Skip to content

Commit 48f2fc4

Browse files
Update articles/deployment-environments/how-to-configure-extensibility-model-custom-image.md
Co-authored-by: RoseHJM <[email protected]>
1 parent d113a10 commit 48f2fc4

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

articles/deployment-environments/how-to-configure-extensibility-model-custom-image.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -505,7 +505,7 @@ In this configuration, ADE uses the Managed Identity for the PET, whether system
505505
> This role assignment has to be made for every project environment type. It can be automated through the Azure CLI.
506506
507507
> [!Tip]
508-
> If your ACR uses [Microsoft Entra attribute-based access control (ABAC) for repository permissions](https://learn.microsoft.com/en-us/azure/container-registry/container-registry-rbac-abac-repository-permissions), you might need to make additional role assignments such as `Container Registry Repository Reader` to the PET identity.
508+
> If your ACR uses Microsoft Entra attribute-based access control (ABAC) for repository permissions, you may need to make additional role assignments like `Container Registry Repository Reader` to the PET identity. For more information, see [Microsoft Entra ABAC for repository permissions](/azure/container-registry/container-registry-rbac-abac-repository-permissions).
509509
510510
511511
When you're ready to push your image to your registry, run the following command:

0 commit comments

Comments
 (0)