Skip to content

Commit 196b81d

Browse files
committed
moved a sentence
1 parent 5e26e7c commit 196b81d

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

articles/search/search-get-started-rest.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ You're pasting this key into the `.rest` or `.http` file in a later step.
6161

6262
Make sure your search service is [configured for role-based access](search-security-enable-roles.md). You must have preconfigured [role-assignments for developer access](search-security-rbac.md#assign-roles-for-development). Your role assignments must grant permission to create, load, and query a search index.
6363

64-
In this section, obtain your personal identity token using either the Azure CLI, Azure PowerShell, or the Azure portal. You're pasting your personal identity token into the `.rest` or `.http` file in a later step.
64+
In this section, obtain your personal identity token using either the Azure CLI, Azure PowerShell, or the Azure portal.
6565

6666
#### [Azure CLI](#tab/azure-cli)
6767

@@ -98,6 +98,8 @@ Use the steps found here: [find the user object ID](/partner-center/find-ids-and
9898
9999
---
100100
101+
You're pasting your personal identity token into the `.rest` or `.http` file in a later step.
102+
101103
> [!NOTE]
102104
> This section assumes you're using a local client that connects to Azure AI Search on your behalf. An alternative approach is [getting a token for the client app](/entra/identity-platform/v2-oauth2-client-creds-grant-flow), assuming your application is [registered](/entra/identity-platform/quickstart-register-app) with Microsoft Entra ID.
103105

0 commit comments

Comments
 (0)