Skip to content

Commit 6ab0e91

Browse files
committed
edits
1 parent 81f4cca commit 6ab0e91

File tree

5 files changed

+138
-139
lines changed

5 files changed

+138
-139
lines changed

articles/azure-web-pubsub/howto-custom-domain.md

Lines changed: 42 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -24,80 +24,81 @@ In addition to the default domain that the Azure Web PubSub service provides, yo
2424

2525
Before you can add a custom domain, add a matching custom certificate. A custom certificate is a resource of your instance of Web PubSub. It references a certificate in your key vault. For security and compliance, Web PubSub doesn't permanently store your certificate. Instead, it fetches the certificate from your key vault and keeps it in memory.
2626

27-
### Step 1: Grant your Web PubSub resource access to Key Vault
27+
### Step 1: Grant your Web PubSub resource access to the key vault
2828

2929
Azure Web PubSub Service uses Managed Identity to access your Key Vault. In order to authorize, it needs to be granted permissions.
3030

3131
1. In the Azure portal, go to your Azure Web PubSub resource.
3232
1. On the left pane, select **Identity**.
3333

34-
1. Select the type of identity you want to use: **System assigned** or **User assigned**. To use a user-assigned identity, first you create one.
34+
1. Select the type of identity to use: **System assigned** or **User assigned**. To use a user-assigned identity, first you create one.
3535

3636
To use a system-assigned identity:
3737

3838
1. Select **On**.
3939
1. Select **Yes** to confirm.
4040
1. Select **Save**.
4141

42-
:::image type="content" alt-text="Screenshot of enabling system assigned managed identity." source="media\howto-custom-domain\portal-identity.png" :::
42+
:::image type="content" alt-text="Screenshot of enabling a system-assigned managed identity." source="media\howto-custom-domain\portal-identity.png" :::
4343

4444
To use a user-assigned identity:
4545

4646
1. Select **Add user assigned managed identity**.
4747
1. Select an existing identity.
4848
1. Select **Add**.
4949

50-
:::image type="content" alt-text="Screenshot of enabling user assigned managed identity." source="media\howto-custom-domain\portal-user-assigned-identity.png" :::
50+
:::image type="content" alt-text="Screenshot of enabling a user-assigned managed identity." source="media\howto-custom-domain\portal-user-assigned-identity.png" :::
5151

5252
1. Select **Save**.
5353

5454
Depending on how you configure your Azure Key Vault permissions model, you might need to grant permissions at different locations in the Azure portal.
5555

5656
#### [Vault access policy](#tab/vault-access-policy)
5757

58-
If you're using Key Vault built-in access policy as Key Vault permission model:
58+
If you use a key vault built-in access policy as a key vault permissions model:
5959

60-
:::image type="content" alt-text="Screenshot of built-in access policy selected as Key Vault permission model." source="media\howto-custom-domain\portal-key-vault-perm-model-access-policy.png" :::
60+
:::image type="content" alt-text="Screenshot of a built-in access policy selected as the key vault permissions model." source="media\howto-custom-domain\portal-key-vault-perm-model-access-policy.png" :::
6161

6262
1. Go to your Key Vault resource.
63-
1. In the menu pane, select **Access configuration**.
63+
1. On the left menu, select **Access configuration**.
6464
1. Select **Vault access policy**.
6565
1. Select **Go to access policies**.
6666
1. Select **Create**.
67-
1. Select **Secret Get** permission.
68-
1. Select **Certificate Get** permission.
67+
1. On the **Create an access policy** pane, select the **Permissions** tab.
68+
1. For **Secret permissions**, select **Get**.
69+
1. For **Certificate permissions**, select **Get**.
6970
1. Select **Next**.
7071

71-
:::image type="content" alt-text="Screenshot of permissions selection in Key Vault." source="media\howto-custom-domain\portal-key-vault-permissions.png" :::
72+
:::image type="content" alt-text="Screenshot of permissions selection in a key vault." source="media\howto-custom-domain\portal-key-vault-permissions.png" :::
7273

73-
1. Search for the Azure Web PubSub resource name.
74+
1. Search for the Web PubSub resource name.
7475
1. Select **Next**.
7576

76-
:::image type="content" alt-text="Screenshot of principal selection in Key Vault." source="media\howto-custom-domain\portal-key-vault-principal.png" :::
77+
:::image type="content" alt-text="Screenshot of principal selection in a key vault." source="media\howto-custom-domain\portal-key-vault-principal.png" :::
7778

78-
1. Select **Next** on the **Application** tab.
79+
1. Select the **Application** tab, and then select **Next**.
7980
1. Select **Create**.
8081

8182
#### [Azure role-based access control](#tab/azure-rbac)
8283

8384
If you're using Azure role-based access control as Key Vault permission model:
8485

85-
:::image type="content" alt-text="Screenshot of Azure RBAC selected as Key Vault permission model." source="media\howto-custom-domain\portal-key-vault-perm-model-rbac.png" :::
86+
:::image type="content" alt-text="Screenshot of Azure RBAC selected as the key vault permission model." source="media\howto-custom-domain\portal-key-vault-perm-model-rbac.png" :::
8687

8788
1. Go to your Key Vault resource.
88-
1. On the left menu, select **Go to access control (IAM)**.
89+
1. On the left menu, select **Access control (IAM)**.
8990
1. Select **Add** > **Add role assignment**.
9091

91-
:::image type="content" alt-text="Screenshot of Key Vault IAM." source="media\howto-custom-domain\portal-key-vault-iam.png" :::
92+
:::image type="content" alt-text="Screenshot of the key vault Access control pane." source="media\howto-custom-domain\portal-key-vault-iam.png" :::
9293

93-
1. Under the **Role** tab, select **Key Vault Secrets User**. Select **Next**.
94+
1. Select the **Role** tab, and then select **Key Vault Secrets User**. Select **Next**.
9495

95-
:::image type="content" alt-text="Screenshot of role tab when adding role assignment to Key Vault." source="media\howto-custom-domain\portal-key-vault-role.png" :::
96+
:::image type="content" alt-text="Screenshot of the Role tab when adding a role assignment to a key vault." source="media\howto-custom-domain\portal-key-vault-role.png" :::
9697

97-
1. Under the **Members** tab, select **Managed identity**.
98-
1. Search for and **Select** the Azure Web PubSub Service resource name or the user assigned identity name.
98+
1. Select the **Members** tab, and then select **Managed identity**.
99+
1. Search for and then select the Web PubSub resource name or the name of the user-assigned identity.
99100

100-
:::image type="content" alt-text="Screenshot of members tab when adding role assignment to Key Vault." source="media\howto-custom-domain\portal-key-vault-members.png" :::
101+
:::image type="content" alt-text="Screenshot of the Members tab when adding a role assignment to a key vault." source="media\howto-custom-domain\portal-key-vault-members.png" :::
101102

102103
1. Select **Next**.
103104
1. Select **Review + assign**.
@@ -106,51 +107,51 @@ If you're using Azure role-based access control as Key Vault permission model:
106107

107108
### Step 2: Create a custom certificate
108109

109-
1. In the Azure portal, go to your Azure Web PubSub Service resource.
110-
1. In the menu pane, select **Custom domain**.
111-
1. In the **Custom certificate** section, select **Add**.
110+
1. In the Azure portal, go to your Web PubSub resource.
111+
1. On the left menu, select **Custom domain**.
112+
1. On the **Custom certificate** pane, select **Add**.
112113

113114
:::image type="content" alt-text="Screenshot of custom certificate management." source="media\howto-custom-domain\portal-custom-certificate-management.png" :::
114115

115-
1. Fill in a name for the custom certificate.
116-
1. Select **Select from your Key Vault** to choose a Key Vault certificate. After selection the following **Key Vault Base URI**, the **Key Vault Secret Name** will be automatically filled in. Alternatively you can also fill in these fields manually.
117-
1. Optionally, you can specify a **Key Vault Secret Version** if you want to pin the certificate to a specific version.
116+
1. Enter a name for the custom certificate.
117+
1. Select **Select from your Key Vault** to choose a key vault certificate. After you select a key vault, values for **Key Vault Base URI** and **Key Vault Secret Name** are automatically added. You also have to option to edit these fields manually.
118+
1. (Optional) To pin the certificate to a specific version, enter a value for **Key Vault Secret Version**.
118119
1. Select **Add**.
119120

120121
:::image type="content" alt-text="Screenshot of adding a custom certificate." source="media\howto-custom-domain\portal-custom-certificate-add.png" :::
121122

122-
Azure Web PubSub Service fetches the certificate and validates its contents. When it succeeds, the certificate's **Provisioning State** is **Succeeded**.
123+
Web PubSub fetches the certificate and validates its contents. When certificate validation succeeds, **Provisioning State** for the certificate is **Succeeded**.
123124

124-
:::image type="content" alt-text="Screenshot of an added custom certificate." source="media\howto-custom-domain\portal-custom-certificate-added.png" :::
125+
:::image type="content" alt-text="Screenshot of an added custom certificate." source="media\howto-custom-domain\portal-custom-certificate-added.png" :::
125126

126127
## Create a custom domain CNAME
127128

128-
To validate the ownership of your custom domain, you need to create a CNAME record for the custom domain and point it to the default domain of Azure Web PubSub Service.
129+
To validate the ownership of your custom domain, you need to create a CNAME record for the custom domain and point it to the default domain of your Web PubSub resource.
129130

130-
For example, if your default domain is `contoso.webpubsub.azure.com`, and your custom domain is `contoso.example.com`, you need to create a CNAME record on `example.com` like:
131+
For example, if your default domain is `contoso.webpubsub.azure.com` and your custom domain is `contoso.example.com`, create a CNAME record on `example.com` like in this example:
131132

132133
```plaintext
133134
contoso.example.com. 0 IN CNAME contoso.webpubsub.azure.com.
134135
```
135136

136-
If you're using Azure DNS Zone, see [manage DNS records](../dns/dns-operations-recordsets-portal.md) to learn how to add a CNAME record.
137+
If you're using Azure DNS Zone, see [Manage DNS records](../dns/dns-operations-recordsets-portal.md) to learn how to add a CNAME record.
137138

138-
:::image type="content" alt-text="Screenshot of adding a CNAME record in Azure DNS Zone." source="media\howto-custom-domain\portal-dns-cname.png" :::
139+
:::image type="content" alt-text="Screenshot of adding a CNAME record in Azure DNS Zone." source="media\howto-custom-domain\portal-dns-cname.png" :::
139140

140-
If you're using other DNS providers, follow provider's guide to create a CNAME record.
141+
If you use other DNS providers, use the provider's documentation to create a CNAME record.
141142

142143
## Add a custom domain
143144

144-
A custom domain is another sub resource of your Azure Web PubSub Service. It contains all configurations for a custom domain.
145+
A custom domain is another sub resource of your Web PubSub instance. It contains all configurations that are required for a custom domain.
145146

146-
1. In the Azure portal, go to your Azure Web PubSub Service resource.
147-
1. In the menu pane, select **Custom domain**.
148-
1. Under **Custom domain**, select **Add**.
147+
1. In the Azure portal, go to your Web PubSub resource.
148+
1. On the left menu, select **Custom domain**.
149+
1. On the **Custom domain** pane, select **Add**.
149150

150151
:::image type="content" alt-text="Screenshot of custom domain management." source="media\howto-custom-domain\portal-custom-domain-management.png" :::
151152

152-
1. Enter a name for the custom domain. It's the sub resource name.
153-
1. Enter the domain name. It's the full domain name of your custom domain, for example, `contoso.com`.
153+
1. Enter a name for the custom domain. Use the sub resource name.
154+
1. Enter the domain name. Use the full domain name of your custom domain, for example, `contoso.com`.
154155
1. Select a custom certificate that applies to this custom domain.
155156
1. Select **Add**.
156157

@@ -160,7 +161,7 @@ A custom domain is another sub resource of your Azure Web PubSub Service. It con
160161

161162
You can now access your Web PubSub endpoint by using the custom domain.
162163

163-
To verify the domain, you can access the health API. Here's an example that uses cURL:
164+
To verify the domain, you can access the health API. The following examples use cURL.
164165

165166
#### [PowerShell](#tab/azure-powershell)
166167

articles/azure-web-pubsub/howto-disable-local-auth.md

Lines changed: 20 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Disable local (access key) authentication with Azure Web PubSub Service
3-
description: This article provides information about how to disable access key authentication and use only Microsoft Entra authorization with Azure Web PubSub Service.
2+
title: Disable local (access key) authentication with Azure Web PubSub
3+
description: Learn how to disable access key authentication and use only Microsoft Entra authorization with Azure Web PubSub.
44
author: terencefan
55

66
ms.author: tefa
@@ -10,34 +10,34 @@ ms.custom: devx-track-arm-template
1010
ms.topic: conceptual
1111
---
1212

13-
# Disable local (access key) authentication with Azure Web PubSub Service
13+
# Disable local (access key) authentication with Azure Web PubSub
1414

15-
There are two ways to authenticate to Azure Web PubSub Service resources: Microsoft Entra ID and Access Key. Microsoft Entra ID provides superior security and ease of use over access key. With Microsoft Entra ID, there’s no need to store the tokens in your code and risk potential security vulnerabilities. We recommend that you use Microsoft Entra ID with your Azure Web PubSub Service resources when possible.
15+
Azure Web PubSub resources can authenticate requests in two ways: via a Microsoft Entra ID or via an access key. Microsoft Entra ID provides superior security and ease of use over an access key. If you use Microsoft Entra ID, you don't need to store the tokens in your code and risk potential security vulnerabilities. We recommend that you use Microsoft Entra ID with your Web PubSub resources when possible.
1616

1717
> [!IMPORTANT]
18-
> Disabling local authentication can have following influences.
18+
> Disabling local authentication might have the following results:
1919
>
20-
> - The current set of access keys will be permanently deleted.
21-
> - Tokens signed with current set of access keys will become unavailable.
22-
> - Signature will **NOT** be attached in the upstream request header. Please visit _[how to validate access token](./howto-use-managed-identity.md#validate-access-tokens)_ to learn how to validate requests via Microsoft Entra token.
20+
> - The current set of access keys is permanently deleted.
21+
> - Tokens that are signed by using the current set of access keys become unavailable.
22+
> - A signature will *not* be attached in the upstream request header. Learn how to [validate an access token](./howto-use-managed-identity.md#validate-access-tokens) .
2323
24-
## Use Azure portal
24+
## Use the Azure portal
2525

26-
In this section, you will learn how to use the Azure portal to disable local authentication.
26+
To disable local authentication by using the Azure portal:
2727

28-
1. Navigate to your Web PubSub Service resource in the [Azure portal](https://portal.azure.com).
28+
1. In the [Azure portal](https://portal.azure.com), go to your Web PubSub resource.
2929

30-
2. in the **Settings** section of the menu sidebar, select **Keys** tab.
30+
2. On the left menu under **Settings**, select **Keys**.
3131

32-
3. Select **Disabled** for local authentication.
32+
3. For local authentication, select **Disabled**.
3333

34-
4. Click **Save** button.
34+
4. Select **Save**.
3535

36-
![Screenshot of disabling local auth.](./media/howto-disable-local-auth/disable-local-auth.png)
36+
![Screenshot that shows disabling local authentication.](./media/howto-disable-local-auth/disable-local-auth.png)
3737

38-
## Use Azure Resource Manager template
38+
## Use a Azure Resource Manager template
3939

40-
You can disable local authentication by setting `disableLocalAuth` property to true as shown in the following Azure Resource Manager template.
40+
You can disable local authentication by setting `disableLocalAuth` property to `true` as shown in the following Azure Resource Manager template:
4141

4242
```json
4343
{
@@ -89,13 +89,11 @@ You can disable local authentication by setting `disableLocalAuth` property to t
8989

9090
## Use Azure Policy
9191

92-
You can assign the [Azure Web PubSub Service should have local authentication methods disabled](https://ms.portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2Fb66ab71c-582d-4330-adfd-ac162e78691e) Azure policy to an Azure subscription or a resource group to enforce disabling of local authentication for all Web PubSub resources in the subscription or the resource group.
92+
You can assign the policy [Azure Web PubSub Service should have local authentication methods disabled](https://ms.portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2Fb66ab71c-582d-4330-adfd-ac162e78691e) in Azure Policy to an Azure subscription or to a resource group to enforce disabling local authentication for all Web PubSub resources in the subscription or resource group.
9393

94-
![Screenshot of disabling local auth policy.](./media/howto-disable-local-auth/disable-local-auth-policy.png)
94+
![Screenshot that shows disabling local authentication policy.](./media/howto-disable-local-auth/disable-local-auth-policy.png)
9595

96-
## Next steps
97-
98-
See the following docs to learn about authentication methods.
96+
## Related content
9997

10098
- [Overview of Microsoft Entra ID for Web PubSub](concept-azure-ad-authorization.md)
10199
- [Authenticate with Azure applications](./howto-authorize-from-application.md)

0 commit comments

Comments
 (0)