Skip to content

Commit 52bcde5

Browse files
Merge pull request #232059 from rwike77/tutorialfreshness
updated tutorial
2 parents 64b1800 + cf99639 commit 52bcde5

File tree

1 file changed

+16
-14
lines changed

1 file changed

+16
-14
lines changed

articles/active-directory/develop/multi-service-web-app-access-storage.md

Lines changed: 16 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: CelesteDG
77
ms.service: app-service
88
ms.topic: tutorial
99
ms.workload: identity
10-
ms.date: 04/25/2021
10+
ms.date: 03/24/2023
1111
ms.author: ryanwi
1212
ms.reviewer: stsoneff
1313
ms.devlang: csharp, javascript
@@ -64,7 +64,7 @@ To create a general-purpose v2 storage account in the Azure portal, follow these
6464

6565
1. On the Azure portal menu, select **All services**. In the list of resources, enter **Storage Accounts**. As you begin typing, the list filters based on your input. Select **Storage Accounts**.
6666

67-
1. In the **Storage Accounts** window that appears, select **Add**.
67+
1. In the **Storage Accounts** window that appears, select **Create**.
6868

6969
1. Select the subscription in which to create the storage account.
7070

@@ -74,33 +74,27 @@ To create a general-purpose v2 storage account in the Azure portal, follow these
7474

7575
1. Select a location for your storage account, or use the default location.
7676

77-
1. Leave these fields set to their default values:
77+
1. For **Performance**, select the **Standard** option.
7878

79-
|Field|Value|
80-
|--|--|
81-
|Deployment model|Resource Manager|
82-
|Performance|Standard|
83-
|Account kind|StorageV2 (general-purpose v2)|
84-
|Replication|Read-access geo-redundant storage (RA-GRS)|
85-
|Access tier|Hot|
79+
1. For **Redundancy**, select the **Locally-redundant storage (LRS)** option from the dropdown.
8680

87-
1. Select **Review + Create** to review your storage account settings and create the account.
81+
1. Select **Review** to review your storage account settings and create the account.
8882

8983
1. Select **Create**.
9084

9185
To create a Blob Storage container in Azure Storage, follow these steps.
9286

9387
1. Go to your new storage account in the Azure portal.
9488

95-
1. In the left menu for the storage account, scroll to the **Blob service** section, and then select **Containers**.
89+
1. In the left menu for the storage account, scroll to the **Data storage** section, and then select **Containers**.
9690

9791
1. Select the **+ Container** button.
9892

9993
1. Type a name for your new container. The container name must be lowercase, must start with a letter or number, and can include only letters, numbers, and the dash (-) character.
10094

10195
1. Set the level of public access to the container. The default level is **Private (no anonymous access)**.
10296

103-
1. Select **OK** to create the container.
97+
1. Select **Create** to create the container.
10498

10599
# [PowerShell](#tab/azure-powershell)
106100

@@ -172,7 +166,15 @@ You need to grant your web app access to the storage account before you can crea
172166

173167
In the [Azure portal](https://portal.azure.com), go into your storage account to grant your web app access. Select **Access control (IAM)** in the left pane, and then select **Role assignments**. You'll see a list of who has access to the storage account. Now you want to add a role assignment to a robot, the app service that needs access to the storage account. Select **Add** > **Add role assignment** to open the **Add role assignment** page.
174168

175-
Assign the **Storage Blob Data Contributor** role to the **App Service** at subscription scope. For detailed steps, see [Assign Azure roles using the Azure portal](../../role-based-access-control/role-assignments-portal.md).
169+
1. In the **Assignment type** tab, select **Job function type** and then **Next**.
170+
171+
1. In the **Role** tab, select **Storage Blob Data Contributor** role from the dropdown and then select **Next**.
172+
173+
1. In the **Members** tab, select **Assign access to** -> **Managed identity** and then select **Members** -> **Select members**. In the **Select managed identities** window, find and select the managed identity created for your App Service in the **Managed identity** dropdown. Select the **Select** button.
174+
175+
1. Select **Review and assign** and then select **Review and assign** once more.
176+
177+
For detailed steps, see [Assign Azure roles using the Azure portal](../../role-based-access-control/role-assignments-portal.md).
176178

177179
Your web app now has access to your storage account.
178180

0 commit comments

Comments
 (0)