Skip to content

Commit 1405de3

Browse files
committed
more edits based on fresh feedback
1 parent c37bf95 commit 1405de3

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

articles/storage/common/sas-expiration-policy.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -77,9 +77,9 @@ $account = Set-AzStorageAccount -ResourceGroupName <resource-group> `
7777
> You can also set the SAS expiration policy as you create a storage account by setting the `-SasExpirationPeriod` parameter of the [New-AzStorageAccount](/powershell/module/az.storage/new-azstorageaccount) command.
7878
7979
> [!NOTE]
80-
> If you get error message *"No KeyCreationTime for key: key\<key number>, please regenerate that key"*, [rotate the account access keys](#do-i-need-to-rotate-the-account-access-keys-first) and try again.
80+
> If you get an error message indicating that the creation time for a key has not been set, [rotate the account access keys](#do-i-need-to-rotate-the-account-access-keys-first) and try again.
8181
82-
To verify that the policy has been applied, use the `SasPolicy` property of the [PSStorageAccount](/dotnet/api/microsoft.azure.commands.management.storage.models.psstorageaccount) returned to the `$account` variable in the previous command.
82+
To verify that the policy has been applied, check the storage account's SasPolicy property.
8383

8484
```powershell
8585
$account.SasPolicy
@@ -105,7 +105,7 @@ az storage account update \
105105
> You can also set the SAS expiration policy as you create a storage account by setting the `--key-exp-days` parameter of the [az storage account create](/cli/azure/storage/account#az-storage-account-create) command.
106106
107107
> [!NOTE]
108-
> If you get error message *"No KeyCreationTime for key: key\<key number>, please regenerate that key"*, [rotate the account access keys](#do-i-need-to-rotate-the-account-access-keys-first) and try again.
108+
> If you get an error message indicating that the creation time for a key has not been set, [rotate the account access keys](#do-i-need-to-rotate-the-account-access-keys-first) and try again.
109109
110110
To verify that the policy has been applied, call the [az storage account show](/cli/azure/storage/account#az-storage-account-show) command, and use the string `{SasPolicy:sasPolicy}` for the `-query` parameter.
111111

articles/storage/common/storage-account-get-info.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -174,7 +174,7 @@ az storage account show-connection-string --resource-group <resource-group> --na
174174

175175
## Get the creation time of the account access keys for a storage account
176176

177-
If the creation time of the account access keys for a storage account are null, the keys will need to be rotated before performing configurations or other tasks that rely on them, such as [configuring a SAS expiration policy](sas-expiration-policy.md). You can get the creation time of the account access keys for a storage account by using the Azure portal, PowerShell, or Azure CLI.
177+
If the **keyCreationTime** property of one or both of the account access keys for a storage account is null, then you will need to rotate the keys before you can configure a key expiration policy or a SAS expiration policy. You can check the **keyCreationTime** for a storage account by using the Azure portal, PowerShell, or Azure CLI.
178178

179179
# [Azure portal](#tab/portal)
180180

0 commit comments

Comments
 (0)