Skip to content

Commit 7808557

Browse files
committed
update
1 parent 5bc4090 commit 7808557

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

articles/machine-learning/prompt-flow/troubleshoot-guidance.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ There are possible reasons for this issue:
8383
- Allowed origins: `https://mlworkspace.azure.ai,https://ml.azure.com,https://*.ml.azure.com,https://ai.azure.com,https://*.ai.azure.com,https://mlworkspacecanary.azure.ai,https://mlworkspace.azureml-test.net`
8484
- Allowed methods: `DELETE, GET, HEAD, POST, OPTIONS, PUT`
8585

86-
:::image type="content" source="./media/faq/resource-sharing-setting-storage-account.png" alt-text="Screenshot that shows datastore with wrong account key." lightbox = "./media/faq/resource-sharing-setting-storage-account.png":::
86+
:::image type="content" source="./media/faq/resource-sharing-setting-storage-account.png" alt-text="Screenshot that shows Resource sharing config of storage account." lightbox = "./media/faq/resource-sharing-setting-storage-account.png":::
8787

8888
## Compute session related issues
8989

@@ -275,21 +275,21 @@ If you encounter an error like "Access denied to list workspace secret", check w
275275

276276
You can follow [Identity-based data authentication](../how-to-administrate-data-authentication.md#identity-based-data-authentication) this part to make your datastore credential-less.
277277

278-
You need to change auth type of datastore to None, which stands for meid_token based auth. For blob/adls gen1/adls gen2 based datastore, you can make change from datastore detail page, or CLI/SDK: https://github.com/Azure/azureml-examples/tree/main/cli/resources/datastore
278+
You need to change auth type of datastore to None, which stands for meid_token based auth. For blob/adls gen1/adls gen2 based datastore (at least for `workspaceblobstore`), you can make change from datastore detail page, or CLI/SDK: https://github.com/Azure/azureml-examples/tree/main/cli/resources/datastore
279279

280280
:::image type="content" source="./media/faq/datastore_auth_type.png" alt-text="Screenshot of auth type for datastore. " lightbox = "./media/faq/datastore_auth_type.png":::
281281

282-
For fileshare based datastore, you can only change auth type for REST API: [datastores-create-or-update](/rest/api/azureml/datastores/create-or-update?tabs=HTTP#code-try-0). You can first use [datastores-get](/rest/api/azureml/datastores/get?tabs=HTTP#code-try-0) to get the body properties of datastore, then change `"credentialsType": "None"`.
282+
For fileshare based datastore (at least for `workspaceworkingdirectory`), you can only change auth type for REST API: [datastores-create-or-update](/rest/api/azureml/datastores/create-or-update?tabs=HTTP#code-try-0). You can first use [datastores-get](/rest/api/azureml/datastores/get?tabs=HTTP#code-try-0) to get the body properties of datastore, then change `"credentialsType": "None"`.
283283

284284
:::image type="content" source="./media/faq/datastore-update-rest.png" alt-text="Screenshot of rest for datastore update. " lightbox = "./media/faq/datastore-update-rest.png":::
285285

286286
#### Grant permission to user identity or managed identity
287287

288288
To use credential-less datastore in prompt flow, you need to grant enough permissions to user identity or managed identity to access the datastore.
289289
- If you're using user identity this default option in prompt flow, you need to make sure the user identity has following role on the storage account:
290-
- `Storage Blob Data Contributor` on the storage account, at least need read/write (better have delete) permission.
291-
- `Storage File Data Privileged Contributor` on the storage account, at least need read/write (better have delete) permission
290+
- `Storage Blob Data Contributor` on the storage account, at least need read/write (better also include delete) permission.
291+
- `Storage File Data Privileged Contributor` on the storage account, at least need read/write (better also include delete) permission
292292
- If you're using user assigned managed identity, you need to make sure the managed identity has following role on the storage account:
293-
- `Storage Blob Data Contributor` on the storage account, at least need read/write (better have delete) permission.
294-
- `Storage File Data Privileged Contributor` on the storage account, at least need read/write (better have delete) permission
293+
- `Storage Blob Data Contributor` on the storage account, at least need read/write (better also include delete) permission.
294+
- `Storage File Data Privileged Contributor` on the storage account, at least need read/write (better also include delete) permission
295295
- Meanwhile, you need to assign user identity `Storage Blob Data Read` role to storage account, if your want use prompt flow to authoring and test flow.

0 commit comments

Comments
 (0)