Skip to content

Commit 10542c2

Browse files
committed
update managed identity articles
1 parent c5e3ec0 commit 10542c2

File tree

2 files changed

+12
-9
lines changed

2 files changed

+12
-9
lines changed

articles/cognitive-services/Translator/document-translation/how-to-guides/create-use-managed-identities.md

Lines changed: 12 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: nitinme
77
ms.service: cognitive-services
88
ms.subservice: translator-text
99
ms.topic: how-to
10-
ms.date: 12/17/2022
10+
ms.date: 02/09/2023
1111
ms.author: lajanuar
1212
---
1313

@@ -24,7 +24,7 @@ Managed identities for Azure resources are service principals that create an Azu
2424

2525
* You can use managed identities to grant access to any resource that supports Azure AD authentication, including your own applications. Managed identities eliminate the need for you to include shared access signature tokens (SAS) with your HTTP requests.
2626

27-
* To grant access to an Azure resource, you'll assign an Azure role to a managed identity using [Azure role-based access control (`Azure RBAC`)](../../../../role-based-access-control/overview.md).
27+
* To grant access to an Azure resource, assign an Azure role to a managed identity using [Azure role-based access control (`Azure RBAC`)](../../../../role-based-access-control/overview.md).
2828

2929
* There's no added cost to use managed identities in Azure.
3030

@@ -34,16 +34,19 @@ Managed identities for Azure resources are service principals that create an Azu
3434
>
3535
> * Managed identities are a safer way to grant access to data without having SAS tokens included with your HTTP requests.
3636
37+
:::image type="content" source="../media/managed-identity-rbac-flow.png" alt-text="Screenshot of managed identity flow (RBAC).":::
38+
3739
## Prerequisites
38-
To get started, you'll need:
40+
41+
To get started, you need:
3942

4043
* An active [**Azure account**](https://azure.microsoft.com/free/cognitive-services/)—if you don't have one, you can [**create a free account**](https://azure.microsoft.com/free/).
4144

4245
* A [**single-service Translator**](https://portal.azure.com/#create/Microsoft.CognitiveServicesTextTranslation) (not a multi-service Cognitive Services) resource assigned to a **non-global** region. For detailed steps, _see_ [Create a Cognitive Services resource using the Azure portal](../../../cognitive-services-apis-create-account.md?tabs=multiservice%2cwindows).
4346

4447
* A brief understanding of [**Azure role-based access control (`Azure RBAC`)**](../../../../role-based-access-control/role-assignments-portal.md) using the Azure portal.
4548

46-
* An [**Azure blob storage account**](https://portal.azure.com/#create/Microsoft.StorageAccount-ARM) in the same region as your Translator resource. You'll create containers to store and organize your blob data within your storage account.
49+
* An [**Azure blob storage account**](https://portal.azure.com/#create/Microsoft.StorageAccount-ARM) in the same region as your Translator resource. You also need to create containers to store and organize your blob data within your storage account.
4750

4851
* **If your storage account is behind a firewall, you must enable the following configuration**: </br>
4952

@@ -63,9 +66,9 @@ There are two types of managed identities: **system-assigned** and **user-assign
6366

6467
* A system-assigned managed identity is **enabled** directly on a service instance. It isn't enabled by default; you must go to your resource and update the identity setting.
6568

66-
* The system-assigned managed identity is tied to your resource throughout its lifecycle. If you delete your resource, the managed identity will be deleted as well.
69+
* The system-assigned managed identity is tied to your resource throughout its lifecycle. If you delete your resource, the managed identity is deleted as well.
6770

68-
In the following steps, we'll enable a system-assigned managed identity and grant your Translator resource limited access to your Azure blob storage account.
71+
In the following steps, we enable a system-assigned managed identity and grant your Translator resource limited access to your Azure blob storage account.
6972

7073
## Enable a system-assigned managed identity
7174

@@ -93,7 +96,7 @@ The **Storage Blob Data Contributor** role gives Translator (represented by the
9396

9497
:::image type="content" source="../../media/managed-identities/enable-system-assigned-managed-identity-portal.png" alt-text="Screenshot: enable system-assigned managed identity in Azure portal.":::
9598

96-
1. An Azure role assignments page will open. Choose your subscription from the drop-down menu then select **&plus; Add role assignment**.
99+
1. On the Azure role assignments page that opened, choose your subscription from the drop-down menu then select **&plus; Add role assignment**.
97100

98101
:::image type="content" source="../../media/managed-identities/azure-role-assignments-page-portal.png" alt-text="Screenshot: Azure role assignments page in the Azure portal.":::
99102

@@ -124,11 +127,11 @@ The **Storage Blob Data Contributor** role gives Translator (represented by the
124127

125128
* A batch Document Translation request is submitted to your Translator service endpoint via a POST request.
126129

127-
* With managed identity and `Azure RBAC`, you'll no longer need to include SAS URLs.
130+
* With managed identity and `Azure RBAC`, you no longer need to include SAS URLs.
128131

129132
* If successful, the POST method returns a `202 Accepted` response code and the batch request is created by the service.
130133

131-
* The translated documents will appear in your target container.
134+
* The translated documents appear in your target container.
132135

133136
### Headers
134137

51 KB
Loading

0 commit comments

Comments
 (0)