Skip to content

Commit 18ae8d5

Browse files
committed
Updating the networking docs:
1 parent 406da96 commit 18ae8d5

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/storage/common/storage-network-security.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: normesta
66
ms.service: azure-storage
77
ms.subservice: storage-common-concepts
88
ms.topic: how-to
9-
ms.date: 08/15/2023
9+
ms.date: 05/09/2024
1010
ms.author: normesta
1111
ms.reviewer: santoshc
1212
ms.custom: devx-track-azurepowershell, devx-track-azurecli, build-2023, engagement
@@ -578,9 +578,9 @@ You can grant access to trusted Azure services by creating a network rule except
578578

579579
<a id="trusted-access-resources-in-subscription"></a>
580580

581-
### Trusted access for resources registered in your subscription
581+
### Trusted access for resources registered in your Microsoft Entra tenant
582582

583-
Resources of some services that are registered in your subscription can access your storage account *in the same subscription* for selected operations, such as writing logs or running backups. The following table describes each service and the allowed operations.
583+
Resources of some services can access your storage account for selected operations, such as writing logs or running backups. Those services must be registered in a subscription that is located in the same Microsoft Entra tenant as your storage account. The following table describes each service and the allowed operations.
584584

585585
| Service | Resource provider name | Allowed operations |
586586
|:------------------------ |:-------------------------- |:---------------------------------- |

0 commit comments

Comments
 (0)