Skip to content

Commit b864308

Browse files
authored
Merge pull request #215132 from pritamso/Broken-link-fix-msmbaldwin
Broken link fixed
2 parents 82321bd + 837dc69 commit b864308

File tree

7 files changed

+13
-13
lines changed

7 files changed

+13
-13
lines changed

articles/confidential-ledger/authentication-azure-ad.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ To do so, the client performs a two-steps process:
2424
Azure confidential ledger then executes the request on behalf of the security principal for which Azure AD issued the access token. All authorization checks are performed using this identity.
2525

2626
In most cases, the recommendation is to use one of Azure confidential ledger SDKs to access the service programmatically, as they remove much of the hassle of implementing the
27-
flow above (and much more). See, for example, the [Python client library](https://pypi.org/project/azure-confidentialledger/) and [.NET client library](/dotnet/api/overview/azure/storage.confidentialledger-readme-pre).
27+
flow above (and much more). See, for example, the [Python client library](https://pypi.org/project/azure-confidentialledger/) and [.NET client library](/dotnet/api/azure.security.confidentialledger).
2828

2929
The main authenticating scenarios are:
3030

@@ -84,7 +84,7 @@ For detailed steps on registering an Azure confidential ledger application with
8484

8585
At the end of registration, the application owner gets the following values:
8686

87-
- An **Application ID** (also known as the AAD Client ID or appID)
87+
- An **Application ID** (also known as the Azure Active Directory Client ID or appID)
8888
- An **authentication key** (also known as the shared secret).
8989

9090
The application must present both these values to Azure Active Directory to get a token.
@@ -108,4 +108,4 @@ This flow is called the[OAuth2 token exchange flow](https://tools.ietf.org/html/
108108
- [Integrating applications with Azure Active Directory](../active-directory/develop/quickstart-register-app.md)
109109
- [Use portal to create an Azure AD application and service principal that can access resources](../active-directory/develop/howto-create-service-principal-portal.md)
110110
- [Create an Azure service principal with the Azure CLI](/cli/azure/create-an-azure-service-principal-azure-cli).
111-
- [Authenticating Azure confidential ledger nodes](authenticate-ledger-nodes.md)
111+
- [Authenticating Azure confidential ledger nodes](authenticate-ledger-nodes.md)

articles/confidential-ledger/faq.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ sections:
5858
- question: |
5959
How can I manage users on a ledger?
6060
answer: |
61-
You can manage users on a ledger through the portal or one of the available SDKs: [python](https://pypi.org/project/azure-confidentialledger/), [.NET](/dotnet/api/overview/azure/security.confidentialledger-readme-pre), or [Java (preview)](/java/api/overview/azure/data-confidentialledger-readme?view=azure-java-preview).
61+
You can manage users on a ledger through the portal or one of the available SDKs: [python](https://pypi.org/project/azure-confidentialledger/), [.NET](/dotnet/api/overview/azure/security.confidentialledger-readme), or [Java (preview)](/java/api/overview/azure/data-confidentialledger-readme?view=azure-java-preview).
6262
6363
- question: |
6464
Can Microsoft help me manage users on a ledger I have created?

articles/confidential-ledger/quickstart-net.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ Get started with the Azure confidential ledger client library for .NET. [Azure c
1818

1919
Azure confidential ledger client library resources:
2020

21-
[API reference documentation](/dotnet/api/overview/azure/security.confidentialledger-readme-pre) | [Library source code](https://github.com/Azure/azure-sdk-for-net/tree/main/sdk/confidentialledger/Azure.Security.ConfidentialLedger) | [Package (NuGet)](https://www.nuget.org/packages/Azure.Security.ConfidentialLedger/1.0.0)
21+
[API reference documentation](/dotnet/api/overview/azure/security.confidentialledger-readme) | [Library source code](https://github.com/Azure/azure-sdk-for-net/tree/main/sdk/confidentialledger/Azure.Security.ConfidentialLedger) | [Package (NuGet)](https://www.nuget.org/packages/Azure.Security.ConfidentialLedger/1.0.0)
2222

2323
## Prerequisites
2424

@@ -68,7 +68,7 @@ dotnet add package Azure.Identity
6868

6969
## Object model
7070

71-
The Azure confidential ledger client library for .NET allows you to create an immutable ledger entry in the service. The [Code examples](#code-examples) section shows how to create a write to the ledger and retrieve the transaction id.
71+
The Azure confidential ledger client library for .NET allows you to create an immutable ledger entry in the service. The [Code examples](#code-examples) section shows how to create a write to the ledger and retrieve the transaction ID.
7272

7373
## Code examples
7474

articles/key-vault/general/tutorial-javascript-virtual-machine.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,7 @@ az keyvault set-policy --name "<your-unique-keyvault-name>" --object-id "<system
104104

105105
## Log in to the VM
106106

107-
To sign in to the virtual machine, follow the instructions in [Connect and sign in to an Azure virtual machine running Linux](/azure-docs-archive-pr/virtual-machines/linux/login-using-aad) or [Connect and sign in to an Azure virtual machine running Windows](../../virtual-machines/windows/connect-logon.md).
107+
To sign in to the virtual machine, follow the instructions in [Connect and sign in to an Azure virtual machine running Linux](/azure/virtual-machines/linux-vm-connect) or [Connect and sign in to an Azure virtual machine running Windows](../../virtual-machines/windows/connect-logon.md).
108108

109109

110110
To log into a Linux VM, you can use the ssh command with the \<publicIpAddress\> given in the [Create a virtual machine](#create-a-virtual-machine) step:

articles/key-vault/general/tutorial-net-virtual-machine.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -128,7 +128,7 @@ Set-AzKeyVaultAccessPolicy -ResourceGroupName <YourResourceGroupName> -VaultName
128128

129129
## Sign in to the virtual machine
130130

131-
To sign in to the virtual machine, follow the instructions in [Connect and sign in to an Azure Windows virtual machine](../../virtual-machines/windows/connect-logon.md) or [Connect and sign in to an Azure Linux virtual machine](/azure-docs-archive-pr/virtual-machines/linux/login-using-aad).
131+
To sign in to the virtual machine, follow the instructions in [Connect and sign in to an Azure Windows virtual machine](../../virtual-machines/windows/connect-logon.md) or [Connect and sign in to an Azure Linux virtual machine](/azure/virtual-machines/linux-vm-connect).
132132

133133
## Set up the console app
134134

articles/key-vault/general/tutorial-python-virtual-machine.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,7 @@ az keyvault set-policy --name "<your-unique-keyvault-name>" --object-id "<system
104104

105105
## Log in to the VM
106106

107-
To sign in to the virtual machine, follow the instructions in [Connect and sign in to an Azure virtual machine running Linux](/azure-docs-archive-pr/virtual-machines/linux/login-using-aad) or [Connect and sign in to an Azure virtual machine running Windows](../../virtual-machines/windows/connect-logon.md).
107+
To sign in to the virtual machine, follow the instructions in [Connect and sign in to an Azure virtual machine running Linux](/azure/virtual-machines/linux-vm-connect) or [Connect and sign in to an Azure virtual machine running Windows](../../virtual-machines/windows/connect-logon.md).
108108

109109

110110
To log into a Linux VM, you can use the ssh command with the \<publicIpAddress\> given in the [Create a virtual machine](#create-a-virtual-machine) step:

articles/virtual-machines/linux/disk-encryption-linux.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -188,7 +188,7 @@ To disable the encryption, see [Disable encryption and remove the encryption ext
188188
189189
You can enable disk encryption on an existing or running Linux VM in Azure by using the [Resource Manager template](https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.compute/encrypt-running-linux-vm-without-aad).
190190
191-
1. Click **Deploy to Azure** on the Azure quickstart template.
191+
1. Click **Deploy to Azure** on the Azure Quickstart Template.
192192
193193
2. Select the subscription, resource group, resource group location, parameters, legal terms, and agreement. Click **Create** to enable encryption on the existing or running VM.
194194
@@ -219,7 +219,7 @@ The **EncryptFormatAll** parameter reduces the time for Linux data disks to be e
219219
>If you're setting this parameter while updating encryption settings, it might lead to a reboot before the actual encryption. In this case, you will also want to remove the disk you don't want formatted from the fstab file. Similarly, you should add the partition you want encrypt-formatted to the fstab file before initiating the encryption operation.
220220
221221
### EncryptFormatAll criteria
222-
The parameter goes though all partitions and encrypts them as long as they meet **all** of the criteria below:
222+
The parameter goes through all partitions and encrypts them as long as they meet **all** of the criteria below:
223223
- Is not a root/OS/boot partition
224224
- Is not already encrypted
225225
- Is not a BEK volume
@@ -333,7 +333,7 @@ You can add a new data disk using [az vm disk attach](add-disk.md), or [through
333333

334334
### Enable encryption on a newly added disk with Azure CLI
335335

336-
If the VM was previously encrypted with "All" then the --volume-type parameter should remain "All". All includes both OS and data disks. If the VM was previously encrypted with a volume type of "OS", then the --volume-type parameter should be changed to "All" so that both the OS and the new data disk will be included. If the VM was encrypted with only the volume type of "Data", then it can remain "Data" as demonstrated below. Adding and attaching a new data disk to a VM is not sufficient preparation for encryption. The newly attached disk must also be formatted and properly mounted within the VM prior to enabling encryption. On Linux the disk must be mounted in /etc/fstab with a [persistent block device name](/azure-docs-test-baseline-pr/virtual-machines/linux/troubleshoot-device-names-problems).
336+
If the VM was previously encrypted with "All" then the --volume-type parameter should remain "All". All includes both OS and data disks. If the VM was previously encrypted with a volume type of "OS", then the --volume-type parameter should be changed to "All" so that both the OS and the new data disk will be included. If the VM was encrypted with only the volume type of "Data", then it can remain "Data" as demonstrated below. Adding and attaching a new data disk to a VM is not sufficient preparation for encryption. The newly attached disk must also be formatted and properly mounted within the VM prior to enabling encryption. On Linux the disk must be mounted in /etc/fstab with a [persistent block device name](/troubleshoot/azure/virtual-machines/troubleshoot-device-names-problems).
337337

338338
In contrast to PowerShell syntax, the CLI does not require the user to provide a unique sequence version when enabling encryption. The CLI automatically generates and uses its own unique sequence version value.
339339

@@ -449,7 +449,7 @@ Azure Disk Encryption does not work for the following Linux scenarios, features,
449449

450450
- Encrypting basic tier VM or VMs created through the classic VM creation method.
451451
- Disabling encryption on an OS drive or data drive of a Linux VM when the OS drive is encrypted.
452-
- Encrypting the OS drive for Linux virtual machine scale sets.
452+
- Encrypting the OS drive for Linux Virtual Machine Scale Sets.
453453
- Encrypting custom images on Linux VMs.
454454
- Integration with an on-premises key management system.
455455
- Azure Files (shared file system).

0 commit comments

Comments
 (0)