Skip to content

Commit c2853ae

Browse files
committed
tweaks before pushing for preview link
Signed-off-by: Hannah Hunter <[email protected]>
1 parent 41029ee commit c2853ae

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

articles/azure-functions/durable/durable-task-scheduler/durable-task-scheduler-identity.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ You can grant the following Durable Task Scheduler related roles to an identity:
1919
| **Durable Task Data Reader** | Role to read all Durable Task Scheduler data. Assign this role if you only need a list of orchestrations and entities payloads. |
2020

2121
> [!NOTE]
22-
> Most Durable Functions apps require the *Durable Task Data Contributor* role.
22+
> Most computes require the *Durable Task Data Contributor* role.
2323
2424
In this article, you learn how to grant permissions to an identity resource and configure your compute app to use the identity for access to schedulers and task hubs.
2525

@@ -133,6 +133,7 @@ Now that the identity has the required RBAC to access Durable Task Scheduler, yo
133133
::: zone pivot="az-cli"
134134
135135
1. Get resource ID of manage identity.
136+
136137
```azurecli
137138
resource_id=$(az resource show --resource-group RESOURCE_GROUP --name MANAGED_IDENTITY_NAME --resource-type Microsoft.ManagedIdentity/userAssignedIdentities --query id --output tsv)
138139
```

0 commit comments

Comments
 (0)