Skip to content

Commit ac0d2ec

Browse files
committed
typos per acrolinx
1 parent 3c2db2c commit ac0d2ec

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

articles/search/search-howto-managed-identities-cosmos-db.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ $readOnlyRoleDefinitionId = "00000000-0000-0000-0000-00000000000"
6464
$scope=$(az cosmosdb show --name $cosmosdbname --resource-group $resourcegroup --query id --output tsv)
6565
```
6666

67-
Define a role asisgnment for the system-assigned identity:
67+
Define a role assignment for the system-assigned identity:
6868

6969
```azurepowershell
7070
az cosmosdb sql role assignment create --account-name $cosmosdbname --resource-group $resourcegroup --role-definition-id $readOnlyRoleDefinitionId --principal-id $sys_principal --scope $scope
@@ -92,7 +92,7 @@ When you're connecting with a system-assigned managed identity, the only change
9292
* For MongoDB collections, add "ApiKind=MongoDb" to the connection string and use a preview REST API.
9393
* For Gremlin graphs, add "ApiKind=Gremlin" to the connection string and use a preview REST API.
9494

95-
Here's an example of how to create a data source to index data from a storage account using the [Create Data Source](/rest/api/searchservice/create-data-source) REST API and a managed identity connection string. The managed identity connection string format is the same for the REST API, .NET SDK, and the Azure portal.
95+
Here's an example of how to create a data source to index data from a Cosmos DB account using the [Create Data Source](/rest/api/searchservice/create-data-source) REST API and a managed identity connection string. The managed identity connection string format is the same for the REST API, .NET SDK, and the Azure portal.
9696

9797
```http
9898
POST https://[service name].search.windows.net/datasources?api-version=2023-11-01

articles/search/search-security-enable-roles.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ If you want to use Azure role-based access control for connections into Azure AI
1818

1919
Role-based access for data plane operations is optional, but recommended. The alternative is [key-based authentication](search-security-api-keys.md), which is the default.
2020

21-
Roles for service administration (control plane) are built-in and can't be enabled or disabled.
21+
Roles for service administration (control plane) are built in and can't be enabled or disabled.
2222

2323
> [!NOTE]
2424
> *Data plane* refers to operations against the search service endpoint, such as indexing or queries, or any other operation specified in the [Search REST API](/rest/api/searchservice/) or equivalent Azure SDK client libraries.

0 commit comments

Comments
 (0)