Skip to content

Commit 22a4cd8

Browse files
committed
apply relative link, set date
1 parent e1d449c commit 22a4cd8

5 files changed

+6
-5
lines changed

articles/virtual-network/virtual-network-encryption-faq.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ metadata:
33
title: Virtual Network encryption frequently asked questions
44
description: Answers to common questions about using Azure Virtual Network encryption.
55
ms.topic: faq
6+
ms.date: 05/13/2024
67

78
title: Frequently asked questions for Azure Virtual Network encryption
89
summary: |

articles/vpn-gateway/site-to-site-certificate-authentication-gateway-portal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ This configuration requires a managed identity. For more information about manag
4242

4343
## <a name="enable"></a>Enable VPN Gateway for Key Vault and Managed Identity
4444

45-
In this section, you enable the gateway for Azure Key Vault and the managed identity you created earlier. For more information about Azure Key Vault, see [About Azure Key Vault](https://learn.microsoft.com/azure/key-vault/general/overview).
45+
In this section, you enable the gateway for Azure Key Vault and the managed identity you created earlier. For more information about Azure Key Vault, see [About Azure Key Vault](/azure/key-vault/general/overview).
4646

4747
1. In the portal, go to your virtual network gateway (VPN gateway).
4848
1. Go to **Settings -> Configuration**. On the Configuration page, specify the following authentication settings:
@@ -215,7 +215,7 @@ Export the public key data for the **root certificate**. Exported files must be
215215

216216
## Create a key vault
217217

218-
This configuration requires Azure Key Vault. The following steps create a key vault. You add your certificate and Managed Identity to your key vault later. For more comprehensive steps, see [Quickstart - Create a key vault using the Azure portal](https://learn.microsoft.com/azure/key-vault/general/quick-create-portal).
218+
This configuration requires Azure Key Vault. The following steps create a key vault. You add your certificate and Managed Identity to your key vault later. For more comprehensive steps, see [Quickstart - Create a key vault using the Azure portal](/azure/key-vault/general/quick-create-portal).
219219

220220
1. In the Azure portal, search for **Key Vaults**. On the **Key vaults** page, select **+Create**.
221221
1. On the **Create a key vault** page, fill out the required information. The resource group doesn't have to be the same as the resource group that you used for your VPN gateway.

articles/vpn-gateway/vpn-gateway-classic-resource-manager-migration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Once the VNet migration is completed, Azure will attempt to complete the remaind
2626
The Resource Manager model is different from the classic model and is composed of virtual network gateways, local network gateways and connection resources. These represent the VPN gateway itself, the local-site representing on premises address space and connectivity between the two respectively. Once migration is completed, your gateways won't be available in the classic model and all management operations on virtual network gateways, local network gateways, and connection objects must be performed using the Resource Manager model.
2727

2828
## Locating a classic VPN gateway
29-
To locate a classic VPN gateway via PowerShell, you will need to install the Azure PowerShell Service Management module. Start here: [Installing the Azure PowerShell Service Management module](https://learn.microsoft.com/powershell/azure/servicemanagement/install-azure-ps). To view classic resources, you will need co-admin or owner permissions. You can't use Az cmdlets to access classic resources.
29+
To locate a classic VPN gateway via PowerShell, you will need to install the Azure PowerShell Service Management module. Start here: [Installing the Azure PowerShell Service Management module](/powershell/azure/servicemanagement/install-azure-ps). To view classic resources, you will need co-admin or owner permissions. You can't use Az cmdlets to access classic resources.
3030

3131

3232
To locate a classic VPN gateway via Azure portal, open the portal and search for "Virtual network(classic)". Select your classic virtual network and navigate to the gateway blade to find your classic virtual network gateway.

includes/vpn-gateway-vwan-openvpn-conditional.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.topic: include
88
# this file is used for both virtual wan and vpn gateway. When modifying, make sure that your changes work for both environments.
99
---
1010

11-
Conditional Access allows for fine-grained access control on a per-application basis. In order to use Conditional Access, you should have Microsoft Entra ID P1 or P2 or greater licensing applied to the users that will be subject to the Conditional Access rules. For more information, see [What is Conditional Access](https://learn.microsoft.com/entra/identity/conditional-access/overview)?
11+
Conditional Access allows for fine-grained access control on a per-application basis. In order to use Conditional Access, you should have Microsoft Entra ID P1 or P2 or greater licensing applied to the users that will be subject to the Conditional Access rules. For more information, see [What is Conditional Access](/entra/identity/conditional-access/overview)?
1212

1313
1. Go to the **Microsoft Entra ID - Enterprise applications - All applications** page and click **Azure VPN**.
1414

includes/vpn-gateway-vwan-openvpn-enable-mfa-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,4 +11,4 @@ ms.topic: include
1111
If you want users to be prompted for a second factor of authentication before granting access, you can configure Microsoft Entra multifactor authentication (MFA). You can configure MFA on a per user basis, or you can leverage MFA via [Conditional Access](/azure/active-directory/conditional-access/overview).
1212

1313
* MFA per user can be enabled at no-additional cost. When you enable MFA per user, the user is prompted for second factor authentication against all applications tied to the Microsoft Entra tenant. See [Option 1](#peruser) for steps.
14-
* Conditional Access allows for finer-grained control over how a second factor should be promoted. It can allow assignment of MFA to only VPN, and exclude other applications tied to the Microsoft Entra tenant. See [Option 2](#conditional) for configuration steps. For more information about Conditional Access, see [What is Conditional Access](https://learn.microsoft.com/entra/identity/conditional-access/overview)?
14+
* Conditional Access allows for finer-grained control over how a second factor should be promoted. It can allow assignment of MFA to only VPN, and exclude other applications tied to the Microsoft Entra tenant. See [Option 2](#conditional) for configuration steps. For more information about Conditional Access, see [What is Conditional Access](/entra/identity/conditional-access/overview)?

0 commit comments

Comments
 (0)