You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/confidential-ledger/authentication-azure-ad.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,7 @@ To do so, the client performs a two-steps process:
24
24
Azure confidential ledger then executes the request on behalf of the security principal for which Azure AD issued the access token. All authorization checks are performed using this identity.
25
25
26
26
In most cases, the recommendation is to use one of Azure confidential ledger SDKs to access the service programmatically, as they remove much of the hassle of implementing the
27
-
flow above (and much more). See, for example, the [Python client library](https://pypi.org/project/azure-confidentialledger/) and [.NET client library](/dotnet/api/overview/azure/storage.confidentialledger-readme-pre).
27
+
flow above (and much more). See, for example, the [Python client library](https://pypi.org/project/azure-confidentialledger/) and [.NET client library](/dotnet/api/azure.security.confidentialledger).
28
28
29
29
The main authenticating scenarios are:
30
30
@@ -84,7 +84,7 @@ For detailed steps on registering an Azure confidential ledger application with
84
84
85
85
At the end of registration, the application owner gets the following values:
86
86
87
-
- An **Application ID** (also known as the AAD Client ID or appID)
87
+
- An **Application ID** (also known as the Azure Active Directory Client ID or appID)
88
88
- An **authentication key** (also known as the shared secret).
89
89
90
90
The application must present both these values to Azure Active Directory to get a token.
@@ -108,4 +108,4 @@ This flow is called the[OAuth2 token exchange flow](https://tools.ietf.org/html/
108
108
-[Integrating applications with Azure Active Directory](../active-directory/develop/quickstart-register-app.md)
109
109
-[Use portal to create an Azure AD application and service principal that can access resources](../active-directory/develop/howto-create-service-principal-portal.md)
110
110
-[Create an Azure service principal with the Azure CLI](/cli/azure/create-an-azure-service-principal-azure-cli).
Copy file name to clipboardExpand all lines: articles/confidential-ledger/faq.yml
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -58,7 +58,7 @@ sections:
58
58
- question: |
59
59
How can I manage users on a ledger?
60
60
answer: |
61
-
You can manage users on a ledger through the portal or one of the available SDKs: [python](https://pypi.org/project/azure-confidentialledger/), [.NET](/dotnet/api/overview/azure/security.confidentialledger-readme-pre), or [Java (preview)](/java/api/overview/azure/data-confidentialledger-readme?view=azure-java-preview).
61
+
You can manage users on a ledger through the portal or one of the available SDKs: [python](https://pypi.org/project/azure-confidentialledger/), [.NET](/dotnet/api/overview/azure/security.confidentialledger-readme), or [Java (preview)](/java/api/overview/azure/data-confidentialledger-readme?view=azure-java-preview).
62
62
63
63
- question: |
64
64
Can Microsoft help me manage users on a ledger I have created?
The Azure confidential ledger client library for .NET allows you to create an immutable ledger entry in the service. The [Code examples](#code-examples) section shows how to create a write to the ledger and retrieve the transaction id.
71
+
The Azure confidential ledger client library for .NET allows you to create an immutable ledger entry in the service. The [Code examples](#code-examples) section shows how to create a write to the ledger and retrieve the transaction ID.
To sign in to the virtual machine, follow the instructions in [Connect and sign in to an Azure virtual machine running Linux](/azure-docs-archive-pr/virtual-machines/linux/login-using-aad) or [Connect and sign in to an Azure virtual machine running Windows](../../virtual-machines/windows/connect-logon.md).
107
+
To sign in to the virtual machine, follow the instructions in [Connect and sign in to an Azure virtual machine running Linux](/azure/virtual-machines/linux-vm-connect) or [Connect and sign in to an Azure virtual machine running Windows](../../virtual-machines/windows/connect-logon.md).
108
108
109
109
110
110
To log into a Linux VM, you can use the ssh command with the \<publicIpAddress\> given in the [Create a virtual machine](#create-a-virtual-machine) step:
To sign in to the virtual machine, follow the instructions in [Connect and sign in to an Azure Windows virtual machine](../../virtual-machines/windows/connect-logon.md) or [Connect and sign in to an Azure Linux virtual machine](/azure-docs-archive-pr/virtual-machines/linux/login-using-aad).
131
+
To sign in to the virtual machine, follow the instructions in [Connect and sign in to an Azure Windows virtual machine](../../virtual-machines/windows/connect-logon.md) or [Connect and sign in to an Azure Linux virtual machine](/azure/virtual-machines/linux-vm-connect).
To sign in to the virtual machine, follow the instructions in [Connect and sign in to an Azure virtual machine running Linux](/azure-docs-archive-pr/virtual-machines/linux/login-using-aad) or [Connect and sign in to an Azure virtual machine running Windows](../../virtual-machines/windows/connect-logon.md).
107
+
To sign in to the virtual machine, follow the instructions in [Connect and sign in to an Azure virtual machine running Linux](/azure/virtual-machines/linux-vm-connect) or [Connect and sign in to an Azure virtual machine running Windows](../../virtual-machines/windows/connect-logon.md).
108
108
109
109
110
110
To log into a Linux VM, you can use the ssh command with the \<publicIpAddress\> given in the [Create a virtual machine](#create-a-virtual-machine) step:
Copy file name to clipboardExpand all lines: articles/virtual-machines/linux/disk-encryption-linux.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -188,7 +188,7 @@ To disable the encryption, see [Disable encryption and remove the encryption ext
188
188
189
189
You can enable disk encryption on an existing or running Linux VM in Azure by using the [Resource Manager template](https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.compute/encrypt-running-linux-vm-without-aad).
190
190
191
-
1. Click **Deploy to Azure** on the Azure quickstart template.
191
+
1. Click **Deploy to Azure** on the Azure Quickstart Template.
192
192
193
193
2. Select the subscription, resource group, resource group location, parameters, legal terms, and agreement. Click **Create** to enable encryption on the existing or running VM.
194
194
@@ -219,7 +219,7 @@ The **EncryptFormatAll** parameter reduces the time for Linux data disks to be e
219
219
>If you're setting this parameter while updating encryption settings, it might lead to a reboot before the actual encryption. In this case, you will also want to remove the disk you don't want formatted from the fstab file. Similarly, you should add the partition you want encrypt-formatted to the fstab file before initiating the encryption operation.
220
220
221
221
### EncryptFormatAll criteria
222
-
The parameter goes though all partitions and encrypts them as long as they meet **all** of the criteria below:
222
+
The parameter goes through all partitions and encrypts them as long as they meet **all** of the criteria below:
223
223
- Is not a root/OS/boot partition
224
224
- Is not already encrypted
225
225
- Is not a BEK volume
@@ -333,7 +333,7 @@ You can add a new data disk using [az vm disk attach](add-disk.md), or [through
333
333
334
334
### Enable encryption on a newly added disk with Azure CLI
335
335
336
-
If the VM was previously encrypted with "All"then the --volume-type parameter should remain "All". All includes both OS and data disks. If the VM was previously encrypted with a volume type of "OS", then the --volume-type parameter should be changed to "All" so that both the OS and the new data disk will be included. If the VM was encrypted with only the volume type of "Data", then it can remain "Data" as demonstrated below. Adding and attaching a new data disk to a VM is not sufficient preparation forencryption. The newly attached disk must also be formatted and properly mounted within the VM prior to enabling encryption. On Linux the disk must be mountedin /etc/fstab with a [persistent block device name](/azure-docs-test-baseline-pr/virtual-machines/linux/troubleshoot-device-names-problems).
336
+
If the VM was previously encrypted with "All"then the --volume-type parameter should remain "All". All includes both OS and data disks. If the VM was previously encrypted with a volume type of "OS", then the --volume-type parameter should be changed to "All" so that both the OS and the new data disk will be included. If the VM was encrypted with only the volume type of "Data", then it can remain "Data" as demonstrated below. Adding and attaching a new data disk to a VM is not sufficient preparation forencryption. The newly attached disk must also be formatted and properly mounted within the VM prior to enabling encryption. On Linux the disk must be mountedin /etc/fstab with a [persistent block device name](/troubleshoot/azure/virtual-machines/troubleshoot-device-names-problems).
337
337
338
338
In contrast to PowerShell syntax, the CLI does not require the user to provide a unique sequence version when enabling encryption. The CLI automatically generates and uses its own unique sequence version value.
339
339
@@ -449,7 +449,7 @@ Azure Disk Encryption does not work for the following Linux scenarios, features,
449
449
450
450
- Encrypting basic tier VM or VMs created through the classic VM creation method.
451
451
- Disabling encryption on an OS drive or data drive of a Linux VM when the OS drive is encrypted.
452
-
- Encrypting the OS drive for Linux virtual machine scale sets.
452
+
- Encrypting the OS drive for Linux Virtual Machine Scale Sets.
453
453
- Encrypting custom images on Linux VMs.
454
454
- Integration with an on-premises key management system.
0 commit comments