Skip to content

Commit 126ef4c

Browse files
authored
Merge pull request #98381 from jithubhaijabs/patch-5
Correction 'service account' to 'storage account'
2 parents 67833ab + d0bd155 commit 126ef4c

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

includes/storage-files-networking-endpoints-public-restrict-portal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,6 @@ Navigate to the storage account for which you would like to restrict the public
1414

1515
At the top of the page, select the **Selected networks** radio button. This will un-hide a number of settings for controlling the restriction of the public endpoint. Click **+Add existing virtual network** to select the specific virtual network that should be allowed to access the storage account via the public endpoint. This will require selecting a virtual network and a subnet for that virtual network.
1616

17-
Check **Allow trusted Microsoft services to access this service account** to allow trusted first party Microsoft services such as Azure File Sync to access the storage account.
17+
Check **Allow trusted Microsoft services to access this storage account** to allow trusted first party Microsoft services such as Azure File Sync to access the storage account.
1818

19-
[![Screenshot of the Networking blade with a specific virtual network allowed to access the storage account via the public endpoint](media/storage-files-networking-endpoints-public-restrict-portal/restrict-public-endpoint-0.png)](media/storage-files-networking-endpoints-public-restrict-portal/restrict-public-endpoint-0.png#lightbox)
19+
[![Screenshot of the Networking blade with a specific virtual network allowed to access the storage account via the public endpoint](media/storage-files-networking-endpoints-public-restrict-portal/restrict-public-endpoint-0.png)](media/storage-files-networking-endpoints-public-restrict-portal/restrict-public-endpoint-0.png#lightbox)

0 commit comments

Comments
 (0)