Skip to content

Commit fcb7419

Browse files
committed
Update concepts-identity.md
1 parent 8a0fad9 commit fcb7419

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/postgresql/flexible-server/concepts-identity.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ There are two types of managed identities:
4141

4242
- **User-assigned**. You may also create a managed identity as a standalone Azure resource. You can create a user-assigned managed identity and assign it to one or more Azure Resources. When you enable a user-assigned managed identity:
4343
- A service principal of a special type is created in Microsoft Entra ID for the identity. The service principal is managed separately from the resources that use it.
44-
- User-assigned identities can be used by multiple resources.
44+
- Multiple resources can utilize user-assigned identities.
4545
- You authorize the managed identity to have access to one or more services.
4646

4747

@@ -67,7 +67,7 @@ Follow these steps to enable System Assigned Managed Identity on your Azure Data
6767

6868
## ARM template
6969

70-
Use below ARM template to enable system assigned managed identity. You can use the 2023-06-01-preview or the latest available API.
70+
Here is the ARM template to enable system assigned managed identity. You can use the 2023-06-01-preview or the latest available API.
7171

7272
```json
7373
{
@@ -85,7 +85,7 @@ Use below ARM template to enable system assigned managed identity. You can use t
8585
}
8686
```
8787

88-
Use below ARM template to disable system assigned managed identity
88+
To disable system assigned managed identity change the type to **None**
8989

9090
```json
9191
{

0 commit comments

Comments
 (0)