Skip to content

Commit c1cf2ca

Browse files
committed
Minor fixes
1 parent fd73cac commit c1cf2ca

File tree

1 file changed

+5
-4
lines changed

1 file changed

+5
-4
lines changed

articles/deployment-environments/how-to-configure-extensibility-bicep-container-image.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -236,16 +236,16 @@ docker build . -t {YOUR_REGISTRY}.azurecr.io/customImage:1.0.0
236236

237237
### Push the Docker image to a registry
238238

239-
In order to use custom images, you need to store them in a container registry. Azure Container Instances (ACR) is highly recommended for that. Due to its tight integration with ADE, the image can be published without allowing public anonymous pull access.
239+
In order to use custom images, you need to store them in a container registry. Azure Container Registry (ACR) is highly recommended for that. Due to its tight integration with ADE, the image can be published without allowing public anonymous pull access.
240240

241241
It's also possible to store the image in a different container registry such as Docker Hub, but in that case it needs to be publicly accessible.
242242

243243
> [!Caution]
244-
> Enabling anonymous (unauthenticated) pull access makes all registry content publicly available for read (pull) actions.
244+
> Storing your container image in a registry with anonymous (unauthenticated) pull access makes it publicly accessible. Don't do that if your image contains any sensitive information. Instead, store it in Azure Container Registry (ACR) with anonymous pull access disabled.
245245
246-
To use a custom image stored in ACR, you need to ensure that ADE has appropriate permissions to access your image. Anonymous pull access is disabled by default in ACR.
246+
To use a custom image stored in ACR, you need to ensure that ADE has appropriate permissions to access your image. When you create an ACR instance, it's secure by default and only allows authenticated users to gain access.
247247

248-
To create a registry, which can be done through the Azure CLI, the Azure portal, PowerShell commands, and more, follow one of the [quickstarts](/azure/container-registry/container-registry-get-started-azure-cli).
248+
To create an instance of ACR, which can be done through the Azure CLI, the Azure portal, PowerShell commands, and more, follow one of the [quickstarts](/azure/container-registry/container-registry-get-started-azure-cli).
249249

250250
#### Use a public registry with anonymous pull
251251

@@ -310,6 +310,7 @@ In this configuration, ADE uses the Managed Identity for the PET, whether system
310310

311311
> [!Tip]
312312
> This role assignment has to be made for every project environment type. It can be automated through the Azure CLI.
313+
313314
When you're ready to push your image to your registry, run the following command:
314315

315316
```docker

0 commit comments

Comments
 (0)