You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-functions/durable/durable-functions-configure-managed-identity.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -62,14 +62,14 @@ If none of these options are successful, an error stating that the app cannot re
62
62
}
63
63
}
64
64
```
65
-
2. Go to the Azure Storage account resource on Azure Portal, navigate to the **Access Control (IAM)** tab, and click on **Add role assignment**. Find the following roles:
65
+
2. Go to the Azure Storage account resource on the Azure portal, navigate to the **Access Control (IAM)** tab, and click on **Add role assignment**. Find the following roles:
66
66
* Storage Queue Data Contributor
67
67
* Storage Blob Data Contributor
68
68
* Storage Table Data Contributor
69
69
70
70
Assign the roles to yourself by clicking **"+ Select members"** and finding your email in the pop-up window. (This email is the one you use to log into Microsoft applications, Azure CLI, or editors in the Visual Studio family.)
71
71
72
-

72
+

73
73
74
74
## Identity-based connections for app deployed to Azure
75
75
@@ -87,7 +87,7 @@ Navigate to your app's Azure Storage resource on the Azure portal and [assign](/
87
87
88
88
To find your identity resource, select assign access to **Managed identity** and then **+ Select members**
89
89
90
-

90
+

91
91
92
92
### Add managed identity configuration to your app
93
93
@@ -102,7 +102,7 @@ Before you can use your app's managed identity, make some changes to the app set
102
102
103
103
Use *one of the following methods* depending on the cloud that your app runs in:
104
104
105
-
-**Azure cloud**: If your app runs in *public Azure*, add the setting `AzureWebJobsStorage__accountName` that identifies an Azure storage account name. Example value: `mystorageaccount123`
105
+
-**Azure cloud**: If your app runs in *global Azure*, add the setting `AzureWebJobsStorage__accountName` that identifies an Azure storage account name. Example value: `mystorageaccount123`
106
106
107
107
-**Non-Azure cloud**: If your application runs in a cloud outside of Azure, you must add the following three settings to provide specific service URIs (or *endpoints*) of the storage account instead of an account name.
108
108
@@ -123,7 +123,7 @@ Before you can use your app's managed identity, make some changes to the app set
123
123

124
124
125
125
> [!NOTE]
126
-
> If you are using [Azure Government](../../azure-government/documentation-government-welcome.md) or any other cloud that's separate from public Azure, you must use the option that provides specific service URIs instead of just the storage account name. For more information on using Azure Storage with Azure Government, see the [Develop by using the Storage API in Azure Government](../../azure-government/documentation-government-get-started-connect-to-storage.md).
126
+
> If you are using [Azure Government](../../azure-government/documentation-government-welcome.md) or any other cloud that's separate from global Azure, you must use the option that provides specific service URIs instead of just the storage account name. For more information on using Azure Storage with Azure Government, see the [Develop by using the Storage API in Azure Government](../../azure-government/documentation-government-get-started-connect-to-storage.md).
127
127
128
128
1. Finish your managed identity configuration (remember to click "Apply" after making the setting changes):
129
129
@@ -135,10 +135,10 @@ Before you can use your app's managed identity, make some changes to the app set
135
135
136
136
***AzureWebJobsStorage__clientId**, get this GUID value from your managed identity resource
137
137
138
-

138
+

139
139
140
140
> [!NOTE]
141
-
> Durable Functions does *not* support `managedIdentityResourceId`today when using user-assigned identity. Use `clientId` instead.
141
+
> Durable Functions does *not* support `managedIdentityResourceId` when using user-assigned identity. Use `clientId` instead.
0 commit comments