Skip to content

Commit dc9be3f

Browse files
Merge pull request #223655 from FlorianBorn71/RemoveRemoteRenderingFromTrustedAccessList
Remove Azure Remote Rendering service from the list of trusted access…
2 parents 0af9770 + 3f2ffde commit dc9be3f

File tree

1 file changed

+0
-1
lines changed

1 file changed

+0
-1
lines changed

articles/storage/common/storage-network-security.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -666,7 +666,6 @@ You can use the same technique for an account that has the hierarchical namespac
666666
| Azure Media Services | Microsoft.Media/mediaservices | Allows access to storage accounts through Media Services. |
667667
| Azure Migrate | Microsoft.Migrate/migrateprojects | Allows access to storage accounts through Azure Migrate. |
668668
| Microsoft Purview | Microsoft.Purview/accounts | Allows Microsoft Purview to access storage accounts. |
669-
| Azure Remote Rendering | Microsoft.MixedReality/remoteRenderingAccounts | Allows access to storage accounts through Remote Rendering. |
670669
| Azure Site Recovery | Microsoft.RecoveryServices/vaults | Allows access to storage accounts through Site Recovery. |
671670
| Azure SQL Database | Microsoft.Sql | Allows [writing](/azure/azure-sql/database/audit-write-storage-account-behind-vnet-firewall) audit data to storage accounts behind firewall. |
672671
| Azure Synapse Analytics | Microsoft.Sql | Allows import and export of data from specific SQL databases using the COPY statement or PolyBase (in dedicated pool), or the `openrowset` function and external tables in serverless pool. [Learn more](/azure/azure-sql/database/vnet-service-endpoint-rule-overview). |

0 commit comments

Comments
 (0)