Skip to content

Commit 22a6b9e

Browse files
authored
Update container-registry-firewall-access-rules.md
1 parent 956dca7 commit 22a6b9e

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/container-registry/container-registry-firewall-access-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ To pull or push images or other artifacts to an Azure container registry, a clie
1919

2020
* **Registry REST API endpoint** - Authentication and registry management operations are handled through the registry's public REST API endpoint. This endpoint is the login server name of the registry. Example: `myregistry.azurecr.io`
2121

22-
* **Registry REST API endpoint for certificates** - Azure container registry uses a wildcard SSL certificate for all subdomains. When connecting to the Azure container registry using SSL, the client must be able to download the certificate for the TLS handshake. In such case `azurecr.io` must also be accessible.
22+
* **Registry REST API endpoint for certificates** - Azure container registry uses a wildcard SSL certificate for all subdomains. When connecting to the Azure container registry using SSL, the client must be able to download the certificate for the TLS handshake. In such cases, `azurecr.io` must also be accessible.
2323

2424
* **Storage (data) endpoint** - Azure [allocates blob storage](container-registry-storage.md) in Azure Storage accounts on behalf of each registry to manage the data for container images and other artifacts. When a client accesses image layers in an Azure container registry, it makes requests using a storage account endpoint provided by the registry.
2525

0 commit comments

Comments
 (0)