diff --git a/docs/EnterpriseScaleAnalytics-ServicePrincipal.md b/docs/EnterpriseScaleAnalytics-ServicePrincipal.md
index 2fe72cbe..668f07c9 100644
--- a/docs/EnterpriseScaleAnalytics-ServicePrincipal.md
+++ b/docs/EnterpriseScaleAnalytics-ServicePrincipal.md
@@ -39,7 +39,7 @@ Additional required role assignments include:
| Role Name | Description | Scope |
|:----------|:------------|:------|
-| [User Access Administrator](https://docs.microsoft.com/azure/role-based-access-control/built-in-roles#user-access-administrator) | Required to assign the managed identity of Purview to the Azure Key Vault. |
(Resource Scope) `/subscriptions/{{datamanagementzone}subscriptionId}`
|
+| [User Access Administrator](https://docs.microsoft.com/azure/role-based-access-control/built-in-roles#user-access-administrator) | Required to assign the managed identity of Purview to the Azure Key Vault. | (Resource Scope) `/subscriptions/{datamanagementzone-subscriptionId}`
|
To add these role assignments, you can use the [Azure Portal](https://portal.azure.com/) or run the following commands using Azure CLI/Azure Powershell:
@@ -54,9 +54,9 @@ az ad sp list --display-name "{servicePrincipalName}" --query "[].{objectId:obje
az role assignment create \
--assignee "{servicePrincipalObjectId}" \
--role "{roleName}" \
- --scopes "{scope}"
+ --scope "{scope}"
-# Resource group scope level assignment
+# Resource group scope level assignment (below one is for the Data Landing Zones only)
az role assignment create \
--assignee "{servicePrincipalObjectId}" \
--role "{roleName}" \
@@ -76,13 +76,13 @@ New-AzRoleAssignment `
-RoleDefinitionName "{roleName}" `
-Scope "{scope}"
-# For Resource group scope level assignment
+# For Resource group scope level assignment (below one is for the Data Landing Zones only)
New-AzRoleAssignment `
-ObjectId $spObjectId `
-RoleDefinitionName "{roleName}" `
-ResourceGroupName "{resourceGroupName}"
-# For Child-Resource Scope level assignment
+# For Child-Resource Scope level assignment (below one is for the Data Landing Zones only)
New-AzRoleAssignment `
-ObjectId $spObjectId `
-RoleDefinitionName "{roleName}" `