Skip to content

Commit 8ada3e0

Browse files
authored
acrolinx and alt text
1 parent 33c81c5 commit 8ada3e0

File tree

3 files changed

+3
-3
lines changed

3 files changed

+3
-3
lines changed

articles/service-bus-messaging/advanced-features-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Azure Service Bus messaging - advanced features
3-
description: This article provides a high-level overview of advanced features in Azure Service Bus such as sessions, scheduled delivery, autodelete on ide, etc.
3+
description: This article provides a high-level overview of advanced features in Azure Service Bus such as sessions, scheduled delivery, autodelete on idle, etc.
44
ms.topic: concept-article
55
ms.date: 07/25/2024
66
#customer intent: as a developer of messaging applications, I want to know what features are supported by Azure Service Bus to make informed decisions.

articles/service-bus-messaging/disable-local-authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ You can disable local authentication for a Service Bus namespace by setting `dis
7777
## Azure policy
7878
You can assign the [disable local auth](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2Fcfb11c26-f069-4c14-8e36-56c394dae5af) Azure policy to an Azure subscription or a resource group to enforce disabling of local authentication for all Service Bus namespaces in the subscription or the resource group.
7979

80-
:::image type="content" source="./media/disable-local-authentication/azure-policy.png" alt-text="Azure policy to disable location authentication." lightbox="./media/disable-local-authentication/azure-policy.png":::
80+
:::image type="content" source="./media/disable-local-authentication/azure-policy.png" alt-text="Screenshot of Azure policy to disable location authentication." lightbox="./media/disable-local-authentication/azure-policy.png":::
8181

8282
## Related content
8383
See the following to learn about Microsoft Entra ID and SAS authentication.

articles/service-bus-messaging/service-bus-service-endpoints.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ This section shows you how to use Azure portal to add a virtual network service
8080
> If you select the **Selected networks** option and don't add at least one IP firewall rule or a virtual network on this page, the namespace can be accessed over public internet (using the access key).
8181
3. Select the virtual network from the list of virtual networks, and then pick the **subnet**. You have to enable the service endpoint before adding the virtual network to the list. If the service endpoint isn't enabled, the portal prompts you to enable it.
8282

83-
:::image type="content" source="./media/service-endpoints/select-subnet.png" alt-text="Image showing the selection of virtual network and subnet.":::
83+
:::image type="content" source="./media/service-endpoints/select-subnet.png" alt-text="Screenshot showing the selection of virtual network and subnet.":::
8484
4. You should see the following successful message after the service endpoint for the subnet is enabled for **Microsoft.ServiceBus**. Select **Add** at the bottom of the page to add the network.
8585

8686
:::image type="content" source="./media/service-endpoints/subnet-service-endpoint-enabled.png" alt-text="Image showing the success message of enabling the service endpoint.":::

0 commit comments

Comments
 (0)