Skip to content

Commit c860d91

Browse files
committed
correx
1 parent 63ac870 commit c860d91

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/container-registry/container-registry-firewall-access-rules.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,8 +23,8 @@ If your registry is [geo-replicated](container-registry-geo-replication.md), a c
2323

2424
## Allow access to REST and data endpoints
2525

26-
* **REST endpoint** - Allow access to the fully qualified registry login server name, such as `myregistry.azurecr.io`, or an associated IP address range
27-
* **Storage (data) endpoint** - Enable access to a [dedicated data endpoint](#configure-dedicated-data-endpoints-preview) (preview) in each region where the registry is located or replicated, such as `myregistry.westeurope.azurecr.io`. Alternatively, and less specifically, allow access to all Azure blob storage accounts using the wildcard `*.blob.core.windows.net`, or an associated IP address range.
26+
* **REST endpoint** - Allow access to the fully qualified registry login server name, `<registry-name>.azurecr.io`, or an associated IP address range
27+
* **Storage (data) endpoint** - Enable access to a [dedicated data endpoint](#configure-dedicated-data-endpoints-preview) (preview) in each region where the registry is located or replicated, `<registry-name>.<region>.data.azurecr.io`. Alternatively, and less specifically, allow access to all Azure blob storage accounts using the wildcard `*.blob.core.windows.net`, or an associated IP address range.
2828

2929
## Configure dedicated data endpoints (preview)
3030

0 commit comments

Comments
 (0)