Skip to content

Commit 7bd15be

Browse files
Merge pull request #231209 from laujan/move-diagram-mi-fr
update managed identity
2 parents 71434c8 + 0386262 commit 7bd15be

File tree

1 file changed

+10
-8
lines changed

1 file changed

+10
-8
lines changed

articles/applied-ai-services/form-recognizer/managed-identities.md

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -7,33 +7,35 @@ manager: nitinme
77
ms.service: applied-ai-services
88
ms.subservice: forms-recognizer
99
ms.topic: how-to
10-
ms.date: 02/09/2023
10+
ms.date: 03/17/2023
1111
ms.author: lajanuar
1212
monikerRange: '>=form-recog-2.1.0'
1313
recommendations: false
1414
---
1515

1616
# Managed identities for Form Recognizer
1717

18-
:::image type="content" source="media/managed-identities/rbac-flow.png" alt-text="Screenshot of managed identity flow (RBAC).":::
19-
2018
[!INCLUDE [applies to v3.0 and v2.1](includes/applies-to-v3-0-and-v2-1.md)]
2119

2220
Managed identities for Azure resources are service principals that create an Azure Active Directory (Azure AD) identity and specific permissions for Azure managed resources:
2321

22+
:::image type="content" source="media/managed-identities/rbac-flow.png" alt-text="Screenshot of managed identity flow (RBAC).":::
23+
2424
* You can use managed identities to grant access to any resource that supports Azure AD authentication, including your own applications. Unlike security keys and authentication tokens, managed identities eliminate the need for developers to manage credentials.
2525

2626
* To grant access to an Azure resource, assign an Azure role to a managed identity using [Azure role-based access control (Azure RBAC)](../../role-based-access-control/overview.md).
2727

2828
* There's no added cost to use managed identities in Azure.
2929

30-
> [!TIP]
31-
> Managed identities eliminate the need for you to manage credentials, including Shared Access Signature (SAS) tokens. Managed identities are a safer way to grant access to data without having credentials in your code.
32-
30+
> [!IMPORTANT]
31+
>
32+
> * Managed identities eliminate the need for you to manage credentials, including Shared Access Signature (SAS) tokens.
33+
>
34+
> * Managed identities are a safer way to grant access to data without having credentials in your code.
3335
3436
## Private storage account access
3537

36-
Private Azure storage account access and authentication are supported by [managed identities for Azure resources](../../active-directory/managed-identities-azure-resources/overview.md). If you have an Azure storage account, protected by a Virtual Network (VNet) or firewall, Form Recognizer can't directly access your storage account data. However, once a managed identity is enabled, Form Recognizer can access your storage account using an assigned managed identity credential.
38+
Private Azure storage account access and authentication support [managed identities for Azure resources](../../active-directory/managed-identities-azure-resources/overview.md). If you have an Azure storage account, protected by a Virtual Network (VNet) or firewall, Form Recognizer can't directly access your storage account data. However, once a managed identity is enabled, Form Recognizer can access your storage account using an assigned managed identity credential.
3739

3840
> [!NOTE]
3941
>
@@ -106,7 +108,7 @@ You need to grant Form Recognizer access to your storage account before it can c
106108
>
107109
> If you're unable to assign a role in the Azure portal because the Add > Add role assignment option is disabled or you get the permissions error, "you do not have permissions to add role assignment at this scope", check that you're currently signed in as a user with an assigned a role that has Microsoft.Authorization/roleAssignments/write permissions such as Owner or User Access Administrator at the Storage scope for the storage resource.
108110
109-
1. Next, you're going to assign a **Storage Blob Data Reader** role to your Form Recognizer service resource. In the **Add role assignment** pop-up window complete the fields as follows and select **Save**:
111+
1. Next, you're going to assign a **Storage Blob Data Reader** role to your Form Recognizer service resource. In the **Add role assignment** pop-up window, complete the fields as follows and select **Save**:
110112

111113
| Field | Value|
112114
|------|--------|

0 commit comments

Comments
 (0)