You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/event-hubs/configure-customer-managed-key.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -367,7 +367,7 @@ Follow instructions from the [Create a user-assigned managed identity](../active
367
367
> [!NOTE]
368
368
> You can assign up to **4** user identities to a namespace. These associations are deleted when the namespace is deleted or when you pass the `identity -> type` in the template to `None`.
369
369
370
-
### Ggrant access to user-assigned identity
370
+
### Grant access to user-assigned identity
371
371
372
372
1. Get the **Service principal ID** for the user identity using the following PowerShell command. In the example, `ud1` is the user-assigned identity to be used for encryption.
373
373
@@ -386,7 +386,7 @@ Follow instructions from the [Create a user-assigned managed identity](../active
386
386
### Create an Event Hubs namespace with user identity and key vault information
387
387
This section gives you an example that shows you how to do the following tasks using an Azure Resource Manager template.
388
388
389
-
- Assign a user-managed identity to an Event Hubs namespace.
389
+
1. Assign a user-managed identity to an Event Hubs namespace.
390
390
391
391
```json
392
392
"identity": {
@@ -396,7 +396,7 @@ This section gives you an example that shows you how to do the following tasks u
396
396
}
397
397
},
398
398
```
399
-
- Enable encryption on the namespace by specifying a key from your key vault and the user-managed identity to access the key.
399
+
1. Enable encryption on the namespace by specifying a key from your key vault and the user-managed identity to access the key.
400
400
401
401
```json
402
402
"encryption":{
@@ -505,7 +505,7 @@ This section gives you an example that shows you how to do the following tasks u
505
505
]
506
506
}
507
507
```
508
-
2. Create a template parameter file: **CreateEventHubsNamespaceWithUserIdentityAndEncryptionParams.json**.
508
+
1. Create a template parameter file: **CreateEventHubsNamespaceWithUserIdentityAndEncryptionParams.json**.
509
509
510
510
# [Key Vault](#tab/Key-Vault)
511
511
@@ -576,7 +576,7 @@ This section gives you an example that shows you how to do the following tasks u
576
576
|`<RESOURCE GROUP NAME>`| Resource group of the user-managed identity. |
577
577
|`<USER MANAGED IDENTITY NAME>`| Name of the user-managed identity. |
578
578
579
-
3. Run the following PowerShell command to deploy the Resource Manager template. Replace `{MyRG}` with the name of your resource group before running the command.
579
+
1. Run the following PowerShell command to deploy the Resource Manager template. Replace `{MyRG}` with the name of your resource group before running the command.
Copy file name to clipboardExpand all lines: articles/service-bus-messaging/configure-customer-managed-key.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -368,7 +368,7 @@ Follow instructions from the [Create a user-assigned managed identity](../active
368
368
### Create a premium Service Bus namespace with user identity and key vault information
369
369
This section gives you an example that shows you how to do the following tasks using an Azure Resource Manager template.
370
370
371
-
- Assign a user-managed identity to a Service Bus namespace.
371
+
1. Assign a user-managed identity to a Service Bus namespace.
372
372
373
373
```json
374
374
"identity": {
@@ -378,7 +378,7 @@ This section gives you an example that shows you how to do the following tasks u
378
378
}
379
379
},
380
380
```
381
-
- Enable encryption on the namespace by specifying a key from your key vault and the user-managed identity to access the key.
381
+
1. Enable encryption on the namespace by specifying a key from your key vault and the user-managed identity to access the key.
382
382
383
383
```json
384
384
"encryption":{
@@ -472,7 +472,7 @@ This section gives you an example that shows you how to do the following tasks u
472
472
}
473
473
```
474
474
475
-
2. Create a template parameter file: **CreateServiceBusNamespaceWithUserIdentityAndEncryptionParams.json**.
475
+
1. Create a template parameter file: **CreateServiceBusNamespaceWithUserIdentityAndEncryptionParams.json**.
476
476
477
477
# [Key Vault](#tab/Key-Vault)
478
478
@@ -543,7 +543,7 @@ This section gives you an example that shows you how to do the following tasks u
543
543
|`<RESOURCE GROUP NAME>`| Resource group of the user-managed identity. |
544
544
|`<USER MANAGED IDENTITY NAME>`| Name of the user-managed identity. |
545
545
546
-
3. Run the following PowerShell command to deploy the Resource Manager template. Replace `{MyRG}` with the name of your resource group before running the command.
546
+
1. Run the following PowerShell command to deploy the Resource Manager template. Replace `{MyRG}` with the name of your resource group before running the command.
0 commit comments