Skip to content

Commit 942a860

Browse files
committed
Learn Editor: Update how-to-setup-rbac.md
1 parent 3a60bd1 commit 942a860

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/cosmos-db/how-to-setup-rbac.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -451,16 +451,16 @@ When constructing the [REST API authorization header](/rest/api/cosmos-db/access
451451

452452
## Use data explorer
453453

454-
The use of Azure Cosmos DB role-based access control within Data Explorer (either exposed in the Azure Portal or at [https://cosmos.azure.com] (https://cosmos.azure.com)) is governed by the **Enable Entra ID RBAC** setting. You can access this setting via the "wheel" icon at the upper right-hand side of the Data Explorer interface.
454+
The use of Azure Cosmos DB role-based access control within Data Explorer (either exposed in the Azure Portal or at [https://cosmos.azure.com](https://cosmos.azure.com)) is governed by the **Enable Entra ID RBAC** setting. You can access this setting via the "wheel" icon at the upper right-hand side of the Data Explorer interface.
455455

456456
The setting has three possible values:
457-
- **Automatic (default)**: In this mode, role-based access control will be automatically used if the account has [disabled the use of keys] (#disable-local-auth). Otherwise, Data Explorer will use account keys for data requests.
457+
- **Automatic (default)**: In this mode, role-based access control will be automatically used if the account has [disabled the use of keys](#disable-local-auth). Otherwise, Data Explorer will use account keys for data requests.
458458

459459
- **True**: In this mode, role-based access will always be used for Data Explorer data requests. If the account has not been enabled for role-based access , then the requests will fail.
460460

461461
- **False**: In this mode, account keys will always be used for Data Explorer data requests. If the account has disabled the use of keys, then the requests will fail.
462462

463-
When using modes that enable role-based access, please ensure that the signed in identity has been [assigned with proper role definitions] (#role-assignments) to enable data access.
463+
When using modes that enable role-based access, please ensure that the signed in identity has been [assigned with proper role definitions](#role-assignments) to enable data access.
464464

465465
Also note that changing the mode to one that uses account keys may trigger a request to fetch the primary key on behalf of the identity that is signed in.
466466

0 commit comments

Comments
 (0)