Skip to content

Commit fff79ab

Browse files
committed
PR review
1 parent 47d4d73 commit fff79ab

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/managed-grafana/how-to-authentication-permissions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ To enable a system-assigned managed identity:
2828
1. In the **System assigned (Preview)** tab, set the status for **System assigned** to **On**.
2929

3030
> [!NOTE]
31-
> Assigning multiple managed identities to a single Azure Managed Grafana resource isn't possible. If a user-assigned managed identity is already assigned to the Azure Managed Grafana resource, you must first remove the assignment from the **System assigned (Preview)** tab before you can enable the system-assigned managed identity.
31+
> Assigning multiple managed identities to a single Azure Managed Grafana resource isn't possible. If a user-assigned managed identity is already assigned to the Azure Managed Grafana resource, you must first remove the assignment from the **User assigned (Preview)** tab before you can enable the system-assigned managed identity.
3232

3333
> [!NOTE]
3434
> Disabling a system-assigned managed identity is irreversible. Each time you enable a system-assigned managed identity, Azure creates a new identity.
@@ -62,7 +62,7 @@ To assign a user-assigned managed identity:
6262
> [!NOTE]
6363
> You can only assign one user-assigned managed identity per Azure Managed Grafana instance.
6464

65-
### Use a service principal
65+
## Use a service principal
6666

6767
Azure Managed Grafana can also access data sources using service principals for authentication, using client IDs and secrets.
6868

0 commit comments

Comments
 (0)