Skip to content

Commit 8569617

Browse files
authored
Merge pull request #178426 from chwarr/ce-app-service-os-func
Copy edit App Service Operating system functionality
2 parents a1d2c49 + a28f65e commit 8569617

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/app-service/operating-system-functionality.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.custom: seodec18
1212
This article describes the common baseline operating system functionality that is available to all Windows apps running on [Azure App Service](./overview.md). This functionality includes file, network, and registry access, and diagnostics logs and events.
1313

1414
> [!NOTE]
15-
> [Linux apps](overview.md#app-service-on-linux) in App Service run in their own containers. No access to the host operating system is allowed, you do have root access to the container. Likewise, for [apps running in Windows containers](quickstart-custom-container.md?pivots=container-windows), you have administrative access to the container but no access to the host operating system.
15+
> [Linux apps](overview.md#app-service-on-linux) in App Service run in their own containers. You have root access to the container but no access to the host operating system is allowed. Likewise, for [apps running in Windows containers](quickstart-custom-container.md?pivots=container-windows), you have administrative access to the container but no access to the host operating system.
1616
>
1717
1818
<a id="tiers"></a>
@@ -22,7 +22,7 @@ App Service runs customer apps in a multi-tenant hosting environment. Apps deplo
2222

2323
[!INCLUDE [app-service-dev-test-note](../../includes/app-service-dev-test-note.md)]
2424

25-
Because App Service supports a seamless scaling experience between different tiers, the security configuration enforced for App Service apps remains the same. This ensures that apps don't suddenly behave differently, failing in unexpected ways, when App Service plan switches from one tier to another.
25+
Because App Service supports a seamless scaling experience between different tiers, the security configuration enforced for App Service apps remains the same. This ensures that apps don't suddenly behave differently, failing in unexpected ways, when an App Service plan switches from one tier to another.
2626

2727
<a id="developmentframeworks"></a>
2828

@@ -76,7 +76,7 @@ On the system drive, App Service reserves `%SystemDrive%\local` for app-specific
7676

7777
Two examples of how App Service uses temporary local storage are the directory for temporary ASP.NET files and the directory for IIS compressed files. The ASP.NET compilation system uses the `%SystemDrive%\local\Temporary ASP.NET Files` directory as a temporary compilation cache location. IIS uses the `%SystemDrive%\local\IIS Temporary Compressed Files` directory to store compressed response output. Both of these types of file usage (as well as others) are remapped in App Service to per-app temporary local storage. This remapping ensures that functionality continues as expected.
7878

79-
Each app in App Service runs as a random unique low-privileged worker process identity called the "application pool identity", described further here: [https://www.iis.net/learn/manage/configuring-security/application-pool-identities](https://www.iis.net/learn/manage/configuring-security/application-pool-identities). Application code uses this identity for basic read-only access to the operating system drive. This means application code can list common directory structures and read common files on operating system drive. Although this might appear to be a somewhat broad level of access, the same directories and files are accessible when you provision a worker role in an Azure hosted service and read the drive contents.
79+
Each app in App Service runs as a random unique low-privileged worker process identity called the "application pool identity", described further in the IIS [Application Pool Identities](/iis/manage/configuring-security/application-pool-identities) documentation. Application code uses this identity for basic read-only access to the operating system drive. This means application code can list common directory structures and read common files on operating system drive. Although this might appear to be a somewhat broad level of access, the same directories and files are accessible when you provision a worker role in an Azure hosted service and read the drive contents.
8080

8181
<a name="multipleinstances"></a>
8282

@@ -128,4 +128,4 @@ App Service doesn't provide remote desktop access to the VM instances.
128128
## More information
129129

130130
[Azure App Service sandbox](https://github.com/projectkudu/kudu/wiki/Azure-Web-App-sandbox) - The most up-to-date information about the execution environment of App Service. This page is
131-
maintained directly by the App Service development team.
131+
maintained directly by the App Service development team.

0 commit comments

Comments
 (0)