Skip to content

Commit 7d5c243

Browse files
author
ecfan
committed
Fix more Acrolinx issues
1 parent bb8a1ef commit 7d5c243

File tree

2 files changed

+18
-18
lines changed

2 files changed

+18
-18
lines changed

articles/logic-apps/logic-apps-securing-a-logic-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ For more information about security in Azure, review these topics:
3535

3636
## Access to logic app operations
3737

38-
FFor Consumption logic apps only, before you can create or manage logic apps and their connections, you need specific permissions, which are provided through roles using [Azure role-based access control (Azure RBAC)](../role-based-access-control/role-assignments-portal.md). You can also set up permissions so that only specific users or groups can run specific tasks, such as managing, editing, and viewing logic apps. To control their permissions, you can assign built-in or customized roles to members who have access to your Azure subscription. Azure Logic Apps has the following specific roles, based on whether you have a Consumption or Standard logic app workflow:
38+
For Consumption logic apps only, before you can create or manage logic apps and their connections, you need specific permissions, which are provided through roles using [Azure role-based access control (Azure RBAC)](../role-based-access-control/role-assignments-portal.md). You can also set up permissions so that only specific users or groups can run specific tasks, such as managing, editing, and viewing logic apps. To control their permissions, you can assign built-in or customized roles to members who have access to your Azure subscription. Azure Logic Apps has the following specific roles, based on whether you have a Consumption or Standard logic app workflow:
3939

4040
##### Consumption workflows
4141

articles/role-based-access-control/built-in-roles.md

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -266,7 +266,7 @@ The following table provides a brief description of each built-in role. Click th
266266
> | **DevOps** | | |
267267
> | [DevTest Labs User](#devtest-labs-user) | Lets you connect, start, restart, and shutdown your virtual machines in your Azure DevTest Labs. | 76283e04-6283-4c54-8f91-bcf1374a3c64 |
268268
> | [Lab Assistant](#lab-assistant) | Enables you to view an existing lab, perform actions on the lab VMs and send invitations to the lab. | ce40b423-cede-4313-a93f-9b28290b72e1 |
269-
> | [Lab Contributor](#lab-contributor) | Applied at lab level, enables you to manage the lab. Applied at a resource group, enables you to create and manage labs. | 5daaa2af-1fe8-407c-9122-bba179798270 |
269+
> | [Lab Contributor](#lab-contributor) | At lab level, enables you to manage the lab. At resource group level, enables you to create and manage labs. | 5daaa2af-1fe8-407c-9122-bba179798270 |
270270
> | [Lab Creator](#lab-creator) | Lets you create new labs under your Azure Lab Accounts. | b97fb8bc-a8b2-4522-a38b-dd33c7e65ead |
271271
> | [Lab Operator](#lab-operator) | Gives you limited ability to manage existing labs. | a36e6959-b6be-4b12-8e9f-ef4b474d304d |
272272
> | [Lab Services Contributor](#lab-services-contributor) | Enables you to fully control all Lab Services scenarios in the resource group. | f69b8690-cc87-41d6-b77a-a4bc3c0a966f |
@@ -288,7 +288,7 @@ The following table provides a brief description of each built-in role. Click th
288288
> | [Azure Arc Kubernetes Admin](#azure-arc-kubernetes-admin) | Lets you manage all resources under cluster/namespace, except update or delete resource quotas and namespaces. | dffb1e0c-446f-4dde-a09f-99eb5cc68b96 |
289289
> | [Azure Arc Kubernetes Cluster Admin](#azure-arc-kubernetes-cluster-admin) | Lets you manage all resources in the cluster. | 8393591c-06b9-48a2-a542-1bd6b377f6a2 |
290290
> | [Azure Arc Kubernetes Viewer](#azure-arc-kubernetes-viewer) | Lets you view all resources in cluster/namespace, except secrets. | 63f0a09d-1495-4db4-a681-037d84835eb4 |
291-
> | [Azure Arc Kubernetes Writer](#azure-arc-kubernetes-writer) | Lets you update everything in cluster/namespace, except (cluster)roles and (cluster)role bindings. | 5b999177-9696-4545-85c7-50de3797e5a1 |
291+
> | [Azure Arc Kubernetes Writer](#azure-arc-kubernetes-writer) | Lets you update everything in cluster/namespace, except (cluster) roles and (cluster) role bindings. | 5b999177-9696-4545-85c7-50de3797e5a1 |
292292
> | [Azure Connected Machine Onboarding](#azure-connected-machine-onboarding) | Can onboard Azure Connected Machines. | b64e21ea-ac4e-4cdf-9dc9-5b892992bee7 |
293293
> | [Azure Connected Machine Resource Administrator](#azure-connected-machine-resource-administrator) | Can read, write, delete and re-onboard Azure Connected Machines. | cd570a14-e51a-42ad-bac8-bafd67325302 |
294294
> | [Billing Reader](#billing-reader) | Allows read access to billing data | fa23ad8b-c56e-40d8-ac0c-ce449e1d2c64 |
@@ -336,9 +336,9 @@ The following table provides a brief description of each built-in role. Click th
336336
> | [Grafana Admin](#grafana-admin) | Perform all Grafana operations, including the ability to manage data sources, create dashboards, and manage role assignments within Grafana. | 22926164-76b3-42b3-bc55-97df8dab3e41 |
337337
> | [Grafana Editor](#grafana-editor) | View and edit a Grafana instance, including its dashboards and alerts. | a79a5197-3a5c-4973-a920-486035ffd60f |
338338
> | [Grafana Viewer](#grafana-viewer) | View a Grafana instance, including its dashboards and alerts. | 60921a7e-fef1-4a43-9b16-a26c52ad4769 |
339-
> | [Load Test Contributor](#load-test-contributor) | View, create, update, delete and execute load tests. View and list load test resources but can not make any changes. | 749a398d-560b-491b-bb21-08924219302e |
339+
> | [Load Test Contributor](#load-test-contributor) | View, create, update, delete and execute load tests. View and list load test resources but can't make any changes. | 749a398d-560b-491b-bb21-08924219302e |
340340
> | [Load Test Owner](#load-test-owner) | Execute all operations on load test resources and load tests | 45bb0b16-2f0c-4e78-afaa-a07599b003f6 |
341-
> | [Load Test Reader](#load-test-reader) | View and list all load tests and load test resources but can not make any changes | 3ae3fb29-0000-4ccd-bf80-542e7b26e081 |
341+
> | [Load Test Reader](#load-test-reader) | View and list all load tests and load test resources but can't make any changes | 3ae3fb29-0000-4ccd-bf80-542e7b26e081 |
342342
> | [Scheduler Job Collections Contributor](#scheduler-job-collections-contributor) | Lets you manage Scheduler job collections, but not access to them. | 188a0f2f-5c9e-469b-ae67-2aa5ce574b94 |
343343
> | [Services Hub Operator](#services-hub-operator) | Services Hub Operator allows you to perform all read, write, and deletion operations related to Services Hub Connectors. | 82200a5b-e217-47a5-b665-6d8765ee745b |
344344

@@ -1086,7 +1086,7 @@ Create and manage virtual machines, manage disks, install and run software, rese
10861086

10871087
### Virtual Machine Data Access Administrator (preview)
10881088

1089-
Manage access to Virtual Machines by adding or removing role assignments.for the Virtual Machine Administrator Login and Virtual Machine User Login roles. Includes an ABAC condition to constrain role assignments.
1089+
Manage access to Virtual Machines by adding or removing role assignments for the Virtual Machine Administrator Login and Virtual Machine User Login roles. Includes an ABAC condition to constrain role assignments.
10901090

10911091
> [!div class="mx-tableFixed"]
10921092
> | Actions | Description |
@@ -12938,9 +12938,9 @@ Lets you manage managed HSM pools, but not access to them.
1293812938
> | Actions | Description |
1293912939
> | --- | --- |
1294012940
> | [Microsoft.KeyVault](resource-provider-operations.md#microsoftkeyvault)/managedHSMs/* | |
12941-
> | [Microsoft.KeyVault](resource-provider-operations.md#microsoftkeyvault)/deletedManagedHsms/read | View the properties of a deleted managed hsm |
12942-
> | [Microsoft.KeyVault](resource-provider-operations.md#microsoftkeyvault)/locations/deletedManagedHsms/read | View the properties of a deleted managed hsm |
12943-
> | [Microsoft.KeyVault](resource-provider-operations.md#microsoftkeyvault)/locations/deletedManagedHsms/purge/action | Purge a soft deleted managed hsm |
12941+
> | [Microsoft.KeyVault](resource-provider-operations.md#microsoftkeyvault)/deletedManagedHsms/read | View the properties of a deleted managed HSM |
12942+
> | [Microsoft.KeyVault](resource-provider-operations.md#microsoftkeyvault)/locations/deletedManagedHsms/read | View the properties of a deleted managed HSM |
12943+
> | [Microsoft.KeyVault](resource-provider-operations.md#microsoftkeyvault)/locations/deletedManagedHsms/purge/action | Purge a soft deleted managed HSM |
1294412944
> | [Microsoft.KeyVault](resource-provider-operations.md#microsoftkeyvault)/locations/managedHsmOperationResults/read | Check the result of a long run operation |
1294512945
> | **NotActions** | |
1294612946
> | *none* | |
@@ -13751,7 +13751,7 @@ Enables you to view an existing lab, perform actions on the lab VMs and send inv
1375113751

1375213752
### Lab Contributor
1375313753

13754-
Applied at lab level, enables you to manage the lab. Applied at a resource group, enables you to create and manage labs.
13754+
At lab level, enables you to manage the lab and applies at lab level. At resource group level, enables you to create and manage labs.
1375513755

1375613756
[Learn more](/azure/lab-services/administrator-guide)
1375713757

@@ -15133,7 +15133,7 @@ Lets you view all resources in cluster/namespace, except secrets.
1513315133

1513415134
### Azure Arc Kubernetes Writer
1513515135

15136-
Lets you update everything in cluster/namespace, except (cluster)roles and (cluster)role bindings.
15136+
Lets you update everything in cluster/namespace, except (cluster) roles and (cluster) role bindings.
1513715137

1513815138
[Learn more](/azure/azure-arc/kubernetes/azure-rbac)
1513915139

@@ -15188,7 +15188,7 @@ Lets you update everything in cluster/namespace, except (cluster)roles and (clus
1518815188
"assignableScopes": [
1518915189
"/"
1519015190
],
15191-
"description": "Lets you update everything in cluster/namespace, except (cluster)roles and (cluster)role bindings.",
15191+
"description": "Lets you update everything in cluster/namespace, except (cluster) roles and (cluster) role bindings.",
1519215192
"id": "/providers/Microsoft.Authorization/roleDefinitions/5b999177-9696-4545-85c7-50de3797e5a1",
1519315193
"name": "5b999177-9696-4545-85c7-50de3797e5a1",
1519415194
"permissions": [
@@ -16436,7 +16436,7 @@ Lets you manage Site Recovery service except vault creation and role assignment
1643616436

1643716437
### Site Recovery Operator
1643816438

16439-
Lets you fail over andfail backbut not perform other Site Recovery management operations
16439+
Lets you fail over and fail back but not perform other Site Recovery management operations
1644016440

1644116441
[Learn more](/azure/site-recovery/site-recovery-role-based-linked-access-control)
1644216442

@@ -16514,7 +16514,7 @@ Lets you fail over andfail backbut not perform other Site Recovery management op
1651416514
"assignableScopes": [
1651516515
"/"
1651616516
],
16517-
"description": "Lets you failover and failback but not perform other Site Recovery management operations",
16517+
"description": "Lets you fail over and fail back but not perform other Site Recovery management operations",
1651816518
"id": "/providers/Microsoft.Authorization/roleDefinitions/494ae006-db33-4328-bf46-533a6560a3ca",
1651916519
"name": "494ae006-db33-4328-bf46-533a6560a3ca",
1652016520
"permissions": [
@@ -17743,7 +17743,7 @@ View a Grafana instance, including its dashboards and alerts.
1774317743

1774417744
### Load Test Contributor
1774517745

17746-
View, create, update, delete and execute load tests. View and list load test resources but can not make any changes.
17746+
View, create, update, delete and execute load tests. View and list load test resources but can't make any changes.
1774717747

1774817748
[Learn more](/azure/load-testing/how-to-assign-roles)
1774917749

@@ -17767,7 +17767,7 @@ View, create, update, delete and execute load tests. View and list load test res
1776717767
"assignableScopes": [
1776817768
"/"
1776917769
],
17770-
"description": "View, create, update, delete and execute load tests. View and list load test resources but can not make any changes.",
17770+
"description": "View, create, update, delete and execute load tests. View and list load test resources but can't make any changes.",
1777117771
"id": "/providers/Microsoft.Authorization/roleDefinitions/749a398d-560b-491b-bb21-08924219302e",
1777217772
"name": "749a398d-560b-491b-bb21-08924219302e",
1777317773
"permissions": [
@@ -17845,7 +17845,7 @@ Execute all operations on load test resources and load tests
1784517845

1784617846
### Load Test Reader
1784717847

17848-
View and list all load tests and load test resources but can not make any changes
17848+
View and list all load tests and load test resources but can't make any changes
1784917849

1785017850
[Learn more](/azure/load-testing/how-to-assign-roles)
1785117851

@@ -17869,7 +17869,7 @@ View and list all load tests and load test resources but can not make any change
1786917869
"assignableScopes": [
1787017870
"/"
1787117871
],
17872-
"description": "View and list all load tests and load test resources but can not make any changes",
17872+
"description": "View and list all load tests and load test resources but can't make any changes",
1787317873
"id": "/providers/Microsoft.Authorization/roleDefinitions/3ae3fb29-0000-4ccd-bf80-542e7b26e081",
1787417874
"name": "3ae3fb29-0000-4ccd-bf80-542e7b26e081",
1787517875
"permissions": [

0 commit comments

Comments
 (0)