy : 00001111-aaaa-2222-bbbb-3333cccc4444
ParentId : /providers/Microsoft.Management/managementGroups/TestGroupParent
ParentName : TestGroupParent
ParentDisplayName : TestGroupParent
Expand Down Expand Up @@ -228,4 +228,4 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
[Update-AzManagementGroup](./Update-AzManagementGroup.md)
[Get-AzManagementGroup](./Get-AzManagementGroup.md)
[Get-AzManagementGroup](./Get-AzManagementGroup.md)
4 changes: 2 additions & 2 deletions azps-0.10.0/Az.Resources/New-AzRoleAssignment.md
Original file line number Diff line number Diff line change
Expand Up @@ -128,14 +128,14 @@ Grant access to a security group

### Example 3
```
PS C:\> New-AzRoleAssignment -SignInName [email protected] -RoleDefinitionName Owner -Scope "/subscriptions/86f81fc3-b00f-48cd-8218-3879f51ff362/resourcegroups/rg1/providers/Microsoft.Web/sites/site1"
PS C:\> New-AzRoleAssignment -SignInName [email protected] -RoleDefinitionName Owner -Scope "/subscriptions/00001111-aaaa-2222-bbbb-3333cccc4444/resourcegroups/rg1/providers/Microsoft.Web/sites/site1"
```

Grant access to a user at a resource (website)

### Example 4
```
PS C:\> New-AzRoleAssignment -ObjectId 5ac84765-1c8c-4994-94b2-629461bd191b -RoleDefinitionName "Virtual Machine Contributor" -ResourceName Devices-Engineering-ProjectRND -ResourceType Microsoft.Network/virtualNetworks/subnets -ParentResource virtualNetworks/VNET-EASTUS-01 -ResourceGroupName Network
PS C:\> New-AzRoleAssignment -ObjectId 00001111-aaaa-2222-bbbb-3333cccc4444 -RoleDefinitionName "Virtual Machine Contributor" -ResourceName Devices-Engineering-ProjectRND -ResourceType Microsoft.Network/virtualNetworks/subnets -ParentResource virtualNetworks/VNET-EASTUS-01 -ResourceGroupName Network
```

Grant access to a group at a nested resource (subnet)
Expand Down
12 changes: 6 additions & 6 deletions azps-0.10.0/Az.Resources/Remove-AzADAppCredential.md
Original file line number Diff line number Diff line change
Expand Up @@ -49,26 +49,26 @@ The credential to be removed is identified by its key ID.
### Example 1 - Remove a specific credential from an application

```
PS C:\> Remove-AzADAppCredential -ObjectId 7663d3fb-6f86-4352-9e6d-cf9d50d5ee82 -KeyId 9044423a-60a3-45ac-9ab1-09534157ebb
PS C:\> Remove-AzADAppCredential -ObjectId 00001111-aaaa-2222-bbbb-3333cccc4444 -KeyId 9044423a-60a3-45ac-9ab1-09534157ebb
```

Removes the credential with key id '9044423a-60a3-45ac-9ab1-09534157ebb' from the application with object id '7663d3fb-6f86-4352-9e6d-cf9d50d5ee82'.
Removes the credential with key id '9044423a-60a3-45ac-9ab1-09534157ebb' from the application with object id '00001111-aaaa-2222-bbbb-3333cccc4444'.

### Example 2 - Remove all credentials from an application

```
PS C:\> Remove-AzADAppCredential -ApplicationId 4589cd6b-3d79-4bb4-93b8-a0b99f3bfc58
PS C:\> Remove-AzADAppCredential -ApplicationId 00001111-aaaa-2222-bbbb-3333cccc4444
```

Removes all credentials from the application with application id '4589cd6b-3d79-4bb4-93b8-a0b99f3bfc58'.
Removes all credentials from the application with application id '00001111-aaaa-2222-bbbb-3333cccc4444'.

### Example 3 - Remove all credentials using piping

```
PS C:\> Get-AzADApplication -ObjectId 7663d3fb-6f86-4352-9e6d-cf9d50d5ee82 | Remove-AzADAppCredential
PS C:\> Get-AzADApplication -ObjectId 00001111-aaaa-2222-bbbb-3333cccc4444 | Remove-AzADAppCredential
```

Gets the application with object id '7663d3fb-6f86-4352-9e6d-cf9d50d5ee82' and pipes that to the Remove-AzADAppCredential cmdlet and removes all credentials from that application.
Gets the application with object id '00001111-aaaa-2222-bbbb-3333cccc4444' and pipes that to the Remove-AzADAppCredential cmdlet and removes all credentials from that application.

## PARAMETERS

Expand Down
4 changes: 2 additions & 2 deletions azps-0.10.0/Az.Resources/Remove-AzADApplication.md
Original file line number Diff line number Diff line change
Expand Up @@ -55,10 +55,10 @@ Removes the application with object id 'b4cd1619-80b3-4cfb-9f8f-9f2333425738' fr
### Example 2 - Remove application by application id

```
PS C:\> Remove-AzADApplication -ApplicationId f9c5ea4f-28f0-401a-a491-491a037fa346
PS C:\> Remove-AzADApplication -ApplicationId 00001111-aaaa-2222-bbbb-3333cccc4444
```

Removes the application with application id 'f9c5ea4f-28f0-401a-a491-491a037fa346' from the tenant.
Removes the application with application id '00001111-aaaa-2222-bbbb-3333cccc4444' from the tenant.

### Example 3 - Remove application by piping

Expand Down
8 changes: 4 additions & 4 deletions azps-0.10.0/Az.Resources/Remove-AzADServicePrincipal.md
Original file line number Diff line number Diff line change
Expand Up @@ -67,10 +67,10 @@ Removes the service principal with object id '61b5d8ea-fdc6-40a2-8d5b-ad447c678d
### Example 2 - Remove a service principal by application id

```
PS C:\> Remove-AzADServicePrincipal -ApplicationId 9263469e-d328-4321-8646-3e3e75d20e76
PS C:\> Remove-AzADServicePrincipal -ApplicationId 00001111-aaaa-2222-bbbb-3333cccc4444
```

Removes the service principal with application id '9263469e-d328-4321-8646-3e3e75d20e76'.
Removes the service principal with application id '00001111-aaaa-2222-bbbb-3333cccc4444'.

### Example 3 - Remove a service principal by SPN

Expand All @@ -91,10 +91,10 @@ Gets the service principal with object id '61b5d8ea-fdc6-40a2-8d5b-ad447c678d45'
### Example 5 - Remove a service principal by piping an application

```
PS C:\> Get-AzApplication -ApplicationId 9263469e-d328-4321-8646-3e3e75d20e76 | Remove-AzADServicePrincipal
PS C:\> Get-AzApplication -ApplicationId 00001111-aaaa-2222-bbbb-3333cccc4444 | Remove-AzADServicePrincipal
```

Gets the application with application id '9263469e-d328-4321-8646-3e3e75d20e76' and pipes that to the Remove-AzADServicePrincipal cmdlet to remove the service principal associated with that application.
Gets the application with application id '00001111-aaaa-2222-bbbb-3333cccc4444' and pipes that to the Remove-AzADServicePrincipal cmdlet to remove the service principal associated with that application.

## PARAMETERS

Expand Down
Loading

0 comments on commit a0b770c

Please sign in to comment.