Skip to content

Commit f639aac

Browse files
committed
make a few minor edits before publish
1 parent 34792a8 commit f639aac

File tree

2 files changed

+9
-7
lines changed

2 files changed

+9
-7
lines changed

articles/storage/common/sas-expiration-policy.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,10 +7,11 @@ author: jimmart-dev
77

88
ms.service: storage
99
ms.topic: how-to
10-
ms.date: 12/02/2022
10+
ms.date: 12/12/2022
1111
ms.author: jammart
1212
ms.reviewer: nachakra
1313
ms.subservice: common
14+
ms.custom: engagement-fy23
1415
---
1516

1617
# Configure an expiration policy for shared access signatures
@@ -52,15 +53,15 @@ To configure a SAS expiration policy in the Azure portal, follow these steps:
5253
1. Locate the setting for **Allow recommended upper limit for shared access signature (SAS) expiry interval**, and set it to **Enabled**.
5354

5455
> [!NOTE]
55-
> If the setting is grayed out and you see the message shown in the image below, then [you will need to rotate both account access keys](#do-i-need-to-rotate-the-account-access-keys-first) before you can set a **Recommended upper limit for SAS expiry interval**:
56+
> If the setting is grayed out and you see the message shown in the image below, then [you will need to rotate both account access keys](#do-i-need-to-rotate-the-account-access-keys-first) before you can set the **Recommended upper limit for SAS expiry interval** values:
5657
>
5758
> :::image type="content" source="media/sas-expiration-policy/configure-sas-expiration-policy-portal-grayed-out.png" alt-text="Screenshot showing the option to configure a SAS expiration policy is grayed out in the Azure portal" lightbox="media/sas-expiration-policy/configure-sas-expiration-policy-portal-grayed-out.png":::
5859
59-
1. Specify the recommended interval for any new shared access signatures that are created on resources in this storage account.
60+
1. Specify the time values under **Recommended upper limit for SAS expiry interval** for the recommended interval for any new shared access signatures that are created on resources in this storage account.
6061

6162
:::image type="content" source="media/sas-expiration-policy/configure-sas-expiration-policy-portal.png" alt-text="Screenshot showing how to configure a SAS expiration policy in the Azure portal" lightbox="media/sas-expiration-policy/configure-sas-expiration-policy-portal.png":::
6263

63-
1. Select the **Save** button to save your changes.
64+
1. Select **Save** to save your changes.
6465

6566
#### [PowerShell](#tab/azure-powershell)
6667

articles/storage/common/storage-account-get-info.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,10 +6,11 @@ services: storage
66
author: jimmart-dev
77

88
ms.author: jammart
9-
ms.date: 12/02/2022
9+
ms.date: 12/12/2022
1010
ms.service: storage
1111
ms.subservice: common
1212
ms.topic: how-to
13+
ms.custom: engagement-fy23
1314
---
1415

1516
# Get storage account configuration information
@@ -173,15 +174,15 @@ az storage account show-connection-string --resource-group <resource-group> --na
173174

174175
## Get the creation time of the account access keys for a storage account
175176

176-
If the creation time of the account access keys for a storage account are null, the keys will need to be rotated before performing configurations or tasks that rely on the keys, such as [configuring a SAS expiration policy](sas-expiration-policy.md). You can get the creation time of the account access keys for a storage account by using the Azure portal, PowerShell, or Azure CLI.
177+
If the creation time of the account access keys for a storage account are null, the keys will need to be rotated before performing configurations or other tasks that rely on them, such as [configuring a SAS expiration policy](sas-expiration-policy.md). You can get the creation time of the account access keys for a storage account by using the Azure portal, PowerShell, or Azure CLI.
177178

178179
# [Azure portal](#tab/portal)
179180

180181
To display the creation time of the account access keys for a storage account in the Azure portal, follow these steps:
181182

182183
1. Navigate to your storage account in the Azure portal.
183184
1. On the **Overview** page, in the **Essentials** section, select the **JSON View** link.
184-
1. For the **API version**, select the most recent version.
185+
1. On the **Resource JSON** page, select the most recent **API version**.
185186
1. In the JSON under *properties* you will see the *keyCreationTime* for *key1* and *key2*.
186187

187188
:::image type="content" source="media/storage-account-get-info/key-creation-time-portal.png" alt-text="Screenshot of the JSON View of a storage account showing one account access key with null values and another with a date and time stamp" lightbox="media/storage-account-get-info/key-creation-time-portal.png":::

0 commit comments

Comments
 (0)