Skip to content

Commit bfdae1e

Browse files
Fixed blocking issues from review
1 parent e59b999 commit bfdae1e

File tree

2 files changed

+9
-9
lines changed

2 files changed

+9
-9
lines changed

articles/event-hubs/configure-customer-managed-key.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -367,7 +367,7 @@ Follow instructions from the [Create a user-assigned managed identity](../active
367367
> [!NOTE]
368368
> You can assign up to **4** user identities to a namespace. These associations are deleted when the namespace is deleted or when you pass the `identity -> type` in the template to `None`.
369369
370-
### Ggrant access to user-assigned identity
370+
### Grant access to user-assigned identity
371371
372372
1. Get the **Service principal ID** for the user identity using the following PowerShell command. In the example, `ud1` is the user-assigned identity to be used for encryption.
373373
@@ -386,7 +386,7 @@ Follow instructions from the [Create a user-assigned managed identity](../active
386386
### Create an Event Hubs namespace with user identity and key vault information
387387
This section gives you an example that shows you how to do the following tasks using an Azure Resource Manager template.
388388
389-
- Assign a user-managed identity to an Event Hubs namespace.
389+
1. Assign a user-managed identity to an Event Hubs namespace.
390390
391391
```json
392392
"identity": {
@@ -396,7 +396,7 @@ This section gives you an example that shows you how to do the following tasks u
396396
}
397397
},
398398
```
399-
- Enable encryption on the namespace by specifying a key from your key vault and the user-managed identity to access the key.
399+
1. Enable encryption on the namespace by specifying a key from your key vault and the user-managed identity to access the key.
400400
401401
```json
402402
"encryption":{
@@ -505,7 +505,7 @@ This section gives you an example that shows you how to do the following tasks u
505505
]
506506
}
507507
```
508-
2. Create a template parameter file: **CreateEventHubsNamespaceWithUserIdentityAndEncryptionParams.json**.
508+
1. Create a template parameter file: **CreateEventHubsNamespaceWithUserIdentityAndEncryptionParams.json**.
509509
510510
# [Key Vault](#tab/Key-Vault)
511511
@@ -576,7 +576,7 @@ This section gives you an example that shows you how to do the following tasks u
576576
| `<RESOURCE GROUP NAME>` | Resource group of the user-managed identity. |
577577
| `<USER MANAGED IDENTITY NAME>` | Name of the user-managed identity. |
578578

579-
3. Run the following PowerShell command to deploy the Resource Manager template. Replace `{MyRG}` with the name of your resource group before running the command.
579+
1. Run the following PowerShell command to deploy the Resource Manager template. Replace `{MyRG}` with the name of your resource group before running the command.
580580

581581
```azurepowershell-interactive
582582
New-AzResourceGroupDeployment -Name CreateEventHubsNamespaceWithEncryption -ResourceGroupName {MyRG} -TemplateFile ./ CreateEventHubsNamespaceWithUserIdentityAndEncryption.json -TemplateParameterFile ./ CreateEventHubsNamespaceWithUserIdentityAndEncryptionParams.json

articles/service-bus-messaging/configure-customer-managed-key.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -368,7 +368,7 @@ Follow instructions from the [Create a user-assigned managed identity](../active
368368
### Create a premium Service Bus namespace with user identity and key vault information
369369
This section gives you an example that shows you how to do the following tasks using an Azure Resource Manager template.
370370
371-
- Assign a user-managed identity to a Service Bus namespace.
371+
1. Assign a user-managed identity to a Service Bus namespace.
372372
373373
```json
374374
"identity": {
@@ -378,7 +378,7 @@ This section gives you an example that shows you how to do the following tasks u
378378
}
379379
},
380380
```
381-
- Enable encryption on the namespace by specifying a key from your key vault and the user-managed identity to access the key.
381+
1. Enable encryption on the namespace by specifying a key from your key vault and the user-managed identity to access the key.
382382
383383
```json
384384
"encryption":{
@@ -472,7 +472,7 @@ This section gives you an example that shows you how to do the following tasks u
472472
}
473473
```
474474
475-
2. Create a template parameter file: **CreateServiceBusNamespaceWithUserIdentityAndEncryptionParams.json**.
475+
1. Create a template parameter file: **CreateServiceBusNamespaceWithUserIdentityAndEncryptionParams.json**.
476476
477477
# [Key Vault](#tab/Key-Vault)
478478
@@ -543,7 +543,7 @@ This section gives you an example that shows you how to do the following tasks u
543543
| `<RESOURCE GROUP NAME>` | Resource group of the user-managed identity. |
544544
| `<USER MANAGED IDENTITY NAME>` | Name of the user-managed identity. |
545545

546-
3. Run the following PowerShell command to deploy the Resource Manager template. Replace `{MyRG}` with the name of your resource group before running the command.
546+
1. Run the following PowerShell command to deploy the Resource Manager template. Replace `{MyRG}` with the name of your resource group before running the command.
547547

548548
```azurepowershell-interactive
549549
New-AzResourceGroupDeployment -Name CreateServiceBusNamespaceWithEncryption -ResourceGroupName {MyRG} -TemplateFile ./ CreateServiceBusNamespaceWithUserIdentityAndEncryption.json -TemplateParameterFile ./ CreateServiceBusNamespaceWithUserIdentityAndEncryptionParams.json

0 commit comments

Comments
 (0)