You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/energy-data-services/how-to-use-managed-identity.md
+9-7Lines changed: 9 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -84,7 +84,9 @@ Retrieve the application ID of the user-assigned identity by using the object ID
84
84
Next, add the application ID to the appropriate groups that will use the entitlement service to access Microsoft Energy Data Services APIs. The following example adds the application ID to two groups:
@@ -101,7 +103,7 @@ Next, add the application ID to the appropriate groups that will use the entitle
101
103
> [!NOTE]
102
104
> In the following commands, be sure to use the application ID of the managed identity and not the object ID.
103
105
104
-
a. To add the application ID to the users@[partition ID].dataservices.energy group, run the following CURL command via Bash in Azure:
106
+
1. To add the application ID to the users@[partition ID].dataservices.energy group, run the following cURL command via Bash in Azure:
105
107
106
108
```bash
107
109
curl --location --request POST 'https://<Microsoft Energy Data Services URI>/api/entitlements/v2/groups/users@ <data-partition-id>.dataservices.energy/members' \
@@ -116,14 +118,14 @@ Next, add the application ID to the appropriate groups that will use the entitle
116
118
117
119
Here's a sample response:
118
120
119
-
```JSON
121
+
```json
120
122
{
121
123
"email": "<application ID of the managed identity>",
122
124
"role": "MEMBER"
123
125
}
124
126
```
125
127
126
-
b. To add the application ID to the users.datalake.editors@[partition ID].dataservices.energy group, run the following CURLcommand via Bash in Azure:
128
+
1. To add the application ID to the users.datalake.editors@[partition ID].dataservices.energy group, run the following cURLcommand via Bash in Azure:
127
129
128
130
```bash
129
131
curl --location --request POST 'https://<Microsoft Energy Data Services URI>/api/entitlements/v2/groups/ users.datalake.editors@ <data-partition-id>.dataservices.energy/members' \
@@ -138,7 +140,7 @@ Next, add the application ID to the appropriate groups that will use the entitle
138
140
139
141
Here's a sample response:
140
142
141
-
```JSON
143
+
```json
142
144
{
143
145
"email": "<application ID of the managed identity>",
144
146
"role": "MEMBER"
@@ -149,7 +151,7 @@ Next, add the application ID to the appropriate groups that will use the entitle
149
151
150
152
Now Azure Functions is ready to access Microsoft Energy Data Services APIs.
151
153
152
-
The Azure functiongenerates a token by using the user-assigned identity. The functionuses the application ID present in the Microsoft Energy Data Services instance while generating the token.
154
+
The Azure functiongenerates a token by using the user-assigned identity. The functionuses the application ID that's present in the Microsoft Energy Data Services instance while generating the token.
153
155
154
156
Here's an example of the Azure functioncode:
155
157
@@ -184,7 +186,7 @@ You should get the following successful response from Azure Functions:
184
186
185
187
[](media/how-to-use-managed-identity/5-azure-function-success.png#lightbox)
186
188
187
-
With the preceding steps completed, can now use Azure Functions to access Microsoft Energy Data Services APIs with appropriate use of managed identities.
189
+
With the preceding steps completed, you can now use Azure Functions to access Microsoft Energy Data Services APIs with appropriate use of managed identities.
0 commit comments