Skip to content

Commit 3044d9d

Browse files
authored
Merge pull request #112151 from SvenAelterman/patch-42
Fix typo; some Markdown linting
2 parents 8f49f9c + c091817 commit 3044d9d

File tree

1 file changed

+3
-11
lines changed

1 file changed

+3
-11
lines changed

articles/virtual-machines/extensions/key-vault-linux.md

Lines changed: 3 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -26,17 +26,15 @@ The Key Vault VM extension supports these Linux distributions:
2626

2727
> [!NOTE]
2828
> To get extended security features, prepare to upgrade Ubuntu 16.04 and Debian 9 systems as these versions are reaching their end of designated support period.
29-
>
3029
3130
> [!NOTE]
32-
> The Key Vault VM Extension downloads the certificates in the default location or to the location provided by "certStoreLocation" property in the VM Extension settings. The KeyValut VM Extension updates the folder permission to 700 (drwx------) allowing read, write and execute permission to the owner of the folder only
31+
> The Key Vault VM Extension downloads the certificates in the default location or to the location provided by "certStoreLocation" property in the VM Extension settings. The Key Vault VM Extension updates the folder permission to 700 (drwx------) allowing read, write and execute permission to the owner of the folder only
3332
3433
### Supported certificate content types
3534

3635
- PKCS #12
3736
- PEM
3837

39-
4038
## Prerequisites
4139
- Key Vault instance with certificate. See [Create a Key Vault](../../key-vault/general/quick-create-portal.md)
4240
- VM/VMSS must have assigned [managed identity](../../active-directory/managed-identities-azure-resources/overview.md)
@@ -59,7 +57,8 @@ The Key Vault VM extension supports these Linux distributions:
5957
}
6058
`
6159
## Key Vault VM extension version
62-
* Users can chose to upgrade their key vault vm extension version to `V2.0` to use full certificate chain download feature. Issuer certificates (intermediate and root) will be appended to the leaf certificate in the PEM file.
60+
61+
* Users can chose to upgrade their Key Vault vm extension version to `V2.0` to use full certificate chain download feature. Issuer certificates (intermediate and root) will be appended to the leaf certificate in the PEM file.
6362

6463
* If you prefer to upgrade to `v2.0`, you would need to delete `v1.0` first, then install `v2.0`.
6564
```azurecli
@@ -70,9 +69,6 @@ The Key Vault VM extension supports these Linux distributions:
7069

7170
* If the VM has certificates downloaded by v1.0, deleting the v1.0 AKVVM extension will NOT delete the downloaded certificates. After installing v2.0, the existing certificates will NOT be modified. You would need to delete the certificate files or roll-over the certificate to get the PEM file with full-chain on the VM.
7271

73-
74-
75-
7672
## Extension schema
7773

7874
The following JSON shows the schema for the Key Vault VM extension. The extension does not require protected settings - all its settings are considered information without security impact. The extension requires a list of monitored secrets, polling frequency, and the destination certificate store. Specifically:
@@ -120,8 +116,6 @@ The following JSON shows the schema for the Key Vault VM extension. The extensio
120116
> Also **required** for **Azure Arc-enabled VMs**.
121117
> Set msiEndpoint to `http://localhost:40342/metadata/identity`.
122118
123-
124-
125119
### Property values
126120

127121
| Name | Value / Example | Data Type |
@@ -139,7 +133,6 @@ The following JSON shows the schema for the Key Vault VM extension. The extensio
139133
| msiEndpoint | http://169.254.169.254/metadata/identity | string |
140134
| msiClientId | c7373ae5-91c2-4165-8ab6-7381d6e75619 | string |
141135

142-
143136
## Template deployment
144137

145138
Azure VM extensions can be deployed with Azure Resource Manager templates. Templates are ideal when deploying one or more virtual machines that require post deployment refresh of certificates. The extension can be deployed to individual VMs or virtual machine scale sets. The schema and configuration are common to both template types.
@@ -233,7 +226,6 @@ The Azure PowerShell can be used to deploy the Key Vault VM extension to an exis
233226
234227
# Start the deployment
235228
Update-AzVmss -ResourceGroupName <ResourceGroupName> -VMScaleSetName <VmssName> -VirtualMachineScaleSet $vmss
236-
237229
```
238230
239231
## Azure CLI deployment

0 commit comments

Comments
 (0)