Skip to content

Commit be54688

Browse files
authored
Update roles-for-resource-and-storage.md to prevent 403 error
The update to the documentation is to add the missing RBAC role for the current user, without this after creating a new custom entity recognition project it will fail with error 403.
1 parent 403a56b commit be54688

File tree

1 file changed

+11
-0
lines changed

1 file changed

+11
-0
lines changed

articles/ai-services/language-service/custom-named-entity-recognition/includes/roles-for-resource-and-storage.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -37,5 +37,16 @@ Use the following steps to set the required roles for your Language resource and
3737
5. Select **Select members**
3838
6. Select your subscription, and **Language** as the managed identity. You can search for user names in the **Select** field.
3939

40+
### Roles for your user
41+
> [!IMPORTANT]
42+
> If you skip this step you will have a 403 error when trying to connect to your custom project, it is important that your current user has this role to access storage account blob data even if you are the owner of the storage account.
43+
>
44+
1. Go to your storage account page in the [Azure portal](https://portal.azure.com/).
45+
2. Select **Access Control (IAM)** in the left navigation menu.
46+
3. Select **Add** to **Add Role Assignments**, and choose the **Storage blob data contributor** role on the storage account.
47+
4. Within **Assign access to**, select **User, group, or service principal**.
48+
5. Select **Select members**
49+
6. Select your User. You can search for user names in the **Select** field.
50+
4051
> [!IMPORTANT]
4152
> If you have a virtual network or private endpoint, be sure to select **Allow Azure services on the trusted services list to access this storage account** in the Azure portal.

0 commit comments

Comments
 (0)