Skip to content

Commit 477769f

Browse files
committed
more edits
1 parent ee13169 commit 477769f

1 file changed

Lines changed: 3 additions & 3 deletions

File tree

articles/storage/files/files-managed-identities.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -286,13 +286,13 @@ To prepare your client VM or Windows device to authenticate by using a managed i
286286

287287
Before you can mount the file share by using the managed identity, refresh the authentication credentials and specify your storage account endpoint. To copy your storage account URI, go to the storage account in the Azure portal and then select **Settings** > **Endpoints** from the service menu. Be sure to copy the entire URI including the trailing slash: `https://<storage-account-name>.file.core.windows.net/`
288288

289+
For a system assigned managed identity, run the following command to get an OAuth token, insert it in the Kerberos cache, and auto-refresh when the token is close to expiration. You can optionally omit the `refresh`.
290+
289291
```powershell
290292
AzFilesSmbMIClient.exe refresh --uri https://<storage-account-name>.file.core.windows.net/
291293
```
292294

293-
This command gets an OAuth token and inserts it in the Kerberos cache. It auto-refreshes when the token is close to expiration. You can optionally omit the `refresh`.
294-
295-
If your Windows VM has both user assigned and system assigned managed identities configured, use the following command to specify the user assigned managed identity. Replace `<client-id>` with the Client ID of the managed identity.
295+
For a user assigned managed identity, you need to specify the Client ID. Replace `<client-id>` with the Client ID of the managed identity.
296296

297297
```powershell
298298
AzFilesSmbMIClient.exe refresh --uri https://<storage-account-name>.file.core.windows.net/ --clientId <client-id>

0 commit comments

Comments
 (0)