You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/postgresql/flexible-server/concepts-identity.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,7 +41,7 @@ There are two types of managed identities:
41
41
42
42
-**User-assigned**. You may also create a managed identity as a standalone Azure resource. You can create a user-assigned managed identity and assign it to one or more Azure Resources. When you enable a user-assigned managed identity:
43
43
- A service principal of a special type is created in Microsoft Entra ID for the identity. The service principal is managed separately from the resources that use it.
44
-
-User-assigned identities can be used by multiple resources.
44
+
-Multiple resources can utilize user-assigned identities.
45
45
- You authorize the managed identity to have access to one or more services.
46
46
47
47
@@ -67,7 +67,7 @@ Follow these steps to enable System Assigned Managed Identity on your Azure Data
67
67
68
68
## ARM template
69
69
70
-
Use below ARM template to enable system assigned managed identity. You can use the 2023-06-01-preview or the latest available API.
70
+
Here is the ARM template to enable system assigned managed identity. You can use the 2023-06-01-preview or the latest available API.
71
71
72
72
```json
73
73
{
@@ -85,7 +85,7 @@ Use below ARM template to enable system assigned managed identity. You can use t
85
85
}
86
86
```
87
87
88
-
Use below ARM template to disable system assigned managed identity
88
+
To disable system assigned managed identity change the type to **None**
0 commit comments