Skip to content

Commit 5b03cbd

Browse files
authored
Merge pull request #206685 from MikeRayMSFT/20220802-owner-mikhailalmeida
Update metadata for owner for Arc data security docs
2 parents d5bef99 + 756f605 commit 5b03cbd

9 files changed

+33
-31
lines changed

articles/azure-arc/data/active-directory-introduction.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ description: Introduction to Azure Arc-enabled data services with Active Directo
44
services: azure-arc
55
ms.service: azure-arc
66
ms.subservice: azure-arc-data
7-
author: cloudmelon
8-
ms.author: melqin
7+
author: mikhailalmeida
8+
ms.author: mialmei
99
ms.reviewer: mikeray
1010
ms.date: 04/15/2022
1111
ms.topic: how-to

articles/azure-arc/data/active-directory-prerequisites.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ description: Deploy Azure Arc-enabled data services in Active Directory authenti
44
services: azure-arc
55
ms.service: azure-arc
66
ms.subservice: azure-arc-data
7-
author: cloudmelon
8-
ms.author: melqin
7+
author: mikhailalmeida
8+
ms.author: mialmei
99
ms.reviewer: mikeray
1010
ms.date: 04/21/2022
1111
ms.topic: how-to

articles/azure-arc/data/connect-active-directory-sql-managed-instance.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ description: Connect to AD-integrated Azure Arc-enabled SQL Managed Instance
44
services: azure-arc
55
ms.service: azure-arc
66
ms.subservice: azure-arc-data
7-
author: cloudmelon
8-
ms.author: melqin
7+
author: mikhailalmeida
8+
ms.author: mialmei
99
ms.reviewer: mikeray
1010
ms.date: 12/15/2021
1111
ms.topic: how-to

articles/azure-arc/data/deploy-active-directory-connector-cli.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ description: Tutorial to deploy an Active Directory connector using Azure CLI
44
services: azure-arc
55
ms.service: azure-arc
66
ms.subservice: azure-arc-data
7-
author: cloudmelon
8-
ms.author: melqin
7+
author: mikhailalmeida
8+
ms.author: mialmei
99
ms.reviewer: mikeray
1010
ms.date: 05/05/2022
1111
ms.topic: how-to
@@ -22,7 +22,7 @@ This article explains how to deploy an Active Directory (AD) connector using Azu
2222

2323
### Install tools
2424

25-
Before you can proceed with the tasks in this article you need to install the following tools:
25+
Before you can proceed with the tasks in this article, install the following tools:
2626

2727
- The [Azure CLI (az)](/cli/azure/install-azure-cli)
2828
- The [`arcdata` extension for Azure CLI](install-arcdata-extension.md)
@@ -276,7 +276,7 @@ az arcdata ad-connector update
276276

277277
To delete an AD connector instance, use `az arcdata ad-connector delete`. See the following examples for both connectivity modes:
278278

279-
### [Indirectly-Connected mode](#tab/indirectly-connected-mode)
279+
### [Indirectly connected mode](#tab/indirectly-connected-mode)
280280

281281
```azurecli
282282
az arcdata ad-connector delete --name < AD Connector name > --k8s-namespace < namespace > --use-k8s
@@ -288,7 +288,7 @@ Example:
288288
az arcdata ad-connector delete --name arcadc --k8s-namespace arc --use-k8s
289289
```
290290

291-
### [Directly-Connected mode](#tab/directly-connected-mode)
291+
### [Directly connected mode](#tab/directly-connected-mode)
292292
```azurecli
293293
az arcdata ad-connector delete --name < AD Connector name > --data-controller-name < data controller name > --resource-group < resource group >
294294
```

articles/azure-arc/data/deploy-active-directory-sql-managed-instance-cli.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ description: Explains how to deploy Active Directory integrated Azure Arc-enable
44
services: azure-arc
55
ms.service: azure-arc
66
ms.subservice: azure-arc-data
7-
author: cloudmelon
8-
ms.author: melqin
7+
author: mikhailalmeida
8+
ms.author: mialmei
99
ms.reviewer: mikeray
1010
ms.date: 04/28/2022
1111
ms.topic: how-to
@@ -227,7 +227,7 @@ az sql mi-arc create
227227
To delete a SQL Managed Instance, use `az sql mi-arc delete`. See the following examples for both connectivity modes:
228228

229229

230-
### [Indirectly-Connected mode](#tab/indirectly-connected-mode)
230+
### [Indirectly connected mode](#tab/indirectly-connected-mode)
231231

232232
```azurecli
233233
az sql mi-arc delete --name < SQL MI name > --k8s-namespace < namespace > --use-k8s
@@ -239,7 +239,7 @@ Example:
239239
az sql mi-arc delete --name contososqlmi --k8s-namespace arc --use-k8s
240240
```
241241

242-
### [Directly-Connected mode](#tab/directly-connected-mode)
242+
### [Directly connected mode](#tab/directly-connected-mode)
243243

244244
```azurecli
245245
az sql mi-arc delete --name < SQL MI name > --resource-group < resource group >

articles/azure-arc/data/deploy-active-directory-sql-managed-instance.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ description: Explains how to deploy Active Directory integrated Azure Arc-enable
44
services: azure-arc
55
ms.service: azure-arc
66
ms.subservice: azure-arc-data
7-
author: cloudmelon
8-
ms.author: melqin
7+
author: mikhailalmeida
8+
ms.author: mialmei
99
ms.reviewer: mikeray
1010
ms.date: 04/05/2022
1111
ms.topic: how-to

articles/azure-arc/data/deploy-customer-managed-keytab-active-directory-connector.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ description: Tutorial to deploy a customer-managed keytab Active Directory (AD)
44
services: azure-arc
55
ms.service: azure-arc
66
ms.subservice: azure-arc-data
7-
author: cloudmelon
8-
ms.author: melqin
7+
author: mikhailalmeida
8+
ms.author: mialmei
99
ms.reviewer: mikeray
1010
ms.date: 04/05/2022
1111
ms.topic: how-to

articles/azure-arc/data/deploy-system-managed-keytab-active-directory-connector.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ description: Tutorial to deploy a system-managed keytab Active Directory connect
44
services: azure-arc
55
ms.service: azure-arc
66
ms.subservice: azure-arc-data
7-
author: cloudmelon
8-
ms.author: melqin
7+
author: mikhailalmeida
8+
ms.author: mialmei
99
ms.reviewer: mikeray
1010
ms.date: 04/05/2022
1111
ms.topic: how-to

articles/azure-arc/data/rotate-user-tls-certificate.md

Lines changed: 12 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ description: Rotate user-provided TLS certificate in indirectly connected Azure
44
services: azure-arc
55
ms.service: azure-arc
66
ms.subservice: azure-arc-data
7-
author: cloudmelon
8-
ms.author: melqin
7+
author: mikhailalmeida
8+
ms.author: mialmei
99
ms.reviewer: mikeray
1010
ms.date: 12/15/2021
1111
ms.topic: how-to
@@ -23,7 +23,7 @@ Examples in this article use OpenSSL. [OpenSSL](https://www.openssl.org/) is an
2323

2424
## Generate certificate request using `openssl`
2525

26-
If the managed instance uses a self-signed certificate, make sure sure all needed Subject Alternative Names (SANs) are added. The SAN is an extension to X.509 that allows various values to be associated with a security certificate using a `subjectAltName` field, the SAN field lets you specify additional host names (sites, IP addresses, common names, and etc.) to be protected by a single SSL certificate, such as a multi-domain SAN or extended validation multi-domain SSL certificate.
26+
If the managed instance uses a self-signed certificate, add all needed Subject Alternative Names (SANs). The SAN is an extension to X.509 that allows various values to be associated with a security certificate using a `subjectAltName` field, the SAN field lets you specify additional host names (sites, IP addresses, common names, and etc.) to be protected by a single SSL certificate, such as a multi-domain SAN or extended validation multi-domain SSL certificate.
2727

2828
To generate certificate on your own, you need to create a certificate signing request (CSR). Verify the configuration for the certificate has a common name with required SANs and has a CA issuer. For example:
2929

@@ -36,13 +36,14 @@ Run the following command to check the required SANs:
3636
```console
3737
openssl x509 -in /<cert path>/<filename>.pem -text
3838
```
39-
The following is an example to use this command :
39+
40+
The following example demonstrates this command:
4041

4142
```console
4243
openssl x509 -in ./mssql-certificate.pem -text
4344
```
4445

45-
The command returns the following output :
46+
The command returns the following output:
4647

4748
```output
4849
Certificate:
@@ -53,7 +54,7 @@ Certificate:
5354
Issuer: CN = Cluster Certificate Authority
5455
Validity
5556
Not Before: Mmm dd hh:mm:ss yyyy GMT
56-
Not After : Mmm dd hh:mm:ss yyyy GMT
57+
Not After: Mmm dd hh:mm:ss yyyy GMT
5758
Subject: CN = mi4-svc
5859
Subject Public Key Info:
5960
Public Key Algorithm: rsaEncryption
@@ -75,7 +76,8 @@ MIIDNjCCAh6gAwIB ...==
7576
-----END CERTIFICATE-----
7677
```
7778

78-
An exemplary output is as the following :
79+
Example output:
80+
7981
```output
8082
X509v3 Subject Alternative Name:
8183
DNS:mi1-svc, DNS:mi1-svc.test.svc.cluster.local, DNS:mi1-svc.test.svc
@@ -89,13 +91,13 @@ DNS:mi1-svc, DNS:mi1-svc.test.svc.cluster.local, DNS:mi1-svc.test.svc
8991
base64 /<path>/<file> > cert.txt
9092
```
9193

92-
For Windows users, use [certutil](/windows-server/administration/windows-commands/certutil) utility to perform Base64 encoding and decoding as the following command :
94+
For Windows users, use [certutil](/windows-server/administration/windows-commands/certutil) utility to perform Base64 encoding and decoding as the following command:
9395

9496
```console
9597
$certutil -encode -f input.txt b64-encoded.txt
9698
```
9799

98-
You will need to remove the header in the output file manually or using the following command :
100+
Remove the header in the output file manually, or use the following command:
99101

100102
```console
101103
$findstr /v CERTIFICATE b64-encoded.txt> updated-b64.txt
@@ -192,7 +194,7 @@ spec:
192194
tier: GeneralPurpose
193195
```
194196

195-
You can use the following kubectl command to apply this setting :
197+
You can use the following kubectl command to apply this setting:
196198

197199
```console
198200
kubectl apply -f <my-sql-mi-yaml-file>

0 commit comments

Comments
 (0)