Skip to content

Commit d0a5ff4

Browse files
authored
Merge pull request #191160 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 4c6bf67 + 4f052db commit d0a5ff4

File tree

4 files changed

+8
-5
lines changed

4 files changed

+8
-5
lines changed

articles/cognitive-services/Computer-vision/includes/quickstarts-sdk/go-sdk.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.author: pafarley
1616

1717
Use the OCR client library to read printed and handwritten text from images.
1818

19-
[Reference documentation](https://godoc.org/github.com/Azure/azure-sdk-for-go/services/cognitiveservices/v2.1/computervision) | [Library source code](https://github.com/Azure/azure-sdk-for-go/tree/master/services/cognitiveservices/v2.1/computervision) | [Package](https://github.com/Azure/azure-sdk-for-go)
19+
[Reference documentation](https://godoc.org/github.com/Azure/azure-sdk-for-go/services/cognitiveservices/v2.1/computervision) | [Library source code](github.com/Azure/azure-sdk-for-go/services/cognitiveservices/v2.1/computervision) | [Package](https://github.com/Azure/azure-sdk-for-go)
2020

2121
## Prerequisites
2222

articles/cognitive-services/Custom-Vision-Service/includes/quickstarts/python-tutorial.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -58,6 +58,8 @@ Create variables for your resource's Azure endpoint and subscription keys.
5858
>
5959
> You can find the prediction resource ID on the resource's **Properties** tab in the Azure portal, listed as **Resource ID**.
6060
>
61+
> You also can go to https://www.customvision.ai/. After you sign in, select the **Settings** icon at the top right. On the **Setting** pages, you can get all the keys, resource ID, and endpoints.
62+
>
6163
> Remember to remove the keys from your code when you're done, and never post them publicly. For production, consider using a secure way of storing and accessing your credentials. For more information, see the Cognitive Services [security](../../../cognitive-services-security.md) article.
6264
6365
## Object model

articles/storage/blobs/authorize-access-azure-active-directory.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.subservice: common
1414

1515
# Authorize access to blobs using Azure Active Directory
1616

17-
Azure Storage supports using Azure Active Directory (Azure AD) to authorize requests to blob data. With Azure AD, you can use Azure role-based access control (Azure RBAC) to grant permissions to a security principal, which may be a user, group, or application service principal. The security principal is authenticated by Azure AD to return an OAuth 2.0 token. The token can then be used to authorize a request against the Blob service.
17+
Azure Storage supports using Azure Active Directory (Azure AD) to authorize requests to blob data. With Azure AD, you can use Azure role-based access control (Azure RBAC) to grant permissions to a security principal, which may be a user, group, or application service principal. The security principal is authenticated by Azure AD to return an OAuth 2.0 token. The token can then be used to authorize a request against the Blob service. Note that this is only supported for API versions 2017-11-09 and later. For more information, see [Versioning for the Azure Storage services](/rest/api/storageservices/versioning-for-the-azure-storage-services#specifying-service-versions-in-requests).
1818

1919
Authorizing requests against Azure Storage with Azure AD provides superior security and ease of use over Shared Key authorization. Microsoft recommends using Azure AD authorization with your blob applications when possible to assure access with minimum required privileges.
2020

articles/storage/files/storage-troubleshoot-windows-file-connection-problems.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -84,8 +84,9 @@ To use the `Test-NetConnection` cmdlet, the Azure PowerShell module must be inst
8484
$resourceGroupName = "<your-resource-group-name>"
8585
$storageAccountName = "<your-storage-account-name>"
8686
87-
# This command requires you to be logged into your Azure account, run Login-AzAccount if you haven't
88-
# already logged in.
87+
# This command requires you to be logged into your Azure account and set the subscription your storage account is under, run:
88+
# Connect-AzAccount -SubscriptionId ‘xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx’
89+
# if you haven't already logged in.
8990
$storageAccount = Get-AzStorageAccount -ResourceGroupName $resourceGroupName -Name $storageAccountName
9091
9192
# The ComputerName, or host, is <storage-account>.file.core.windows.net for Azure Public Regions.
@@ -542,4 +543,4 @@ az storage account keys renew \
542543
---
543544

544545
## Need help? Contact support.
545-
If you still need help, [contact support](https://portal.azure.com/?#blade/Microsoft_Azure_Support/HelpAndSupportBlade) to get your problem resolved quickly.
546+
If you still need help, [contact support](https://portal.azure.com/?#blade/Microsoft_Azure_Support/HelpAndSupportBlade) to get your problem resolved quickly.

0 commit comments

Comments
 (0)