Skip to content

Commit 531b88d

Browse files
authored
edits
1 parent 0b75ed4 commit 531b88d

File tree

1 file changed

+6
-5
lines changed

1 file changed

+6
-5
lines changed

articles/virtual-machines/extensions/key-vault-windows.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -130,8 +130,8 @@ The following JSON shows the schema for the Key Vault VM extension. Before you c
130130
"url": <Example: "https://myvault.vault.azure.net/secrets/mycertificate2">,
131131
"certificateStoreName": <Example: "MY">,
132132
"certificateStoreLocation": <Example: "CurrentUser">,
133-
"keyExportable": <Optional. Lets the private key be exportable. Example: "false">
134-
"accounts": Example: ["Local Service"]>
133+
"keyExportable": <Optional. Lets the private key be exportable. Example: "false">,
134+
"accounts": <Example: ["Local Service"]>
135135
}
136136
]>
137137
},
@@ -249,7 +249,8 @@ The following JSON snippets provide example settings for an ARM template deploym
249249
"settings": {
250250
"secretsManagementSettings": {
251251
"pollingIntervalInS": <A string that specifies the polling interval in seconds. Example: 3600>,
252-
"linkOnRenewal": <Windows only. Ensures s-channel binding when the certificate renews without necessitating redeployment. Example: true>,"observedCertificates": <An array of KeyVault URIs that represent monitored certificates, including certificate store location and ACL permission to certificate private key. Example:
252+
"linkOnRenewal": <Windows only. Ensures s-channel binding when the certificate renews without necessitating redeployment. Example: true>,
253+
"observedCertificates": <An array of KeyVault URIs that represent monitored certificates, including certificate store location and ACL permission to certificate private key. Example:
253254
[
254255
{
255256
"url": <A Key Vault URI to the secret portion of the certificate. Example: "https://myvault.vault.azure.net/secrets/mycertificate1">,
@@ -261,7 +262,7 @@ The following JSON snippets provide example settings for an ARM template deploym
261262
"url": <Example: "https://myvault.vault.azure.net/secrets/mycertificate2">,
262263
"certificateStoreName": <Example: "MY">,
263264
"certificateStoreLocation": <Example: "CurrentUser">,
264-
"keyExportable": <Optional. Lets the private key be exportable. Example: "false">
265+
"keyExportable": <Optional. Lets the private key be exportable. Example: "false">,
265266
"accounts": <Example: ["Local Service"]>
266267
},
267268
{
@@ -415,7 +416,7 @@ Use PowerShell to deploy the version 1.0 Key Vault VM extension to an existing V
415416
> [!WARNING]
416417
> PowerShell clients often prefix a quote mark `"` with a backslash `\` in the settings JSON file. The extraneous characters cause the akvvm_service to fail with the error, "[CertificateManagementConfiguration] Failed to parse the configuration settings with:not an object."
417418
>
418-
> You can see the supplied backslash `\` and quote `"` characters in the Azure portal. Check the contents of the settings JSON file under **Settings** > **Extensions + Applications**. To avoid the error, initialize the `$settings` property as a PowerShell `HashTable` as follows:
419+
> You can see the supplied backslash `\` and quote `"` characters in the Azure portal. Check the contents of the settings JSON file under **Settings** > **Extensions + Applications**. To avoid the error, initialize the `$settings` property as a PowerShell `Hashtable` as follows:
419420
>
420421
> ```powershell
421422
> $settings = @{"secretsManagementSettings" = @{"pollingIntervalInS"="<pollingInterval>"; "certificateStoreName"="<certStoreName>";"certificateStoreLocation"="<certStoreLoc>";"observedCertificates"=@("<observedCert1>", "<observedCert2>")};"authenticationSettings"=@{"msiEndpoint"="<msiEndpoint>";"msiClientId"="<msiClientId>"} }

0 commit comments

Comments
 (0)