You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/confidential-ledger/overview.md
+6-8Lines changed: 6 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.author: mbaldwin
13
13
14
14
Microsoft Azure confidential ledger (ACL) is a new and highly secure service for managing sensitive data records. It runs exclusively on hardware-backed secure enclaves, a heavily monitored and isolated runtime environment which keeps potential attacks at bay. Furthermore, Azure confidential ledger runs on a minimalistic Trusted Computing Base (TCB), which ensures that no one—not even Microsoft—is "above" the ledger.
15
15
16
-
As its name suggests, Azure confidential ledger utilizes the [Azure Confidential Computing platform](../confidential-computing/index.yml) and the [Confidential Consortium Framework](https://www.microsoft.com/research/project/confidential-consortium-framework) to provide a high integrity solution that is tamper-protected and evident. One ledger spans across three or more identical instances, each of which run in a dedicated, fully attested hardware-backed enclave. The ledger's integrity is maintained through a consensus-based blockchain.
16
+
As its name suggests, Azure confidential ledger utilizes the [Azure Confidential Computing platform](../confidential-computing/index.yml) and the [Confidential Consortium Framework](https://ccf.dev) to provide a high integrity solution that is tamper-protected and evident. One ledger spans across three or more identical instances, each of which run in a dedicated, fully attested hardware-backed enclave. The ledger's integrity is maintained through a consensus-based blockchain.
17
17
18
18
Azure confidential ledger offers unique data integrity advantages, including immutability, tamper-proofing, and append-only operations. These features, which ensure that all records are kept intact, are ideal when critical metadata records must not be modified, such as for regulatory compliance and archival purposes.
19
19
@@ -32,9 +32,9 @@ The confidential ledger is exposed through REST APIs which can be integrated int
32
32
33
33
## Ledger security
34
34
35
-
This section defines the security protections for the ledger. The ledger APIs use client certificate-based authentication. Currently, the ledger supports certificate-based authentication process with owner roles. We will be adding support for Azure Active Directory (AAD) based authentication and also role-based access (for example, owner, reader, and contributor).
35
+
The ledger APIs support certificate-based authenticationprocess with owner roles as well as Azure Active Directory (AAD) based authentication and also role-based access (for example, owner, reader, and contributor).
36
36
37
-
The data to the ledger is sent through TLS 1.2 connection and the TLS 1.2 connection terminates inside the hardware backed security enclaves (Intel® SGX enclaves). This ensures that no one can intercept the connection between a customer's client and the confidential ledger server nodes.
37
+
The data to the ledger is sent through TLS 1.3 connection and the TLS 1.3 connection terminates inside the hardware backed security enclaves (Intel® SGX enclaves). This ensures that no one can intercept the connection between a customer's client and the confidential ledger server nodes.
38
38
39
39
### Ledger storage
40
40
@@ -46,8 +46,7 @@ The Functional APIs allow direct interaction with your instantiated confidential
46
46
47
47
## Constraints
48
48
49
-
- Once a confidential ledger is created, you cannot change the ledger type.
50
-
- Azure confidential ledger does not support standard Azure Disaster Recovery at this time. However, Azure confidential ledger offers built-in redundancy within the Azure region, as the confidential ledger runs on multiple independent nodes.
49
+
- Once a confidential ledger is created, you cannot change the ledger type (private or public).
51
50
- Azure confidential ledger deletion leads to a "hard delete", so your data will not be recoverable after deletion.
52
51
- Azure confidential ledger names must be globally unique. Ledgers with the same name, irrespective of their type, are not allowed.
53
52
@@ -56,9 +55,8 @@ The Functional APIs allow direct interaction with your instantiated confidential
56
55
| Term | Definition |
57
56
|--|--|
58
57
| ACL | Azure confidential ledger |
59
-
| Ledger | An immutable append record of transactions (also known as a Blockchain) |
60
-
| Commit | A confirmation that a transaction has been locally committed to a node. A local commit by itself does not guarantee that a transaction is part of the ledger. |
61
-
| Global commit | A confirmation that transaction was globally committed and is part of the ledger. |
58
+
| Ledger | An immutable append-only record of transactions (also known as a Blockchain) |
59
+
| Commit | A confirmation that a transaction has been appended to the ledger. |
62
60
| Receipt | Proof that the transaction was processed by the ledger. |
Copy file name to clipboardExpand all lines: articles/dns/private-dns-scenarios.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ Azure DNS Private Zones provide name resolution within a virtual network and bet
17
17
18
18
In this scenario, you have a virtual network in Azure that has many resources in it, including virtual machines. Your requirement is to resolve any resources in the virtual network using a specific domain name (DNS zone). You also need the naming resolution to be private and not accessible from the internet. Lastly, you need Azure to automatically register VMs into the DNS zone.
19
19
20
-
This scenario is shown below. We have a virtual network named "A" containing two VMs (VNETA-VM1 and VNETA-VM2). Each VM has a private IP associated. Once you've create a private zone, for example `contoso.com` and link virtual network "A" as a registration virtual network. Azure DNS will automatically create two A records in the zone referencing the two VMs. DNS queries from VNETA-VM1 can now resolve `VNETA-VM2.contoso.com` and will receive a DNS response that contains the private IP address of VNETA-VM2.
20
+
This scenario is shown below. We have a virtual network named "A" containing two VMs (VNETA-VM1 and VNETA-VM2). Each VM has a private IP associated. Once you've created a private zone, for example,`contoso.com`, and link virtual network "A" as a registration virtual network, Azure DNS will automatically create two A records in the zone referencing the two VMs. DNS queries from VNETA-VM1 can now resolve `VNETA-VM2.contoso.com` and will receive a DNS response that contains the private IP address of VNETA-VM2.
21
21
You can also do a reverse DNS query (PTR) for the private IP of VNETA-VM1 (10.0.0.1) from VNETA-VM2. The DNS response will contain the name VNETA-VM1, as expected.
Copy file name to clipboardExpand all lines: articles/service-bus-messaging/service-bus-faq.yml
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -60,9 +60,9 @@ sections:
60
60
61
61
See the following table for the outbound TCP ports you need to open to use these protocols to communicate with Azure Service Bus:
62
62
63
-
| Protocol | Port | Details |
63
+
| Protocol | Ports | Details |
64
64
| -------- | ----- | ------- |
65
-
| AMQP | 5671 | AMQP with TLS. See [AMQP protocol guide](service-bus-amqp-protocol-guide.md) |
65
+
| AMQP | 5671, 5672 | AMQP with TLS. See [AMQP protocol guide](service-bus-amqp-protocol-guide.md) |
66
66
| HTTPS | 443 | This port is used for the HTTP/REST API and for AMQP-over-WebSockets |
67
67
68
68
The HTTPS port is generally required for outbound communication also when AMQP is used over port 5671, because several management operations performed by the client SDKs and the acquisition of tokens from Azure Active Directory (when used) run over HTTPS.
Copy file name to clipboardExpand all lines: articles/virtual-machines/windows/build-image-with-packer.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -56,7 +56,8 @@ $sp.AppId
56
56
To authenticate to Azure, you also need to obtain your Azure tenant and subscription IDs with [Get-AzSubscription](/powershell/module/az.accounts/get-azsubscription):
0 commit comments