You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -532,7 +536,7 @@ See [VM Applications overview](/azure/virtual-machines/vm-applications) for more
532
536
533
537
A limit of 5,000 disk encryption sets are allowed per region and per subscription. [Contact Azure support](../../communications-gateway/request-changes.md) to increase the quota.
534
538
535
-
See the following documentation to learn more about about encryption restrictions:
539
+
See the following documentation to learn more about encryption restrictions:
Copy file name to clipboardExpand all lines: articles/backup/azure-data-lake-storage-backup-support-matrix.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ Vaulted backups of Azure Data Lake Storage are available in the following region
26
26
27
27
| Availability type | Region |
28
28
| --- | --- |
29
-
|**General availability**| East Asia, France South, Southeast US, Switzerland North, Switzerland West, UAE North, UK West, West India. |
29
+
|**General availability**| East Asia, France South, US South Central, Switzerland North, Switzerland West, UAE North, UK West, West India. |
30
30
|**Preview**| Australia East, Central India, Central US, East US, East US 2, Germany West Central, North Central US, North Europe, South India, Southeast Asia, West Central US, West US, West US 2, West US 3. |
Copy file name to clipboardExpand all lines: articles/backup/tutorial-cross-region-restore.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Tutorial - Configure and run Cross Region Restore for Azure database for PostgreSQL
3
3
description: Learn how to configure and run Cross Region Restore for Azure database for PostgreSQL using Azure Backup.
4
4
ms.topic: tutorial
5
-
ms.date: 11/22/2024
5
+
ms.date: 04/07/2025
6
6
ms.service: azure-backup
7
7
ms.author: v-mallicka
8
8
# Customer intent: "As a database administrator, I want to configure and run Cross Region Restore for Azure PostgreSQL databases, so that I can ensure data resiliency and perform recovery drills without downtime in the primary region."
Copy file name to clipboardExpand all lines: articles/data-factory/data-factory-service-identity.md
+8-4Lines changed: 8 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ There are two types of supported managed identities:
29
29
30
30
-**System-assigned:** You can enable a managed identity directly on a service instance. When you allow a system-assigned managed identity during the creation of the service, an identity is created in Microsoft Entra tied to that service instance's lifecycle. By design, only that Azure resource can use this identity to request tokens from Microsoft Entra ID. So when the resource is deleted, Azure automatically deletes the identity for you.
31
31
-**User-assigned:** You may also create a managed identity as a standalone Azure resource. You can [create a user-assigned managed identity](../active-directory/managed-identities-azure-resources/how-to-manage-ua-identity-portal.md) and assign it to one or more instances of a data factory. In user-assigned managed identities, the identity is managed separately from the resources that use it.
32
-
>[!NOTE]
32
+
>[!NOTE]
33
33
> [Trusted bypass](https://techcommunity.microsoft.com/t5/azure-data-factory-blog/data-factory-is-now-a-trusted-service-in-azure-storage-and-azure/ba-p/964993) cannot utilize user-assigned managed identities. It can only employ system-assigned managed identities for connecting to Azure Storage and Azure Key Vault.
34
34
35
35
Managed identity provides the below benefits:
@@ -51,9 +51,13 @@ To effectively use managed identities in Azure Data Factory, specific roles must
51
51
-**Reader Role**: This role is necessary to read the metadata of the resources.
52
52
-**Contributor Role**: This role is required to manage the resources that the managed identity needs to access.
53
53
54
+
> [!NOTE]
55
+
> - Users with the Data Factory Contributor role can create and run pipelines that use both the System‑assigned Managed Identity (SAMI) and any User‑assigned Managed Identities (UAMI) attached to the data factory. Those identities inherit all permissions already granted to them on external resources (for example, storage accounts, SQL databases, Key Vault, Fabric Lakehouse).
56
+
> - Please assign the Contributor role only to trusted principals and on the narrowest scope possible. Review and limit the permissions granted to the data factory’s managed identities, use least‑privilege RBAC on downstream resources, and regularly audit role assignments and activity logs.
57
+
54
58
## System-assigned managed identity
55
59
56
-
>[!NOTE]
60
+
>[!NOTE]
57
61
> System-assigned managed identity is also referred to as 'Managed identity' elsewhere in the documentation and in the Data Factory Studio for backward compatibility purpose. We will explicitly mention 'User-assigned managed identity' when referring to it.
@@ -71,7 +75,7 @@ If you find your service instance doesn't have a managed identity associated fol
71
75
-[Generate managed identity using an Azure Resource Manager template](#generate-system-assigned-managed-identity-using-an-azure-resource-manager-template)
72
76
-[Generate managed identity using SDK](#generate-system-assigned-managed-identity-using-sdk)
73
77
74
-
>[!NOTE]
78
+
>[!NOTE]
75
79
>
76
80
>- Managed identity cannot be modified. Updating a service instance which already has a managed identity won't have any impact, and the managed identity is kept unchanged.
77
81
>- If you update a service instance which already has a managed identity without specifying the "identity" parameter in the factory objects or without specifying "identity" section in REST request body, you will get an error.
0 commit comments