Skip to content

Commit 2525672

Browse files
committed
Rename files
1 parent 5b0188d commit 2525672

10 files changed

+10
-10
lines changed

articles/azure-signalr/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,7 @@
120120
- name: Secure outbound traffic through Shared Private Endpoints
121121
href: howto-shared-private-endpoints.md
122122
- name: Access Key Vault in private network through Shared Private Endpoints
123-
href: howto-shared-private-endpoints-keyvault.md
123+
href: howto-shared-private-endpoints-key-vault.md
124124
- name: Use managed identity
125125
href: howto-use-managed-identity.md
126126
- name: Authorize from Azure Application

articles/azure-signalr/howto-custom-domain.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -179,11 +179,11 @@ It should return `200` status code without any certificate error.
179179

180180
## Key Vault in private network
181181

182-
If you have configured [Private Endpoint](../private-link/private-endpoint-overview.md) to your Key Vault, Azure SignalR Service cannot access the Key Vault via public network. You need to set up a [Shared Private Endpoint](./howto-shared-private-endpoints-keyvault.md) to let Azure SignalR Service access your Key Vault via private network.
182+
If you have configured [Private Endpoint](../private-link/private-endpoint-overview.md) to your Key Vault, Azure SignalR Service cannot access the Key Vault via public network. You need to set up a [Shared Private Endpoint](./howto-shared-private-endpoints-key-vault.md) to let Azure SignalR Service access your Key Vault via private network.
183183

184184
After you create a Shared Private Endpoint, you can create a custom certificate as usual. **You don't have to change the domain in Key Vault URI**. For example, if your Key Vault base URI is `https://contoso.vault.azure.net`, you still use this URI to configure custom certificate.
185185

186-
You don't have to explicitly allow Azure SignalR Service IPs in Key Vault firewall settings. See [Key Vault private link diagnostics](../key-vault/general/private-link-diagnostics.md).
186+
You don't have to explicitly allow Azure SignalR Service IPs in Key Vault firewall settings. For more info, see [Key Vault private link diagnostics](../key-vault/general/private-link-diagnostics.md).
187187

188188
## Next steps
189189

articles/azure-signalr/howto-shared-private-endpoints-keyvault.md renamed to articles/azure-signalr/howto-shared-private-endpoints-key-vault.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.author: dayshen
1414

1515
Azure SignalR Service can access your Key Vault in private network through Shared Private Endpoints. In this way you don't have to expose your Key Vault on public network.
1616

17-
:::image type="content" alt-text="Diagram showing architecture of shared private endpoint." source="media\howto-shared-private-endpoints-keyvault\shared-private-endpoint-overview.png" :::
17+
:::image type="content" alt-text="Diagram showing architecture of shared private endpoint." source="media\howto-shared-private-endpoints-key-vault\shared-private-endpoint-overview.png" :::
1818

1919
## Shared Private Link Resources Management
2020

@@ -35,17 +35,17 @@ The rest of the examples show how the *contoso-signalr* service can be configure
3535
1. In the menu pane, select **Networking**. Switch to **Private access** tab.
3636
1. Click **Add shared private endpoint**.
3737

38-
:::image type="content" alt-text="Screenshot of shared private endpoints management." source="media\howto-shared-private-endpoints-keyvault\portal-shared-private-endpoints-management.png" lightbox="media\howto-shared-private-endpoints-keyvault\portal-shared-private-endpoints-management.png" :::
38+
:::image type="content" alt-text="Screenshot of shared private endpoints management." source="media\howto-shared-private-endpoints-key-vault\portal-shared-private-endpoints-management.png" lightbox="media\howto-shared-private-endpoints-key-vault\portal-shared-private-endpoints-management.png" :::
3939

4040
1. Fill in a name for the shared private endpoint.
4141
1. Select the target linked resource either by selecting from your owned resources or by filling a resource ID.
4242
1. Click **Add**.
4343

44-
:::image type="content" alt-text="Screenshot of adding a shared private endpoint." source="media\howto-shared-private-endpoints-keyvault\portal-shared-private-endpoints-add.png" :::
44+
:::image type="content" alt-text="Screenshot of adding a shared private endpoint." source="media\howto-shared-private-endpoints-key-vault\portal-shared-private-endpoints-add.png" :::
4545

4646
1. The shared private endpoint resource will be in **Succeeded** provisioning state. The connection state is **Pending** approval at target resource side.
4747

48-
:::image type="content" alt-text="Screenshot of an added shared private endpoint." source="media\howto-shared-private-endpoints-keyvault\portal-shared-private-endpoints-added.png" lightbox="media\howto-shared-private-endpoints-keyvault\portal-shared-private-endpoints-added.png" :::
48+
:::image type="content" alt-text="Screenshot of an added shared private endpoint." source="media\howto-shared-private-endpoints-key-vault\portal-shared-private-endpoints-added.png" lightbox="media\howto-shared-private-endpoints-key-vault\portal-shared-private-endpoints-added.png" :::
4949

5050
#### [Azure CLI](#tab/azure-cli)
5151

@@ -92,13 +92,13 @@ Wait until the status changes to "Succeeded" before proceeding to the next steps
9292

9393
1. In the Azure portal, select the **Networking** tab of your Key Vault and navigate to **Private endpoint connections**. After the asynchronous operation has succeeded, there should be a request for a private endpoint connection with the request message from the previous API call.
9494

95-
:::image type="content" alt-text="Screenshot of the Azure portal, showing the Private endpoint connections pane." source="media\howto-shared-private-endpoints-keyvault\portal-keyvault-approve-private-endpoint.png" :::
95+
:::image type="content" alt-text="Screenshot of the Azure portal, showing the Private endpoint connections pane." source="media\howto-shared-private-endpoints-key-vault\portal-key-vault-approve-private-endpoint.png" :::
9696

9797
1. Select the private endpoint that Azure SignalR Service created. Click **Approve**.
9898

9999
Make sure that the private endpoint connection appears as shown in the following screenshot. It could take one to two minutes for the status to be updated in the portal.
100100

101-
:::image type="content" alt-text="Screenshot of the Azure portal, showing an Approved status on the Private endpoint connections pane." source="media\howto-shared-private-endpoints-keyvault\portal-keyvault-approved-private-endpoint.png" :::
101+
:::image type="content" alt-text="Screenshot of the Azure portal, showing an Approved status on the Private endpoint connections pane." source="media\howto-shared-private-endpoints-key-vault\portal-key-vault-approved-private-endpoint.png" :::
102102

103103
#### [Azure CLI](#tab/azure-cli)
104104

@@ -141,7 +141,7 @@ It takes minutes for the approval to be propagated to Azure SignalR Service. You
141141
142142
#### [Azure portal](#tab/azure-portal)
143143
144-
:::image type="content" alt-text="Screenshot of an approved shared private endpoint." source="media\howto-shared-private-endpoints-keyvault\portal-shared-private-endpoints-approved.png" lightbox="media\howto-shared-private-endpoints-keyvault\portal-shared-private-endpoints-approved.png" :::
144+
:::image type="content" alt-text="Screenshot of an approved shared private endpoint." source="media\howto-shared-private-endpoints-key-vault\portal-shared-private-endpoints-approved.png" lightbox="media\howto-shared-private-endpoints-key-vault\portal-shared-private-endpoints-approved.png" :::
145145
146146
#### [Azure CLI](#tab/azure-cli)
147147

0 commit comments

Comments
 (0)