Skip to content

Commit fb29f3d

Browse files
authored
Merge pull request #124986 from ArieHein/Spelling-Wave-6
Spelling Fixes - Wave 6
2 parents b2b16c6 + 04badf4 commit fb29f3d

7 files changed

+7
-7
lines changed

articles/azure-app-configuration/concept-customer-managed-keys.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ After these resources are configured, use the following steps so that the Azure
6767
az appconfig identity assign --name contoso-app-config --resource-group contoso-resource-group --identities [system]
6868
```
6969
70-
The output of this command includes the principal ID (`"principalId"`) and tenant ID (`"tenandId"`) of the system-assigned identity. These IDs will be used to grant the identity access to the managed key.
70+
The output of this command includes the principal ID (`"principalId"`) and tenant ID (`"tenantId"`) of the system-assigned identity. These IDs will be used to grant the identity access to the managed key.
7171
7272
```json
7373
{

articles/azure-app-configuration/concept-enable-rbac.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ All requests for [control plane](../azure-resource-manager/management/control-pl
3232

3333
- **App Configuration Contributor**: Use this role to manage only App Configuration resource. This role does not grant access to manage other Azure resources. It grants access to the resource's access keys. While the App Configuration data can be accessed using access keys, this role doesn't grant direct access to the data using Microsoft Entra ID. It grants access to recover deleted App Configuration resource but not to purge them. To purge deleted App Configuration resources, use the **Contributor** role.
3434
- **App Configuration Reader**: Use this role to read only App Configuration resource. This role does not grant access to read other Azure resources. It doesn't grant access to the resource's access keys, nor to the data stored in App Configuration.
35-
- **Contributor** or **Owner**: Use this role to manage the App Configuration resource while also be able to manage other Azure resources. This role is a privileged adminstrator role. It grants access to the resource's access keys. While the App Configuration data can be accessed using access keys, this role doesn't grant direct access to the data using Microsoft Entra ID.
35+
- **Contributor** or **Owner**: Use this role to manage the App Configuration resource while also be able to manage other Azure resources. This role is a privileged administrator role. It grants access to the resource's access keys. While the App Configuration data can be accessed using access keys, this role doesn't grant direct access to the data using Microsoft Entra ID.
3636
- **Reader**: Use this role to read App Configuration resource while also be able to read other Azure resources. This role doesn't grant access to the resource's access keys, nor to the data stored in App Configuration.
3737

3838
> [!NOTE]

articles/azure-app-configuration/feature-management-dotnet-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1401,7 +1401,7 @@ builder.Services.AddSingleton<ITelemetryInitializer, TargetingTelemetryInitializ
14011401
> [!NOTE]
14021402
> To ensure that `TargetingTelemetryInitializer` works as expected, the `TargetingHttpContextMiddleware` described below should be used.
14031403

1404-
To enable persistance of targeting context in the current activity, you can use the [`TargetingHttpContextMiddleware`](https://github.com/microsoft/FeatureManagement-Dotnet/blob/preview/src/Microsoft.FeatureManagement.AspNetCore/TargetingHttpContextMiddleware.cs).
1404+
To enable persistence of targeting context in the current activity, you can use the [`TargetingHttpContextMiddleware`](https://github.com/microsoft/FeatureManagement-Dotnet/blob/preview/src/Microsoft.FeatureManagement.AspNetCore/TargetingHttpContextMiddleware.cs).
14051405

14061406
``` C#
14071407
app.UseMiddleware<TargetingHttpContextMiddleware>();

articles/azure-app-configuration/feature-management-python-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -276,7 +276,7 @@ This strategy for rolling out a feature is built in to the library through the i
276276

277277
### Targeting a user
278278

279-
Either a user can be specified directly in the `is_enabled` call or a `TargetingContxt` can be used to specify the user and optional group.
279+
Either a user can be specified directly in the `is_enabled` call or a `TargetingContext` can be used to specify the user and optional group.
280280

281281
```python
282282
# Directly specifying the user

articles/azure-app-configuration/howto-feature-filters.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ You can create custom feature filters that enable features based on your specifi
4646
1. Feature filters can optionally use parameters for configurable conditions. In this example, you use a **Percentage** parameter and set its value to **50**, which tells the filter to enable the feature flag with a 50% chance.
4747

4848
> [!div class="mx-imgBorder"]
49-
> ![Screenshot of the Azure portal, adding paramters for the custom filter.](./media/feature-filters/add-custom-filter-parameter.png)
49+
> ![Screenshot of the Azure portal, adding parameters for the custom filter.](./media/feature-filters/add-custom-filter-parameter.png)
5050
5151
1. Select **Add** to save the new feature filter and return to the **Edit feature flag** screen.
5252

articles/azure-app-configuration/push-kv-github-action.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@ jobs:
125125
az appconfig kv import --endpoint <your-app-configuration-store-endpoint> --auth-mode login -s file --path appsettings.json --format json --yes
126126
```
127127

128-
For more information about Azure App Configuration CLI import commands, see the [Azure AppConfifguration CLI documentation.](/cli/azure/appconfig/kv#az-appconfig-kv-import)
128+
For more information about Azure App Configuration CLI import commands, see the [Azure AppConfiguration CLI documentation.](/cli/azure/appconfig/kv#az-appconfig-kv-import)
129129

130130
### Use a dynamic label on import
131131

articles/azure-app-configuration/rest-api-authorization-azure-ad.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ Roles contain a list of actions that users assigned to that role can perform. Az
3232
- `Microsoft.AppConfiguration/configurationStores/keyValues/write`: This action allows write access to App Configuration key-value resources.
3333
- `Microsoft.AppConfiguration/configurationStores/keyValues/delete`: This action allows App Configuration key-value resources to be deleted. Note that deleting a resource returns the key-value that was deleted.
3434
- `Microsoft.AppConfiguration/configurationStores/snapshots/read`: This action allows read access to App Configuration snapshot resources, as well as any key-values contained within snapshots.
35-
- `Microsoft.AppConfiguration/configurationStores/snapshots/write`: This action allows write access to App Configuration snapshot resouces.
35+
- `Microsoft.AppConfiguration/configurationStores/snapshots/write`: This action allows write access to App Configuration snapshot resources.
3636
- `Microsoft.AppConfiguration/configurationStores/snapshots/archive/action`: This action allows access to archive and recover App Configuration snapshot resources.
3737

3838
## Error

0 commit comments

Comments
 (0)