Skip to content

Commit bad8272

Browse files
committed
edit pass: signalr-how-to-guides
1 parent 6140873 commit bad8272

File tree

1 file changed

+24
-24
lines changed

1 file changed

+24
-24
lines changed

articles/azure-signalr/howto-custom-domain.md

Lines changed: 24 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -12,24 +12,24 @@ ms.author: dayshen
1212

1313
# Configure a custom domain for Azure SignalR Service
1414

15-
In addition to the default domain provided with Azure SignalR Service, you can also add a custom DNS domain to your service. In this article, you learn how to add a custom domain to your Azure SignalR Service resource.
15+
In addition to the default domain provided with Azure SignalR Service, you can also add a custom Domain Name System (DNS) domain to your service. In this article, you learn how to add a custom domain to your Azure SignalR Service resource.
1616

1717
## Prerequisites
1818

19-
- A custom domain registered through Azure App Service or a third-party registrar.
19+
- A custom domain registered through Azure App Service or a non-Microsoft registrar.
2020
- An Azure account with an active subscription. If you don't have one, you can [create one for free](https://azure.microsoft.com/free/).
2121
- An Azure resource group.
2222
- An Azure SignalR Service resource.
2323
- An Azure Key Vault instance.
24-
- A custom domain Secure Sockets Layer (SSL) certificate stored in your Key Vault instance. For more information, see [Get started with Key Vault certificates](/azure/key-vault/certificates/certificate-scenarios)
24+
- A custom domain TLS/SSL certificate stored in your Key Vault instance. For more information, see [Get started with Key Vault certificates](/azure/key-vault/certificates/certificate-scenarios)
2525
- An Azure DNS zone (optional).
2626

2727
## Add a custom certificate
2828

29-
Before you can add a custom domain, you need to add a custom SSL certificate. Your Azure SignalR Service resource accesses the certificate stored in your key vault through a managed identity.
29+
Before you can add a custom domain, you need to add a custom TLS/SSL certificate. Your Azure SignalR Service resource accesses the certificate stored in your key vault through a managed identity.
3030

3131
> [!NOTE]
32-
> Custom domains is a Premium tier feature. Standard tier resources can be upgraded to Premium tier without downtime.
32+
> The custom domains feature is a Premium tier feature. You can upgrade Standard tier resources to Premium tier without downtime.
3333
3434
### Enable managed identity in an Azure SignalR Service
3535

@@ -49,7 +49,7 @@ After the identity is created, the object (principal) ID appears. Azure SignalR
4949

5050
Azure SignalR Service uses a [managed identity](~/articles/active-directory/managed-identities-azure-resources/overview.md) to access your key vault. You must give the managed identity permission to access your key vault.
5151

52-
The steps to grant permission depends on whether you selected **Vault access policy** or **Azure role-based access control** as your key vault permission model.
52+
The steps to grant permission depend on whether you selected **Vault access policy** or **Azure role-based access control** as your key vault permission model.
5353

5454
#### [Vault access policy](#tab/vault-access-policy)
5555

@@ -86,7 +86,7 @@ When you use the Azure role-based access control permission model, follow this p
8686

8787
:::image type="content" alt-text="Screenshot that shows Azure role-based access control selected as the vault permission model." source="media/howto-custom-domain/portal-key-vault-perm-model-rbac.png" :::
8888

89-
1. Go to your key vault resource.
89+
1. Go to your Key Vault resource.
9090
1. On the menu on the left, select **Access control (IAM)**.
9191
1. Select **Add** > **Add role assignment**.
9292

@@ -97,66 +97,66 @@ When you use the Azure role-based access control permission model, follow this p
9797
:::image type="content" alt-text="Screenshot that shows the Role tab when you add a role assignment to Key Vault." source="media/howto-custom-domain/portal-key-vault-role.png" :::
9898

9999
1. On the **Members** tab, under **Assign access to**, select **Managed identity**.
100-
1. Select **+Select members**. The **Select members** pane opens on the right.
101-
1. Search for the Azure SignalR Service resource name or the user-assigned identity name. Select **Select**.
100+
1. Choose **+ Select members** to open the **Select managed identities** pane.
101+
1. Search for the Azure SignalR Service resource name or the user-assigned identity name. Choose **Select**.
102102

103103
:::image type="content" alt-text="Screenshot that shows the Members tab when you add a role assignment to Key Vault." source="media/howto-custom-domain/portal-key-vault-members.png" :::
104104

105105
1. Select **Review + assign**.
106106

107107
-----
108108

109-
### Add a custom certificate to your Azure SignalR Service
109+
### Add a custom certificate to your Azure SignalR Service resource
110110

111-
To add the custom certificate to your Azure SignalR Service, follow these steps :
111+
To add the custom certificate to your Azure SignalR Service resource, follow these steps:
112112

113113
1. In the Azure portal, go to your Azure SignalR Service resource.
114-
1. On the menu pane, select **Custom domain**.
114+
1. On the menu on the left, select **Custom domain**.
115115
1. Under **Custom certificate**, select **Add**.
116116

117117
:::image type="content" alt-text="Screenshot that shows custom certificate management." source="media/howto-custom-domain/portal-custom-certificate-management.png" :::
118118

119119
1. Enter a name of the custom certificate.
120-
1. To choose a key vault certificate, choose **Select from your Key Vault**. After your selection, **Key Vault Base URI** and **Key Vault Secret Name** fill automatically. Alternatively, fill in the fields manually.
121-
1. Optionally, you can specify a **Key Vault Secret Version** if you want to pin the certificate to a specific version.
120+
1. To choose a Key Vault certificate, choose **Select from your Key Vault**. After you make your selection, **Key Vault Base URI** and **Key Vault Secret Name** fill automatically. Alternatively, fill in the fields manually.
121+
1. Optionally, you can specify a value for **Key Vault Secret Version** if you want to pin the certificate to a specific version.
122122
1. Select **Add**.
123123

124124
:::image type="content" alt-text="Screenshot that shows adding a custom certificate." source="media/howto-custom-domain/portal-custom-certificate-add.png" :::
125125

126-
The Azure SignalR Service fetches the certificate and validates its content. When it succeeds, **Provisioning State** shows **Succeeded** for the certificate.
126+
Azure SignalR Service fetches the certificate and validates its content. When it succeeds, **Provisioning State** shows **Succeeded** for the certificate.
127127

128128
:::image type="content" alt-text="Screenshot that shows an added custom certificate." source="media/howto-custom-domain/portal-custom-certificate-added.png" :::
129129

130130
## Create a custom domain CNAME record
131131

132-
You must create a CNAME record for your custom domain in an Azure DNS zone or with your third-party registrar service. The CNAME record creates an alias from your custom domain to the default domain of Azure SignalR Service. The Azure SignalR Service uses the record to validate the ownership of your custom domain.
132+
You must create a CNAME record for your custom domain in an Azure DNS zone or with your non-Microsoft registrar service. The CNAME record creates an alias from your custom domain to the default domain of Azure SignalR Service. Azure SignalR Service uses the record to validate the ownership of your custom domain.
133133

134-
For example, if your default domain is `contoso.service.signalr.net` and your custom domain is `contoso.example.com`, you need to create a CNAME record on `example.com`.
134+
For example, if your default domain is `contoso.service.signalr.net` and your custom domain is `contoso.example.com`, you need to create a CNAME record on `example.com`.
135135

136136
After you create the CNAME record, you can perform a DNS lookup to see the CNAME information. In the example, the output from the `linux dig` (DNS lookup) command looks similar to this output:
137137

138138
```
139139
contoso.example.com. 0 IN CNAME contoso.service.signalr.net.
140140
```
141141

142-
If you're using Azure DNS zone, see [Manage DNS records](~/articles/dns/dns-operations-recordsets-portal.md) to learn how to add a CNAME record.
142+
If you're using an Azure DNS zone, see [Manage DNS records](~/articles/dns/dns-operations-recordsets-portal.md) to learn how to add a CNAME record.
143143

144-
:::image type="content" alt-text="Screenshot that shows adding a CNAME record in Azure DNS zone." source="media/howto-custom-domain/portal-dns-cname.png" :::
144+
:::image type="content" alt-text="Screenshot that shows adding a CNAME record in an Azure DNS zone." source="media/howto-custom-domain/portal-dns-cname.png" :::
145145

146146
If you're using other DNS providers, follow the provider's guide to create a CNAME record.
147147

148148
## Add a custom domain
149149

150-
Now add the custom domain to your Azure SignalR Service.
150+
Now add the custom domain to your Azure SignalR Service resource.
151151

152152
1. In the Azure portal, go to your Azure SignalR Service resource.
153-
1. On the menu, select **Custom domain**.
153+
1. On the menu on the left, select **Custom domain**.
154154
1. Under **Custom domain**, select **Add**.
155155

156156
:::image type="content" alt-text="Screenshot that shows custom domain management." source="media/howto-custom-domain/portal-custom-domain-management.png" :::
157157

158158
1. Enter a name for the custom domain.
159-
1. Enter the full domain name of your custom domain. For example, use `contoso.com`.
159+
1. Enter the full domain name of your custom domain. For example, use **contoso.com**.
160160
1. Select a custom certificate that applies to this custom domain.
161161
1. Select **Add**.
162162

@@ -200,7 +200,7 @@ It should return the `200` status code without any certificate error.
200200

201201
If you configured a [private endpoint](../private-link/private-endpoint-overview.md) to your key vault, Azure SignalR Service can't access your key vault via a public network. You can give Azure SignalR Service access to your key vault through a private network by creating a [shared private endpoint](./howto-shared-private-endpoints-key-vault.md).
202202

203-
After you create a shared private endpoint, add a custom certificate. For instructions, see [Add a custom certificate to Azure SignalR Service](#add-a-custom-certificate-to-your-azure-signalr-service).
203+
After you create a shared private endpoint, add a custom certificate. For more information, see [Add a custom certificate to Azure SignalR Service](#add-a-custom-certificate-to-your-azure-signalr-service).
204204

205205
>[!IMPORTANT]
206206
>You don't have to change the domain in your key vault URI. For example, if your key vault base URI is `https://contoso.vault.azure.net`, you use this URI to configure a custom certificate.
@@ -218,7 +218,7 @@ Alternatively, you can pin a custom certificate to a specific secret version in
218218
If you don't plan to use the resources you created in this article, you can delete the resource group.
219219

220220
>[!CAUTION]
221-
> Deleting the resource group deletes all resources contained within it. If resources outside the scope of this article exist in the specified resource group, they're' also deleted.
221+
> Deleting the resource group deletes all resources contained within it. If resources outside the scope of this article exist in the specified resource group, they're also deleted.
222222
223223
## Related content
224224

0 commit comments

Comments
 (0)