Skip to content

Commit 8ac79b8

Browse files
update for clarity and correctness
1 parent c960393 commit 8ac79b8

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/azure-app-configuration/quickstart-deployment-overview.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ You must have permissions to manage Azure App Configuration resources. Azure rol
2323
- The Azure Resource Manager Owner role
2424
- The Azure Resource Manager Contributor role
2525

26-
To learn more about Azure RBAC and Microsoft Entra ID, see [Authorize access to Azure App Configuration using Microsoft Entra ID](./concetp-enable-rbac.md)
26+
To learn more about Azure RBAC and Microsoft Entra ID, see [Authorize access to Azure App Configuration using Microsoft Entra ID](./concetp-enable-rbac.md).
2727

2828
## Manage Azure App Configuration data in deployment
2929
Azure App Configuration data, such as key-values and snapshots, can be managed in deployment. It's recommended to configure **Pass-through** ARM authentication mode to require proper Azure App Configuration data plane authorization.
@@ -38,31 +38,31 @@ To configure ARM authentication mode of Azure App Configuration resource in the
3838

3939
:::image type="content" border="true" source="./media/access-settings-blade.png" alt-text="Screenshot showing how to access an Azure App Configuration resources access settings blade":::
4040

41-
3. Select the recommended **Pass-through** authentication mode under **Azure Resouce Manager Authentication Mode**.
41+
3. Select the recommended **Pass-through** authentication mode under **Azure Resource Manager Authentication Mode**.
4242

4343
:::image type="content" border="true" source="./media/quickstarts/deployment/select-passthrough-authentication-mode.png" alt-text="Screenshot showing pass-through authentication mode being selected under Azure Resource Manager Authentication Mode":::
4444

4545
---
4646

4747
> [!NOTE]
48-
> Local authentication mode is for backward compatibility and has several limitations. It does not support proper auditing for accessing data in deployment. Under local authentication mode, key-value data access inside an ARM template/Bicep/Terraform is disabled if [access key authentication is disabled](./howto-disable-access-key-authentication.md#limitations). Azure App Configuration data plane permissions are not required for accessing data under local authentication mode.
48+
> Local authentication mode is for backward compatibility and has several limitations. It does not support proper auditing for accessing data in deployment. Under local authentication mode, key-value data access inside an ARM template/Bicep/Terraform is disabled if [access key authentication is disabled](./howto-disable-access-key-authentication.md#limitations). Azure App Configuration data plane permissions are not required for accessing data under local authentication mode.
4949
5050
### Authorization
51-
You must have permissions to read and manage Azure App Configuration data in deployment. In addition to the permissions required for Azure App Configuration resource, which are provided by built-in Owner or Contributor roles, Azure App Configuration data plane permissions including Microsoft.AppConfiguration/configurationStores/keyValues/read and Microsoft.AppConfiguration/configurationStores/snapshots/read are also required under pass-through authentication mode. Built-in roles with this action include:
51+
In addition to the permissions required for managing Azure App Configuration resource, you must have data plane permissions to read and manage Azure App Configuration data in deployment under pass-through mode. Azure App Configuration data plane permissions includes Microsoft.AppConfiguration/configurationStores/keyValues/read and Microsoft.AppConfiguration/configurationStores/snapshots/read. Built-in roles with this action include:
5252
- App Configuration Data Owner
5353
- App Configuration Data Reader
5454

5555
To learn more about Azure RBAC and Microsoft Entra ID, see [Authorize access to Azure App Configuration using Microsoft Entra ID](./concetp-enable-rbac.md)
5656

57-
### ARM prviate access
57+
### ARM private access
5858
[Azure Resource Management Private Link](../../includes/resource-manager-create-rmpl.md) can be set up to restrict access for managing resources in your virtual network. Azure App Configuration supports ARM Private Link access to the App Configuration data with pass-through authentication mode and ARM private access enabled.
5959

6060
# [Azure portal](#tab/portal)
6161

6262
To configure ARM private access of Azure App Configuration resource in the Azure portal, follow these steps:
6363

6464
1. Navigate to your Azure App Configuration resource in the Azure portal.
65-
2. Locate the **Networkinng** setting under **Settings**.
65+
2. Locate the **Networking** setting under **Settings**.
6666

6767
:::image type="content" border="true" source="./media/networking-blade.png" alt-text="Screenshot showing how to access an Azure App Configuration resources networking blade":::
6868

0 commit comments

Comments
 (0)