Skip to content

Commit c696800

Browse files
authored
Merge pull request #241594 from kaistrubel/kaistrubel
updating directions and screen shots for private link on Key Vault
2 parents 0f2c585 + 0e3105a commit c696800

File tree

6 files changed

+15
-15
lines changed

6 files changed

+15
-15
lines changed

articles/key-vault/general/private-link-service.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -46,10 +46,10 @@ You can create a new key vault with the [Azure portal](../general/quick-create-p
4646

4747
After configuring the key vault basics, select the Networking tab and follow these steps:
4848

49-
1. Select the Private Endpoint radio button in the Networking tab.
50-
1. Select the "+ Add" Button to add a private endpoint.
49+
1. Disable public access by toggling off the radio button.
50+
1. Select the "+ Create a private endpoint" Button to add a private endpoint.
5151

52-
![Screenshot that shows the 'Networking' tab on the 'Create key vault' page.](../media/private-link-service-1.png)
52+
![Screenshot that shows the 'Networking' tab on the 'Create key vault' page.](../media/private-link-service-10.png)
5353

5454
1. In the "Location" field of the Create Private Endpoint Blade, select the region in which your virtual network is located.
5555
1. In the "Name" field, create a descriptive name that will allow you to identify this private endpoint.
@@ -102,7 +102,7 @@ There are four provisioning states:
102102
1. In the search bar, type in "key vaults"
103103
1. Select the key vault that you want to manage.
104104
1. Select the "Networking" tab.
105-
1. If there are any connections that are pending, you will see a connection listed with "Pending" in the provisioning state.
105+
1. If there are any connections that are pending, you'll see a connection listed with "Pending" in the provisioning state.
106106
1. Select the private endpoint you wish to approve
107107
1. Select the approve button.
108108
1. If there are any private endpoint connections you want to reject, whether it's a pending request or existing connection, select the connection and select the "Reject" button.
@@ -199,7 +199,7 @@ Open the command line and run the following command:
199199
nslookup <your-key-vault-name>.vault.azure.net
200200
```
201201

202-
If you run the ns lookup command to resolve the IP address of a key vault over a public endpoint, you will see a result that looks like this:
202+
If you run the ns lookup command to resolve the IP address of a key vault over a public endpoint, you'll see a result that looks like this:
203203

204204
```console
205205
c:\ >nslookup <your-key-vault-name>.vault.azure.net
@@ -210,7 +210,7 @@ Address: (public IP address)
210210
Aliases: <your-key-vault-name>.vault.azure.net
211211
```
212212

213-
If you run the ns lookup command to resolve the IP address of a key vault over a private endpoint, you will see a result that looks like this:
213+
If you run the ns lookup command to resolve the IP address of a key vault over a private endpoint, you'll see a result that looks like this:
214214

215215
```console
216216
c:\ >nslookup your_vault_name.vault.azure.net
@@ -228,22 +228,22 @@ Aliases: <your-key-vault-name>.vault.azure.net
228228
1. You can check and fix this in Azure portal. Open the Key Vault resource, and select the Networking option.
229229
2. Then select the Private endpoint connections tab.
230230
3. Make sure connection state is Approved and provisioning state is Succeeded.
231-
4. You may also navigate to the private endpoint resource and review same properties there, and double-check that the virtual network matches the one you are using.
231+
4. You may also navigate to the private endpoint resource and review same properties there, and double-check that the virtual network matches the one you're using.
232232

233233
* Check to make sure you have a Private DNS Zone resource.
234234
1. You must have a Private DNS Zone resource with the exact name: privatelink.vaultcore.azure.net.
235235
2. To learn how to set this up please see the following link. [Private DNS Zones](../../dns/private-dns-privatednszone.md)
236236

237-
* Check to make sure the Private DNS Zone is linked to the Virtual Network. This may be the issue if you are still getting the public IP address returned.
238-
1. If the Private Zone DNS is not linked to the virtual network, the DNS query originating from the virtual network will return the public IP address of the key vault.
237+
* Check to make sure the Private DNS Zone is linked to the Virtual Network. This may be the issue if you're still getting the public IP address returned.
238+
1. If the Private Zone DNS isn't linked to the virtual network, the DNS query originating from the virtual network will return the public IP address of the key vault.
239239
2. Navigate to the Private DNS Zone resource in the Azure portal and select the virtual network links option.
240240
4. The virtual network that will perform calls to the key vault must be listed.
241241
5. If it's not there, add it.
242242
6. For detailed steps, see the following document [Link Virtual Network to Private DNS Zone](../../dns/private-dns-getstarted-portal.md#link-the-virtual-network)
243243

244-
* Check to make sure the Private DNS Zone is not missing an A record for the key vault.
244+
* Check to make sure the Private DNS Zone isn't missing an A record for the key vault.
245245
1. Navigate to the Private DNS Zone page.
246-
2. Select Overview and check if there is an A record with the simple name of your key vault (i.e. fabrikam). Do not specify any suffix.
246+
2. Select Overview and check if there's an A record with the simple name of your key vault (i.e. fabrikam). Don't specify any suffix.
247247
3. Make sure you check the spelling, and either create or fix the A record. You can use a TTL of 600 (10 mins).
248248
4. Make sure you specify the correct private IP address.
249249

@@ -254,8 +254,8 @@ Aliases: <your-key-vault-name>.vault.azure.net
254254
4. The link will show the Overview of the NIC resource, which contains the property Private IP address.
255255
5. Verify that this is the correct IP address that is specified in the A record.
256256

257-
* If you are connecting from an on-prem resource to a Key Vault, ensure you have all required conditional forwarders in the on-prem environment enabled.
258-
1. Review [Azure Private Endpoint DNS configuration](../../private-link/private-endpoint-dns.md#azure-services-dns-zone-configuration) for the zones needed, and make sure you have conditional forwarders for both `vault.azure.net` and `vaultcore.azure.net` on your on-prem DNS.
257+
* If you're connecting from an on-premises resource to a Key Vault, ensure you have all required conditional forwarders in the on-premises environment enabled.
258+
1. Review [Azure Private Endpoint DNS configuration](../../private-link/private-endpoint-dns.md#azure-services-dns-zone-configuration) for the zones needed, and make sure you have conditional forwarders for both `vault.azure.net` and `vaultcore.azure.net` on your on-premises DNS.
259259
2. Ensure that you have conditional forwarders for those zones that route to an [Azure Private DNS Resolver](../../dns/dns-private-resolver-overview.md) or some other DNS platform with access to Azure resolution.
260260

261261
## Limitations and Design Considerations

articles/key-vault/general/rbac-guide.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -79,11 +79,11 @@ To add role assignments, you must have `Microsoft.Authorization/roleAssignments/
7979
8080
1. Enable Azure RBAC permissions on new key vault:
8181

82-
![Enable Azure RBAC permissions - new vault](../media/rbac/image-1.png)
82+
![Enable Azure RBAC permissions - new vault](../media/rbac/new-vault.png)
8383

8484
2. Enable Azure RBAC permissions on existing key vault:
8585

86-
![Enable Azure RBAC permissions - existing vault](../media/rbac/image-2.png)
86+
![Enable Azure RBAC permissions - existing vault](../media/rbac/existing-vault.png)
8787

8888
> [!IMPORTANT]
8989
> Setting Azure RBAC permission model invalidates all access policies permissions. It can cause outages when equivalent Azure roles aren't assigned.
73.3 KB
Loading
103 KB
Loading
215 KB
Loading
84.8 KB
Loading

0 commit comments

Comments
 (0)