Skip to content

Commit 27c2c95

Browse files
authored
Merge pull request #3785 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-ai-docs (branch main)
2 parents f94603f + d258151 commit 27c2c95

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

articles/search/search-howto-managed-identities-cosmos-db.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -74,14 +74,14 @@ $cosmosdb_acc_name = <cosmos db account name>
7474
$resource_group = <resource group name>
7575
$subsciption = <subscription ID>
7676
$system_assigned_principal = <Object (principal) ID for the search service's system/user assigned identity>
77-
$readOnlyRoleDefinitionId = "00000000-0000-0000-0000-00000000000"
78-
$scope=$(az cosmosdb show --name $cosmosdbname --resource-group $resourcegroup --query id --output tsv)
77+
$readOnlyRoleDefinitionId = "00000000-0000-0000-0000-000000000001"
78+
$scope=$(az cosmosdb show --name $cosmosdb_acc_name --resource-group $resource_group --query id --output tsv)
7979
```
8080

8181
Define a role assignment for the system-assigned identity:
8282

8383
```azurecli
84-
az cosmosdb sql role assignment create --account-name $cosmosdbname --resource-group $resourcegroup --role-definition-id $readOnlyRoleDefinitionId --principal-id $sys_principal --scope $scope
84+
az cosmosdb sql role assignment create --account-name $cosmosdb_acc_name --resource-group $resource_group --role-definition-id $readOnlyRoleDefinitionId --principal-id $system_assigned_principal --scope $scope
8585
```
8686

8787
For more information, see [Use data plane role-based access control with Azure Cosmos DB for NoSQL](/azure/cosmos-db/nosql/security/how-to-grant-data-plane-role-based-access)

articles/search/tutorial-rag-build-solution-query.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ You're setting up two clients, so you need endpoints and permissions on both res
4949
# Set endpoints and API keys for Azure services
5050
AZURE_SEARCH_SERVICE: str = "PUT YOUR SEARCH SERVICE ENDPOINT HERE"
5151
# AZURE_SEARCH_KEY: str = "DELETE IF USING ROLES, OTHERWISE PUT YOUR SEARCH SERVICE ADMIN KEY HERE"
52-
AZURE_OPENAI_ACCOUNT: str = "PUR YOUR AZURE OPENAI ENDPOINT HERE"
52+
AZURE_OPENAI_ACCOUNT: str = "PUT YOUR AZURE OPENAI ENDPOINT HERE"
5353
# AZURE_OPENAI_KEY: str = "DELETE IF USING ROLES, OTHERWISE PUT YOUR AZURE OPENAI KEY HERE"
5454
```
5555

0 commit comments

Comments
 (0)