Skip to content

Commit 04d28e2

Browse files
committed
Update per PR reviewer feedback.
1 parent 4400364 commit 04d28e2

File tree

3 files changed

+8
-8
lines changed

3 files changed

+8
-8
lines changed

articles/azure-arc/data/active-directory-prerequisites.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -57,9 +57,9 @@ New-ADOrganizationalUnit -Name "<name>" -Path "<Distinguished name of the direct
5757

5858
The examples in this article use `arcou` for the OU name.
5959

60-
![Active Directory organizational unit](media/active-directory-deployment/start-new-organizational-unit.png)
60+
![Screenshot of Active Directory Users and computers menu.](media/active-directory-deployment/start-new-organizational-unit.png)
6161

62-
![New object - organizational unit](media/active-directory-deployment/new-organizational-unit.png)
62+
![Screenshot of new object - organizational unit dialog.](media/active-directory-deployment/new-organizational-unit.png)
6363

6464
### Create the domain service account (DSA)
6565

@@ -69,7 +69,7 @@ Create the Active Directory user that you will use as the domain service account
6969

7070
To create a new user in AD, you can right-click the domain or the OU and select **New** > **User**:
7171

72-
![Active Directory users dialog](media/active-directory-deployment/start-ad-new-user.png)
72+
![Screenshot of user properties.](media/active-directory-deployment/start-ad-new-user.png)
7373

7474
This account will be referred to as *arcdsa* in this article.
7575

@@ -97,7 +97,7 @@ Whether you have created a new account for the DSA or are using an existing Acti
9797

9898
1. Select **Add...** and add the **arcdsa** user.
9999

100-
![Add user](./media/active-directory-deployment/add-user.png)
100+
![Screenshot of add user dialog.](./media/active-directory-deployment/add-user.png)
101101

102102
1. Select the **arcdsa** user and clear all permissions, then select **Advanced**.
103103

@@ -109,7 +109,7 @@ Whether you have created a new account for the DSA or are using an existing Acti
109109

110110
- Set **Applies To** to **This Object and all descendant objects**.
111111

112-
![Set allow for properties](./media/active-directory-deployment/set-permissions.png)
112+
![Screenshot of permission entries.](./media/active-directory-deployment/set-permissions.png)
113113

114114
- Scroll down to the bottom, and select **Clear all**.
115115

articles/azure-arc/data/deploy-active-directory-connector-cli.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -197,7 +197,7 @@ az arcdata ad-connector create
197197
--netbios-domain-name < AD domain NETBOIS name >
198198
--nameserver-addresses < DNS server IP addresses >
199199
--account-provisioning < account provisioning mode >
200-
--ou-distinguished-name < AD domain Organisaltional distiguished name >
200+
--ou-distinguished-name < AD domain organizational distinguished name >
201201
--prefer-k8s-dns < whether Kubernetes DNS or AD DNS Server for IP address lookup >
202202
--data-controller-name < Arc Data Controller Name >
203203
--resource-group < resource-group >

articles/azure-arc/data/deploy-system-managed-keytab-active-directory-connector.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -39,15 +39,15 @@ Before you proceed, you must have:
3939

4040
The AD domain service account should have sufficient permissions to automatically create and delete users accounts inside the provided organizational unit (OU) in the active directory.
4141

42-
Gran the following permissions - scoped to the Organizational Unit (OU) - to the domain service account:
42+
Grant the following permissions - scoped to the Organizational Unit (OU) - to the domain service account:
4343

4444
- Read all properties
4545
- Write all properties
4646
- Create User objects
4747
- Delete User objects
4848
- Reset Password for Descendant User objects
4949

50-
To know more further details about how to set up OU and AD account, go to [Deploy Azure Arc-enabled data services in Active Directory authentication with system-managed keytab - prerequisites](active-directory-prerequisites.md)
50+
For details about how to set up OU and AD account, go to [Deploy Azure Arc-enabled data services in Active Directory authentication with system-managed keytab - prerequisites](active-directory-prerequisites.md)
5151

5252
## Input for deploying Active Directory connector in system-managed keytab mode
5353

0 commit comments

Comments
 (0)