Skip to content

Commit 424b51b

Browse files
Update titles
1 parent ed619fa commit 424b51b

File tree

3 files changed

+3
-3
lines changed

3 files changed

+3
-3
lines changed

articles/storage/blobs/sas-service-create-dotnet.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Create a service SAS for a blob with .NET
2+
title: Create a service SAS for a container or blob with .NET
33
titleSuffix: Azure Storage
44
description: Learn how to create a service shared access signature (SAS) for a container or blob using the Azure Blob Storage client library for .NET.
55
author: pauljewellmsft

articles/storage/blobs/sas-service-create-java.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Create a service SAS for a blob with Java
2+
title: Create a service SAS for a container or blob with Java
33
titleSuffix: Azure Storage
44
description: Learn how to create a service shared access signature (SAS) for a container or blob using the Azure Blob Storage client library for Java.
55
author: pauljewellmsft

articles/storage/blobs/storage-blob-user-delegation-sas-create-dotnet.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ This article shows how to use Microsoft Entra credentials to create a user deleg
2525

2626
## Assign Azure roles for access to data
2727

28-
When a Microsoft Entra security principal attempts to access data, that security principal must have permissions to the resource. Whether the security principal is a managed identity in Azure or a Microsoft Entra user account running code in the development environment, the security principal must be assigned an Azure role that grants access data. For information about assigning permissions via Azure RBAC, see [Assign an Azure role for access to blob data](assign-azure-role-data-access.md).
28+
When a Microsoft Entra security principal attempts to access data, that security principal must have permissions to the resource. Whether the security principal is a managed identity in Azure or a Microsoft Entra user account running code in the development environment, the security principal must be assigned an Azure role that grants access to data. For information about assigning permissions via Azure RBAC, see [Assign an Azure role for access to blob data](assign-azure-role-data-access.md).
2929

3030
[!INCLUDE [storage-dev-guide-user-delegation-sas-dotnet](../../../includes/storage-dev-guides/storage-dev-guide-user-delegation-sas-dotnet.md)]
3131

0 commit comments

Comments
 (0)