Skip to content

Commit 7985edd

Browse files
authored
Merge pull request #124188 from FreddyAyala/patch-3
Update roles-for-resource-and-storage.md to prevent 403 error
2 parents 76dcba9 + e54e95c commit 7985edd

File tree

1 file changed

+11
-0
lines changed

1 file changed

+11
-0
lines changed

articles/ai-services/language-service/custom-named-entity-recognition/includes/roles-for-resource-and-storage.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -37,5 +37,16 @@ Use the following steps to set the required roles for your Language resource and
3737
5. Select **Select members**
3838
6. Select your subscription, and **Language** as the managed identity. You can search for user names in the **Select** field.
3939

40+
### Roles for your user
41+
> [!IMPORTANT]
42+
> If you skip this step, you'll have a 403 error when trying to connect to your custom project. It's important that your current user has this role to access storage account blob data, even if you're the owner of the storage account.
43+
>
44+
1. Go to your storage account page in the [Azure portal](https://portal.azure.com/).
45+
2. Select **Access Control (IAM)** in the left navigation menu.
46+
3. Select **Add** to **Add Role Assignments**, and choose the **Storage blob data contributor** role on the storage account.
47+
4. Within **Assign access to**, select **User, group, or service principal**.
48+
5. Select **Select members**
49+
6. Select your User. You can search for user names in the **Select** field.
50+
4051
> [!IMPORTANT]
4152
> If you have a virtual network or private endpoint, be sure to select **Allow Azure services on the trusted services list to access this storage account** in the Azure portal.

0 commit comments

Comments
 (0)