Skip to content

Commit 67853b2

Browse files
committed
Fix em-dash usage
1 parent 1320242 commit 67853b2

7 files changed

Lines changed: 16 additions & 16 deletions

File tree

learn-pr/wwl-azure/guided-project-share-files-securely/includes/1-introduction.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
This guided project focuses on sharing files securely using Azure Blob Storage, shared access signatures (SAS), and lifecycle management.
22

3-
A shared access signature (SAS) is a token that grants temporary, scoped access to a blob or container without sharing your storage account keys. When you generate a SAS from a stored access policy, the policy acts as a central control pointyou can revoke all linked tokens instantly by deleting the policy.
3+
A shared access signature (SAS) is a token that grants temporary, scoped access to a blob or container without sharing your storage account keys. When you generate a SAS from a stored access policy, the policy acts as a central control pointyou can revoke all linked tokens instantly by deleting the policy.
44

55
## Scenario
66

7-
Your internal finance team needs to share monthly reports with an external partner for a short review window. You upload the report to a private container, set up a stored access policy, generate a SAS link from that policy, and then test both sides of the access modelconfirming the partner can access the file with the SAS while anonymous access stays blocked. When the review is complete, you revoke access by deleting the policy and configure a lifecycle rule to automatically clean up shared files.
7+
Your internal finance team needs to share monthly reports with an external partner for a short review window. You upload the report to a private container, set up a stored access policy, generate a SAS link from that policy, and then test both sides of the access modelconfirming the partner can access the file with the SAS while anonymous access stays blocked. When the review is complete, you revoke access by deleting the policy and configure a lifecycle rule to automatically clean up shared files.
88

99
- Exercise 1 - Create a storage account, private container, and upload a file.
1010
- Exercise 2 - Create a stored access policy and generate a SAS link.

learn-pr/wwl-azure/guided-project-share-files-securely/includes/2-exercise-create-storage-upload-file.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ Set up the foundation for blob storage. The storage account holds your blob cont
5353
> **Validation step:** Verify the storage account is deployed. Confirm the storage account name and region match your configuration.
5454
5555
> [!NOTE]
56-
> Each exercise includes validation steps like this one. Track your results as you goyou'll review them all in the validation unit at the end of this module.
56+
> Each exercise includes validation steps like this one. Track your results as you goyou'll review them all in the validation unit at the end of this module.
5757
5858
## Task 3: Create the private container
5959

learn-pr/wwl-azure/guided-project-share-files-securely/includes/3-exercise-create-access-policy.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ This guided project consists of the following exercises:
66
- Revoke partner access
77
- Configure lifecycle management
88

9-
In this exercise, you create a stored access policy on the container and generate a SAS URL from it. The stored access policy acts as a control pointif you need to revoke access later, you can delete the policy instead of tracking down individual tokens.
9+
In this exercise, you create a stored access policy on the container and generate a SAS URL from it. The stored access policy acts as a control pointif you need to revoke access later, you can delete the policy instead of tracking down individual tokens.
1010

1111
This exercise includes the following tasks:
1212

@@ -15,7 +15,7 @@ This exercise includes the following tasks:
1515

1616
**Outcome:** A stored access policy on the container and a SAS URL generated from that policy.
1717

18-
Instead of generating a one-off SAS token with its own permissions and expiry, you'll create a **stored access policy** first. A stored access policy defines the rules (permissions and expiry) at the container level. Any SAS token generated from that policy inherits those rulesand if you delete the policy later, every SAS token linked to it is instantly revoked. This is the enterprise approach to SAS management.
18+
Instead of generating a one-off SAS token with its own permissions and expiry, you'll create a **stored access policy** first. A stored access policy defines the rules (permissions and expiry) at the container level. Any SAS token generated from that policy inherits those rulesand if you delete the policy later, every SAS token linked to it is instantly revoked. This is the enterprise approach to SAS management.
1919

2020
## Task 1: Create a stored access policy
2121

@@ -55,7 +55,7 @@ Now generate a SAS token that inherits its rules from the policy you just create
5555
9. Copy the **Blob SAS URL** and save it securely. You'll use this URL in the next exercise.
5656

5757
> [!NOTE]
58-
> Notice that the **Permissions** and **Expiry** fields are grayed outthey're controlled by the policy, not set individually. This is the key advantage: all tokens share the same rules, and revoking the policy revokes them all.
58+
> Notice that the **Permissions** and **Expiry** fields are grayed outthey're controlled by the policy, not set individually. This is the key advantage: all tokens share the same rules, and revoking the policy revokes them all.
5959
6060
> [!NOTE]
6161
> **Validation step:** Confirm the SAS URL is generated and the permissions came from the stored access policy.

learn-pr/wwl-azure/guided-project-share-files-securely/includes/4-exercise-test-partner-access.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ This guided project consists of the following exercises:
66
- Revoke partner access
77
- Configure lifecycle management
88

9-
In this exercise, you test both sides of the access modelfirst confirming that direct access is blocked, then verifying that the SAS URL grants access to the file. This demonstrates the security boundary between public access and token-based access.
9+
In this exercise, you test both sides of the access modelfirst confirming that direct access is blocked, then verifying that the SAS URL grants access to the file. This demonstrates the security boundary between public access and token-based access.
1010

1111
This exercise includes the following tasks:
1212

@@ -39,7 +39,7 @@ Now verify that the policy-based SAS token grants access to the same file that w
3939
1. In the same incognito window, paste the SAS URL into the address bar and press **Enter**.
4040
2. Confirm the file content displays in the browser. Because this is a text file, the browser renders it directly instead of downloading it.
4141
3. Note that you are not signed in but still have access due to the SAS token.
42-
4. Keep this incognito window openyou'll use it again in the next exercise.
42+
4. Keep this incognito window openyou'll use it again in the next exercise.
4343

4444
> [!NOTE]
4545
> **Validation step:** Confirm the SAS URL displays the file content from the same unauthenticated incognito session that was just denied direct access.

learn-pr/wwl-azure/guided-project-share-files-securely/includes/5-exercise-revoke-access.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ This guided project consists of the following exercises:
66
- **Revoke partner access**
77
- Configure lifecycle management
88

9-
In this exercise, you revoke the partner's access by deleting the stored access policy. This instantly invalidates all SAS tokens generated from the policyeven those that haven't expired yet. You then confirm the file itself is still safely stored.
9+
In this exercise, you revoke the partner's access by deleting the stored access policy. This instantly invalidates all SAS tokens generated from the policyeven those that haven't expired yet. You then confirm the file itself is still safely stored.
1010

1111
This exercise includes the following tasks:
1212

@@ -17,7 +17,7 @@ This exercise includes the following tasks:
1717

1818
**Outcome:** Deleting the stored access policy instantly revokes all SAS tokens generated from it.
1919

20-
The partner has finished reviewing the file. Instead of waiting for the SAS token to expire on its own, you'll revoke access immediately by deleting the stored access policy. Every SAS token linked to that policy stops working the moment the policy is deletedeven if the token's expiry time hasn't passed yet.
20+
The partner has finished reviewing the file. Instead of waiting for the SAS token to expire on its own, you'll revoke access immediately by deleting the stored access policy. Every SAS token linked to that policy stops working the moment the policy is deletedeven if the token's expiry time hasn't passed yet.
2121

2222
## Task 1: Confirm SAS still works
2323

@@ -51,7 +51,7 @@ Remove the policy to instantly revoke all SAS tokens that were generated from it
5151
5252
## Task 3: Verify access is revoked
5353

54-
Test the same SAS URL to confirm it no longer workseven though the token's expiry time hasn't passed.
54+
Test the same SAS URL to confirm it no longer workseven though the token's expiry time hasn't passed.
5555

5656
1. Return to the incognito window.
5757
2. Refresh the SAS URL.
@@ -62,14 +62,14 @@ Test the same SAS URL to confirm it no longer works — even though the token's
6262
6363
## Task 4: Confirm the file still exists
6464

65-
Verify that revoking SAS access only removed the external pathwaythe file itself is untouched.
65+
Verify that revoking SAS access only removed the external pathwaythe file itself is untouched.
6666

6767
1. Return to the Azure portal in your main browser window.
6868
2. Navigate to the **partner-drop** container.
6969
3. Confirm **monthly-report.txt** still exists in the container.
7070
4. Close the incognito window.
7171

7272
> [!NOTE]
73-
> **Validation step:** The file remains in the container. Revoking SAS access doesn't delete datait only removes the access pathway.
73+
> **Validation step:** The file remains in the container. Revoking SAS access doesn't delete datait only removes the access pathway.
7474
7575
> [!NOTE]

learn-pr/wwl-azure/guided-project-share-files-securely/includes/7-validate-success.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,8 +8,8 @@ Review the validation steps you completed during the exercises. Confirm that eac
88
- [ ] The SAS URL is generated from the stored access policy (permissions inherited, not set manually).
99
- [ ] The direct URL (without SAS token) is denied from an unauthenticated incognito session.
1010
- [ ] The SAS URL displays the file content from the same unauthenticated session.
11-
- [ ] After deleting the stored access policy, the SAS URL is instantly deniedeven before the token's expiry time.
12-
- [ ] The file still exists in the container after access is revokedonly the access pathway was removed.
11+
- [ ] After deleting the stored access policy, the SAS URL is instantly deniedeven before the token's expiry time.
12+
- [ ] The file still exists in the container after access is revokedonly the access pathway was removed.
1313
- [ ] A lifecycle management rule named **delete-shared-files** is configured to delete blobs in **partner-drop/** after 30 days.
1414

1515
If any item is not true, return to the relevant exercise and troubleshoot before continuing.

learn-pr/wwl-azure/guided-project-share-files-securely/includes/unused/6-validate-success.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ Review the validation steps you completed during the exercises. Confirm that eac
88
- [ ] The direct URL (without SAS token) is denied from an unauthenticated incognito session.
99
- [ ] The SAS URL displays the file content from the same unauthenticated session.
1010
- [ ] The expired SAS URL returns an authorization error after the expiry time passes.
11-
- [ ] The file still exists in the container after SAS expiryonly external access was revoked.
11+
- [ ] The file still exists in the container after SAS expiryonly external access was revoked.
1212
- [ ] The **partner-upload** container is created with **Private** access level.
1313
- [ ] A write-only SAS is generated with only **Write** and **Create** permissions.
1414
- [ ] A file is uploaded via Cloud Shell using the write SAS URL.

0 commit comments

Comments
 (0)