Skip to content

Commit 19cfbc8

Browse files
committed
Added titleSuffix and fix typos per review
1 parent dda3828 commit 19cfbc8

8 files changed

+10
-2
lines changed

articles/private-link/create-network-security-perimeter-bicep.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
---
22
title: Quickstart - Create a network security perimeter - Bicep
3-
description: Learn how to create a network security perimeter for an Azure resource using the Bicep. This example demonstrates the creation of a network security perimeter for an Azure Key Vault.
3+
titleSuffix: Azure Private Link
4+
description: Learn how to create a network security perimeter for an Azure resource using Bicep. This example demonstrates the creation of a network security perimeter for an Azure Key Vault.
45
author: mbender-ms
56
ms.author: mbender
67
ms.service: azure-private-link
@@ -12,7 +13,7 @@ ms.custom: subject-armqs, mode-arm, template-concept, devx-track-bicep
1213

1314
# Quickstart - Create a network security perimeter - Bicep
1415

15-
Get started with network security perimeter by creating a network security perimeter for an Azure key vault using Bicep. A [network security perimeter](network-security-perimeter-concepts.md) allows [Azure Platform as a Service (PaaS)](./network-security-perimeter-concepts.md#onboarded-private-link-resources) resources to communicate within an explicit trusted boundary. You create and update a PaaS resource's association in a network security perimeter profile. Then you create and update network security perimeter access rules. When you're finished, you delete all resources created in this quickstart.
16+
Get started with network security perimeter by creating a network security perimeter for an Azure Key Vault using Bicep. A [network security perimeter](network-security-perimeter-concepts.md) allows [Azure Platform as a Service (PaaS)](./network-security-perimeter-concepts.md#onboarded-private-link-resources) resources to communicate within an explicit trusted boundary. You create and update a PaaS resource's association in a network security perimeter profile. Then you create and update network security perimeter access rules. When you're finished, you delete all resources created in this quickstart.
1617

1718
[!INCLUDE [About Bicep](~/reusable-content/ce-skilling/azure/includes/resource-manager-quickstart-bicep-introduction.md)]
1819

articles/private-link/create-network-security-perimeter-cli.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
22
title: Quickstart - Create a network security perimeter - Azure CLI
3+
titleSuffix: Azure Private Link
34
description: Learn how to create a network security perimeter for an Azure resource using Azure CLI. This example demonstrates the creation of a network security perimeter for an Azure Key Vault.
45
author: mbender-ms
56
ms.author: mbender

articles/private-link/create-network-security-perimeter-portal.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
22
title: Quickstart - Create a network security perimeter - Azure portal
3+
titleSuffix: Azure Private Link
34
description: Learn how to create a network security perimeter for an Azure resource using the Azure portal. This example demonstrates the creation of a network security perimeter for an Azure Key Vault.
45
author: mbender-ms
56
ms.author: mbender

articles/private-link/create-network-security-perimeter-powershell.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
22
title: Quickstart - Create a network security perimeter - Azure PowerShell
3+
titleSuffix: Azure Private Link
34
description: Learn how to create a network security perimeter for an Azure resource using Azure PowerShell. This example demonstrates the creation of a network security perimeter for an Azure Key Vault.
45
author: mbender-ms
56
ms.author: mbender

articles/private-link/network-security-perimeter-concepts.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
22
title: What is a network security perimeter?
3+
titleSuffix: Azure Private Link
34
description: Learn about the components of network security perimeter, a feature that allows Azure PaaS resources to communicate within an explicit trusted boundary, or perimeter.
45
author: mbender-ms
56
ms.author: mbender

articles/private-link/network-security-perimeter-diagnostic-logs.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
22
title: 'Diagnostic logs for Network Security Perimeter'
3+
titleSuffix: Azure Private Link
34
description: Learn the options for storing diagnostic logs for Network Security Perimeter and how to enable logging through the Azure portal.
45
author: mbender-ms
56
ms.author: mbender

articles/private-link/network-security-perimeter-role-based-access-control-requirements.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
22
title: Azure role-based access control permissions required for Azure Network Security Perimeter usage
3+
titleSuffix: Azure Private Link
34
description: Learn about the Azure role-based access control permissions required to use Azure Network Security Perimeter.
45
author: mbender-ms
56
ms.author: mbender

articles/private-link/network-security-perimeter-transition.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
22
title: Transition to a network security perimeter in Azure
3+
titleSuffix: Azure Private Link
34
description: Learn about the different access modes and how to transition to a network security perimeter in Azure.
45
author: mbender-ms
56
ms.author: mbender

0 commit comments

Comments
 (0)