Skip to content

Commit 58538cb

Browse files
committed
add toc entry
2 parents bd4e3e1 + 330c7bf commit 58538cb

File tree

52 files changed

+613
-423
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

52 files changed

+613
-423
lines changed

articles/active-directory-b2c/string-transformations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -446,7 +446,7 @@ The following example generates an error message when an account is already in t
446446
</Localization>
447447
```
448448

449-
The claims transformation creates a response message based on the localized string. The message contains the user's email address embedded into the localized sting *ResponseMessage_EmailExists*.
449+
The claims transformation creates a response message based on the localized string. The message contains the user's email address embedded into the localized string *ResponseMessage_EmailExists*.
450450

451451
```xml
452452
<ClaimsTransformation Id="SetResponseMessageForEmailAlreadyExists" TransformationMethod="FormatLocalizedString">

articles/app-service/includes/quickstart-custom-container/quickstart-custom-container-linux-azure-portal-pivot.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ For more information about containerized applications in a serverless environmen
1515
## Prerequisites
1616

1717
- An [Azure account](https://azure.microsoft.com/free/?utm_source=campaign&utm_campaign=vscode-tutorial-docker-extension&mktingSource=vscode-tutorial-docker-extension)
18-
- An [Azure container registry](/azure/container-registry/container-registry-get-started-portal)
18+
- An [Azure Container Registry](/azure/container-registry/container-registry-get-started-portal)
1919
- [Azure CLI](/cli/azure/install-azure-cli)
2020
- [Docker](https://www.docker.com/community-edition)
2121

@@ -91,7 +91,7 @@ Sign in to the [Azure portal](https://portal.azure.com).
9191

9292
1. At the top of the page, select the **Container** tab.
9393

94-
1. In the **Container** tab, for **Image Source**, select **Azure Container Registry**. Under **Azure container registry options**, set the following values:
94+
1. In the **Container** tab, for **Image Source**, select **Azure Container Registry**. Under **Azure Container Registry options**, set the following values:
9595

9696
- **Registry**: Select your Azure Container Registry.
9797
- **Image**: Select **dotnetcore-docs-hello-world-linux**.

articles/app-service/includes/quickstart-custom-container/quickstart-custom-container-linux-visual-studio-code-pivot.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ This quickstart uses Azure Container Registry as the registry. You can use other
2727
Create a container registry by following the instructions in [Quickstart: Create a private container registry using the Azure portal](/azure/container-registry/container-registry-get-started-portal).
2828

2929
> [!IMPORTANT]
30-
> Be sure to set the **Admin User** option to **Enable** when you create the Azure container registry. You can also set it from the **Access keys** section of your registry page in the Azure portal. This setting is required for App Service access. For managed identity, see [Deploy from ACR tutorial](../../tutorial-custom-container.md?pivots=container-linux#vi-configure-the-web-app).
30+
> Be sure to set the **Admin User** option to **Enable** when you create the Azure Container Registry. You can also set it from the **Access keys** section of your registry page in the Azure portal. This setting is required for App Service access. For managed identity, see [Deploy from ACR tutorial](../../tutorial-custom-container.md?pivots=container-linux#vi-configure-the-web-app).
3131
3232
## Sign in
3333

@@ -132,7 +132,7 @@ docker --version
132132
1. Make sure the image tag begins with `<acr-name>.azurecr.io` and press **Enter**.
133133
1. When Visual Studio Code finishes pushing the image to your container registry, select **Refresh** at the top of the **REGISTRIES** explorer and verify that the image is pushed successfully.
134134

135-
:::image type="content" source="../../media/quickstart-docker/image-in-registry.png" alt-text="Screenshot shows the image deployed to Azure container registry.":::
135+
:::image type="content" source="../../media/quickstart-docker/image-in-registry.png" alt-text="Screenshot shows the image deployed to Azure Container Registry.":::
136136

137137
## Deploy to App Service
138138

articles/app-service/includes/quickstart-custom-container/quickstart-custom-container-windows-azure-portal-pivot.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ This quickstart shows you how to deploy an ASP.NET app in a Windows image from A
1414
## Prerequisites
1515

1616
- An [Azure account](https://azure.microsoft.com/free/?utm_source=campaign&utm_campaign=vscode-tutorial-docker-extension&mktingSource=vscode-tutorial-docker-extension)
17-
- An [Azure container registry](/azure/container-registry/container-registry-get-started-portal)
17+
- An [Azure Container Registry](/azure/container-registry/container-registry-get-started-portal)
1818
- [Azure CLI](/cli/azure/install-azure-cli)
1919
- [Install Docker for Windows](https://docs.docker.com/docker-for-windows/install/)
2020
- [Switch Docker to run Windows containers](/virtualization/windowscontainers/quick-start/quick-start-windows-10)
@@ -94,7 +94,7 @@ Sign in to the [Azure portal](https://portal.azure.com).
9494
9595
1. At the top of the page, select the **Container** tab.
9696
97-
1. In the **Container** tab, for **Image Source**, select **Azure Container Registry** . Under **Azure container registry options**, set the following values:
97+
1. In the **Container** tab, for **Image Source**, select **Azure Container Registry** . Under **Azure Container Registry options**, set the following values:
9898
9999
- **Registry**: Select your Azure Container Registry.
100100
- **Image**: Select **dotnetcore-docs-hello-world-linux**.
@@ -137,7 +137,7 @@ The App Service app pulls from the container registry each time it starts. If yo
137137
- [Secure with custom domain and certificate](../../tutorial-secure-domain-certificate.md)
138138
- [Integrate your app with an Azure virtual network](../../overview-vnet-integration.md)
139139
- [Use Private Endpoints for App Service apps](../../networking/private-endpoint.md)
140-
- [Use Azure container registry with Private Link](/azure/container-registry/container-registry-private-link)
140+
- [Use Azure Container Registry with Private Link](/azure/container-registry/container-registry-private-link)
141141
- [Migrate to Windows container in Azure](../../tutorial-custom-container.md)
142142
- [Deploy a container with Azure Pipelines](../../deploy-container-azure-pipelines.md)
143143
- [Deploy a container with GitHub Actions](../../deploy-container-github-action.md)

articles/app-service/tutorial-dotnetcore-sqldb-app.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ In this tutorial, you learn how to:
3636
::: zone pivot="azure-portal"
3737

3838
* An Azure account with an active subscription. If you don't have an Azure account, you [can create one for free](https://azure.microsoft.com/free).
39-
* A GitHub account. you can also [get one for free](https://github.com/join).
39+
* A GitHub account. You can also [get one for free](https://github.com/join).
4040
* Knowledge of ASP.NET Core development.
4141
* **(Optional)** To try GitHub Copilot, a [GitHub Copilot account](https://docs.github.com/copilot/using-github-copilot/using-github-copilot-code-suggestions-in-your-editor). A 30-day free trial is available.
4242

@@ -83,7 +83,7 @@ First, you set up a sample data-driven app as a starting point. For your conveni
8383
:::column span="2":::
8484
**Step 2:** In the GitHub fork:
8585
1. Select **main** > **starter-no-infra** for the starter branch. This branch contains just the sample project and no Azure-related files or configuration.
86-
1. Select **Code** > **Create codespace on starter-no-infra**.
86+
1. Select **Code** > **Codespaces** > **Create codespace on starter-no-infra**.
8787
The codespace takes a few minutes to set up.
8888
:::column-end:::
8989
:::column:::
@@ -212,9 +212,10 @@ The creation wizard generated the connectivity variable for you already as [.NET
212212
1. Select the **Networking** tab.
213213
1. Unselect **Enable public access**.
214214
1. Select **Create a private endpoint**.
215-
1. In **Resource Group**, select **msdocs-core-sql-tutorial**.
215+
1. In **Resource group**, select **msdocs-core-sql-tutorial**.
216216
1. In the dialog, in **Location**, select the same location as your App Service app.
217217
1. In **Name**, type **msdocs-core-sql-XYZVvaultEndpoint**.
218+
1. In **Location**, select the same location as your App Service app.
218219
1. In **Virtual network**, select **msdocs-core-sql-XYZVnet**.
219220
1. In **Subnet**, **msdocs-core-sql-XYZSubnet**.
220221
1. Select **OK**.
@@ -265,7 +266,7 @@ The creation wizard generated the connectivity variable for you already as [.NET
265266
:::row:::
266267
:::column span="2":::
267268
**Step 7: Configure the Redis connector to use Key Vault secrets**
268-
1. In the Service Connectors page, select the checkbox next to the Cache for Redis connector, then select **Edit**.
269+
1. In the Service Connector page, select the checkbox next to the Cache for Redis connector, then select **Edit**.
269270
1. Select the **Authentication** tab.
270271
1. Select **Store Secret in Key Vault**.
271272
1. Under **Key Vault Connection**, select the key vault you created.
@@ -425,7 +426,7 @@ With the SQL Database protected by the virtual network, the easiest way to run [
425426
:::column span="2":::
426427
**Step 1:** Back in the App Service page, in the left menu,
427428
1. Select **Development Tools** > **SSH**.
428-
1. Select **Go**.
429+
1. Select **Go**. (The start up takes a few minutes.)
429430
:::column-end:::
430431
:::column:::
431432
:::image type="content" source="./media/tutorial-dotnetcore-sqldb-app/azure-portal-generate-db-schema-1.png" alt-text="A screenshot showing how to open the SSH shell for your app from the Azure portal." lightbox="./media/tutorial-dotnetcore-sqldb-app/azure-portal-generate-db-schema-1.png":::

articles/azure-functions/functions-bindings-web-pubsub.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ The Web PubSub extension is part of an [extension bundle], which is specified in
7272
By default, an application setting named `WebPubSubConnectionString` is used to store your Web PubSub connection string. When you choose to use a different setting name for your connection, you must explicitly set that as the key name in your binding definitions. During local development, you must also add this setting to the `Values` collection in the the [_local.settings.json_ file](./functions-develop-local.md#local-settings-file).
7373

7474
> [!IMPORTANT]
75-
> A connection string includes the authorization information required for your application to access Azure Web PubSub service. The access key inside the connection string is similar to a root password for your service. For optimal security, your function app should use managed idenities when connecting to the Web PubSub service instead of using a connection string. For more information, see [Authorize a managed identity request by using Microsoft Entra ID](../azure-web-pubsub/howto-authorize-from-managed-identity.md).
75+
> A connection string includes the authorization information required for your application to access Azure Web PubSub service. The access key inside the connection string is similar to a root password for your service. For optimal security, your function app should use managed identities when connecting to the Web PubSub service instead of using a connection string. For more information, see [Authorize a managed identity request by using Microsoft Entra ID](../azure-web-pubsub/howto-authorize-from-managed-identity.md).
7676
7777
For details on how to configure and use Web PubSub and Azure Functions together, refer to [Tutorial: Create a serverless notification app with Azure Functions and Azure Web PubSub service](../azure-web-pubsub/tutorial-serverless-notification.md).
7878

articles/azure-netapp-files/configure-customer-managed-keys-hardware.md

Lines changed: 1 addition & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: azure-netapp-files
77
ms.workload: storage
88
ms.topic: how-to
99
ms.custom: references_regions
10-
ms.date: 05/09/2025
10+
ms.date: 05/20/2025
1111
ms.author: anfdocs
1212
---
1313
# Configure customer-managed keys with managed Hardware Security Module for Azure NetApp Files volume encryption
@@ -72,26 +72,6 @@ Azure NetApp Files volume encryption with customer-managed keys with the managed
7272
* West US 2
7373
* West US 3
7474

75-
## Register the feature
76-
77-
This feature is currently in preview. You need to register the feature before using it for the first time. After registration, the feature is enabled and works in the background. No UI control is required.
78-
79-
1. Register the feature:
80-
81-
```azurepowershell-interactive
82-
Register-AzProviderFeature -ProviderNamespace Microsoft.NetApp -FeatureName ANFManagedHsmEncryption
83-
```
84-
85-
2. Check the status of the feature registration:
86-
87-
> [!NOTE]
88-
> The **RegistrationState** may be in the `Registering` state for up to 60 minutes before changing to`Registered`. Wait until the status is **Registered** before continuing.
89-
90-
```azurepowershell-interactive
91-
Get-AzProviderFeature -ProviderNamespace Microsoft.NetApp -FeatureName ANFManagedHsmEncryption
92-
```
93-
You can also use [Azure CLI commands](/cli/azure/feature) `az feature register` and `az feature show` to register the feature and display the registration status.
94-
9575
## Configure customer-managed keys with managed HSM for system-assigned identity
9676

9777
When you configure customer-managed keys with a system-assigned identity, Azure configures the NetApp account automatically by adding a system-assigned identity. The access policy is created on your Azure Key Vault with key permissions of Get, Encrypt, and Decrypt.

articles/azure-netapp-files/whats-new.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: b-hchen
66
ms.service: azure-netapp-files
77
ms.custom: linux-related-content
88
ms.topic: overview
9-
ms.date: 05/09/2025
9+
ms.date: 05/20/2025
1010
ms.author: anfdocs
1111
---
1212

@@ -16,6 +16,12 @@ Azure NetApp Files is updated regularly. This article provides a summary about t
1616

1717
## May 2025
1818

19+
* [Volume encryption with customer-managed keys with managed Hardware Security Module (HSM)](configure-customer-managed-keys-hardware.md) is now generally available (GA)
20+
21+
Azure NetApp Files volume encryption choices have expanded to offer support for customer-managed keys for Azure NetApp Files volume encryption with Azure Key Vault Managed HSM.
22+
23+
This feature offers increased security from FIPS 140-2 Level 2 to FIPS 140-2 Level 3 for critical deployments. Various applications that leverage HSM security include payment processing, application-level encryption, and authentication. Industry verticals that use HSMs include financial services, public sector, IT/Telco (secure communications), and energy (securing critical infrastructure).
24+
1925
* [Application volume group for Oracle](configure-application-volume-oracle-api.md#replication) now supports cross-zone and cross-region replication (preview)
2026

2127
[Application volume group for Oracle](application-volume-group-oracle-introduction.md) now supports [cross-region](cross-region-replication-introduction.md) and [cross-zone replication](cross-zone-replication-introduction.md) to improve the resilience and data protection of your Oracle deployments. With cross-zone and cross-region replication, Azure NetApp Files only replicates changed blocks across regions or zones, enabling a lower restore point objective. To understand more of the benefits of each option, see [Understand data protection and disaster recovery options in Azure NetApp Files](data-protection-disaster-recovery-options.md).

0 commit comments

Comments
 (0)