Skip to content

Commit a6719e0

Browse files
authored
Merge pull request #288956 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 1c83ea1 + 7d5373f commit a6719e0

File tree

2 files changed

+10
-10
lines changed

2 files changed

+10
-10
lines changed

articles/app-service/overview-managed-identity.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -304,8 +304,8 @@ For .NET apps and functions, the simplest way to work with a managed identity is
304304
See the respective documentation headings of the client library for information:
305305

306306
- [Add Azure Identity client library to your project](/dotnet/api/overview/azure/identity-readme#getting-started)
307-
- [Access Azure service with a system-assigned identity](/dotnet/api/overview/azure/identity-readme#authenticating-with-defaultazurecredential)
308-
- [Access Azure service with a user-assigned identity](/dotnet/api/overview/azure/identity-readme#specifying-a-user-assigned-managed-identity-with-the-defaultazurecredential)
307+
- [Access Azure service with a system-assigned identity](/dotnet/api/overview/azure/identity-readme#authenticate-with-defaultazurecredential)
308+
- [Access Azure service with a user-assigned identity](/dotnet/api/overview/azure/identity-readme#specify-a-user-assigned-managed-identity-with-defaultazurecredential)
309309

310310
The linked examples use [`DefaultAzureCredential`](/dotnet/api/overview/azure/identity-readme#defaultazurecredential). It's useful for the majority of the scenarios because the same pattern works in Azure (with managed identities) and on your local machine (without managed identities).
311311

@@ -316,8 +316,8 @@ For Node.js apps and JavaScript functions, the simplest way to work with a manag
316316
See the respective documentation headings of the client library for information:
317317

318318
- [Add Azure Identity client library to your project](/javascript/api/overview/azure/identity-readme#install-the-package)
319-
- [Access Azure service with a system-assigned identity](/javascript/api/overview/azure/identity-readme#authenticating-with-defaultazurecredential)
320-
- [Access Azure service with a user-assigned identity](/javascript/api/overview/azure/identity-readme#authenticating-a-user-assigned-managed-identity-with-defaultazurecredential)
319+
- [Access Azure service with a system-assigned identity](/javascript/api/overview/azure/identity-readme#authenticate-with-defaultazurecredential)
320+
- [Access Azure service with a user-assigned identity](/javascript/api/overview/azure/identity-readme#specify-a-user-assigned-managed-identity-with-defaultazurecredential)
321321

322322
The linked examples use [`DefaultAzureCredential`](/javascript/api/overview/azure/identity-readme#defaultazurecredential). It's useful for the majority of the scenarios because the same pattern works in Azure (with managed identities) and on your local machine (without managed identities).
323323

@@ -330,8 +330,8 @@ For Python apps and functions, the simplest way to work with a managed identity
330330
See the respective documentation headings of the client library for information:
331331

332332
- [Add Azure Identity client library to your project](/python/api/overview/azure/identity-readme#getting-started)
333-
- [Access Azure service with a system-assigned identity](/python/api/overview/azure/identity-readme#authenticating-with-defaultazurecredential)
334-
- [Access Azure service with a user-assigned identity](/python/api/overview/azure/identity-readme#authenticating-a-user-assigned-managed-identity-with-defaultazurecredential)
333+
- [Access Azure service with a system-assigned identity](/python/api/overview/azure/identity-readme#authenticate-with-defaultazurecredential)
334+
- [Access Azure service with a user-assigned identity](/python/api/overview/azure/identity-readme#authenticate-with-a-user-assigned-managed-identity)
335335

336336
The linked examples use [`DefaultAzureCredential`](/python/api/overview/azure/identity-readme#defaultazurecredential). It's useful for the majority of the scenarios because the same pattern works in Azure (with managed identities) and on your local machine (without managed identities).
337337

@@ -342,8 +342,8 @@ For Java apps and functions, the simplest way to work with a managed identity is
342342
See the respective documentation headings of the client library for information:
343343

344344
- [Add Azure Identity client library to your project](/java/api/overview/azure/identity-readme#include-the-package)
345-
- [Access Azure service with a system-assigned identity](/java/api/overview/azure/identity-readme#authenticating-with-defaultazurecredential)
346-
- [Access Azure service with a user-assigned identity](/java/api/overview/azure/identity-readme#authenticating-a-user-assigned-managed-identity-with-defaultazurecredential)
345+
- [Access Azure service with a system-assigned identity](/java/api/overview/azure/identity-readme#authenticate-with-defaultazurecredential)
346+
- [Access Azure service with a user-assigned identity](/java/api/overview/azure/identity-readme#authenticate-a-user-assigned-managed-identity-with-defaultazurecredential)
347347

348348
The linked examples use [`DefaultAzureCredential`](/azure/developer/java/sdk/identity-azure-hosted-auth#default-azure-credential). It's useful for the majority of the scenarios because the same pattern works in Azure (with managed identities) and on your local machine (without managed identities).
349349

articles/expressroute/expressroute-troubleshooting-arp-classic.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ The following cmdlet provides the ARP tables for Azure private peering:
6363

6464
```azurepowershell
6565
# Required variables
66-
$ckt = "<your Service Key here>
66+
$ckt = "<your Service Key here>"
6767
6868
# ARP table for Azure private peering--primary path
6969
Get-AzureDedicatedCircuitPeeringArpInfo -ServiceKey $ckt -AccessType Private -Path Primary
@@ -110,7 +110,7 @@ The ARP table of a peering can be used to validate Layer 2 configuration and con
110110
* The ARP table has an entry for the on-premises side with a valid IP and MAC address, and a similar entry for the Microsoft side.
111111
* The last octet of the on-premises IP address is always an odd number.
112112
* The last octet of the Microsoft IP address is always an even number.
113-
* The same MAC address appears on the Microsoft side for all three peerings (primary/secondary).
113+
* The same MAC address appears on the Microsoft side for the peerings (Azure private and Microsoft).
114114

115115
```output
116116
Age InterfaceProperty IpAddress MacAddress

0 commit comments

Comments
 (0)