Skip to content

Commit 94dc69b

Browse files
committed
fixed grammar
1 parent b406823 commit 94dc69b

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/azure-arc/servers/managed-identity-authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ The system environment variable **IDENTITY_ENDPOINT** is used to discover the id
4040
- On Linux, you must be a member of the **himds** group.
4141
- A server connected and registered with Azure Arc-enabled servers.
4242
- You are a member of the [Owner group](../../role-based-access-control/built-in-roles.md#owner) in the subscription or resource group, in order to perform required resource creation and role management steps.
43-
- An Azure Key Vault to store and retrieve your credential. and assign the Azure Arc identity access to the KeyVault.
43+
- An Azure Key Vault to store and retrieve your credential, and assign the Azure Arc identity access to the KeyVault.
4444

4545
- If you don't have a Key Vault created, see [Create Key Vault](../../active-directory/managed-identities-azure-resources/tutorial-windows-vm-access-nonaad.md#create-a-key-vault-).
4646
- To configure access by the managed identity used by the server, see [Grant access for Linux](../../active-directory/managed-identities-azure-resources/tutorial-linux-vm-access-nonaad.md#grant-access) or [Grant access for Windows](../../active-directory/managed-identities-azure-resources/tutorial-windows-vm-access-nonaad.md#grant-access). For step number 5, you are going to enter the name of the Azure Arc-enabled server. To complete this using PowerShell, see [Assign an access policy using PowerShell](../../key-vault/general/assign-access-policy-powershell.md).

0 commit comments

Comments
 (0)