Skip to content

Commit 9130839

Browse files
Merge pull request #288831 from meganbradley/meganbradley/docutune-autopr-20241020-030949-3887017-ignore-build
[BULK] - DocuTune remediation - Sensitive terms with GUIDs (part 71)
2 parents 60a63a9 + e050b7c commit 9130839

File tree

4 files changed

+10
-10
lines changed

4 files changed

+10
-10
lines changed

articles/storage/blobs/assign-azure-role-data-access.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -73,10 +73,10 @@ The first response returns the security principal, and the second returns the se
7373
UserPrincipalName : [email protected]
7474
ObjectType : User
7575
DisplayName : Mark P. Daniels
76-
Id : ab12cd34-ef56-ab12-cd34-ef56ab12cd34
76+
Id : aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb
7777
Type :
7878
79-
ab12cd34-ef56-ab12-cd34-ef56ab12cd34
79+
aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb
8080
```
8181

8282
The `-RoleDefinitionName` parameter value is the name of the RBAC role that needs to be assigned to the principal. To access blob data in the Azure portal with Microsoft Entra credentials, a user must have the following role assignments:
@@ -113,7 +113,7 @@ The following example assigns the **Storage Blob Data Reader** role to a user by
113113

114114
<!-- replaycheck-task id="3361d580" -->
115115
```powershell
116-
New-AzRoleAssignment -ObjectID "ab12cd34-ef56-ab12-cd34-ef56ab12cd34" `
116+
New-AzRoleAssignment -ObjectID "aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb" `
117117
-RoleDefinitionName "Storage Blob Data Reader" `
118118
-Scope "/subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.Storage/storageAccounts/<storage-account-name>"
119119
```
@@ -160,7 +160,7 @@ The following example assigns the **Storage Blob Data Reader** role to a user by
160160
```azurecli-interactive
161161
az role assignment create \
162162
--role "Storage Blob Data Reader" \
163-
--assignee-object-id "ab12cd34-ef56-ab12-cd34-ef56ab12cd34" \
163+
--assignee-object-id "aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb" \
164164
--assignee-principal-type "User" \
165165
--scope "/subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.Storage/storageAccounts/<storage-account-name>"
166166
```

articles/storage/blobs/data-lake-storage-access-control.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -332,7 +332,7 @@ A GUID is shown if the entry represents a user and that user doesn't exist in Mi
332332

333333
When you define ACLs for service principals, it's important to use the Object ID (OID) of the *service principal* for the app registration that you created. It's important to note that registered apps have a separate service principal in the specific Microsoft Entra tenant. Registered apps have an OID that's visible in the Azure portal, but the *service principal* has another (different) OID.
334334
Article
335-
To get the OID for the service principal that corresponds to an app registration, you can use the `az ad sp show` command. Specify the Application ID as the parameter. Here's an example of obtaining the OID for the service principal that corresponds to an app registration with App ID = 00001111-aaaa-2222-bbbb-3333cccc4444. Run the following command in the Azure CLI:
335+
To get the OID for the service principal that corresponds to an app registration, you can use the `az ad sp show` command. Specify the Application ID as the parameter. Here's an example of obtaining the OID for the service principal that corresponds to an app registration with App ID = ffffffff-eeee-dddd-cccc-bbbbbbbbbbb0. Run the following command in the Azure CLI:
336336

337337
```azurecli
338338
az ad sp show --id 18218b12-1895-43e9-ad80-6e8fc1ea88ce --query objectId

articles/storage/blobs/storage-auth-abac-attributes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -526,7 +526,7 @@ The following table summarizes the available attributes by source:
526526
> | **Attribute source** | [Environment](../../role-based-access-control/conditions-format.md#environment-attributes) |
527527
> | **Attribute type** | [String](../../role-based-access-control/conditions-format.md#string-comparison-operators) |
528528
> | **Applies to** | For copy operations using the following REST operations, this attribute only applies to the destination storage account, and not the source:<br><br>[Copy Blob](/rest/api/storageservices/copy-blob)<br>[Copy Blob From URL](/rest/api/storageservices/copy-blob-from-url)<br>[Put Blob From URL](/rest/api/storageservices/put-blob-from-url)<br>[Put Block From URL](/rest/api/storageservices/put-block-from-url)<br>[Append Block From URL](/rest/api/storageservices/append-block-from-url)<br>[Put Page From URL](/rest/api/storageservices/put-page-from-url)<br><br>For all other read, write, create, delete, and rename operations, it applies to the storage account that is the target of the operation |
529-
> | **Examples** | `@Environment[Microsoft.Network/privateEndpoints] StringEqualsIgnoreCase '/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/example-group/providers/Microsoft.Network/privateEndpoints/privateendpoint1'`<br/>[Example: Allow read access to a container only from a specific private endpoint](storage-auth-abac-examples.md#example-allow-access-to-a-container-only-from-a-specific-private-endpoint) |
529+
> | **Examples** | `@Environment[Microsoft.Network/privateEndpoints] StringEqualsIgnoreCase '/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/example-group/providers/Microsoft.Network/privateEndpoints/privateendpoint1'`<br/>[Example: Allow read access to a container only from a specific private endpoint](storage-auth-abac-examples.md#example-allow-access-to-a-container-only-from-a-specific-private-endpoint) |
530530
> | **Learn more** | [Use private endpoints for Azure Storage](../common/storage-private-endpoints.md) |
531531
532532
### Snapshot
@@ -555,7 +555,7 @@ The following table summarizes the available attributes by source:
555555
> | **Attribute source** | [Environment](../../role-based-access-control/conditions-format.md#environment-attributes) |
556556
> | **Attribute type** | [String](../../role-based-access-control/conditions-format.md#string-comparison-operators) |
557557
> | **Applies to** | For copy operations using the following REST operations, this attribute only applies to the destination storage account, and not the source:<br><br>[Copy Blob](/rest/api/storageservices/copy-blob)<br>[Copy Blob From URL](/rest/api/storageservices/copy-blob-from-url)<br>[Put Blob From URL](/rest/api/storageservices/put-blob-from-url)<br>[Put Block From URL](/rest/api/storageservices/put-block-from-url)<br>[Append Block From URL](/rest/api/storageservices/append-block-from-url)<br>[Put Page From URL](/rest/api/storageservices/put-page-from-url)<br><br>For all other read, write, create, delete, and rename operations, it applies to the storage account that is the target of the operation |
558-
> | **Examples** | `@Environment[Microsoft.Network/virtualNetworks/subnets] StringEqualsIgnoreCase '/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/example-group/providers/Microsoft.Network/virtualNetworks/virtualnetwork1/subnets/default'`<br/>[Example: Allow access to blobs in specific containers from a specific subnet](storage-auth-abac-examples.md#example-allow-access-to-blobs-in-specific-containers-from-a-specific-subnet) |
558+
> | **Examples** | `@Environment[Microsoft.Network/virtualNetworks/subnets] StringEqualsIgnoreCase '/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/example-group/providers/Microsoft.Network/virtualNetworks/virtualnetwork1/subnets/default'`<br/>[Example: Allow access to blobs in specific containers from a specific subnet](storage-auth-abac-examples.md#example-allow-access-to-blobs-in-specific-containers-from-a-specific-subnet) |
559559
> | **Learn more** | [Subnets](../../virtual-network/concepts-and-best-practices.md) |
560560
561561
### UTC now

articles/storage/queues/queues-auth-abac-attributes.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -149,7 +149,7 @@ The following table summarizes the available attributes by source:
149149
> | **Attribute** | `Microsoft.Network/privateEndpoints` |
150150
> | **Attribute source** | [Environment](../../role-based-access-control/conditions-format.md#environment-attributes) |
151151
> | **Attribute type** | [String](../../role-based-access-control/conditions-format.md#string-comparison-operators) |
152-
> | **Examples** | `@Environment[Microsoft.Network/privateEndpoints] StringEqualsIgnoreCase '/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/example-group/providers/Microsoft.Network/privateEndpoints/privateendpoint1'`<br/>[Example: Allow read access to a container only from a specific private endpoint](../blobs/storage-auth-abac-examples.md#example-allow-access-to-a-container-only-from-a-specific-private-endpoint) |
152+
> | **Examples** | `@Environment[Microsoft.Network/privateEndpoints] StringEqualsIgnoreCase '/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/example-group/providers/Microsoft.Network/privateEndpoints/privateendpoint1'`<br/>[Example: Allow read access to a container only from a specific private endpoint](../blobs/storage-auth-abac-examples.md#example-allow-access-to-a-container-only-from-a-specific-private-endpoint) |
153153
> | **Learn more** | [Use private endpoints for Azure Storage](../common/storage-private-endpoints.md) |
154154
155155
### Queue name
@@ -173,7 +173,7 @@ The following table summarizes the available attributes by source:
173173
> | **Attribute** | `Microsoft.Network/virtualNetworks/subnets` |
174174
> | **Attribute source** | [Environment](../../role-based-access-control/conditions-format.md#environment-attributes) |
175175
> | **Attribute type** | [String](../../role-based-access-control/conditions-format.md#string-comparison-operators) |
176-
> | **Examples** | `@Environment[Microsoft.Network/virtualNetworks/subnets] StringEqualsIgnoreCase '/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/example-group/providers/Microsoft.Network/virtualNetworks/virtualnetwork1/subnets/default'`<br/>[Example: Allow access to blobs in specific containers from a specific subnet](../blobs/storage-auth-abac-examples.md#example-allow-access-to-blobs-in-specific-containers-from-a-specific-subnet) |
176+
> | **Examples** | `@Environment[Microsoft.Network/virtualNetworks/subnets] StringEqualsIgnoreCase '/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/example-group/providers/Microsoft.Network/virtualNetworks/virtualnetwork1/subnets/default'`<br/>[Example: Allow access to blobs in specific containers from a specific subnet](../blobs/storage-auth-abac-examples.md#example-allow-access-to-blobs-in-specific-containers-from-a-specific-subnet) |
177177
> | **Learn more** | [Subnets](../../virtual-network/concepts-and-best-practices.md) |
178178
179179
### UTC now
@@ -192,4 +192,4 @@ The following table summarizes the available attributes by source:
192192

193193
- [Example Azure role assignment conditions](../blobs\storage-auth-abac-examples.md)
194194
- [Azure role assignment condition format and syntax](../../role-based-access-control/conditions-format.md)
195-
- [Troubleshoot Azure role assignment conditions](../../role-based-access-control/conditions-troubleshoot.md)
195+
- [Troubleshoot Azure role assignment conditions](../../role-based-access-control/conditions-troubleshoot.md)

0 commit comments

Comments
 (0)