Skip to content

Commit c4b3d49

Browse files
Merge pull request #220393 from greg-lindsay/fwlog
remove text and image
2 parents 02c7af9 + c9aab93 commit c4b3d49

File tree

1 file changed

+1
-3
lines changed

1 file changed

+1
-3
lines changed

articles/firewall/premium-certificates.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: vhorne
55
ms.service: firewall
66
services: firewall
77
ms.topic: conceptual
8-
ms.date: 05/23/2022
8+
ms.date: 12/05/2022
99
ms.author: victorh
1010
---
1111

@@ -68,8 +68,6 @@ To configure your key vault:
6868
- It's recommended to use a CA certificate import because it allows you to configure an alert based on certificate expiration date.
6969
- After you've imported a certificate or a secret, you need to define access policies in the key vault to allow the identity to be granted get access to the certificate/secret.
7070
- The provided CA certificate needs to be trusted by your Azure workload. Ensure they are deployed correctly.
71-
- The Key Vault Networking must be set to allow access from **All networks**.
72-
:::image type="content" source="media/premium-certificates/keyvault-networking.png" alt-text="Screenshot showing Key Vault networking" lightbox="media/premium-certificates/keyvault-networking.png":::
7371

7472
You can either create or reuse an existing user-assigned managed identity, which Azure Firewall uses to retrieve certificates from Key Vault on your behalf. For more information, see [What is managed identities for Azure resources?](../active-directory/managed-identities-azure-resources/overview.md)
7573

0 commit comments

Comments
 (0)