Skip to content

Commit 873d581

Browse files
committed
Minor fixes
1 parent 76b7d6d commit 873d581

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/deployment-environments/how-to-configure-extensibility-terraform-container-image.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -185,9 +185,9 @@ In order to use custom images, you need to store them in a container registry. A
185185
It's also possible to store the image in a different container registry such as Docker Hub, but in that case it needs to be publicly accessible.
186186

187187
> [!Caution]
188-
> Enabling anonymous (unauthenticated) pull access makes all registry content publicly available for read (pull) actions.
188+
> Storing your container image in a registry with anonymous (unauthenticated) pull access makes it publicly accessible. Don't do that if your image contains any sensitive information. Instead, store it in Azure Container Registry (ACR) with anonymous pull access disabled.
189189
190-
To use a custom image stored in ACR, you need to ensure that ADE has appropriate permissions to access your image. Anonymous pull access is disabled by default in ACR.
190+
To use a custom image stored in ACR, you need to ensure that ADE has appropriate permissions to access your image. When you create an ACR instance, it's secure by default and only allows authenticated users to gain access.
191191

192192
To create an instance of the ACR, which can be done through the Azure CLI, the Azure portal, PowerShell commands, and more, follow one of the [quickstarts](/azure/container-registry/container-registry-get-started-azure-cli).
193193

0 commit comments

Comments
 (0)