Skip to content

Commit a235afd

Browse files
committed
fix broken links
1 parent e30320a commit a235afd

File tree

4 files changed

+6
-6
lines changed

4 files changed

+6
-6
lines changed

articles/cdn/cdn-custom-ssl.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ To enable HTTPS on a custom domain, follow these steps:
9191

9292
# [Option 2: Enable HTTPS with your own certificate](#tab/option-2-enable-https-with-your-own-certificate)
9393

94-
You can use your own certificate to enable the HTTPS feature. This process is done through an integration with Azure Key Vault, which allows you to store your certificates securely. Azure CDN uses this secure mechanism to get your certificate and it requires a few extra steps. When you create your TLS/SSL certificate, you must create a complete certificate chain with an allowed certificate authority (CA) that is part of the [Microsoft Trusted CA List](https://ccadb-public.secure.force.com/microsoft/IncludedCACertificateReportForMSFT). If you use a nonallowed CA, your request is rejected. If a certificate without complete chain is presented, requests, which involve that certificate aren't guaranteed to work as expected.
94+
You can use your own certificate to enable the HTTPS feature. This process is done through an integration with Azure Key Vault, which allows you to store your certificates securely. Azure CDN uses this secure mechanism to get your certificate and it requires a few extra steps. When you create your TLS/SSL certificate, you must create a complete certificate chain with an allowed certificate authority (CA) that is part of the [Microsoft Trusted CA List](/security/trusted-root/participants-list). If you use a nonallowed CA, your request is rejected. If a certificate without complete chain is presented, requests, which involve that certificate aren't guaranteed to work as expected.
9595

9696
### Prepare your Azure Key Vault account and certificate
9797

@@ -101,7 +101,7 @@ You can use your own certificate to enable the HTTPS feature. This process is do
101101

102102
> [!NOTE]
103103
> - Azure Content Delivery Network only supports PFX certificates.
104-
> - The certificate must have a complete certificate chain with leaf and intermediate certificates, and root CA must be part of the [Microsoft Trusted CA List](https://ccadb-public.secure.force.com/microsoft/IncludedCACertificateReportForMSFT).
104+
> - The certificate must have a complete certificate chain with leaf and intermediate certificates, and root CA must be part of the [Microsoft Trusted CA List](/security/trusted-root/participants-list).
105105
106106
### Set up managed identity for Azure CDN
107107

articles/frontdoor/front-door-custom-domain-https.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ To enable HTTPS on a custom domain:
9090
9191
### Option 2: Use your own certificate
9292

93-
You can use your own certificate through an integration with Azure Key Vault. Ensure your certificate is from a [Microsoft Trusted CA List](https://ccadb-public.secure.force.com/microsoft/IncludedCACertificateReportForMSFT) and has a complete certificate chain.
93+
You can use your own certificate through an integration with Azure Key Vault. Ensure your certificate is from a [Microsoft Trusted CA List](/security/trusted-root/participants-list) and has a complete certificate chain.
9494

9595
#### Prepare your key vault and certificate
9696

@@ -100,7 +100,7 @@ You can use your own certificate through an integration with Azure Key Vault. En
100100
- Upload your certificate as a **certificate** object, not a **secret**.
101101

102102
> [!NOTE]
103-
> Front Door doesn't support certificates with elliptic curve (EC) cryptography algorithms. The certificate must have a complete certificate chain with leaf and intermediate certificates, and root CA must be part of the [Microsoft Trusted CA list](https://ccadb-public.secure.force.com/microsoft/IncludedCACertificateReportForMSFT).
103+
> Front Door doesn't support certificates with elliptic curve (EC) cryptography algorithms. The certificate must have a complete certificate chain with leaf and intermediate certificates, and root CA must be part of the [Microsoft Trusted CA list](/security/trusted-root/participants-list).
104104
105105
#### Register Azure Front Door
106106

articles/frontdoor/standard-premium/how-to-configure-https-custom-domain.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ There are currently two ways to authenticate Azure Front Door to access your Key
7878

7979
> [!WARNING]
8080
> - Azure Front Door currently only supports Key Vault in the same subscription. Selecting Key Vault under a different subscription results in a failure.
81-
> - Azure Front Door doesn't support certificates with elliptic curve cryptography algorithms. Also, your certificate must have a complete certificate chain with leaf and intermediate certificates. The root CA also must be part of the [Microsoft Trusted CA List](https://ccadb-public.secure.force.com/microsoft/IncludedCACertificateReportForMSFT).
81+
> - Azure Front Door doesn't support certificates with elliptic curve cryptography algorithms. Also, your certificate must have a complete certificate chain with leaf and intermediate certificates. The root CA also must be part of the [Microsoft Trusted CA List](/security/trusted-root/participants-list).
8282
8383
#### Register Azure Front Door
8484

articles/peering-service/location-partners.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ The following table provides information on the Peering Service connectivity par
4444
| [MainOne](https://mainone.net/products-and-services/) | Africa |
4545
| [NAP Africa](https://www.napafrica.net/technical/microsoft-azure-peering-service/) | Africa |
4646
| [NTT Communications](https://www.ntt.com/en/services/network/software-defined-network.html) | Japan, Indonesia |
47-
| [PCCW](https://www.pccwglobal.com/en/enterprise/products/network/ep-global-internet-access) | Asia |
47+
| [PCCW](https://www.pccwglobal.com/) | Asia |
4848
| [PIT Chile](https://www.pitchile.cl/wp/maps/) |LATAM|
4949
| [Sejong Telecom](https://www.sejongtelecom.net/) | Asia |
5050
| [Singtel](https://www.singtel.com/business/campaign/singnet-cloud-connect-microsoft-direct) | Asia |

0 commit comments

Comments
 (0)