I'm able to create a service principal either using Azure or from the portal console with the az
cli.
az ad sp create-for-rbac --name "myspuser" --password "adfhrrreeuwrgwejdfgds"
Then I assign the owner role at subscription level and log-in in a powershell console.
Login-AzureRmAccount -Credential (New-Object System.Management.Automation.PSCredential ('a92b2ea2-aaaa-0000-0a0a-1238ec953226', $(ConvertTo-SecureString 'abcewior23h23ius' -AsPlainText -Force))) -ServicePrincipal -TenantId 0cedca99-00f4-40d1-aa41-80d67ece2de8;
Here I can do almost anything like deploy machines except check for other users.
When I execute
Get-AzureRmADServicePrincipal
All that I get is Get-AzureRmADServicePrincipal : Insufficient privileges to complete the operation.
This works with my standard user login.
My goal is to create an automation where users can deploy a full environment via ARM templates using jenkins in their MSDN subscription. As some logins a are not supported from powershell I would like to make my users use a service principal for that. My automation requires creating a SP that will be used from a linux machine using jenkins that needs to read resource group machines properties.
What I am missing here? How can I assign a service principal user rights to manage other service principal accounts?