From dfc2d32c3b055752ea31f0345a245ef5eb7931a7 Mon Sep 17 00:00:00 2001 From: navba-MSFT <57353862+navba-MSFT@users.noreply.github.com> Date: Fri, 6 May 2022 15:06:31 +0530 Subject: [PATCH] (AzureCXP) Fixes Azure/azure-powershell#17008 The below information needs to be added to avoid the customer's using -UseConnectedAccount (AAD Credential) to create account SAS which would fail. "An account SAS is secured using the storage account key. To create an account SAS, a client application must possess the account key." --- .../Storage.Management/help/New-AzStorageAccountSASToken.md | 1 + 1 file changed, 1 insertion(+) diff --git a/src/Storage/Storage.Management/help/New-AzStorageAccountSASToken.md b/src/Storage/Storage.Management/help/New-AzStorageAccountSASToken.md index 462a2129322c..bffd98738964 100644 --- a/src/Storage/Storage.Management/help/New-AzStorageAccountSASToken.md +++ b/src/Storage/Storage.Management/help/New-AzStorageAccountSASToken.md @@ -23,6 +23,7 @@ New-AzStorageAccountSASToken -Service ## DESCRIPTION The **New-AzStorageAccountSASToken** cmdlet creates an account-level shared access signature (SAS) token for an Azure Storage account. You can use the SAS token to delegate permissions for multiple services, or to delegate permissions for services not available with an object-level SAS token. +An account SAS is secured using the storage account key. To create an account SAS, a client application must possess the account key. ## EXAMPLES