Skip to content

Commit cb357b8

Browse files
authored
Merge pull request #172350 from JasonWHowell/disallowed-html-tags
Disallowed html tags
2 parents 36b28c7 + 47d8e35 commit cb357b8

File tree

10 files changed

+71
-129
lines changed

10 files changed

+71
-129
lines changed

articles/active-directory/saas-apps/fieldglass-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -75,8 +75,8 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7575

7676
| Reply URL |
7777
|-----------|
78-
| https://www.fieldglass.net/<company name> |
79-
| https://<company name>.fgvms.com/<company name> |
78+
| `https://www.fieldglass.net/<company name>` |
79+
| `https://<company name>.fgvms.com/<company name>` |
8080
|
8181

8282
> [!NOTE]

articles/databox-online/azure-stack-edge-gpu-connect-powershell-interface.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,7 @@ You want to perform this configuration before you configure compute from the Azu
104104
105105
`Set-HcsKubeClusterNetworkInfo -PodSubnet <subnet details> -ServiceSubnet <subnet details>`
106106
107-
Replace the <subnet details> with the subnet range that you want to use.
107+
Replace the \<subnet details\> with the subnet range that you want to use.
108108
109109
1. Once you have run this command, you can use the `Get-HcsKubeClusterNetworkInfo` command to verify that the pod and service subnets have changed.
110110
@@ -480,9 +480,11 @@ To change the memory or processor limits for Kubernetes worker node, do the foll
480480
481481
1. To change the values of memory and processors for the worker node, run the following command:
482482
483-
Set-AzureDataBoxEdgeRoleCompute -Name <Name value from the output of Get-AzureDataBoxEdgeRole> -Memory <Value in Bytes> -ProcessorCount <No. of cores>
483+
```powershell
484+
Set-AzureDataBoxEdgeRoleCompute -Name <Name value from the output of Get-AzureDataBoxEdgeRole> -Memory <Value in Bytes> -ProcessorCount <No. of cores>
485+
```
484486

485-
Here is a sample output.
487+
Here is a sample output.
486488

487489
```powershell
488490
[10.100.10.10]: PS>Set-AzureDataBoxEdgeRoleCompute -Name IotRole -MemoryInBytes 32GB -ProcessorCount 16

articles/defender-for-iot/organizations/how-to-deploy-certificates.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -189,9 +189,9 @@ This section describes how to convert existing certificates files to supported f
189189

190190
|**Description** | **CLI command** |
191191
|--|--|
192-
| Convert .crt file to .pem file | openssl x509 -inform PEM -in <full path>/<pem-file-name>.pem -out <fullpath>/<crt-file-name>.crt |
193-
| Convert .pem file to .crt file | openssl x509 -inform PEM -in <full path>/<pem-file-name>.pem -out <fullpath>/<crt-file-name>.crt |
194-
| Convert a PKCS#12 file (.pfx .p12) containing a private key and certificates to .pem | openssl pkcs12 -in keyStore.pfx -out keyStore.pem -nodes. You can add -nocerts to only output the private key, or add -nokeys to only output the certificates. |
192+
| Convert .crt file to .pem file | `openssl x509 -inform PEM -in <full path>/<pem-file-name>.pem -out <fullpath>/<crt-file-name>.crt` |
193+
| Convert .pem file to .crt file | `openssl x509 -inform PEM -in <full path>/<pem-file-name>.pem -out <fullpath>/<crt-file-name>.crt` |
194+
| Convert a PKCS#12 file (.pfx .p12) containing a private key and certificates to .pem | `openssl pkcs12 -in keyStore.pfx -out keyStore.pem -nodes`. You can add -nocerts to only output the private key, or add -nokeys to only output the certificates. |
195195

196196
## Troubleshooting
197197

articles/defender-for-iot/organizations/references-work-with-defender-for-iot-apis.md

Lines changed: 15 additions & 70 deletions
Original file line numberDiff line numberDiff line change
@@ -272,7 +272,7 @@ Array of JSON objects that represent devices.
272272

273273
| Type | APIs | Example |
274274
|--|--|--|
275-
| GET | curl -k -H "Authorization: <AUTH_TOKEN>" https://<IP_ADDRESS>/api/v1/devices | curl -k -H "Authorization: 1234b734a9244d54ab8d40aedddcabcd" https:<span>//127<span>.0.0.1/api/v1/devices?authorized=true |
275+
| GET | `curl -k -H "Authorization: <AUTH_TOKEN>" https://<IP_ADDRESS>/api/v1/devices | curl -k -H "Authorization: 1234b734a9244d54ab8d40aedddcabcd" https://127.0.0.1/api/v1/devices?authorized=true` |
276276

277277
### Retrieve device connection information - /api/v1/devices/connections
278278

@@ -445,8 +445,8 @@ Array of JSON objects that represent device connections.
445445
> [!div class="mx-tdBreakAll"]
446446
> | Type | APIs | Example |
447447
> |--|--|--|
448-
> | GET | curl -k -H "Authorization: <AUTH_TOKEN>" https://<IP_ADDRESS>/api/v1/devices/connections | curl -k -H "Authorization: 1234b734a9244d54ab8d40aedddcabcd" https:/<span>/127.0.0.1/api/v1/devices/connections |
449-
> | GET | curl -k -H "Authorization: <AUTH_TOKEN>" 'https://<IP_ADDRESS>/api/v1/devices/<deviceId>/connections?lastActiveInMinutes=&discoveredBefore=&discoveredAfter=' | curl -k -H "Authorization: 1234b734a9244d54ab8d40aedddcabcd" 'https:/<span>/127.0.0.1/api/v1/devices/2/connections?lastActiveInMinutes=20&discoveredBefore=1594550986000&discoveredAfter=1594550986000' |
448+
> | GET | `curl -k -H "Authorization: <AUTH_TOKEN>" https://<IP_ADDRESS>/api/v1/devices/connections` | `curl -k -H "Authorization: 1234b734a9244d54ab8d40aedddcabcd" https:/<span>/127.0.0.1/api/v1/devices/connections` |
449+
> | GET | `curl -k -H "Authorization: <AUTH_TOKEN>" 'https://<IP_ADDRESS>/api/v1/devices/<deviceId>/connections?lastActiveInMinutes=&discoveredBefore=&discoveredAfter='` | `curl -k -H "Authorization: 1234b734a9244d54ab8d40aedddcabcd" 'https:/<span>/127.0.0.1/api/v1/devices/2/connections?lastActiveInMinutes=20&discoveredBefore=1594550986000&discoveredAfter=1594550986000'` |
450450
451451
### Retrieve information on CVEs - /api/v1/devices/cves
452452

@@ -560,8 +560,8 @@ Array of JSON objects that represent CVEs identified on IP addresses.
560560

561561
| Type | APIs | Example |
562562
|--|--|--|
563-
| GET | curl -k -H "Authorization: <AUTH_TOKEN>" https://<IP_ADDRESS>/api/v1/devices/cves | curl -k -H "Authorization: 1234b734a9244d54ab8d40aedddcabcd" https:/<span>/127.0.0.1/api/v1/devices/cves |
564-
| GET | curl -k -H "Authorization: <AUTH_TOKEN>" https://<IP_ADDRESS>/api/v1/devices/<deviceIpAddress>/cves?top= | curl -k -H "Authorization: 1234b734a9244d54ab8d40aedddcabcd" https:/<span>/127.0.0.1/api/v1/devices/10.10.10.15/cves?top=50 |
563+
| GET | `curl -k -H "Authorization: <AUTH_TOKEN>" https://<IP_ADDRESS>/api/v1/devices/cves` | `curl -k -H "Authorization: 1234b734a9244d54ab8d40aedddcabcd" https:/<span>/127.0.0.1/api/v1/devices/cves` |
564+
| GET | `curl -k -H "Authorization: <AUTH_TOKEN>" https://<IP_ADDRESS>/api/v1/devices/<deviceIpAddress>/cves?top=` | `curl -k -H "Authorization: 1234b734a9244d54ab8d40aedddcabcd" https:/<span>/127.0.0.1/api/v1/devices/10.10.10.15/cves?top=50` |
565565

566566
### Retrieve alert information - /api/v1/alerts
567567

@@ -703,7 +703,7 @@ Note that /api/v2/ is needed for the following information:
703703
> [!div class="mx-tdBreakAll"]
704704
> | Type | APIs | Example |
705705
> |--|--|--|
706-
> | GET | curl -k -H "Authorization: <AUTH_TOKEN>" 'https://<IP_ADDRESS>/api/v1/alerts?state=&fromTime=&toTime=&type=' | curl -k -H "Authorization: 1234b734a9244d54ab8d40aedddcabcd" 'https:/<span>/127.0.0.1/api/v1/alerts?state=unhandled&fromTime=1594550986000&toTime=1594550986001&type=disconnections' |
706+
> | GET | `curl -k -H "Authorization: <AUTH_TOKEN>" 'https://<IP_ADDRESS>/api/v1/alerts?state=&fromTime=&toTime=&type='` | `curl -k -H "Authorization: 1234b734a9244d54ab8d40aedddcabcd" 'https:/<span>/127.0.0.1/api/v1/alerts?state=unhandled&fromTime=1594550986000&toTime=1594550986001&type=disconnections'` |
707707
708708
### Retrieve timeline events - /api/v1/events
709709

@@ -2079,97 +2079,51 @@ Note that /api/v2/ is needed for the following information:
20792079

20802080
```rest
20812081
[
2082-
20832082
{
2084-
20852083
"engine": "Operational",
2086-
20872084
"handled": false,
2088-
20892085
"title": "Traffic Detected on sensor Interface",
2090-
20912086
"additionalInformation": null,
2092-
20932087
"sourceDevice": 0,
2094-
20952088
"zoneId": 1,
2096-
20972089
"siteId": 1,
2098-
20992090
"time": 1594808245000,
2100-
21012091
"sensorId": 1,
2102-
21032092
"message": "The sensor resumed detecting network traffic on ens224.",
2104-
21052093
"destinationDevice": 0,
2106-
21072094
"id": 1,
2108-
21092095
"severity": "Warning"
2110-
21112096
},
2112-
21132097
{
2114-
21152098
"engine": "Anomaly",
2116-
21172099
"handled": false,
2118-
21192100
"title": "Address Scan Detected",
2120-
21212101
"additionalInformation": null,
2122-
21232102
"sourceDevice": 4,
2124-
21252103
"zoneId": 1,
2126-
21272104
"siteId": 1,
2128-
21292105
"time": 1594808260000,
2130-
21312106
"sensorId": 1,
2132-
21332107
"message": "Address scan detected.\nScanning address: 10.10.10.22\nScanned subnet: 10.11.0.0/16\nScanned addresses: 10.11.1.1, 10.11.20.1, 10.11.20.10, 10.11.20.100, 10.11.20.2, 10.11.20.3, 10.11.20.4, 10.11.20.5, 10.11.20.6, 10.11.20.7...\nIt is recommended to notify the security officer of the incident.",
2134-
21352108
"destinationDevice": 0,
2136-
21372109
"id": 2,
2138-
21392110
"severity": "Critical"
2140-
21412111
},
2142-
21432112
{
2144-
21452113
"engine": "Operational",
2146-
21472114
"handled": false,
2148-
21492115
"title": "Suspicion of Unresponsive MODBUS Device",
2150-
21512116
"additionalInformation": null,
2152-
21532117
"sourceDevice": 194,
2154-
21552118
"zoneId": 1,
2156-
21572119
"siteId": 1,
2158-
21592120
"time": 1594808285000,
2160-
21612121
"sensorId": 1,
2162-
21632122
"message": "Outstation device 10.13.10.1 (Protocol Address 53) seems to be unresponsive to MODBUS requests.",
2164-
21652123
"destinationDevice": 0,
2166-
21672124
"id": 3,
2168-
21692125
"severity": "Minor"
2170-
21712126
}
2172-
21732127
]
21742128
```
21752129

@@ -2178,7 +2132,7 @@ Note that /api/v2/ is needed for the following information:
21782132
> [!div class="mx-tdBreakAll"]
21792133
> | Type | APIs | Example |
21802134
> |--|--|--|
2181-
> | GET | curl -k -H "Authorization: <AUTH_TOKEN>" 'https://<>IP_ADDRESS>/external/v1/alerts?state=&zoneId=&fromTime=&toTime=&siteId=&sensor=' | curl -k -H "Authorization: 1234b734a9244d54ab8d40aedddcabcd" 'https:/<span>/127.0.0.1/external/v1/alerts?state=unhandled&zoneId=1&fromTime=0&toTime=1594551777000&siteId=1&sensor=1' |
2135+
> | GET | `curl -k -H "Authorization: <AUTH_TOKEN>" 'https://<>IP_ADDRESS>/external/v1/alerts?state=&zoneId=&fromTime=&toTime=&siteId=&sensor='` | `curl -k -H "Authorization: 1234b734a9244d54ab8d40aedddcabcd" 'https:/<span>/127.0.0.1/external/v1/alerts?state=unhandled&zoneId=1&fromTime=0&toTime=1594551777000&siteId=1&sensor=1'` |
21822136
21832137
### QRadar alerts
21842138

@@ -2281,7 +2235,7 @@ Array of JSON objects that represent devices.
22812235

22822236
| Type | APIs | Example |
22832237
|--|--|--|
2284-
| PUT | curl -k -X PUT -d '{"action": "<ACTION>"}' -H "Authorization: <AUTH_TOKEN>" https://<IP_ADDRESS>/external/v1/alerts/<UUID> | curl -k -X PUT -d '{"action": "handle"}' -H "Authorization: 1234b734a9244d54ab8d40aedddcabcd" https:/<span>/127.0.0.1/external/v1/alerts/1-1594550943000 |
2238+
| PUT | `curl -k -X PUT -d '{"action": "<ACTION>"}' -H "Authorization: <AUTH_TOKEN>" https://<IP_ADDRESS>/external/v1/alerts/<UUID>` | `curl -k -X PUT -d '{"action": "handle"}' -H "Authorization: 1234b734a9244d54ab8d40aedddcabcd" https:/<span>/127.0.0.1/external/v1/alerts/1-1594550943000` |
22852239

22862240
### Alert exclusions (maintenance window) - /external/v1/maintenanceWindow
22872241

@@ -2302,13 +2256,9 @@ The APIs that you define here appear in the on-premises management console's **A
23022256
- **engines**: Defines from which security engine to suppress alerts during the maintenance process:
23032257

23042258
- ANOMALY
2305-
23062259
- MALWARE
2307-
23082260
- OPERATIONAL
2309-
23102261
- POLICY_VIOLATION
2311-
23122262
- PROTOCOL_VIOLATION
23132263

23142264
- **sensorIds**: Defines from which Defender for IoT sensor to suppress alerts during the maintenance process. It's the same ID retrieved from /api/v1/appliances (GET).
@@ -2322,11 +2272,8 @@ The APIs that you define here appear in the on-premises management console's **A
23222272
- **400 (Bad Request)**: Appears in the following cases:
23232273

23242274
- The **ttl** parameter is not numeric or not positive.
2325-
23262275
- The **subnets** parameter was defined using a wrong format.
2327-
23282276
- The **ticketId** parameter is missing.
2329-
23302277
- The **engine** parameter does not match the existing security engines.
23312278

23322279
- **404 (Not Found)**: One of the sensors doesn't exist.
@@ -2357,9 +2304,7 @@ This method is useful when you want to set a longer duration than the currently
23572304
- **400 (Bad Request)**: Appears in the following cases:
23582305

23592306
- The **ttl** parameter is not numeric or not positive.
2360-
23612307
- The **ticketId** parameter is missing.
2362-
23632308
- The **ttl** parameter is missing.
23642309

23652310
- **404 (Not Found)**: The ticket ID is not linked to an open maintenance window.
@@ -2439,10 +2384,10 @@ Array of JSON objects that represent maintenance window operations.
24392384

24402385
| Type | APIs | Example |
24412386
|--|--|--|
2442-
| POST | curl -k -X POST -d '{"ticketId": "<TICKET_ID>",ttl": <TIME_TO_LIVE>,"engines": [<ENGINE1, ENGINE2...ENGINEn>],"sensorIds": [<SENSOR_ID1, SENSOR_ID2...SENSOR_IDn>],"subnets": [<SUBNET1, SUBNET2....SUBNETn>]}' -H "Authorization: <AUTH_TOKEN>" https:/<span>/127.0.0.1/external/v1/maintenanceWindow | curl -k -X POST -d '{"ticketId": "a5fe99c-d914-4bda-9332-307384fe40bf","ttl": "20","engines": ["ANOMALY"],"sensorIds": ["5","3"],"subnets": ["10.0.0.3"]}' -H "Authorization: 1234b734a9244d54ab8d40aedddcabcd" https:/<span>/127.0.0.1/external/v1/maintenanceWindow |
2443-
| PUT | curl -k -X PUT -d '{"ticketId": "<TICKET_ID>",ttl": "<TIME_TO_LIVE>"}' -H "Authorization: <AUTH_TOKEN>" https:/<span>/127.0.0.1/external/v1/maintenanceWindow | curl -k -X PUT -d '{"ticketId": "a5fe99c-d914-4bda-9332-307384fe40bf","ttl": "20"}' -H "Authorization: 1234b734a9244d54ab8d40aedddcabcd" https:/<span>/127.0.0.1/external/v1/maintenanceWindow |
2444-
| DELETE | curl -k -X DELETE -d '{"ticketId": "<TICKET_ID>"}' -H "Authorization: <AUTH_TOKEN>" https:/<span>/127.0.0.1/external/v1/maintenanceWindow | curl -k -X DELETE -d '{"ticketId": "a5fe99c-d914-4bda-9332-307384fe40bf"}' -H "Authorization: 1234b734a9244d54ab8d40aedddcabcd" https:/<span>/127.0.0.1/external/v1/maintenanceWindow |
2445-
| GET | curl -k -H "Authorization: <AUTH_TOKEN>" 'https://<IP_ADDRESS>/external/v1/maintenanceWindow?fromDate=&toDate=&ticketId=&tokenName=' | curl -k -H "Authorization: 1234b734a9244d54ab8d40aedddcabcd" 'https:/<span>/127.0.0.1/external/v1/maintenanceWindow?fromDate=2020-01-01&toDate=2020-07-14&ticketId=a5fe99c-d914-4bda-9332-307384fe40bf&tokenName=a' |
2387+
| POST | `curl -k -X POST -d '{"ticketId": "<TICKET_ID>",ttl": <TIME_TO_LIVE>,"engines": [<ENGINE1, ENGINE2...ENGINEn>],"sensorIds": [<SENSOR_ID1, SENSOR_ID2...SENSOR_IDn>],"subnets": [<SUBNET1, SUBNET2....SUBNETn>]}' -H "Authorization: <AUTH_TOKEN>" https:/<span>/127.0.0.1/external/v1/maintenanceWindow` | `curl -k -X POST -d '{"ticketId": "a5fe99c-d914-4bda-9332-307384fe40bf","ttl": "20","engines": ["ANOMALY"],"sensorIds": ["5","3"],"subnets": ["10.0.0.3"]}' -H "Authorization: 1234b734a9244d54ab8d40aedddcabcd" https:/<span>/127.0.0.1/external/v1/maintenanceWindow` |
2388+
| PUT | `curl -k -X PUT -d '{"ticketId": "<TICKET_ID>",ttl": "<TIME_TO_LIVE>"}' -H "Authorization: <AUTH_TOKEN>" https:/<span>/127.0.0.1/external/v1/maintenanceWindow` | `curl -k -X PUT -d '{"ticketId": "a5fe99c-d914-4bda-9332-307384fe40bf","ttl": "20"}' -H "Authorization: 1234b734a9244d54ab8d40aedddcabcd" https:/<span>/127.0.0.1/external/v1/maintenanceWindow` |
2389+
| DELETE | `curl -k -X DELETE -d '{"ticketId": "<TICKET_ID>"}' -H "Authorization: <AUTH_TOKEN>" https:/<span>/127.0.0.1/external/v1/maintenanceWindow` | `curl -k -X DELETE -d '{"ticketId": "a5fe99c-d914-4bda-9332-307384fe40bf"}' -H "Authorization: 1234b734a9244d54ab8d40aedddcabcd" https:/<span>/127.0.0.1/external/v1/maintenanceWindow` |
2390+
| GET | `curl -k -H "Authorization: <AUTH_TOKEN>" 'https://<IP_ADDRESS>/external/v1/maintenanceWindow?fromDate=&toDate=&ticketId=&tokenName='` | `curl -k -H "Authorization: 1234b734a9244d54ab8d40aedddcabcd" 'https:/<span>/127.0.0.1/external/v1/maintenanceWindow?fromDate=2020-01-01&toDate=2020-07-14&ticketId=a5fe99c-d914-4bda-9332-307384fe40bf&tokenName=a'` |
24462391

24472392
### Authenticate user credentials - /external/authentication/validation
24482393

@@ -2505,7 +2450,7 @@ response:
25052450

25062451
| Type | APIs | Example |
25072452
|--|--|--|
2508-
| POST | curl -k -d '{"username":"<USER_NAME>","password":"PASSWORD"}' 'https://<IP_ADDRESS>/external/authentication/validation' | curl -k -d '{"username":"myUser","password":"1234@abcd"}' 'https:/<span>/127.0.0.1/external/authentication/validation' |
2453+
| POST | `curl -k -d '{"username":"<USER_NAME>","password":"PASSWORD"}' 'https://<IP_ADDRESS>/external/authentication/validation'` | `curl -k -d '{"username":"myUser","password":"1234@abcd"}' 'https:/<span>/127.0.0.1/external/authentication/validation'` |
25092454

25102455
### Change password - /external/authentication/set_password
25112456

@@ -2579,7 +2524,7 @@ response:
25792524

25802525
| Type | APIs | Example |
25812526
|--|--|--|
2582-
| POST | curl -k -d '{"username": "<USER_NAME>","password": "<CURRENT_PASSWORD>","new_password": "<NEW_PASSWORD>"}' -H 'Content-Type: application/json' https://<IP_ADDRESS>/external/authentication/set_password | curl -k -d '{"username": "myUser","password": "1234@abcd","new_password": "abcd@1234"}' -H 'Content-Type: application/json' https:/<span>/127.0.0.1/external/authentication/set_password |
2527+
| POST | `curl -k -d '{"username": "<USER_NAME>","password": "<CURRENT_PASSWORD>","new_password": "<NEW_PASSWORD>"}' -H 'Content-Type: application/json' https://<IP_ADDRESS>/external/authentication/set_password` | `curl -k -d '{"username": "myUser","password": "1234@abcd","new_password": "abcd@1234"}' -H 'Content-Type: application/json' https:/<span>/127.0.0.1/external/authentication/set_password` |
25832528

25842529
### User password update by system admin - /external/authentication/set_password_by_admin
25852530

@@ -2660,7 +2605,7 @@ response:
26602605
> [!div class="mx-tdBreakAll"]
26612606
> | Type | APIs | Example |
26622607
> |--|--|--|
2663-
> | POST | curl -k -d '{"admin_username":"<ADMIN_USERNAME>","admin_password":"<ADMIN_PASSWORD>","username": "<USER_NAME>","new_password": "<NEW_PASSWORD>"}' -H 'Content-Type: application/json' https://<IP_ADDRESS>/external/authentication/set_password_by_admin | curl -k -d '{"admin_user":"adminUser","admin_password": "1234@abcd","username": "myUser","new_password": "abcd@1234"}' -H 'Content-Type: application/json' https:/<span>/127.0.0.1/external/authentication/set_password_by_admin |
2608+
> | POST | `curl -k -d '{"admin_username":"<ADMIN_USERNAME>","admin_password":"<ADMIN_PASSWORD>","username": "<USER_NAME>","new_password": "<NEW_PASSWORD>"}' -H 'Content-Type: application/json' https://<IP_ADDRESS>/external/authentication/set_password_by_admin` | `curl -k -d '{"admin_user":"adminUser","admin_password": "1234@abcd","username": "myUser","new_password": "abcd@1234"}' -H 'Content-Type: application/json' https:/<span>/127.0.0.1/external/authentication/set_password_by_admin` |
26642609
26652610
## Next steps
26662611

articles/industry/agriculture/rest-api-in-azure-farmbeats.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -65,15 +65,15 @@ Here are the most common request headers that you must specify when you make an
6565

6666
**Header** | **Description and example**
6767
--- | ---
68-
Content-Type | The request format (Content-Type: application/<format>). For Azure FarmBeats Datahub APIs, the format is JSON. Content-Type: application/json
69-
Authorization | Specifies the access token required to make an API call. Authorization: Bearer <Access-Token>
68+
Content-Type | The request format (Content-Type: application/\<format\>). For Azure FarmBeats Datahub APIs, the format is JSON. Content-Type: application/json
69+
Authorization | Specifies the access token required to make an API call. Authorization: Bearer \<Access-Token\>
7070
Accept | The response format. For Azure FarmBeats Datahub APIs, the format is JSON. Accept: application/json
7171

7272
### API requests
7373

7474
To make a REST API request, you combine the HTTP (GET, POST, PUT, or DELETE) method, the URL to the API service, the URI to a resource to query, submit data to, update, or delete, and then add one or more HTTP request headers.
7575

76-
The URL to the API service is your Datahub URL, for example, https://\<yourdatahub-website-name>.azurewebsites.net.
76+
The URL to the API service is your Datahub URL, for example, `https://<yourdatahub-website-name>.azurewebsites.net`.
7777

7878
Optionally, you can include query parameters on GET calls to filter, limit the size of, and sort the data in the responses.
7979

@@ -153,7 +153,7 @@ Azure FarmBeats APIs can be accessed by a user or an app registration in Azure A
153153
- Go back to **Overview**, and select the link next to **Manage Application in local directory**.
154154
- Go to **Properties** to capture the **Object ID**.
155155

156-
4. Go to your Datahub Swagger (https://<yourdatahub>.azurewebsites.net/swagger/index.html) and do the following:
156+
4. Go to your Datahub Swagger (`https://<yourdatahub>.azurewebsites.net/swagger/index.html`) and do the following:
157157
- Go to the **RoleAssignment API**.
158158
- Perform a POST to create a **RoleAssignment** object for the **Object ID** you just created.
159159

0 commit comments

Comments
 (0)