Skip to content

Commit 940daa3

Browse files
authored
Merge pull request #259555 from PallabPaul/acl-ma-edits
Adding enhancements to ACL Managed App docs
2 parents b00e0ac + 7743140 commit 940daa3

File tree

2 files changed

+19
-10
lines changed

2 files changed

+19
-10
lines changed

articles/confidential-ledger/create-blob-managed-app.md

Lines changed: 17 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -41,9 +41,9 @@ Once a Managed Application is created, you're able to then connect the Managed A
4141

4242
### Create a topic and event subscription for the storage account
4343

44-
The Managed Application uses an Azure Service Bus Queue to track and record all **Create Blob** events. You can add this Queue as an Event Subscriber for any storage account that you're creating blobs for.
44+
The Managed Application uses an Azure Service Bus Queue to track and record all **Create Blob** events. You will use the Queue created in the Managed Resource Group by the Managed Application and add it as an Event Subscriber for any storage account that you're creating blobs for.
4545

46-
#### Azure portal
46+
### [Azure portal](#tab/azure-portal)
4747

4848
:::image type="content" source="./media/managed-application/managed-app-event-subscription-inline.png" alt-text="Screenshot of the Azure portal in a web browser, showing how to set up a storage event subscription." lightbox="./media/managed-application/managed-app-event-subscription-enhanced.png":::
4949

@@ -53,11 +53,11 @@ On the Azure portal, you can navigate to the storage account that you would like
5353

5454
The queue uses sessions to maintain ordering across multiple storage accounts so you will also need to navigate to the `Delivery Properties` tab and to enter a unique session ID for this event subscription.
5555

56-
#### Azure CLI
56+
### [CLI](#tab/cli-or-sdk)
5757

5858
**Creating the Event Topic:**
5959

60-
```bash
60+
```azurecli
6161
az eventgrid system-topic create \
6262
--resource-group {resource_group} \
6363
--name {sample_topic_name} \
@@ -76,7 +76,7 @@ az eventgrid system-topic create \
7676

7777
**Creating the Event Subscription:**
7878

79-
```bash
79+
```azurecli
8080
az eventgrid system-topic event-subscription create \
8181
--name {sample_subscription_name} \
8282
--system-topic-name {sample_topic_name} \
@@ -98,17 +98,19 @@ az eventgrid system-topic event-subscription create \
9898

9999
`endpoint` - Resource ID of the service bus queue that is subscribing to the storage account Topic
100100

101+
---
102+
101103
### Add required role to storage account
102104

103105
The Managed Application requires the `Storage Blob Data Owner` role to read and create hashes for each blob and this role is required to be added in order for the digest to be calculated correctly.
104106

105-
#### Azure portal
107+
### [Azure portal](#tab/azure-portal)
106108

107109
:::image type="content" source="./media/managed-application/managed-app-managed-identity-inline.png" alt-text="Screenshot of the Azure portal in a web browser, showing how to set up a managed identity for the managed app." lightbox="./media/managed-application/managed-app-managed-identity-enhanced.png":::
108110

109-
#### Azure CLI
111+
### [CLI](#tab/cli-or-sdk)
110112

111-
```bash
113+
```azurecli
112114
az role assignment create \
113115
--role "Storage Blob Data Owner" \
114116
--assignee-object-id {function_oid} \
@@ -120,6 +122,8 @@ az role assignment create \
120122

121123
`scope` - Resource ID of storage account to create the role for
122124

125+
---
126+
123127
> [!NOTE]
124128
> Multiple storage accounts can be connected to a single Managed Application instance. We currently recommend a maximum of **10 storage accounts** that contain high usage blob containers.
125129
@@ -139,6 +143,8 @@ The transaction table holds information about each blob and a unique hash that i
139143

140144
The block table holds information related to every digest this is created for the blob container and the associated transaction ID for the digest is stored in Azure Confidential Ledger.
141145

146+
> [!NOTE]
147+
> Every blob creation event will not result in a digest being created. Digests are created after a certain block size is reached. Currently, a digest will be created for every **4 blob creation events**.
142148
143149
### Viewing digest on Azure Confidential Ledger
144150

@@ -162,13 +168,13 @@ An audit can be triggered by including the following message to the Service Bus
162168
}
163169
```
164170

165-
#### Azure portal
171+
### [Azure portal](#tab/azure-portal)
166172

167173
:::image type="content" source="./media/managed-application/managed-app-queue-trigger-audit-inline.png" alt-text="Screenshot of the Azure portal in a web browser, how to trigger an audit by adding a message to the queue." lightbox="./media/managed-application/managed-app-queue-trigger-audit-enhanced.png":::
168174

169175
Be sure to include a `Session ID` as the queue has sessions enabled.
170176

171-
#### Azure Service Bus Python SDK
177+
### [Python SDK](#tab/cli-or-sdk)
172178

173179
```python
174180
import json
@@ -193,6 +199,7 @@ message = {
193199
message = ServiceBusMessage(json.dumps(message), session_id=SESSION_ID)
194200
sender.send_messages(message)
195201
```
202+
---
196203

197204
### Viewing audit results
198205

articles/confidential-ledger/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,8 @@
3333
items:
3434
- name: Create a client certificate
3535
href: create-client-certificate.md
36+
- name: Create a managed application to store blob digests
37+
href: create-blob-managed-app.md
3638
- name: Register the confidential ledger resource provider
3739
href: register-ledger-resource-provider.md
3840
- name: Register an ACL app with Microsoft Entra ID

0 commit comments

Comments
 (0)