Skip to content

Commit c271620

Browse files
Update articles/deployment-environments/how-to-configure-extensibility-generic-container-image.md
Co-authored-by: Max Horstmann <[email protected]>
1 parent 3a3245d commit c271620

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/deployment-environments/how-to-configure-extensibility-generic-container-image.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -141,7 +141,7 @@ It's also possible to store the image in a different container registry such as
141141
> [!Caution]
142142
> Storing your container image in a registry with anonymous (unauthenticated) pull access makes it publicly accessible. Don't do that if your image contains any sensitive information. Instead, store it in Azure Container Instances (ACR) with anonymous pull access disabled.
143143
144-
To use a custom image stored in the ACR, you need to ensure that ADE has appropriate permissions to access your image. When you create an ACR instance, it's secure by default and only allows authenticated users to gain access. With this configuration, you don't have to enable anonymous pull access.
144+
To use a custom image stored in ACR, you need to ensure that ADE has appropriate permissions to access your image. When you create an ACR instance, it's secure by default and only allows authenticated users to gain access.
145145

146146
To create an instance of the ACR, which can be done through the Azure CLI, the Azure portal, PowerShell commands, and more, follow one of the [quickstarts](/azure/container-registry/container-registry-get-started-azure-cli).
147147

0 commit comments

Comments
 (0)