Skip to content

Commit 8ef31de

Browse files
authored
Apply suggestions from code review
Correct alt text
1 parent 243be17 commit 8ef31de

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

articles/azure-signalr/howto-use-managed-identity.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ To add a system-managed identity to your SignalR instance:
4141
1. On the **System assigned** tab, switch **Status** to **On**.
4242
1. Select **Save**.
4343

44-
:::image type="content" source="media/signalr-howto-use-managed-identity/system-identity-portal.png" alt-text="Add a system-assigned identity in the portal":::
44+
:::image type="content" source="media/signalr-howto-use-managed-identity/system-identity-portal.png" alt-text="Screenshot showing Add a system-assigned identity in the portal.":::
4545

4646
1. Select **Yes** to confirm the change.
4747

@@ -55,7 +55,7 @@ To add a user-assigned identity to your SignalR instance, you need to create the
5555
1. On the **User assigned** tab, select **Add**.
5656
1. Select the identity from the **User assigned managed identities** drop down menu.
5757
1. Select **Add**.
58-
:::image type="content" source="media/signalr-howto-use-managed-identity/user-identity-portal.png" alt-text="Add a user-assigned identity in the portal":::
58+
:::image type="content" source="media/signalr-howto-use-managed-identity/user-identity-portal.png" alt-text="Screenshot showing Add a user-assigned identity in the portal.":::
5959

6060
## Use a managed identity in serverless scenarios
6161

@@ -106,7 +106,7 @@ You can easily set access validation for a Function App without code changes usi
106106
1. In the **Basics** tab, select **Microsoft** from the **Identity provider** dropdown.
107107
1. Select **Log in with Azure Active Directory** in **Action to take when request is not authenticated**.
108108
1. Select **Microsoft** in the identity provider dropdown. The option to create a new registration is selected by default. You can change the name of the registration. For more information on enabling Azure AD provider, see [Configure your App Service or Azure Functions app to use Azure AD login](../app-service/configure-authentication-provider-aad.md)
109-
:::image type="content" source="media/signalr-howto-use-managed-identity/function-aad.png" alt-text="Function Aad":::
109+
:::image type="content" source="media/signalr-howto-use-managed-identity/function-aad.png" alt-text="Screenshot showing Function Add.":::
110110
1. Navigate to SignalR Service and follow the [steps](howto-use-managed-identity.md#add-a-system-assigned-identity) to add a system-assigned identity or user-assigned identity.
111111
1. go to **Upstream settings** in SignalR Service and choose **Use Managed Identity** and **Select from existing Applications**. Select the application you created previously.
112112

articles/azure-signalr/signalr-howto-azure-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ When a resource is non-compliant, there are many possible reasons. To determine
4343
1. Select **Compliance**.
4444
1. Use the filters to limit compliance states or to search for policies
4545

46-
[ ![Policy compliance in portal](./media/signalr-howto-azure-policy/azure-policy-compliance.png) ](./media/signalr-howto-azure-policy/azure-policy-compliance.png#lightbox)
46+
[ ![Screenshot showing policy compliance in portal.](./media/signalr-howto-azure-policy/azure-policy-compliance.png) ](./media/signalr-howto-azure-policy/azure-policy-compliance.png#lightbox)
4747

4848
1. Select a policy to review aggregate compliance details and events. If desired, then select a specific SignalR for resource compliance.
4949

0 commit comments

Comments
 (0)