Skip to content

Commit 20f04ed

Browse files
committed
Learn Editor: Update managed-identity.md
1 parent c3925f7 commit 20f04ed

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/ai-services/openai/how-to/managed-identity.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ In the following sections, you'll use the Azure CLI to assign roles, and obtain
2525
- Currently, access to this service is granted only by application. You can apply for access to Azure OpenAI by completing the form at [https://aka.ms/oai/access</a>. Open an issue on this repo to contact us if you have an issue.
2626

2727
- [Custom subdomain names are required to enable features like Azure Active Directory (Azure AD) for authentication.](
28-
/articles/ai-services/cognitive-services-custom-subdomains)
28+
../../cognitive-services-custom-subdomains.md)
2929

3030
- Azure CLI - [Installation Guide](/cli/azure/install-azure-cli)
3131
- The following Python libraries: os, requests, json
@@ -68,14 +68,14 @@ Assigning yourself to the "Cognitive Services User" role will allow you to use y
6868
6969
Use the access token to authorize your API call by setting the `Authorization` header value.
7070
71-
```yaml
71+
7272
```bash
7373
curl ${endpoint%/}/openai/deployments/YOUR_DEPLOYMENT_NAME/completions?api-version=2023-05-15 \
7474
-H "Content-Type: application/json" \
7575
-H "Authorization: Bearer $accessToken" \
7676
-d '{ "prompt": "Once upon a time" }'
7777
```
78-
```
78+
7979
## Authorize access to managed identities
8080

8181
OpenAI supports Azure Active Directory (Azure AD) authentication with [managed identities for Azure resources](../../../active-directory/managed-identities-azure-resources/overview.md). Managed identities for Azure resources can authorize access to Azure AI services resources using Azure AD credentials from applications running in Azure virtual machines (VMs), function apps, virtual machine scale sets, and other services. By using managed identities for Azure resources together with Azure AD authentication, you can avoid storing credentials with your applications that run in the cloud.

0 commit comments

Comments
 (0)