az login and select the Azure AD tenant where you've configured the Data API builder App Registration. az account set --tenant 00000000-0000-0000-0000-000000000000 then run the following command to try to authenticate against the newly created scope: az account get-access-token --scope api:///Endpoint.Access azure account set "subscription-name" will set the subscription as your default subscription and all the commands that you execute will run against that subscription. Every command has a -s or --subscription switch where you can explicitly specify the subscription id. Even if the subscription belongs to a different account, it should still work We will use the following command to get the list of Azure subscriptions: az account list --output table. We can select the subscription using the following command (both subscription id and subscription name are accepted): az account set --subscription Then create the service principal account using the following command: This reference is part of the azure-firewall extension for the Azure CLI (version 2.50.0 or higher). The extension will automatically install the first time you run an az network firewall policy rule-collection-group command. Learn more about extensions. Manage and configure Azure firewall policy rule collection group. Select the subscription where you want to apply the policy initiative using the az account set command. Assign the initiative using az policy assignment create. az policy assignment create --name --resource-group --policy-set-definition --params --mi-system-assigned . Note. This reference is part of the quota extension for the Azure CLI (version 2.54.0 or higher). The extension will automatically install the first time you run an az quota command. Note. This reference is part of the resource-mover extension for the Azure CLI (version 2.50.0 or higher). The extension will automatically install the first time you run an az resource-mover move-resource command. az login \ --service-principal \ -t \ -u \ -p Confirm that you are signed in to the correct subscription for your signed-in Microsoft Entra ID service principal. To do this, run the az account set command, using the -s or --subscription option to specify the correct subscription ID. To access a secure service hosted on Azure, you need a bearer token. Get a bearer token for your Azure subscription, using the Azure CLI to get an access token for the required Azure subscription: >az login Copy your subscription ID from the Azure portal and paste it in the “az account set” command: You can configure the default subscription using az account set -s NAME_OR_ID. --terminate-notification-time Length of time (in minutes, between 5 and 15) a notification to be sent to the VM on the instance metadata server till the VM gets deleted.

az account set subscription command