About This Page
This page is part of the Azure documentation. It contains code examples and configuration instructions for working with Azure services.
Bias Analysis
Bias Types:
⚠️
powershell_heavy
⚠️
windows_tools
⚠️
missing_linux_example
⚠️
windows_first
Summary:
The documentation page exclusively uses Azure PowerShell cmdlets and assumes the reader is using PowerShell, which is traditionally a Windows-centric tool. There are no examples or guidance for users on Linux or macOS, such as using Azure CLI, Bash, or cross-platform scripting. All setup and configuration steps are shown with PowerShell, and there is no mention of Linux-native tools or alternative workflows.
Recommendations:
- Provide equivalent Azure CLI (az) command examples for all PowerShell cmdlets, as Azure CLI is cross-platform and widely used on Linux and macOS.
- Explicitly mention that all steps can be performed on Linux/macOS using Azure CLI or PowerShell Core, and provide instructions for installing and using these tools on non-Windows systems.
- Include Bash script examples or references for common tasks, especially for secret management and resource creation.
- Add a section or callouts for Linux users, highlighting any differences or additional considerations (e.g., authentication, environment setup).
- Avoid assuming the use of Windows or PowerShell as the default; present cross-platform options side-by-side or in parallel sections.
Create pull request
Flagged Code Snippets
> [!NOTE]
> * ExpressRoute is a trusted service within Azure that supports Network Security policies within Azure Key Vault. For more information, see [Configure Azure Key Vault Firewall and Virtual Networks](/azure/key-vault/general/network-security).
> * You shouldn't place the Azure Key Vault behind a private endpoint, as this will prevent the communication with the ExpressRoute management plane. The ExpressRoute management plane is responsible for managing the MACsec keys and parameters for your connection.
1. To create a new user identity, you need to use the `New-AzUserAssignedIdentity` cmdlet. This cmdlet creates a user-assigned managed identity in Microsoft Entra ID and registers it with the specified subscription and resource group. A user-assigned managed identity is a stand-alone Azure resource that can be assigned to any Azure service that supports managed identities. You can use this identity to authenticate and authorize access to Azure resources without storing any credentials in your code or configuration files. For more information, see [What is managed identities for Azure resources?](/entra/identity/managed-identities-azure-resources/overview).
Install the following module in Administrator mode if PowerShell doesn't recognize `New-AzUserAssignedIdentity` or `Get-AzUserAssignedIdentity` as valid cmdlets. Then, run the command again.