Skip to content

Commit 6e98a10

Browse files
committed
edits
1 parent 6ab0e91 commit 6e98a10

File tree

5 files changed

+165
-163
lines changed

5 files changed

+165
-163
lines changed

articles/azure-web-pubsub/howto-authorize-from-application.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -55,11 +55,11 @@ To create a client secret:
5555
5656
### Certificate
5757

58-
You can also upload a certification instead of creating a client secret.
58+
You can also upload a certificate instead of creating a client secret.
5959

60-
![Screenshot that shows uploading a certification.](./media/howto-authorize-from-application/upload-certificate.png)
60+
![Screenshot that shows uploading a certificate.](./media/howto-authorize-from-application/upload-certificate.png)
6161

62-
For more information about adding credentials, see [Add credentials](../active-directory/develop/quickstart-register-app.md#add-credentials).
62+
For information about adding credentials, see [Add credentials](../active-directory/develop/quickstart-register-app.md#add-credentials).
6363

6464
## Add a role assignment in the Azure portal
6565

@@ -70,7 +70,7 @@ This section demonstrates how to assign a Web PubSub Service Owner role to a ser
7070
7171
1. In the [Azure portal](https://portal.azure.com/), go to your Web PubSub resource.
7272

73-
1. On the left menu, select **Access control (IAM)** to display access control settings for your Web PubSub service.
73+
1. On the left menu, select **Access control (IAM)** to display access control settings for your Web PubSub resource.
7474

7575
1. Select the **Role assignments** tab and view the role assignments at this scope.
7676

Lines changed: 46 additions & 48 deletions
Original file line numberDiff line numberDiff line change
@@ -1,69 +1,69 @@
11
---
2-
title: Access Key Vault in private network through Shared Private Endpoints
2+
title: Access a key vault in a private network via shared private endpoints
33
titleSuffix: Azure Web PubSub Service
4-
description: How to access key vault in private network through Shared Private Endpoints
4+
description: Learn how to access a key vault in private network through shared private endpoints.
55
author: ArchangelSDY
66
ms.service: azure-web-pubsub
77
ms.custom: devx-track-azurecli
88
ms.topic: how-to
9-
ms.date: 03/27/2023
9+
ms.date: 08/16/2024
1010
ms.author: dayshen
1111
---
1212

13-
# Access Key Vault in private network through shared private endpoints
13+
# Access a key vault in a private network through shared private endpoints
1414

15-
Azure Web PubSub Service can access your Key Vault in a private network through shared private endpoints connections. This article shows you how to configure your Web PubSub service instance to route outbound calls to a key vault through a shared private endpoint rather than public network.
15+
Azure Web PubSub can access a key vault in a private network through shared private endpoint connections. This article shows you how to configure your Web PubSub resource to route outbound calls to a key vault through a shared private endpoint instead of through a public network.
1616

17-
:::image type="content" alt-text="Diagram showing architecture of shared private endpoint." source="media\howto-secure-shared-private-endpoints-key-vault\shared-private-endpoint-overview.png" :::
17+
:::image type="content" alt-text="Diagram showing architecture of shared private endpoint." source="media\howto-secure-shared-private-endpoints-key-vault\shared-private-endpoint-overview.png" :::
1818

19-
Private endpoints of secured resources created through Azure Web PubSub Service APIs are referred to as *shared private-link resources*. This is because you're "sharing" access to a resource, such as an Azure Key Vault, that has been integrated with the [Azure Private Link service](../private-link/private-link-overview.md). These private endpoints are created inside the Azure Web PubSub Service execution environment and aren't directly visible to you.
19+
Private endpoints of secured resources created through Azure Web PubSub APIs are called *shared private link resources*. You "share" access to a resource, such as an instance of Azure Key Vault, that is integrated with [Azure Private Link](../private-link/private-link-overview.md). These private endpoints are created inside the Web PubSub execution environment and aren't directly visible to you.
2020

2121
> [!NOTE]
2222
> The examples in this article use the following resource IDs:
2323
>
24-
> * The resource ID of this Azure Web PubSub Service is _/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/contoso/providers/Microsoft.SignalRService/webpubsub/contoso-webpubsub .
25-
> * The resource ID of Azure Key Vault is */subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/contoso/providers/Microsoft.KeyVault/vaults/contoso-kv*.
24+
> * The resource ID of this Azure Web PubSub instance is `_/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/contoso/providers/Microsoft.SignalRService/webpubsub/contoso-webpubsub`.
25+
> * The resource ID of the Azure Key Vault instance is `/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/contoso/providers/Microsoft.KeyVault/vaults/contoso-kv`.
2626
>
27-
> When following the steps, substitute the resource IDs of your Azure Web PubSub Service and Azure Key Vault.
27+
> To use the steps in the following examples, replace these values with your own subscription ID, the name of your Web PubSub resource, and the name of your Azure Key Vault resource.
2828
2929
## Prerequisites
3030

31-
* An Azure subscription, if you don't have one, create a [free account].(<https://azure.microsoft.com/free/?WT.mc_id=A261C142F>).
32-
* [Azure CLI](/cli/azure/install-azure-cli) 2.25.0 or later (if using Azure CLI)._
33-
* An Azure Web PubSub Service instance in a **Standard** pricing tier or higher
31+
* An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
32+
* The [Azure CLI](/cli/azure/install-azure-cli) 2.25.0 or later (if you use the Azure CLI).
33+
* An Azure Web PubSub instance in a minimum Standard pricing tier.
3434
* An Azure Key Vault resource.
3535

36-
### 1. Create a shared private endpoint resource to the Key Vault
36+
### Create a shared private endpoint resource to the key vault
3737

3838
#### [Azure portal](#tab/azure-portal)
3939

40-
1. In the Azure portal, go to your Azure Web PubSub Service resource page.
41-
1. Select **Networking** from the menu.
40+
1. In the Azure portal, go to your Azure Web PubSub resource.
41+
1. On the left menu, select **Networking**.
4242
1. Select the **Private access** tab.
4343
1. Select **Add shared private endpoint**.
4444

4545
:::image type="content" alt-text="Screenshot of shared private endpoints management." source="media\howto-secure-shared-private-endpoints-key-vault\portal-shared-private-endpoints-management.png" lightbox="media\howto-secure-shared-private-endpoints-key-vault\portal-shared-private-endpoints-management.png" :::
4646

47-
1. Enter a **Name** for the shared private endpoint.
48-
1. Enter your key vault resource by choosing **Select from your resources** and selecting your resource from the lists, or by choosing **Specify resource ID** and entering your key vault resource ID.
49-
1. Enter *please approve* for the **Request message**.
47+
1. For **Name**, enter a name to use for the shared private endpoint.
48+
1. Enter your key vault resource: Choose **Select from your resources** and then select your resource from the lists, or select **Specify resource ID** and enter your key vault resource ID.
49+
1. For **Request message**, enter **please approve**.
5050
1. Select **Add**.
5151

5252
:::image type="content" alt-text="Screenshot of adding a shared private endpoint." source="media\howto-secure-shared-private-endpoints-key-vault\portal-shared-private-endpoints-add.png" :::
5353

54-
The shared private endpoint resource provisioning state is **Succeeded**. The connection state is **Pending** approval at target resource side.
54+
The shared private endpoint resource provisioning state is **Succeeded**. The connection state is **Pending** and waiting for approval for the target resource.
5555

56-
:::image type="content" alt-text="Screenshot of an added shared private endpoint." source="media\howto-secure-shared-private-endpoints-key-vault\portal-shared-private-endpoints-added.png" lightbox="media\howto-secure-shared-private-endpoints-key-vault\portal-shared-private-endpoints-added.png" :::
56+
:::image type="content" alt-text="Screenshot of an added shared private endpoint." source="media\howto-secure-shared-private-endpoints-key-vault\portal-shared-private-endpoints-added.png" lightbox="media\howto-secure-shared-private-endpoints-key-vault\portal-shared-private-endpoints-added.png" :::
5757

5858
#### [Azure CLI](#tab/azure-cli)
5959

60-
You can make the following API call with the [Azure CLI](/cli/azure/) to create a shared private link resource. Replace the `uri` with your own value.
60+
You can make the following API call with the [Azure CLI](/cli/azure/) to create a shared private link resource. Replace the value `uri` with the URI in your scenario.
6161

6262
```azurecli
6363
az rest --method put --uri https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/contoso/providers/Microsoft.SignalRService/webpubsub/contoso-webpubsub/sharedPrivateLinkResources/kv-pe?api-version=2022-08-01-preview --body @create-pe.json
6464
```
6565

66-
The contents of the *create-pe.json* file, which represents the request body to the API, are as follows:
66+
The contents of the *create-pe.json* file represent the request body to the API:
6767

6868
```json
6969
{
@@ -76,54 +76,54 @@ The contents of the *create-pe.json* file, which represents the request body to
7676
}
7777
```
7878

79-
The process of creating an outbound private endpoint is a long-running (asynchronous) operation. As in all asynchronous Azure operations, the `PUT` call returns an `Azure-AsyncOperation` header value that looks like the following output:
79+
The process of creating an outbound private endpoint is a long-running (asynchronous) operation. As in all asynchronous Azure operations, the PUT call returns an `Azure-AsyncOperation` header value that looks like the following example:
8080

8181
```output
8282
"Azure-AsyncOperation": "https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/contoso/providers/Microsoft.SignalRService/webpubsub/contoso-webpubsub/operationStatuses/c0786383-8d5f-4554-8d17-f16fcf482fb2?api-version=2022-08-01-preview"
8383
```
8484

85-
You can poll this URI periodically to obtain the status of the operation. Wait for the status to change to "Succeeded" before proceeding to the next steps.
85+
You can poll this URI periodically to get the status of the operation. Wait for the status to change to "Succeeded" before you proceed to the next section.
8686

87-
You can poll for the status by manually querying the `Azure-AsyncOperationHeader` value:
87+
To poll for the status, manually query the `Azure-AsyncOperationHeader` value:
8888

8989
```azurecli
9090
az rest --method get --uri https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/contoso/providers/Microsoft.SignalRService/webpubsub/contoso-webpubsub/operationStatuses/c0786383-8d5f-4554-8d17-f16fcf482fb2?api-version=2022-08-01-preview
9191
```
9292

9393
-----
9494

95-
### 2. Approve the private endpoint connection for the Key Vault
95+
### Approve the private endpoint connection for the key vault
9696

97-
After the private endpoint connection has been created, you need to approve the connection request from the Azure Web PubSub Service in your key vault resource.
97+
After the private endpoint connection is created, you need to approve the connection request from Web PubSub in your Key Vault resource.
9898

9999
#### [Azure portal](#tab/azure-portal)
100100

101-
1. In the Azure portal, go to your key vault resource page.
102-
1. Select **Networking** from the menu.
101+
1. In the Azure portal, go to your Key Vault resource.
102+
1. On the left menu, select **Networking**.
103103
1. Select **Private endpoint connections**.
104104

105105
:::image type="content" alt-text="Screenshot of the Azure portal, showing the Private endpoint connections pane." source="media\howto-secure-shared-private-endpoints-key-vault\portal-key-vault-approve-private-endpoint.png" :::
106106

107-
1. Select the private endpoint that Azure Web PubSub Service created.
108-
1. Select **Approve** and **Yes** to confirm.
107+
1. Select the private endpoint that Web PubSub created.
108+
1. Select **Approve** and then select **Yes** to confirm.
109109
1. Wait for the private endpoint connection to be approved.
110110

111111
:::image type="content" alt-text="Screenshot of the Azure portal, showing an Approved status on the Private endpoint connections pane." source="media\howto-secure-shared-private-endpoints-key-vault\portal-key-vault-approved-private-endpoint.png" :::
112112

113113
#### [Azure CLI](#tab/azure-cli)
114114

115-
1. List private endpoint connections.
115+
1. List private endpoint connections:
116116

117117
```azurecli
118118
az network private-endpoint-connection list --name <key-vault-resource-name> --resource-group <key-vault-resource-group-name> --type 'Microsoft.KeyVault/vaults'
119119
```
120120
121-
There should be a pending private endpoint connection. Note its `id`.
121+
Check for a pending private endpoint connection. Note the connection ID.
122122
123123
```json
124124
[
125125
{
126-
"id": "<id>",
126+
"id": "<ID>",
127127
"location": "",
128128
"name": "",
129129
"properties": {
@@ -137,22 +137,22 @@ After the private endpoint connection has been created, you need to approve the
137137
]
138138
```
139139
140-
1. Approve the private endpoint connection.
140+
1. Approve the private endpoint connection:
141141
142142
```azurecli
143-
az network private-endpoint-connection approve --id <private-endpoint-connection-id>
143+
az network private-endpoint-connection approve --id <private-endpoint-connection-ID>
144144
```
145145
146146
-----
147147
148-
### 3. Query the status of the shared private link resource
148+
### Query the status of the shared private link resource
149149
150-
It takes a few minutes for the approval to be propagated to Azure Web PubSub Service. You can check the state using either Azure portal or Azure CLI. The shared private endpoint between Azure Web PubSub Service and Azure Key Vault is active when the container state is approved.
150+
It takes a few minutes for the approval to be propagated to Azure Web PubSub Service. You can check the state using either Azure portal or Azure CLI. The shared private endpoint between Azure Web PubSub Service and Azure Key Vault is active when the container state is approved.
151151
152152
#### [Azure portal](#tab/azure-portal)
153153
154-
1. Go to the Azure Web PubSub Service resource in the Azure portal.
155-
1. Select **Networking** from the menu.
154+
1. In the Azure portal, go to your Azure Web PubSub resource.
155+
1. On the left menu, select **Networking**.
156156
1. Select **Shared private link resources**.
157157
158158
:::image type="content" alt-text="Screenshot of an approved shared private endpoint." source="media\howto-secure-shared-private-endpoints-key-vault\portal-shared-private-endpoints-approved.png" lightbox="media\howto-secure-shared-private-endpoints-key-vault\portal-shared-private-endpoints-approved.png" :::
@@ -163,7 +163,7 @@ It takes a few minutes for the approval to be propagated to Azure Web PubSub Ser
163163
az rest --method get --uri https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/contoso/providers/Microsoft.SignalRService/webpubsub/contoso-webpubsub/sharedPrivateLinkResources/func-pe?api-version=2022-08-01-preview
164164
```
165165

166-
This command would return a JSON, where the connection state would show up as "status" under the "properties" section.
166+
This command returns JSON. The connection state is indicated as `status` under `properties`.
167167

168168
```json
169169
{
@@ -179,15 +179,13 @@ This command would return a JSON, where the connection state would show up as "s
179179

180180
```
181181

182-
When the "Provisioning State" (`properties.provisioningState`) of the resource is `Succeeded` and "Connection State" (`properties.status`) is `Approved`, the shared private link resource is functional, and Azure Web PubSub Service can communicate over the private endpoint.
182+
When `properties.provisioningState` is `Succeeded` and `properties.status` (connection state) is `Approved`, the shared private link resource is functional, and Web PubSub can communicate over the private endpoint.
183183

184184
-----
185185

186-
Now you can configure features like a custom domain as usual. You don't have to use a special domain for Key Vault. The Azure Web PubSub Service automatically handles DNS resolution.
186+
Now you can configure features like a custom domain as you typically would. You don't have to use a special domain for your key vault. Web PubSub automatically handles DNS resolution.
187187

188-
## Next steps
188+
## Related conte
189189

190-
Learn more:
191-
192-
* [What are private endpoints?](../private-link/private-endpoint-overview.md)
190+
* [What is a private endpoint?](../private-link/private-endpoint-overview.md)
193191
* [Configure a custom domain](howto-custom-domain.md)

0 commit comments

Comments
 (0)