Skip to content

Commit 67d50cc

Browse files
authored
Update how-to-use-managed-identity.md
1 parent 0485ca6 commit 67d50cc

File tree

1 file changed

+9
-7
lines changed

1 file changed

+9
-7
lines changed

articles/energy-data-services/how-to-use-managed-identity.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,9 @@ Retrieve the application ID of the user-assigned identity by using the object ID
8484
Next, add the application ID to the appropriate groups that will use the entitlement service to access Microsoft Energy Data Services APIs. The following example adds the application ID to two groups:
8585

8686
* users@[partition ID].dataservices.energy
87-
* users.datalake.editors@[partition ID].dataservices.energy
87+
* users.datalake.editors@[partition ID].dataservices.energy
88+
89+
To add the application ID:
8890

8991
1. Gather the following information:
9092

@@ -101,7 +103,7 @@ Next, add the application ID to the appropriate groups that will use the entitle
101103
> [!NOTE]
102104
> In the following commands, be sure to use the application ID of the managed identity and not the object ID.
103105
104-
a. To add the application ID to the users@[partition ID].dataservices.energy group, run the following CURL command via Bash in Azure:
106+
1. To add the application ID to the users@[partition ID].dataservices.energy group, run the following cURL command via Bash in Azure:
105107

106108
```bash
107109
curl --location --request POST 'https://<Microsoft Energy Data Services URI>/api/entitlements/v2/groups/users@ <data-partition-id>.dataservices.energy/members' \
@@ -116,14 +118,14 @@ Next, add the application ID to the appropriate groups that will use the entitle
116118
117119
Here's a sample response:
118120

119-
```JSON
121+
```json
120122
{
121123
"email": "<application ID of the managed identity>",
122124
"role": "MEMBER"
123125
}
124126
```
125127

126-
b. To add the application ID to the users.datalake.editors@[partition ID].dataservices.energy group, run the following CURL command via Bash in Azure:
128+
1. To add the application ID to the users.datalake.editors@[partition ID].dataservices.energy group, run the following cURL command via Bash in Azure:
127129

128130
```bash
129131
curl --location --request POST 'https://<Microsoft Energy Data Services URI>/api/entitlements/v2/groups/ users.datalake.editors@ <data-partition-id>.dataservices.energy/members' \
@@ -138,7 +140,7 @@ Next, add the application ID to the appropriate groups that will use the entitle
138140
139141
Here's a sample response:
140142
141-
```JSON
143+
```json
142144
{
143145
"email": "<application ID of the managed identity>",
144146
"role": "MEMBER"
@@ -149,7 +151,7 @@ Next, add the application ID to the appropriate groups that will use the entitle
149151

150152
Now Azure Functions is ready to access Microsoft Energy Data Services APIs.
151153

152-
The Azure function generates a token by using the user-assigned identity. The function uses the application ID present in the Microsoft Energy Data Services instance while generating the token.
154+
The Azure function generates a token by using the user-assigned identity. The function uses the application ID that's present in the Microsoft Energy Data Services instance while generating the token.
153155
154156
Here's an example of the Azure function code:
155157

@@ -184,7 +186,7 @@ You should get the following successful response from Azure Functions:
184186
185187
[![Screenshot of a success message from Azure Functions.](media/how-to-use-managed-identity/5-azure-function-success.png)](media/how-to-use-managed-identity/5-azure-function-success.png#lightbox)
186188
187-
With the preceding steps completed, can now use Azure Functions to access Microsoft Energy Data Services APIs with appropriate use of managed identities.
189+
With the preceding steps completed, you can now use Azure Functions to access Microsoft Energy Data Services APIs with appropriate use of managed identities.
188190
189191
## Next steps
190192

0 commit comments

Comments
 (0)