Skip to content

Commit 55d23e2

Browse files
committed
fixed typo
1 parent bc102c1 commit 55d23e2

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/search/search-query-access-control-rbac-enforcement.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ Azure Data Lake Storage (ADLS) Gen2 provides an access model that makes fine-gra
1919

2020
- Permission metadata must be in `filterable` string fields.
2121

22-
- Permission metadata must consist of either POSIX-style permissions that identify the level of access and the group or user ID, or the resource ID of the container or blob in ADLS Gen2 if you're using `rbacscope` and A
22+
- Permission metadata must consist of either POSIX-style permissions that identify the level of access and the group or user ID, or the resource ID of the container in ADLS Gen2 if you're using RBAC scope.
2323

2424
- For ADLS Gen2 data sources, you must have configured Access Control Lists (ACLs) and/or Azure role-based access control (RBAC) roles at the container level. You can use a [built-in indexer](search-indexer-access-control-lists-and-role-based-access.md) or [Push APIs](search-index-access-control-lists-and-rbac-push-api.md) to index permission metadata in your index.
2525

0 commit comments

Comments
 (0)