Skip to content

Commit 42c3315

Browse files
committed
edits
1 parent eb861c2 commit 42c3315

10 files changed

+54
-54
lines changed

articles/azure-web-pubsub/howto-authorize-from-application.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,7 @@ This section demonstrates how to assign a Web PubSub Service Owner role to a ser
9292

9393
1. Search for and select the application that you want to assign the role to.
9494

95-
1. Select **Select** to confirm the selection.
95+
1. Choose **Select** to confirm the selection.
9696

9797
1. Select **Next**.
9898

articles/azure-web-pubsub/howto-authorize-from-managed-identity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ This section demonstrates how to assign the Web PubSub Service Owner role to a s
7676

7777
1. Search for and then select the virtual machine that you want to assign the role to.
7878

79-
1. Select **Select** to confirm the selection.
79+
1. Choose **Select** to confirm the selection.
8080

8181
1. Select **Next**.
8282

articles/azure-web-pubsub/howto-custom-domain.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ In addition to the default domain that the Azure Web PubSub service provides, yo
2424

2525
Before you can add a custom domain, add a matching custom certificate. A custom certificate is a resource of your instance of Web PubSub. It references a certificate in your key vault. For security and compliance, Web PubSub doesn't permanently store your certificate. Instead, it fetches the certificate from your key vault and keeps it in memory.
2626

27-
### Step 1: Grant your Web PubSub resource access to the key vault
27+
### Grant your Web PubSub resource access to the key vault
2828

2929
Azure Web PubSub Service uses Managed Identity to access your Key Vault. In order to authorize, it needs to be granted permissions.
3030

@@ -53,7 +53,7 @@ Azure Web PubSub Service uses Managed Identity to access your Key Vault. In orde
5353

5454
Depending on how you configure your Azure Key Vault permissions model, you might need to grant permissions at different locations in the Azure portal.
5555

56-
#### [Vault access policy](#tab/vault-access-policy)
56+
#### [Key vault access policy](#tab/vault-access-policy)
5757

5858
If you use a key vault built-in access policy as a key vault permissions model:
5959

@@ -105,7 +105,7 @@ If you're using Azure role-based access control as Key Vault permission model:
105105

106106
-----
107107

108-
### Step 2: Create a custom certificate
108+
### Create a custom certificate
109109

110110
1. In the Azure portal, go to your Web PubSub resource.
111111
1. On the left menu, select **Custom domain**.
@@ -114,7 +114,7 @@ If you're using Azure role-based access control as Key Vault permission model:
114114
:::image type="content" alt-text="Screenshot of custom certificate management." source="media\howto-custom-domain\portal-custom-certificate-management.png" :::
115115

116116
1. Enter a name for the custom certificate.
117-
1. Select **Select from your Key Vault** to choose a key vault certificate. After you select a key vault, values for **Key Vault Base URI** and **Key Vault Secret Name** are automatically added. You also have to option to edit these fields manually.
117+
1. Choose **Select from your Key Vault** to choose a key vault certificate. After you select a key vault, values for **Key Vault Base URI** and **Key Vault Secret Name** are automatically added. You also have to option to edit these fields manually.
118118
1. (Optional) To pin the certificate to a specific version, enter a value for **Key Vault Secret Version**.
119119
1. Select **Add**.
120120

articles/azure-web-pubsub/howto-secure-network-access-control.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.date: 08/16/2024
1010

1111
# Configure network access control for Azure Web PubSub
1212

13-
Azure Web PubSub enables you to secure and control the level of access to your service endpoint, based on the request type and subset of networks used. When network rules are configured, only applications that request data over the specified set of networks can access your Web PubSub resource.
13+
You can configure Azure Web PubSub to secure and control the level of access to your service endpoint based on the request type and subset of networks used. When network rules are configured, only applications that request data over the specified set of networks can access your Web PubSub resource.
1414

1515
Azure Web PubSub has a public endpoint that is accessible through the internet. You can also create a [private endpoint for your Web PubSub resource](howto-secure-private-endpoints.md). A private endpoint assigns a private IP address from your virtual network to the Web PubSub resource. It also secures all traffic between your virtual network and the Web PubSub resource over a private link. The Web PubSub network access control provides access control for both a public endpoint and for private endpoints.
1616

articles/azure-web-pubsub/howto-secure-private-endpoints.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ You can manage consent requests and private endpoints for your Web PubSub resour
3535
3636
### Connect to a private endpoint
3737

38-
Clients on a VNet that uses a private endpoint should use the same connection string for the Web PubSub resource that clients that connect via a public endpoint use. We rely on Domain Naming Service (DNS) resolution to automatically route the connections from the VNet to Web PubSub over a private link.
38+
Clients on a VNet that uses a private endpoint should use the same connection string for the Web PubSub resource that clients that connect via a public endpoint use. We rely on Domain Naming System (DNS) resolution to automatically route the connections from the VNet to Web PubSub over a private link.
3939

4040
> [!IMPORTANT]
4141
> Use the same connection string to connect to Web PubSub by using private endpoints as you would use for a public endpoint. Don't connect to Web PubSub by using its `privatelink` subdomain URL.
@@ -48,25 +48,25 @@ When you create a private endpoint, the DNS CNAME resource record for your Web P
4848

4949
When you resolve your Web PubSub resource domain name from outside the VNet with the private endpoint, it resolves to the public endpoint of the Web PubSub resource. When resolved from the VNet hosting the private endpoint, the domain name resolves to the private endpoint's IP address.
5050

51-
For the preceding illustrated example, the DNS resource records for the Web PubSub resource `foobar` when it's resolved from outside the VNet hosting the private endpoint:
51+
For the preceding illustrated example, the DNS resource records for the Web PubSub resource `sample` when it's resolved from outside the VNet hosting the private endpoint:
5252

5353
| Name | Type | Value |
5454
| :---------------------------------------------------- | :---: | :---------------------------------------------------- |
55-
| `foobar.webpubsub.azure.com` | CNAME | `foobar.privatelink.webpubsub.azure.com` |
56-
| `foobar.privatelink.webpubsub.azure.com` | A | \<Azure Web PubSub public IP address\> |
55+
| `sample.webpubsub.azure.com` | CNAME | `sample.privatelink.webpubsub.azure.com` |
56+
| `sample.privatelink.webpubsub.azure.com` | A | \<Azure Web PubSub public IP address\> |
5757

58-
As previously mentioned, you can deny or control access for clients outside the VNet through the public endpoint using the network access control.
58+
As previously mentioned, you can deny or control access for clients outside the VNet through the public endpoint by using network access control.
5959

60-
The DNS resource records for the Web PubSub resource `foobar` when it's resolved by a client in the VNet hosting the private endpoint:
60+
The DNS resource records for the Web PubSub resource `sample` when it's resolved by a client in the VNet that hosts the private endpoint:
6161

6262
| Name | Type | Value |
6363
| :---------------------------------------------------- | :---: | :---------------------------------------------------- |
64-
| `foobar.webpubsub.azure.com` | CNAME | `foobar.privatelink.webpubsub.azure.com` |
65-
| `foobar.privatelink.webpubsub.azure.com` | A | 10.1.1.5 |
64+
| `sample.webpubsub.azure.com` | CNAME | `sample.privatelink.webpubsub.azure.com` |
65+
| `sample.privatelink.webpubsub.azure.com` | A | 10.1.1.5 |
6666

6767
This approach gives access to Web PubSub *by using the same connection string* for clients on the VNet that hosts the private endpoints and to clients outside the VNet.
6868

69-
If you use a custom DNS server on your network, clients must be able to resolve the fully qualified domain name (FQDN) for the Web PubSub resource endpoint to the private endpoint IP address. You should configure your DNS server to delegate your private link subdomain to the private DNS zone for the VNet or configure the A records for `foobar.privatelink.webpubsub.azure.com` with the private endpoint IP address.
69+
If you use a custom DNS server on your network, clients must be able to resolve the fully qualified domain name (FQDN) for the Web PubSub resource endpoint to the private endpoint IP address. You should configure your DNS server to delegate your private link subdomain to the private DNS zone for the VNet or configure the A records for `sample.privatelink.webpubsub.azure.com` to use the private endpoint IP address.
7070

7171
> [!TIP]
7272
> If you use a custom or on-premises DNS server, you should configure your DNS server to resolve the Web PubSub resource name in the `privatelink` subdomain to the private endpoint IP address. You can do this by delegating the `privatelink` subdomain to the private DNS zone of the VNet or by configuring the DNS zone on your DNS server and then adding the DNS A records.

articles/azure-web-pubsub/howto-secure-shared-private-endpoints-key-vault.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -163,7 +163,7 @@ It takes a few minutes for the approval to be propagated to Azure Web PubSub Ser
163163
az rest --method get --uri https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/contoso/providers/Microsoft.SignalRService/webpubsub/contoso-webpubsub/sharedPrivateLinkResources/func-pe?api-version=2022-08-01-preview
164164
```
165165

166-
This command returns JSON. The connection state is indicated as `status` under `properties`.
166+
This command returns JSON. The connection state is indicated in `status` under `properties`.
167167

168168
```json
169169
{
@@ -185,7 +185,7 @@ When `properties.provisioningState` is `Succeeded` and `properties.status` (conn
185185

186186
Now you can configure features like a custom domain as you typically would. You don't have to use a special domain for your key vault. Web PubSub automatically handles Domain Name System (DNS) resolution.
187187

188-
## Related conte
188+
## Related content
189189

190190
* [What is a private endpoint?](../private-link/private-endpoint-overview.md)
191191
* [Configure a custom domain](howto-custom-domain.md)

articles/azure-web-pubsub/howto-secure-shared-private-endpoints.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -115,7 +115,7 @@ When the shared private endpoint connection has a **Pending** status, you must a
115115
1. On the left menu, select **Networking**.
116116
1. Under **Inbound Traffic**, select **Private endpoints**.
117117
1. Select the pending connection that you created in your Web PubSub resource.
118-
1. Select **Approve** and then select **Yes** to confirm.
118+
1. Select **Approve**, and then select **Yes** to confirm.
119119

120120
:::image type="content" alt-text="Screenshot of approving a private endpoint connection." source="media\howto-secure-shared-private-endpoints\portal-function-approve-private-endpoint.png" lightbox="media\howto-secure-shared-private-endpoints\portal-function-approve-private-endpoint.png" :::
121121

@@ -172,7 +172,7 @@ It takes a few minutes for the approval to be reflected in Web PubSub. You can c
172172
az rest --method get --uri https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/contoso/providers/Microsoft.SignalRService/webPubSub/contoso-webpubsub/sharedPrivateLinkResources/func-pe?api-version=2021-06-01-preview
173173
```
174174

175-
This command returns JSON. The connection state is indicated as `status` under `properties`.
175+
This command returns JSON. The connection state is indicated in `status` under `properties`.
176176

177177
```json
178178
{
@@ -196,7 +196,7 @@ At this point, the private endpoint between Azure Web PubSub and Azure Functions
196196

197197
## Verify that upstream calls are from a private IP
198198

199-
When the private endpoint is set up, you can verify that incoming calls are from a private IP address by checking the `X-Forwarded-For` header for network traffic.
199+
When the private endpoint is set up, you can verify that incoming calls are from a private IP address by checking the `X-Forwarded-For` header for upstream calls.
200200

201201
:::image type="content" alt-text="Screenshot of the Azure portal, showing that incoming requests are from a private IP." source="media\howto-secure-shared-private-endpoints\portal-function-log.png" :::
202202

articles/azure-web-pubsub/howto-service-tags.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ You can allow outbound traffic from your network to Web PubSub by adding a new o
2828

2929
1. In the portal, go to the network security group.
3030
1. On the left menu, select **Outbound security rules**.
31-
1. Select the **Add** button.
31+
1. Select **Add**.
3232
1. Select **Destination**, and then select **Service Tag**.
3333
1. Select **Destination service tag**, and then select **AzureWebPubSub**.
3434
1. For **Destination port ranges**, enter **443**.
@@ -62,10 +62,10 @@ You can configure a *network security group* to allow inbound traffic to a virtu
6262
#### [Azure portal](#tab/azure-portal)
6363

6464
1. In the Azure portal, go to the network security group.
65-
1. In the left menu, select **Inbound security rules**.
65+
1. On the left menu, select **Inbound security rules**.
6666
1. Select **Add**.
67-
1. Select **Source**, and then select **Service Tag** in the list.
68-
1. Select **Source service tag**, and then select **AzureWebPubSub** in the list.
67+
1. Select **Source**, and then select **Service Tag**.
68+
1. Select **Source service tag**, and then select **AzureWebPubSub**.
6969
1. For **Source port ranges**, enter **\***.
7070

7171
:::image type="content" alt-text="Screenshot showing dialogue to create an inbound security rule." source="media/howto-service-tags/portal-add-inbound-security-rule.png" :::
@@ -84,13 +84,13 @@ az network nsg rule create -n <rule-name> --nsg-name <nsg-name> -g <resource-gro
8484
> [!NOTE]
8585
> Azure Web PubSub is a shared service. By allowing the `AzureWebPubSub` service tag or its associated IP address prefixes, you also allow traffic from other resources, even if they belong to other customers. Make sure that you implement appropriate authentication on your endpoints.
8686
87-
### Event handler endpoints of Azure Functions
87+
### Event handler endpoints for Azure Functions
8888

8989
You can configure a [service tag-based rule](../app-service/app-service-ip-restrictions.md#set-a-service-tag-based-rule).
9090

91-
Alternatively, you can use [shared private endpoints](howto-secure-shared-private-endpoints.md) for better security. Shared private endpoints are dedicated to your resources. No traffic from other resources can access your endpoints.
91+
Alternatively, you can use [shared private endpoints](howto-secure-shared-private-endpoints.md) for increased security. Shared private endpoints are dedicated to your resources. No traffic from other resources can access your endpoints.
9292

93-
### Event Hubs and Key Vault access
93+
### Azure Event Hubs and Azure Key Vault access
9494

9595
We recommend that you use [shared private endpoints](howto-secure-shared-private-endpoints-key-vault.md) to help you maintain the best security.
9696

0 commit comments

Comments
 (0)