Skip to content

Commit bd7663d

Browse files
authored
Merge pull request #266660 from dcurwin/wi-212966-recommendations-alerts-h3-feb19-2024
Replace recommendation and alerts tables with H3
2 parents e2e779b + da692a8 commit bd7663d

File tree

55 files changed

+10641
-1711
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

55 files changed

+10641
-1711
lines changed

articles/container-registry/allow-access-trusted-services.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -16,8 +16,8 @@ Use the Azure Cloud Shell or a local installation of the Azure CLI to run the co
1616

1717
## Limitations
1818

19-
* Certain registry access scenarios with trusted services require a [managed identity for Azure resources](../active-directory/managed-identities-azure-resources/overview.md). Except where noted that a user-assigned managed identity is supported, only a system-assigned identity may be used.
20-
* Allowing trusted services doesn't apply to a container registry configured with a [service endpoint](container-registry-vnet.md). The feature only affects registries that are restricted with a [private endpoint](container-registry-private-link.md) or that have [public IP access rules](container-registry-access-selected-networks.md) applied.
19+
* Certain registry access scenarios with trusted services require a [managed identity for Azure resources](../active-directory/managed-identities-azure-resources/overview.md). Except where noted that a user-assigned managed identity is supported, only a system-assigned identity may be used.
20+
* Allowing trusted services doesn't apply to a container registry configured with a [service endpoint](container-registry-vnet.md). The feature only affects registries that are restricted with a [private endpoint](container-registry-private-link.md) or that have [public IP access rules](container-registry-access-selected-networks.md) applied.
2121

2222
## About trusted services
2323

@@ -26,17 +26,17 @@ Azure Container Registry has a layered security model, supporting multiple netwo
2626
* [Private endpoint with Azure Private Link](container-registry-private-link.md). When configured, a registry's private endpoint is accessible only to resources within the virtual network, using private IP addresses.
2727
* [Registry firewall rules](container-registry-access-selected-networks.md), which allow access to the registry's public endpoint only from specific public IP addresses or address ranges. You can also configure the firewall to block all access to the public endpoint when using private endpoints.
2828

29-
When deployed in a virtual network or configured with firewall rules, a registry denies access to users or services from outside those sources.
29+
When deployed in a virtual network or configured with firewall rules, a registry denies access to users or services from outside those sources.
3030

31-
Several multi-tenant Azure services operate from networks that can't be included in these registry network settings, preventing them from performing operations such as pull or push images to the registry. By designating certain service instances as "trusted", a registry owner can allow select Azure resources to securely bypass the registry's network settings to perform registry operations.
31+
Several multi-tenant Azure services operate from networks that can't be included in these registry network settings, preventing them from performing operations such as pull or push images to the registry. By designating certain service instances as "trusted", a registry owner can allow select Azure resources to securely bypass the registry's network settings to perform registry operations.
3232

3333
### Trusted services
3434

3535
Instances of the following services can access a network-restricted container registry if the registry's **allow trusted services** setting is enabled (the default). More services will be added over time.
3636

3737
Where indicated, access by the trusted service requires additional configuration of a managed identity in a service instance, assignment of an [RBAC role](container-registry-roles.md), and authentication with the registry. For example steps, see [Trusted services workflow](#trusted-services-workflow), later in this article.
3838

39-
|Trusted service |Supported usage scenarios | Configure managed identity with RBAC role
39+
|Trusted service |Supported usage scenarios | Configure managed identity with RBAC role |
4040
|---------|---------|------|
4141
| Azure Container Instances | [Deploy to Azure Container Instances from Azure Container Registry using a managed identity](../container-instances/using-azure-container-registry-mi.md) | Yes, either system-assigned or user-assigned identity |
4242
| Microsoft Defender for Cloud | Vulnerability scanning by [Microsoft Defender for container registries](scan-images-defender.md) | No |
@@ -45,7 +45,7 @@ Where indicated, access by the trusted service requires additional configuration
4545
|Azure Container Registry | [Import images](container-registry-import-images.md) to or from a network-restricted Azure container registry | No |
4646

4747
> [!NOTE]
48-
> Curently, enabling the allow trusted services setting doesn't apply to App Service.
48+
> Currently, enabling the allow trusted services setting doesn't apply to App Service.
4949
5050
## Allow trusted services - CLI
5151

@@ -65,15 +65,15 @@ az acr update --name myregistry --allow-trusted-services true
6565

6666
## Allow trusted services - portal
6767

68-
By default, the allow trusted services setting is enabled in a new Azure container registry.
68+
By default, the allow trusted services setting is enabled in a new Azure container registry.
6969

7070
To disable or re-enable the setting in the portal:
7171

7272
1. In the portal, navigate to your container registry.
73-
1. Under **Settings**, select **Networking**.
73+
1. Under **Settings**, select **Networking**.
7474
1. In **Allow public network access**, select **Selected networks** or **Disabled**.
7575
1. Do one of the following:
76-
* To disable access by trusted services, under **Firewall exception**, uncheck **Allow trusted Microsoft services to access this container registry**.
76+
* To disable access by trusted services, under **Firewall exception**, uncheck **Allow trusted Microsoft services to access this container registry**.
7777
* To allow trusted services, under **Firewall exception**, check **Allow trusted Microsoft services to access this container registry**.
7878
1. Select **Save**.
7979

@@ -84,21 +84,21 @@ Here's a typical workflow to enable an instance of a trusted service to access a
8484
1. Enable a managed identity in an instance of one of the [trusted services](#trusted-services) for Azure Container Registry.
8585
1. Assign the identity an [Azure role](container-registry-roles.md) to your registry. For example, assign the ACRPull role to pull container images.
8686
1. In the network-restricted registry, configure the setting to allow access by trusted services.
87-
1. Use the identity's credentials to authenticate with the network-restricted registry.
87+
1. Use the identity's credentials to authenticate with the network-restricted registry.
8888
1. Pull images from the registry, or perform other operations allowed by the role.
8989

9090
### Example: ACR Tasks
9191

9292
The following example demonstrates using ACR Tasks as a trusted service. See [Cross-registry authentication in an ACR task using an Azure-managed identity](container-registry-tasks-cross-registry-authentication.md) for task details.
9393

9494
1. Create or update an Azure container registry.
95-
[Create](container-registry-tasks-cross-registry-authentication.md#option-2-create-task-with-system-assigned-identity) an ACR task.
95+
[Create](container-registry-tasks-cross-registry-authentication.md#option-2-create-task-with-system-assigned-identity) an ACR task.
9696
* Enable a system-assigned managed identity when creating the task.
9797
* Disable default auth mode (`--auth-mode None`) of the task.
9898
1. Assign the task identity [an Azure role to access the registry](container-registry-tasks-authentication-managed-identity.md#3-grant-the-identity-permissions-to-access-other-azure-resources). For example, assign the AcrPush role, which has permissions to pull and push images.
99-
2. [Add managed identity credentials for the registry](container-registry-tasks-authentication-managed-identity.md#4-optional-add-credentials-to-the-task) to the task.
100-
3. To confirm that the task bypasses network restrictions, [disable public access](container-registry-access-selected-networks.md#disable-public-network-access) in the registry.
101-
4. Run the task. If the registry and task are configured properly, the task runs successfully, because the registry allows access.
99+
1. [Add managed identity credentials for the registry](container-registry-tasks-authentication-managed-identity.md#4-optional-add-credentials-to-the-task) to the task.
100+
1. To confirm that the task bypasses network restrictions, [disable public access](container-registry-access-selected-networks.md#disable-public-network-access) in the registry.
101+
1. Run the task. If the registry and task are configured properly, the task runs successfully, because the registry allows access.
102102

103103
To test disabling access by trusted services:
104104

0 commit comments

Comments
 (0)