Skip to content

Commit 56a8c49

Browse files
authored
Merge pull request #125425 from ThimoReumerman/patch-1
Update Active Directory to Microsoft Entra at articles/private-link/private-link-service-overview.md
2 parents e45a229 + ac7983a commit 56a8c49

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/private-link/private-link-service-overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: What is Azure Private Link service?
33
description: Learn about Azure Private Link service.
44
services: private-link
5-
author: abell
5+
author: AbdullahBell
66
ms.service: azure-private-link
77
ms.topic: concept-article
88
ms.date: 10/15/2024
@@ -67,7 +67,7 @@ A Private Link service specifies the following properties:
6767

6868
- The Private Link Service must be deployed in the same region as the virtual network and the Standard Load Balancer.
6969

70-
- A single Private Link Service can be accessed from multiple Private Endpoints belonging to different virtual networks, subscriptions and/or Active Directory tenants. The connection is established through a connection workflow.
70+
- A single Private Link Service can be accessed from multiple Private Endpoints belonging to different virtual networks, subscriptions and/or Microsoft Entra tenants. The connection is established through a connection workflow.
7171

7272
- Multiple Private Link services can be created on the same Standard Load Balancer using different front-end IP configurations. There are limits to the number of Private Link services you can create per Standard Load Balancer and per subscription. For details, see [Azure limits](../azure-resource-manager/management/azure-subscription-service-limits.md#networking-limits).
7373

@@ -91,7 +91,7 @@ Complete alias: *Prefix*. {GUID}.*region*.azure.privatelinkservice
9191

9292
The Private Link service provides you with three options in the **Visibility** setting to control the exposure of your service. Your visibility setting determines whether a consumer can connect to your service. Here are the visibility setting options, from most restrictive to least restrictive:
9393

94-
- **Role-based access control only**: If your service is for private consumption from different virtual networks that you own, use role-based access control inside subscriptions that are associated with the same Active Directory tenant. **Cross tenant visibility is permitted through role-based access control**.
94+
- **Role-based access control only**: If your service is for private consumption from different virtual networks that you own, use role-based access control inside subscriptions that are associated with the same Microsoft Entra tenant. **Cross tenant visibility is permitted through role-based access control**.
9595

9696
- **Restricted by subscription**: If your service will be consumed across different tenants, you can restrict the exposure to a limited set of subscriptions that you trust. Authorizations can be pre-approved.
9797

0 commit comments

Comments
 (0)