Skip to content

Commit e2a768a

Browse files
rmca14CelesteDG
andauthored
Apply suggestions from code review
Co-authored-by: Celeste de Guzman <[email protected]>
1 parent 4d8a61c commit e2a768a

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

articles/machine-learning/how-to-setup-authentication.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -328,7 +328,7 @@ can require two-factor authentication, or allow sign in only from managed device
328328

329329
| Application ID | Name | Note |
330330
| ----- | ----- | ----- |
331-
| 00001111-aaaa-2222-bbbb-3333cccc4444 | Azure Machine Learning Workbench Web App | Azure Machine Learning studio |
331+
| d7304df8-741f-47d3-9bc2-df0e24e2071f | Azure Machine Learning Workbench Web App | Azure Machine Learning studio |
332332
| cb2ff863-7f30-4ced-ab89-a00194bcf6d9 | Azure AI Studio App | Azure AI Studio |
333333

334334
### Check for service principal
@@ -355,7 +355,7 @@ Before adding the conditional access policy, verify that the application ID is l
355355
New-AzAdServicePrincipal -ApplicationId "application-ID"
356356
```
357357
358-
For example, `New-AzADServicePrincipal -ApplicationId "00001111-aaaa-2222-bbbb-3333cccc4444"`.
358+
For example, `New-AzADServicePrincipal -ApplicationId "d7304df8-741f-47d3-9bc2-df0e24e2071f"`.
359359
360360
1. After you create the service principal, return to __Enterprise applications__ and verify that you can now find the application ID. You can find the list of IDs in the [Use Conditional Access](#use-conditional-access) section.
361361

articles/machine-learning/how-to-setup-customer-managed-keys.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ To create the key vault, see [Create a key vault](/azure/key-vault/general/quick
8484

8585
1. To configure the key vault, select it in the [Azure portal](https://portal.azure.com) and then select __Access polices__ from the left menu.
8686
1. To create permissions for Azure Cosmos DB, select __+ Create__ at the top of the page. Under __Key permissions__, select __Get__, __Unwrap Key__, and __Wrap key__ permissions.
87-
1. Under __Principal__, search for __Azure Cosmos DB__ and then select it. The principal ID for this entry is `aaaaaaaa-bbbb-cccc-1111-222222222222` for all regions other than Azure Government. For Azure Government, the principal ID is `bbbbbbbb-cccc-dddd-2222-333333333333`.
87+
1. Under __Principal__, search for __Azure Cosmos DB__ and then select it. The principal ID for this entry is `a232010e-820c-4083-83bb-3ace5fc29d0b` for all regions other than Azure Government. For Azure Government, the principal ID is `57506a73-e302-42a9-b869-6f12d9ec29e9`.
8888
1. Select __Review + Create__, and then select __Create__.
8989

9090
## Create a workspace that uses a customer-managed key

0 commit comments

Comments
 (0)