This page contains Windows bias

About This Page

This page is part of the Azure documentation. It contains code examples and configuration instructions for working with Azure services.

Bias Analysis

Bias Types:
⚠️ powershell_heavy
⚠️ windows_tools
⚠️ windows_first
Summary:
The documentation page demonstrates a mild Windows bias. It references PowerShell cmdlets (Get-AzSubscription, Get-AzADUser, Get-AzADServicePrincipal) in parameter descriptions without mentioning Linux/CLI alternatives. In the 'Create template spec' and 'Improve the form' sections, PowerShell examples are presented before Azure CLI examples. There are no explicit Linux/Unix shell examples or references to Linux-specific tools or workflows.
Recommendations:
  • When referencing how to obtain values (such as tenantId or objectId), provide both PowerShell and Azure CLI commands (e.g., az account show, az ad user show) in parameter descriptions.
  • Alternate the order of PowerShell and Azure CLI examples, or present them side-by-side to avoid always listing PowerShell first.
  • Explicitly mention that both Azure CLI and PowerShell are cross-platform, and provide guidance for Linux/macOS users where relevant.
  • Consider including bash shell scripting examples or notes for Linux users, especially when instructing users to save files or run commands.
  • Where possible, avoid referring to tools as 'Visual Studio Code' only; mention other editors or clarify that any code/text editor may be used.
GitHub Create pull request

Scan History

Date Scan ID Status Bias Status
2025-07-12 23:44 #41 in_progress ❌ Biased
2025-07-12 00:58 #8 cancelled ✅ Clean
2025-07-10 05:06 #7 processing ✅ Clean

Flagged Code Snippets

{ "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "1.0.0.0", "parameters": { "keyVaultName": { "type": "string", "metadata": { "description": "Specifies the name of the key vault." } }, "location": { "type": "string", "defaultValue": "[resourceGroup().location]", "metadata": { "description": "Specifies the Azure location where the key vault should be created." } }, "enabledForDeployment": { "type": "bool", "defaultValue": false, "allowedValues": [ true, false ], "metadata": { "description": "Specifies whether Azure Virtual Machines are permitted to retrieve certificates stored as secrets from the key vault." } }, "enabledForDiskEncryption": { "type": "bool", "defaultValue": false, "allowedValues": [ true, false ], "metadata": { "description": "Specifies whether Azure Disk Encryption is permitted to retrieve secrets from the vault and unwrap keys." } }, "enabledForTemplateDeployment": { "type": "bool", "defaultValue": false, "allowedValues": [ true, false ], "metadata": { "description": "Specifies whether Azure Resource Manager is permitted to retrieve secrets from the key vault." } }, "tenantId": { "type": "string", "defaultValue": "[subscription().tenantId]", "metadata": { "description": "Specifies the Azure Active Directory tenant ID that should be used for authenticating requests to the key vault. Get it by using Get-AzSubscription cmdlet." } }, "objectId": { "type": "string", "metadata": { "description": "Specifies the object ID of a user, service principal or security group in the Azure Active Directory tenant for the vault. The object ID must be unique for the list of access policies. Get it by using Get-AzADUser or Get-AzADServicePrincipal cmdlets." } }, "keysPermissions": { "type": "array", "defaultValue": [ "list" ], "metadata": { "description": "Specifies the permissions to keys in the vault. Valid values are: all, encrypt, decrypt, wrapKey, unwrapKey, sign, verify, get, list, create, update, import, delete, backup, restore, recover, and purge." } }, "secretsPermissions": { "type": "array", "defaultValue": [ "list" ], "metadata": { "description": "Specifies the permissions to secrets in the vault. Valid values are: all, get, list, set, delete, backup, restore, recover, and purge." } }, "skuName": { "type": "string", "defaultValue": "standard", "allowedValues": [ "standard", "premium" ], "metadata": { "description": "Specifies whether the key vault is a standard vault or a premium vault." } }, "secretName": { "type": "string", "metadata": { "description": "Specifies the name of the secret that you want to create." } }, "secretValue": { "type": "secureString", "metadata": { "description": "Specifies the value of the secret that you want to create." } } }, "resources": [ { "type": "Microsoft.KeyVault/vaults", "apiVersion": "2022-07-01", "name": "[parameters('keyVaultName')]", "location": "[parameters('location')]", "properties": { "enabledForDeployment": "[parameters('enabledForDeployment')]", "enabledForDiskEncryption": "[parameters('enabledForDiskEncryption')]", "enabledForTemplateDeployment": "[parameters('enabledForTemplateDeployment')]", "tenantId": "[parameters('tenantId')]", "accessPolicies": [ { "objectId": "[parameters('objectId')]", "tenantId": "[parameters('tenantId')]", "permissions": { "keys": "[parameters('keysPermissions')]", "secrets": "[parameters('secretsPermissions')]" } } ], "sku": { "name": "[parameters('skuName')]", "family": "A" }, "networkAcls": { "defaultAction": "Allow", "bypass": "AzureServices" } } }, { "type": "Microsoft.KeyVault/vaults/secrets", "apiVersion": "2022-07-01", "name": "[format('{0}/{1}', parameters('keyVaultName'), parameters('secretName'))]", "dependsOn": [ "[resourceId('Microsoft.KeyVault/vaults', parameters('keyVaultName'))]" ], "properties": { "value": "[parameters('secretValue')]" } } ] }
New-AzTemplateSpec ` -name keyvaultspec ` -version 1 ` -ResourceGroupName templateSpecRG ` -location westus2 ` -templatefile keyvault.json ` -UIFormDefinitionFile keyvaultform.json
New-AzTemplateSpec ` -name keyvaultspec ` -version 2 ` -ResourceGroupName templateSpecRG ` -location westus2 ` -templatefile keyvault.json ` -UIFormDefinitionFile keyvaultform.json