Skip to content

Commit 4a99766

Browse files
Update Active Directory to Microsoft Entra at private-link-service-overview.md
1 parent cbe6d55 commit 4a99766

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/private-link/private-link-service-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ A Private Link service specifies the following properties:
6868

6969
- The Private Link Service must be deployed in the same region as the virtual network and the Standard Load Balancer.
7070

71-
- A single Private Link Service can be accessed from multiple Private Endpoints belonging to different virtual networks, subscriptions and/or Active Directory tenants. The connection is established through a connection workflow.
71+
- A single Private Link Service can be accessed from multiple Private Endpoints belonging to different virtual networks, subscriptions and/or Microsoft Entra tenants. The connection is established through a connection workflow.
7272

7373
- Multiple Private Link services can be created on the same Standard Load Balancer using different front-end IP configurations. There are limits to the number of Private Link services you can create per Standard Load Balancer and per subscription. For details, see [Azure limits](../azure-resource-manager/management/azure-subscription-service-limits.md#networking-limits).
7474

@@ -92,7 +92,7 @@ Complete alias: *Prefix*. {GUID}.*region*.azure.privatelinkservice
9292

9393
The Private Link service provides you with three options in the **Visibility** setting to control the exposure of your service. Your visibility setting determines whether a consumer can connect to your service. Here are the visibility setting options, from most restrictive to least restrictive:
9494

95-
- **Role-based access control only**: If your service is for private consumption from different virtual networks that you own, use role-based access control inside subscriptions that are associated with the same Active Directory tenant. **Cross tenant visibility is permitted through role-based access control**.
95+
- **Role-based access control only**: If your service is for private consumption from different virtual networks that you own, use role-based access control inside subscriptions that are associated with the same Microsoft Entra tenant. **Cross tenant visibility is permitted through role-based access control**.
9696

9797
- **Restricted by subscription**: If your service will be consumed across different tenants, you can restrict the exposure to a limited set of subscriptions that you trust. Authorizations can be pre-approved.
9898

0 commit comments

Comments
 (0)