Skip to content

Commit 7de04b9

Browse files
committed
Fix build warnings
1 parent 546cf52 commit 7de04b9

File tree

2 files changed

+24
-14
lines changed

2 files changed

+24
-14
lines changed

articles/cloud-shell/quickstart.md

Lines changed: 20 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -43,75 +43,83 @@ Azure Cloud Shell needs access to manage resources. Access is provided through n
4343
be registered to your subscription. Use the following commands to register the Microsoft.CloudShell
4444
RP namespace in your subscription:
4545

46-
# [Azure CLI](#tab/azurecli)
46+
### [Azure CLI](#tab/azurecli)
4747

4848
```azurecli-interactive
4949
az account set --subscription <Subscription Name or Id>
5050
az provider register --namespace Microsoft.CloudShell
5151
```
5252

53-
# [PowerShell](#tab/powershell)
53+
### [PowerShell](#tab/powershell)
5454

5555
```azurepowershell-interactive
5656
Select-AzSubscription -SubscriptionId <SubscriptionId>
5757
Register-AzResourceProvider -ProviderNamespace Microsoft.CloudShell
5858
```
5959

60+
---
61+
6062
> [!NOTE]
6163
> You only need to register the namespace once per subscription.
6264
6365
### Set your subscription
6466

6567
1. List subscriptions you have access to.
6668

67-
# [Azure CLI](#tab/azurecli)
69+
### [Azure CLI](#tab/azurecli)
6870

6971
```azurecli-interactive
7072
az account list
7173
```
7274

73-
# [PowerShell](#tab/powershell)
75+
### [PowerShell](#tab/powershell)
7476

7577
```azurepowershell-interactive
7678
Get-AzSubscription
7779
```
7880

81+
---
82+
7983
1. Set your preferred subscription:
8084

81-
# [Azure CLI](#tab/azurecli)
85+
### [Azure CLI](#tab/azurecli)
8286

8387
```azurecli-interactive
8488
az account set --subscription 'my-subscription-name'
8589
```
8690

87-
# [PowerShell](#tab/powershell)
91+
### [PowerShell](#tab/powershell)
8892

8993
```azurepowershell-interactive
9094
Set-AzContext -Subscription <SubscriptionId>
9195
```
9296

97+
---
98+
9399
> [!TIP]
94100
> Your subscription is remembered for future sessions using `/home/<user>/.azure/azureProfile.json`.
95101
96102
### Create a resource group
97103

98104
Create a new resource group in CentralUS named `MyRG`.
99105

100-
# [Azure CLI](#tab/azurecli)
106+
### [Azure CLI](#tab/azurecli)
101107

102108
```azurecli-interactive
103109
az group create --location centralus --name MyRG
104110
```
105111

106-
# [PowerShell](#tab/powershell)
112+
### [PowerShell](#tab/powershell)
107113

108114
```azurepowershell-interactive
109115
New-AzResourceGroup -Name MyRG -Location centralus
110116
```
111117

118+
---
119+
112120
### Get a list of Azure commands
113121

114-
# [Azure CLI](#tab/azurecli)
122+
### [Azure CLI](#tab/azurecli)
115123

116124
Run the following command to see a list of all Azure CLI commands.
117125

@@ -125,7 +133,7 @@ Run the following command to get a list of Azure CLI command that apply to WebAp
125133
az webapp --help
126134
```
127135

128-
# [PowerShell](#tab/powershell)
136+
### [PowerShell](#tab/powershell)
129137

130138
Run the following command to see a list of all Azure PowerShell cmdlets.
131139

@@ -142,6 +150,8 @@ cd 'Azure:/My Subscription/WebApps'
142150
Get-AzCommand
143151
```
144152

153+
---
154+
145155
## Next steps
146156

147157
- [Learn about persisting files in Cloud Shell][07]

articles/storage/common/shared-key-authorization-prevent.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: storage
99
ms.topic: how-to
1010
ms.date: 11/14/2022
1111
ms.author: jammart
12-
ms.reviewer: nachakra
12+
ms.reviewer: nachakra
1313
ms.custom: devx-track-azurepowershell, devx-track-azurecli, engagement-fy23
1414
ms.devlang: azurecli
1515
---
@@ -66,7 +66,7 @@ Some Azure tools offer the option to use Azure AD authorization to access Azure
6666
| Azure PowerShell | Supported. For information about how to authorize PowerShell commands for blob or queue operations with Azure AD, see [Run PowerShell commands with Azure AD credentials to access blob data](../blobs/authorize-data-operations-powershell.md) or [Run PowerShell commands with Azure AD credentials to access queue data](../queues/authorize-data-operations-powershell.md). |
6767
| Azure CLI | Supported. For information about how to authorize Azure CLI commands with Azure AD for access to blob and queue data, see [Run Azure CLI commands with Azure AD credentials to access blob or queue data](../blobs/authorize-data-operations-cli.md). |
6868
| Azure IoT Hub | Supported. For more information, see [IoT Hub support for virtual networks](../../iot-hub/virtual-network-support.md). |
69-
| Azure Cloud Shell | Azure Cloud Shell is an integrated shell in the Azure portal. Azure Cloud Shell hosts files for persistence in an Azure file share in a storage account. These files will become inaccessible if Shared Key authorization is disallowed for that storage account. For more information, see [Connect your Microsoft Azure Files storage](../../cloud-shell/overview.md#connect-your-microsoft-azure-files-storage). <br /><br /> To run commands in Azure Cloud Shell to manage storage accounts for which Shared Key access is disallowed, first make sure that you have been granted the necessary permissions to these accounts via Azure RBAC. For more information, see [What is Azure role-based access control (Azure RBAC)?](../../role-based-access-control/overview.md). |
69+
| Azure Cloud Shell | Azure Cloud Shell is an integrated shell in the Azure portal. Azure Cloud Shell hosts files for persistence in an Azure file share in a storage account. These files will become inaccessible if Shared Key authorization is disallowed for that storage account. For more information, see [Persist files in Azure Cloud Shell](../../cloud-shell/persisting-shell-storage.md). <br /><br /> To run commands in Azure Cloud Shell to manage storage accounts for which Shared Key access is disallowed, first make sure that you have been granted the necessary permissions to these accounts via Azure RBAC. For more information, see [What is Azure role-based access control (Azure RBAC)?](../../role-based-access-control/overview.md). |
7070

7171
### Disallow Shared Key authorization to use Azure AD Conditional Access
7272

@@ -115,9 +115,9 @@ Follow these steps to assign the built-in policy for the appropriate scope in th
115115
1. For the **Policy definition** field, select the **More** button (**...**), and enter *shared key access* in the **Search** field. Select the policy definition named **Storage accounts should prevent shared key access**.
116116

117117
:::image type="content" source="media/shared-key-authorization-prevent/policy-definition-select-portal.png" alt-text="Screenshot showing how to select the built-in policy to prevent allowing Shared Key access for your storage accounts" lightbox="media/shared-key-authorization-prevent/policy-definition-select-portal.png":::
118-
118+
119119
1. Select **Review + create**.
120-
120+
121121
1. On the **Review + create** tab, review the policy assignment then select **Create** to assign the policy definition to the specified scope.
122122

123123
#### Monitor compliance with the policy

0 commit comments

Comments
 (0)