Skip to content

Commit c32fd80

Browse files
committed
edits
1 parent c86d48f commit c32fd80

12 files changed

+123
-104
lines changed

articles/azure-web-pubsub/howto-authorize-from-application.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.topic: conceptual
1212

1313
Azure Web PubSub supports Microsoft Entra ID for authorizing requests from [applications](../active-directory/develop/app-objects-and-service-principals.md).
1414

15-
This article shows you how to configure your Web PubSub resource and codes to authorize the request to a Web PubSub resource from an Azure application.
15+
This article shows you how to configure your Web PubSub resource and code to authorize the request to a Web PubSub resource from an Azure application.
1616

1717
## Register an application
1818

@@ -24,10 +24,10 @@ The first step is to register an Azure application.
2424

2525
![Screenshot that shows registering an application.](./media/howto-authorize-from-application/register-an-application.png)
2626

27-
1. Enter a display **Name** for your application.
27+
1. For **Name**, enter a name to use for your application.
2828
1. Select **Register** to confirm the register.
2929

30-
When your application is registered, go to the application **Overview** pane to view the values for **Application (client) ID** and **Directory (tenant) ID**. You use these values in the following sections.
30+
When your application is registered, go to the application overview to view the values for **Application (client) ID** and **Directory (tenant) ID**. You use these values in the following sections.
3131

3232
![Screenshot that shows an application.](./media/howto-authorize-from-application/application-overview.png)
3333

@@ -59,7 +59,7 @@ You can also upload a certificate instead of creating a client secret.
5959

6060
![Screenshot that shows uploading a certificate.](./media/howto-authorize-from-application/upload-certificate.png)
6161

62-
For information about adding credentials, see [Add credentials](../active-directory/develop/quickstart-register-app.md#add-credentials).
62+
For more information about adding credentials, see [Add credentials](../active-directory/develop/quickstart-register-app.md#add-credentials).
6363

6464
## Add a role assignment in the Azure portal
6565

articles/azure-web-pubsub/howto-authorize-from-managed-identity.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,31 +1,31 @@
11
---
2-
title: Authorize a managed identity request to Web PubSub resources
3-
description: Learn how to authorize a managed identity request to Web PubSub resources by using Microsoft Entra ID.
2+
title: Authorize a managed identity request
3+
description: Learn how to authorize a managed identity request to your Web PubSub resources by using Microsoft Entra ID.
44
author: terencefan
55
ms.author: tefa
66
ms.date: 08/16/2024
77
ms.service: azure-web-pubsub
88
ms.topic: conceptual
99
---
1010

11-
# Authorize a managed identity request to Web PubSub resources by using Microsoft Entra ID
11+
# Authorize a managed identity request by using Microsoft Entra ID
1212

1313
Azure Web PubSub Service supports Microsoft Entra ID for authorizing requests from [managed identities](../active-directory/managed-identities-azure-resources/overview.md).
1414

15-
This article shows you how to configure your Web PubSub resource and codes to authorize the request to a Web PubSub resource from a managed identity.
15+
This article shows you how to configure your Web PubSub resource and code to authorize the request to a Web PubSub resource from a managed identity.
1616

1717
## Configure managed identities
1818

1919
The first step is to configure managed identities.
2020

21-
In this section, you set a system-assigned managed identity on a virtual machine by using the Azure portal.
21+
In this section, you set up a system-assigned managed identity on a virtual machine by using the Azure portal.
2222

2323
1. In the [Azure portal](https://portal.azure.com/), search for and then select a virtual machine (VM).
2424
1. Under **Settings**, select **Identity**.
2525
1. On the **System assigned** tab, set **Status** to **On**.
2626

2727
![Screenshot that shows creating a system identity for a virtual machine.](./media/howto-authorize-from-managed-identity/identity-virtual-machine.png)
28-
1. Select the **Save** button to confirm the change.
28+
1. Select **Save** to confirm the change.
2929

3030
### Create a user-assigned managed identity
3131

@@ -37,7 +37,7 @@ Learn how to [create a user-assigned managed identity](../active-directory/manag
3737
- [Configure managed identities for Azure resources on an Azure VM by using Azure PowerShell](../active-directory/managed-identities-azure-resources/qs-configure-powershell-windows-vm.md)
3838
- [Configure managed identities for Azure resources on an Azure VM by using the Azure CLI](../active-directory/managed-identities-azure-resources/qs-configure-cli-windows-vm.md)
3939
- [Configure managed identities for Azure resources on an Azure VM by using a template](../active-directory/managed-identities-azure-resources/qs-configure-template-windows-vm.md)
40-
- [Configure a VM with managed identities for Azure resources by using an Azure SDK](../active-directory/managed-identities-azure-resources/qs-configure-sdk-windows-vm.md)
40+
- [Configure managed identities for Azure resources on a VM by using the Azure SDK](../active-directory/managed-identities-azure-resources/qs-configure-sdk-windows-vm.md)
4141

4242
### Configure managed identities for Azure App Service and Azure Functions
4343

@@ -52,7 +52,7 @@ This section demonstrates how to assign the Web PubSub Service Owner role to a s
5252
5353
1. In the [Azure portal](https://portal.azure.com/), go to your Web PubSub resource.
5454

55-
1. On the left menu, select **Access control (IAM)** to display access control settings for your Web PubSub service.
55+
1. On the left menu, select **Access control (IAM)** to display access control settings for your Web PubSub instance.
5656

5757
1. Select the **Role assignments** tab and view the role assignments at this scope.
5858

articles/azure-web-pubsub/howto-client-certificate.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,25 +1,25 @@
11
---
2-
title: Enable client certificate authentication for Azure Web PubSub (Preview)
3-
titleSuffix: Azure Web PubSub Service
4-
description: Learn how to enable client certificate authentication for Azure Web PubSub (Preview)
2+
title: Turn on client certificate authentication (preview)
3+
titleSuffix: Azure Web PubSub
4+
description: Learn how to turn on client certificate authentication for Azure Web PubSub (preview).
55
author: ArchangelSDY
66
ms.service: azure-web-pubsub
77
ms.topic: how-to
88
ms.date: 06/20/2023
99
ms.author: dayshen
1010
---
1111

12-
# Enable client certificate authentication for Azure Web PubSub (Preview)
12+
# Turn on client certificate authentication (preview)
1313

14-
You can restrict access to your instance of Azure Web PubSub by enabling different types of authentication for it. One authentication method is to request a client certificate and validate the certificate in event handlers. This mechanism is called *client certificate authentication* or *Transport Layer Security (TLS) mutual authentication*. This article shows you how to set up your Web PubSub instance to use client certificate authentication.
14+
You can restrict access to your instance of Azure Web PubSub by turning on different types of authentication for the resource. One authentication method is to request a client certificate and validate the certificate in event handlers. This mechanism is called *client certificate authentication* or *Transport Layer Security (TLS) mutual authentication*. This article shows you how to set up your Web PubSub instance to use client certificate authentication.
1515

1616
> [!NOTE]
1717
> Enabling client certificate authentication in a browser scenario generally is not recommended. Different browsers have different behaviors when they process a client certificate request, and you have little control in a JavaScript application. If you want to enable client certificate authentication, we recommend that you use it in scenarios in which you have strong control over TLS settings. An example is in a native application.
1818
1919
## Prerequisites
2020

2121
* An Azure account with an active subscription. If you don't have an Azure account, you can [create an account for free](https://azure.microsoft.com/free/).
22-
* An Azure Web PubSub instance (must be minimum Standard tier).
22+
* An Azure Web PubSub instance at a minimum Standard tier.
2323
* A function created in Azure Functions to handle connect events.
2424
* A client certificate. You need to know its SHA-1 thumbprint.
2525

articles/azure-web-pubsub/howto-custom-domain.md

Lines changed: 46 additions & 39 deletions
Original file line numberDiff line numberDiff line change
@@ -1,56 +1,65 @@
11
---
2-
title: Configure a custom domain for Azure Web PubSub
3-
titleSuffix: Azure Web PubSub Service
4-
description: Learn how to configure a custom domain for Azure Web PubSub.
2+
title: Add a custom domain
3+
titleSuffix: Azure Web PubSub
4+
description: Learn how to create and configure a custom domain for Azure Web PubSub.
55
author: ArchangelSDY
66
ms.service: azure-web-pubsub
77
ms.topic: how-to
8-
ms.date: 03/30/2023
8+
ms.date: 08/16/2024
99
ms.author: dayshen
1010
---
1111

12-
# Configure a custom domain for Azure Web PubSub
12+
# Add a custom domain
1313

14-
In addition to the default domain that the Azure Web PubSub service provides, you can add a custom domain. A custom domain is a domain name that you own and manage. You can use a custom domain to access your Web PubSub resource. For example, you can use `contoso.example.com` instead of `contoso.webpubsub.azure.com` to access your Azure Web PubSub resource.
14+
In addition to the default domain that is included in an instance of Azure Web PubSub, you can add a custom domain. A custom domain is a domain name that you own and manage. You can use a custom domain to access your Web PubSub resources. For example, you can use `contoso.example.com` instead of `contoso.webpubsub.azure.com` to access your resources.
1515

1616
## Prerequisites
1717

1818
* An Azure account with an active subscription. If you don't have an Azure account, you can [create an account for free](https://azure.microsoft.com/free/).
19-
* An Azure Web PubSub service (must be minimum Premium tier).
19+
* An Azure Web PubSub resource at a minimum Premium tier.
2020
* An Azure Key Vault resource.
2121
* A custom certificate matching custom domain that is stored in Azure Key Vault.
2222

2323
## Add a custom certificate
2424

2525
Before you can add a custom domain, add a matching custom certificate. A custom certificate is a resource of your instance of Web PubSub. It references a certificate in your key vault. For security and compliance, Web PubSub doesn't permanently store your certificate. Instead, it fetches the certificate from your key vault and keeps it in memory.
2626

27-
### Grant your Web PubSub resource access to the key vault
27+
## Give access to a managed identity
2828

29-
Azure Web PubSub Service uses Managed Identity to access your Key Vault. In order to authorize, it needs to be granted permissions.
29+
Azure Web PubSub uses a managed identity to access your key vault. To authorize access, it must be granted permissions.
3030

31-
1. In the Azure portal, go to your Azure Web PubSub resource.
32-
1. On the left pane, select **Identity**.
31+
### Create a managed identity
3332

34-
1. Select the type of identity to use: **System assigned** or **User assigned**. To use a user-assigned identity, first you create one.
33+
1. In the Azure portal, go to your Web PubSub resource.
34+
35+
1. On the left menu, select **Identity**.
36+
37+
1. Select the type of identity to use: **System assigned** or **User assigned**. To use a user-assigned identity, you create one first.
3538

36-
To use a system-assigned identity:
39+
To use a system-assigned identity:
3740

3841
1. Select **On**.
42+
3943
1. Select **Yes** to confirm.
44+
4045
1. Select **Save**.
4146

42-
:::image type="content" alt-text="Screenshot of enabling a system-assigned managed identity." source="media\howto-custom-domain\portal-identity.png" :::
47+
:::image type="content" alt-text="Screenshot that shows adding a system-assigned managed identity." source="media\howto-custom-domain\portal-identity.png" :::
4348

44-
To use a user-assigned identity:
49+
To add a user-assigned identity:
4550

4651
1. Select **Add user assigned managed identity**.
52+
4753
1. Select an existing identity.
54+
4855
1. Select **Add**.
4956

50-
:::image type="content" alt-text="Screenshot of enabling a user-assigned managed identity." source="media\howto-custom-domain\portal-user-assigned-identity.png" :::
57+
:::image type="content" alt-text="Screenshot that shows adding a user-assigned managed identity." source="media\howto-custom-domain\portal-user-assigned-identity.png" :::
5158

5259
1. Select **Save**.
5360

61+
### Grant permissions to the key vault
62+
5463
Depending on how you configure your Azure Key Vault permissions model, you might need to grant permissions at different locations in the Azure portal.
5564

5665
#### [Key vault access policy](#tab/vault-access-policy)
@@ -59,7 +68,7 @@ If you use a key vault built-in access policy as a key vault permissions model:
5968

6069
:::image type="content" alt-text="Screenshot of a built-in access policy selected as the key vault permissions model." source="media\howto-custom-domain\portal-key-vault-perm-model-access-policy.png" :::
6170

62-
1. Go to your Key Vault resource.
71+
1. Go to your key vault resource.
6372
1. On the left menu, select **Access configuration**.
6473
1. Select **Vault access policy**.
6574
1. Select **Go to access policies**.
@@ -81,11 +90,11 @@ If you use a key vault built-in access policy as a key vault permissions model:
8190

8291
#### [Azure role-based access control](#tab/azure-rbac)
8392

84-
If you're using Azure role-based access control as Key Vault permission model:
93+
If you use Azure role-based access control (Azure RBAC) as a key vault permissions model:
8594

86-
:::image type="content" alt-text="Screenshot of Azure RBAC selected as the key vault permission model." source="media\howto-custom-domain\portal-key-vault-perm-model-rbac.png" :::
95+
:::image type="content" alt-text="Screenshot of Azure RBAC selected as the key vault permissions model." source="media\howto-custom-domain\portal-key-vault-perm-model-rbac.png" :::
8796

88-
1. Go to your Key Vault resource.
97+
1. Go to your key vault resource.
8998
1. On the left menu, select **Access control (IAM)**.
9099
1. Select **Add** > **Add role assignment**.
91100

@@ -122,50 +131,48 @@ If you're using Azure role-based access control as Key Vault permission model:
122131

123132
Web PubSub fetches the certificate and validates its contents. When certificate validation succeeds, **Provisioning State** for the certificate is **Succeeded**.
124133

125-
:::image type="content" alt-text="Screenshot of an added custom certificate." source="media\howto-custom-domain\portal-custom-certificate-added.png" :::
134+
:::image type="content" alt-text="Screenshot that shows an added custom certificate." source="media\howto-custom-domain\portal-custom-certificate-added.png" :::
126135

127136
## Create a custom domain CNAME
128137

129-
To validate the ownership of your custom domain, you need to create a CNAME record for the custom domain and point it to the default domain of your Web PubSub resource.
138+
To validate the ownership of your custom domain, create a CNAME record for the custom domain and point it to the default domain of your Web PubSub resource.
130139

131140
For example, if your default domain is `contoso.webpubsub.azure.com` and your custom domain is `contoso.example.com`, create a CNAME record on `example.com` like in this example:
132141

133-
```plaintext
134-
contoso.example.com. 0 IN CNAME contoso.webpubsub.azure.com.
135-
```
142+
`contoso.example.com. 0 IN CNAME contoso.webpubsub.azure.com`
136143

137-
If you're using Azure DNS Zone, see [Manage DNS records](../dns/dns-operations-recordsets-portal.md) to learn how to add a CNAME record.
144+
If you use Azure DNS Zone, to learn how to add a CNAME record, see [Manage DNS records](../dns/dns-operations-recordsets-portal.md).
138145

139-
:::image type="content" alt-text="Screenshot of adding a CNAME record in Azure DNS Zone." source="media\howto-custom-domain\portal-dns-cname.png" :::
146+
:::image type="content" alt-text="Screenshot that shows adding a CNAME record in Azure DNS Zone." source="media\howto-custom-domain\portal-dns-cname.png" :::
140147

141-
If you use other DNS providers, use the provider's documentation to create a CNAME record.
148+
If you use other DNS providers, follow guidance in the provider's documentation to create a CNAME record.
142149

143-
## Add a custom domain
150+
## Add a custom domain to Web PubSub
144151

145152
A custom domain is another sub resource of your Web PubSub instance. It contains all configurations that are required for a custom domain.
146153

147154
1. In the Azure portal, go to your Web PubSub resource.
148155
1. On the left menu, select **Custom domain**.
149156
1. On the **Custom domain** pane, select **Add**.
150157

151-
:::image type="content" alt-text="Screenshot of custom domain management." source="media\howto-custom-domain\portal-custom-domain-management.png" :::
158+
:::image type="content" alt-text="Screenshot that shows custom domain management." source="media\howto-custom-domain\portal-custom-domain-management.png" :::
152159

153160
1. Enter a name for the custom domain. Use the sub resource name.
154161
1. Enter the domain name. Use the full domain name of your custom domain, for example, `contoso.com`.
155162
1. Select a custom certificate that applies to this custom domain.
156163
1. Select **Add**.
157164

158-
:::image type="content" alt-text="Screenshot of adding a custom domain." source="media\howto-custom-domain\portal-custom-domain-add.png" :::
165+
:::image type="content" alt-text="Screenshot that shows adding a custom domain." source="media\howto-custom-domain\portal-custom-domain-add.png" :::
159166

160167
## Verify a custom domain
161168

162169
You can now access your Web PubSub endpoint by using the custom domain.
163170

164-
To verify the domain, you can access the health API. The following examples use cURL.
171+
To verify the domain, you can access the Health API. The following examples use cURL.
165172

166173
#### [PowerShell](#tab/azure-powershell)
167174

168-
```powershell
175+
```azurepowershell
169176
PS C:\> curl.exe -v https://contoso.example.com/api/health
170177
...
171178
> GET /api/health HTTP/1.1
@@ -192,21 +199,21 @@ $ curl -vvv https://contoso.example.com/api/health
192199

193200
-----
194201

195-
The health API should return a `200` status code without any certificate errors.
202+
The Health API should return a `200` status code without any certificate errors.
196203

197204
## Private network key vault
198205

199-
If you configure a [private endpoint](../private-link/private-endpoint-overview.md) to your key vault, Web PubSub can't access the key vault by using a public network. You must set up a [shared private endpoint](./howto-secure-shared-private-endpoints-key-vault.md) to let Web PubSub access your key vault via a private network.
206+
If you configure a [private endpoint](../private-link/private-endpoint-overview.md) to your key vault, Web PubSub can't access the key vault by using a public network. You must set up a [shared private endpoint](./howto-secure-shared-private-endpoints-key-vault.md) to give Web PubSub access to your key vault via a private network.
200207

201-
After you create a shared private endpoint, you can create a custom certificate as usual. *You don't have to change the domain in the key vault URI.* For example, if your key vault base URI is `https://contoso.vault.azure.net`, you still use this URI to configure a custom certificate.
208+
After you create a shared private endpoint, you can create a custom certificate as usual. You *don't have to change the domain in the key vault URI*. For example, if your key vault base URI is `https://contoso.vault.azure.net`, continue to use this URI to configure a custom certificate.
202209

203-
You don't have to explicitly allow Web PubSub IP addresses in your key vault firewall settings. For more information, see [Key Vault private link diagnostics](/azure/key-vault/general/private-link-diagnostics).
210+
You don't have to explicitly allow Web PubSub IP addresses in your key vault firewall settings. For more information, see [Key vault private link diagnostics](/azure/key-vault/general/private-link-diagnostics).
204211

205212
## Certificate rotation
206213

207-
If you don't specify a secret version when you create custom certificate, Web PubSub periodically checks latest version in Key Vault. When a new version is detected, it's automatically applied. The delay is usually within an hour.
214+
If you don't specify a secret version when you create a custom certificate, Web PubSub periodically checks for the latest version in the key vault. When a new version is detected, it's automatically applied. The delay is usually within an hour.
208215

209-
Alternatively, you can also pin a custom certificate to a specific secret version in your key vault. When you need to apply a new certificate, you can edit the secret version, and then update the custom certificate proactively.
216+
Alternatively, you can pin a custom certificate to a specific secret version in your key vault. When you need to apply a new certificate, you can edit the secret version, and then update the custom certificate proactively.
210217

211218
## Related content
212219

0 commit comments

Comments
 (0)