Skip to content

Commit 8503eb7

Browse files
(ForumsTeam) Fixes MicrosoftDocs/azure-docs#13910
If go to the link user is reporting, the link has the below content Restrict Access to Containers and Blobs Updated: April 10, 2015 The content in this topic has been migrated to Manage Access to Azure Storage Resources<https://docs.microsoft.com/en-us/azure/storage/blobs/storage-manage-access-to-resources>. Please update links and bookmarks to point to the new version.
1 parent bcf1476 commit 8503eb7

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/hdinsight/hdinsight-hadoop-use-blob-storage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ Here are some considerations when using Azure Storage account with HDInsight clu
5555
* **Public containers or public blobs in storage accounts that are NOT connected to a cluster:** You have read-only permission to the blobs in the containers.
5656

5757
> [!NOTE]
58-
> Public containers allow you to get a list of all blobs that are available in that container and get container metadata. Public blobs allow you to access the blobs only if you know the exact URL. For more information, see <a href="http://msdn.microsoft.com/library/windowsazure/dd179354.aspx">Restrict access to containers and blobs</a>.
58+
> Public containers allow you to get a list of all blobs that are available in that container and get container metadata. Public blobs allow you to access the blobs only if you know the exact URL. For more information, see <a href="https://docs.microsoft.com/en-us/azure/storage/blobs/storage-manage-access-to-resources">Manage access to containers and blobs</a>.
5959
>
6060
>
6161
* **Private containers in storage accounts that are NOT connected to a cluster:** You can't access the blobs in the containers unless you define the storage account when you submit the WebHCat jobs. This is explained later in this article.

0 commit comments

Comments
 (0)