Skip to content

Commit e6b7ed6

Browse files
committed
Updating an article
1 parent a8d3297 commit e6b7ed6

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/storage/common/storage-network-security.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: storage
55
author: normesta
66
ms.service: storage
77
ms.topic: how-to
8-
ms.date: 02/16/2022
8+
ms.date: 03/12/2022
99
ms.author: normesta
1010
ms.reviewer: santoshc
1111
ms.subservice: common
@@ -634,7 +634,7 @@ You can grant access to trusted Azure services by creating a network rule except
634634
When you grant access to trusted Azure services, you grant the following types of access:
635635

636636
- Trusted access for select operations to resources that are registered in your subscription.
637-
- Trusted access to resources based on system-assigned managed identity.
637+
- Trusted access to resources based on a managed identity.
638638

639639
<a id="trusted-access-resources-in-subscription"></a>
640640

@@ -658,13 +658,13 @@ Resources of some services, **when registered in your subscription**, can access
658658

659659
<a id="trusted-access-system-assigned-managed-identity"></a>
660660

661-
### Trusted access based on system-assigned managed identity
661+
### Trusted access based on a managed identity
662662

663663
The following table lists services that can have access to your storage account data if the resource instances of those services are given the appropriate permission.
664664

665-
If your account does not have the hierarchical namespace feature enabled on it, you can grant permission, by explicitly assigning an Azure role to the [system-assigned managed identity](../../active-directory/managed-identities-azure-resources/overview.md) for each resource instance. In this case, the scope of access for the instance corresponds to the Azure role assigned to the managed identity.
665+
If your account does not have the hierarchical namespace feature enabled on it, you can grant permission, by explicitly assigning an Azure role to the [managed identity](../../active-directory/managed-identities-azure-resources/overview.md) for each resource instance. In this case, the scope of access for the instance corresponds to the Azure role assigned to the managed identity.
666666

667-
You can use the same technique for an account that has the hierarchical namespace feature enable on it. However, you don't have to assign an Azure role if you add the system-assigned managed identity to the access control list (ACL) of any directory or blob contained in the storage account. In that case, the scope of access for the instance corresponds to the directory or file to which the system-assigned managed identity has been granted access. You can also combine Azure roles and ACLs together. To learn more about how to combine them together to grant access, see [Access control model in Azure Data Lake Storage Gen2](../blobs/data-lake-storage-access-control-model.md).
667+
You can use the same technique for an account that has the hierarchical namespace feature enable on it. However, you don't have to assign an Azure role if you add the managed identity to the access control list (ACL) of any directory or blob contained in the storage account. In that case, the scope of access for the instance corresponds to the directory or file to which the managed identity has been granted access. You can also combine Azure roles and ACLs together. To learn more about how to combine them together to grant access, see [Access control model in Azure Data Lake Storage Gen2](../blobs/data-lake-storage-access-control-model.md).
668668

669669
> [!TIP]
670670
> The recommended way to grant access to specific resources is to use resource instance rules. To grant access to specific resource instances, see the [Grant access from Azure resource instances (preview)](#grant-access-specific-instances) section of this article.

0 commit comments

Comments
 (0)