Skip to content

Commit 462474c

Browse files
authored
Merge pull request #126130 from changeworld/patch-181
Fix typo
2 parents 2ddfad3 + b5d1642 commit 462474c

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/confidential-computing/quick-create-confidential-vm-arm.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -173,7 +173,7 @@ Use this example to create a custom parameter file for a Linux-based confidentia
173173
New-MgServicePrincipal -AppId bf7b6499-ff71-4aa2-97a4-f372087be7f0 -DisplayName "Confidential VM Orchestrator"
174174
```
175175
176-
1. Set up your Azure key vault. For how to use an Azure Key Vault Managed HSM instead, see the next step.
176+
1. Set up your Azure Key Vault. For how to use an Azure Key Vault Managed HSM instead, see the next step.
177177
178178
1. Create a resource group for your key vault. Your key vault instance and your confidential VM must be in the same Azure region.
179179
@@ -198,7 +198,7 @@ Use this example to create a custom parameter file for a Linux-based confidentia
198198
az keyvault set-policy --name $KeyVault --object-id $cvmAgent.Id --key-permissions get release
199199
```
200200
201-
1. (Optional) If you don't want to use an Azure key vault, you can create an Azure Key Vault Managed HSM instead.
201+
1. (Optional) If you don't want to use an Azure Key Vault, you can create an Azure Key Vault Managed HSM instead.
202202
203203
1. Follow the [quickstart to create an Azure Key Vault Managed HSM](/azure/key-vault/managed-hsm/quick-create-cli) to provision and activate Azure Key Vault Managed HSM.
204204
1. Enable purge protection on the Azure Managed HSM. This step is required to enable key release.

0 commit comments

Comments
 (0)