Skip to content

Commit 5ac9f58

Browse files
committed
addressed doc reviewer feedback
1 parent 7fb880c commit 5ac9f58

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

articles/azure-functions/durable/durable-functions-configure-managed-identity.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -62,14 +62,14 @@ If none of these options are successful, an error stating that the app cannot re
6262
}
6363
}
6464
```
65-
2. Go to the Azure Storage account resource on Azure Portal, navigate to the **Access Control (IAM)** tab, and click on **Add role assignment**. Find the following roles:
65+
2. Go to the Azure Storage account resource on the Azure portal, navigate to the **Access Control (IAM)** tab, and click on **Add role assignment**. Find the following roles:
6666
* Storage Queue Data Contributor
6767
* Storage Blob Data Contributor
6868
* Storage Table Data Contributor
6969

7070
Assign the roles to yourself by clicking **"+ Select members"** and finding your email in the pop-up window. (This email is the one you use to log into Microsoft applications, Azure CLI, or editors in the Visual Studio family.)
7171

72-
![Assign access to user](./media/durable-functions-configure-df-with-credentials/assign-access-user.png)
72+
![Screenshot showing access assignment to user.](./media/durable-functions-configure-df-with-credentials/assign-access-user.png)
7373

7474
## Identity-based connections for app deployed to Azure
7575

@@ -87,7 +87,7 @@ Navigate to your app's Azure Storage resource on the Azure portal and [assign](/
8787

8888
To find your identity resource, select assign access to **Managed identity** and then **+ Select members**
8989

90-
![Assign access to managed identity](./media/durable-functions-configure-df-with-credentials/assign-access-managed-identity.png)
90+
![Screenshot showing access assignmnet to managed identity.](./media/durable-functions-configure-df-with-credentials/assign-access-managed-identity.png)
9191

9292
### Add managed identity configuration to your app
9393

@@ -102,7 +102,7 @@ Before you can use your app's managed identity, make some changes to the app set
102102

103103
Use *one of the following methods* depending on the cloud that your app runs in:
104104

105-
- **Azure cloud**: If your app runs in *public Azure*, add the setting `AzureWebJobsStorage__accountName` that identifies an Azure storage account name. Example value: `mystorageaccount123`
105+
- **Azure cloud**: If your app runs in *global Azure*, add the setting `AzureWebJobsStorage__accountName` that identifies an Azure storage account name. Example value: `mystorageaccount123`
106106

107107
- **Non-Azure cloud**: If your application runs in a cloud outside of Azure, you must add the following three settings to provide specific service URIs (or *endpoints*) of the storage account instead of an account name.
108108

@@ -123,7 +123,7 @@ Before you can use your app's managed identity, make some changes to the app set
123123
![Screenshot of endpoint sample.](media/durable-functions-configure-df-with-credentials/durable-functions-managed-identity-scenario-02.png)
124124

125125
> [!NOTE]
126-
> If you are using [Azure Government](../../azure-government/documentation-government-welcome.md) or any other cloud that's separate from public Azure, you must use the option that provides specific service URIs instead of just the storage account name. For more information on using Azure Storage with Azure Government, see the [Develop by using the Storage API in Azure Government](../../azure-government/documentation-government-get-started-connect-to-storage.md).
126+
> If you are using [Azure Government](../../azure-government/documentation-government-welcome.md) or any other cloud that's separate from global Azure, you must use the option that provides specific service URIs instead of just the storage account name. For more information on using Azure Storage with Azure Government, see the [Develop by using the Storage API in Azure Government](../../azure-government/documentation-government-get-started-connect-to-storage.md).
127127
128128
1. Finish your managed identity configuration (remember to click "Apply" after making the setting changes):
129129

@@ -135,10 +135,10 @@ Before you can use your app's managed identity, make some changes to the app set
135135

136136
* **AzureWebJobsStorage__clientId**, get this GUID value from your managed identity resource
137137

138-
![Screenshot of user identity client id.](media/durable-functions-configure-df-with-credentials/durable-functions-managed-identity-scenario-03.png)
138+
![Screenshot of user identity client ID.](media/durable-functions-configure-df-with-credentials/durable-functions-managed-identity-scenario-03.png)
139139

140140
> [!NOTE]
141-
> Durable Functions does *not* support `managedIdentityResourceId` today when using user-assigned identity. Use `clientId` instead.
141+
> Durable Functions does *not* support `managedIdentityResourceId` when using user-assigned identity. Use `clientId` instead.
142142
143143

144144

0 commit comments

Comments
 (0)