From 2a86d504131da9d314ba25b005df807c4e308427 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?McCoy=20Pati=C3=B1o?= <39780829+mccoyp@users.noreply.github.com> Date: Tue, 17 May 2022 10:37:52 -0700 Subject: [PATCH] Remove locale from links (#24490) --- doc/dev/mgmt/tests.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/doc/dev/mgmt/tests.md b/doc/dev/mgmt/tests.md index dddb71f66fb0..5899b513490d 100644 --- a/doc/dev/mgmt/tests.md +++ b/doc/dev/mgmt/tests.md @@ -52,14 +52,14 @@ There are several ways to authenticate to Azure, but to be able to record test H ### Get a token with Active Directory application and service principal Follow this detailed tutorial to set up an Active Directory application and service principal: -https://docs.microsoft.com/en-us/azure/active-directory/develop/howto-create-service-principal-portal +https://docs.microsoft.com/azure/active-directory/develop/howto-create-service-principal-portal To use the credentials from Python, you need: * Application ID (a.k.a. client ID) * Authentication key (a.k.a. client secret) * Tenant ID * Subscription ID from the Azure portal -[This section of the above tutorial](https://docs.microsoft.com/en-us/azure/active-directory/develop/howto-create-service-principal-portal#get-tenant-and-app-id-values-for-signing-in) describes where to find them (besides the subscription ID, which is in the "Overview" section of the "Subscriptions" blade.) +[This section of the above tutorial](https://docs.microsoft.com/azure/active-directory/develop/howto-create-service-principal-portal#get-tenant-and-app-id-values-for-signing-in) describes where to find them (besides the subscription ID, which is in the "Overview" section of the "Subscriptions" blade.) The recommended practice is to store these three values in environment variables called `AZURE_TENANT_ID`, `AZURE_CLIENT_ID`, and `AZURE_CLIENT_SECRET`. To set an environment variable use the following commands: ```Shell