Week 22, 2021 - Tips I learned this week

Week 22, 2021 - Tips I learned this week

IntelliSense in vscode, Azure CLI command to get assigned roles, and Azure Storage Explorer new version.


3 min read

This week I learned some Azure CLI commands, how to have json IntelliSense in vscode and that Azure Storage Explorer was usable again.

Autocompletion and schema validation when editing a json file in vscode.

When you are editing a json file in vscode, chances are that there is a json schema somewhere that describes the shape of the json you are modifying. Wouldn't it be great if vscode could provide you suggestions and validate the json according to such a schema while you are typing โŒจ?

Well in fact it is possible, you just have to add at the beginning of your file a $schema key (with the URI of the json schema as the value) and you will have IntelliSense to edit your json in vscode.


In the screenshot above, I am editing a json file where the linked json schema is a Microsoft Teams app manifest schema and as you can see vscode gives me suggestions based on this schema.

This is a tip that you probably already know but as far as I am concerned I only discovered it recently and it is really useful. If you want do to more advanced things like mapping some files types to specific json schemas you can have a look in vscode documentation.

Listing assigned roles for a user on a subscription with Azure CLI

I recently had to list all the roles assigned to my user on a subscription. ๐Ÿ‘ฎโ€โ™€๏ธ For that I used the az role assignement list command like this:


I am filtering the command result with the --query argument to only have the information I am interested in which are roleDefinitionName and scope.

You can specify a subscription by using the optional parameter --subscription but by default the subscription selected is the current subscription which you can see by doing an az account show.

The variable UserId which is passed to the option --assignee contains my user id but I could have also passed my user principal name. As I was looking to list my assigned roles on a subscription in a tenant id where I am a guest, my user principal name is a bit strange with an #EXT# in it so I can never remember what it is. And as I don't know by heart my user id either, I use the az ad signed-in-user show command to get my user id.

So at the end my command to list the assigned roles to my user on the current subscription is the following:

az role assignment list --assignee $(az ad signed-in-user show --query "objectId") --query "[*].{role:roleDefinitionName,scope:scope}" --include-inherited

Azure Storage Explorer just got better !

Azure Storage Explorer is a tool to manage you Azure cloud storage resources from your desktop. Instead of going to Azure portal and navigating between all the panes and resources, you can do everything from this tool like viewing the tables and blobs in the storage accounts you have access to.

Unfortunately, if your account had access to multiple subscriptions on multiple tenants with MFA enabled, using Azure Storage Explorer was a nightmare where you had to log in to a every tenant multiple times to access any storage account. I you had the correct permissions you ended up grabbing a secret connection string to access your storage account from Azure Storage Explorer but it was not a good solution (using secrets instead of your Azure AD account to access resources is never a good idea โ›”).


As you can see on the screenshot above, in v1.19.x Azure Storage Explorer account management section has been completely refreshed to allow us to control exactly the tenants and the subscriptions that we want to load. This way we only have to enter the credentials we need and Azure Storage Explorer becomes usable again! ๐ŸŽ‰

And that's it for this week, happy learning!