Skip to content

Commit c7d59fc

Browse files
Merge pull request #275081 from normesta/networking-2
Updating the networking docs:
2 parents 7d19fb3 + 07b0199 commit c7d59fc

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

articles/storage/common/storage-network-security.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: normesta
66
ms.service: azure-storage
77
ms.subservice: storage-common-concepts
88
ms.topic: how-to
9-
ms.date: 08/15/2023
9+
ms.date: 05/09/2024
1010
ms.author: normesta
1111
ms.reviewer: santoshc
1212
ms.custom: devx-track-azurepowershell, devx-track-azurecli, build-2023, engagement
@@ -578,9 +578,9 @@ You can grant access to trusted Azure services by creating a network rule except
578578

579579
<a id="trusted-access-resources-in-subscription"></a>
580580

581-
### Trusted access for resources registered in your subscription
581+
### Trusted access for resources registered in your Microsoft Entra tenant
582582

583-
Resources of some services that are registered in your subscription can access your storage account *in the same subscription* for selected operations, such as writing logs or running backups. The following table describes each service and the allowed operations.
583+
Resources of some services can access your storage account for selected operations, such as writing logs or running backups. Those services must be registered in a subscription that is located in the same Microsoft Entra tenant as your storage account. The following table describes each service and the allowed operations.
584584

585585
| Service | Resource provider name | Allowed operations |
586586
|:------------------------ |:-------------------------- |:---------------------------------- |

includes/storage-account-key-note-include.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,4 +19,4 @@ Storage account access keys provide full access to the configuration of a storag
1919
>
2020
> To protect an Azure Storage account with Microsoft Entra Conditional Access policies, you must disallow Shared Key authorization for the storage account.
2121
>
22-
> If you have disabled shared key access and you are seeing Shared Key authorization reported in the diagnostic logs, this indicates that trusted access is being used to access storage. For more details, see [Trusted access for resources registered in your subscription](../articles/storage/common/storage-network-security.md#trusted-access-for-resources-registered-in-your-subscription).
22+
> If you have disabled shared key access and you are seeing Shared Key authorization reported in the diagnostic logs, this indicates that trusted access is being used to access storage. For more details, see [Trusted access for resources registered in your Microsoft Entra tenant](../articles/storage/common/storage-network-security.md#trusted-access-for-resources-registered-in-your-microsoft-entra-tenant).

0 commit comments

Comments
 (0)