Skip to content

Commit ccb7406

Browse files
committed
copy edit
1 parent 95ba6b1 commit ccb7406

File tree

5 files changed

+90
-84
lines changed

5 files changed

+90
-84
lines changed

articles/azure-resource-manager/management/authenticate-multi-tenant.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,12 +3,12 @@ title: Authenticate across tenants
33
description: Describes how Azure Resource Manager handles authentication requests across tenants.
44
ms.topic: conceptual
55
ms.custom: devx-track-arm-template
6-
ms.date: 09/26/2024
6+
ms.date: 01/22/2025
77
---
88

99
# Authenticate requests across tenants
1010

11-
When creating a multi-tenant application, you may need to handle authentication requests for resources that are in different tenants. A common scenario is when a virtual machine in one tenant must join a virtual network in another tenant. Azure Resource Manager provides a header value for storing auxiliary tokens to authenticate the requests to different tenants.
11+
When creating a multitenant application, you might need to handle authentication requests for resources in different tenants. A common scenario is when a virtual machine in one tenant must join a virtual network in another tenant. Azure Resource Manager provides a header value for storing auxiliary tokens to authenticate the requests to different tenants.
1212

1313
## Header values for authentication
1414

@@ -21,15 +21,15 @@ The request has the following authentication header values:
2121

2222
The auxiliary header can hold up to three auxiliary tokens.
2323

24-
In the code of your multi-tenant app, get the authentication token for other tenants and store them in the auxiliary headers. The user or application must have been invited as a guest to the other tenants.
24+
In the code of your multitenant app, get the authentication token for other tenants and store them in the auxiliary headers. The user or application must be invited as a guest to the other tenants.
2525

2626
## Processing the request
2727

28-
When your app sends a request to Resource Manager, the request is run under the identity from the primary token. The primary token must be valid and unexpired. This token must be from a tenant that can manage the subscription.
28+
When your app sends a request to Resource Manager, the request runs under the identity from the primary token. The primary token must be valid and unexpired. This token must be from a tenant that can manage the subscription.
2929

30-
When the request references a resource from different tenant, Resource Manager checks the auxiliary tokens to determine if the request can be processed. All auxiliary tokens in the header must be valid and unexpired. If any token is expired, Resource Manager returns a 401 response code. The response includes the client ID and tenant ID from the token that isn't valid. If the auxiliary header contains a valid token for the tenant, the cross tenant request is processed.
30+
When the request references a resource from different tenant, Resource Manager checks the auxiliary tokens to determine if it can process the request. All auxiliary tokens in the header must be valid and unexpired. If any token is expired, Resource Manager returns a 401 response code. The response includes the client ID and tenant ID from the token that isn't valid. If the auxiliary header contains a valid token for the tenant, the cross-tenant request is processed.
3131

3232
## Next steps
3333

3434
* To learn about authentication requests, see [Authentication flows and application scenarios](../../active-directory/develop/authentication-flows-app-scenarios.md).
35-
* For more information about tokens, see [Microsoft Entra access tokens](../../active-directory/develop/access-tokens.md).
35+
* For more information about tokens, see [Microsoft Entra access tokens](../../active-directory/develop/access-tokens.md).

articles/azure-resource-manager/management/create-private-link-access-commands.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,12 @@
22
title: Manage resources through private link
33
description: Restrict management access for resource to private link
44
ms.topic: conceptual
5-
ms.date: 09/26/2024
5+
ms.date: 01/22/2025
66
---
77

88
# Use APIs to create a private link for managing Azure resources
99

10-
This article explains how you can use [Azure Private Link](../../private-link/index.yml) to restrict access for managing resources in your subscriptions.
10+
This article explains how to use [Azure Private Link](../../private-link/index.yml) to restrict access for managing resources in your subscriptions.
1111

1212
[!INCLUDE [Create content](../../../includes/resource-manager-create-rmpl.md)]
1313

@@ -67,17 +67,17 @@ To create resource management private link, send the following request:
6767

6868
---
6969

70-
Note the ID that is returned for the new resource management private link. You'll use it for creating the private link association.
70+
Note the ID that is returned for the new resource management private link. You use it for creating the private link association.
7171

7272
## Create private link association
7373

74-
The resource name of a private link association resource must be a GUID, and it isn't yet supported to disable the publicNetworkAccess field.
74+
The resource name of a private link association resource must be a GUID, and you can't disable the `publicNetworkAccess` field.
7575

7676
To create the private link association, use:
7777

7878
# [Azure CLI](#tab/azure-cli)
7979

80-
### Example
80+
### Example
8181

8282
```azurecli
8383
# Login first with az login if not using Cloud Shell
@@ -133,7 +133,7 @@ To create the private link association, use:
133133

134134
## Add private endpoint
135135

136-
This article assumes you already have a virtual network. In the subnet that will be used for the private endpoint, you must turn off private endpoint network policies. If you haven't turned off private endpoint network policies, see [Disable network policies for private endpoints](../../private-link/disable-private-endpoint-network-policy.md).
136+
This article assumes you already have a virtual network. In the subnet that you plan to use for the private endpoint, you must turn off private endpoint network policies. To turn off private endpoint network policies, see [Disable network policies for private endpoints](../../private-link/disable-private-endpoint-network-policy.md).
137137

138138
To create a private endpoint, see Private Endpoint documentation for creating via [Portal](../../private-link/create-private-endpoint-portal.md), [PowerShell](../../private-link/create-private-endpoint-powershell.md), [CLI](../../private-link/create-private-endpoint-cli.md), [Bicep](../../private-link/create-private-endpoint-bicep.md), or [template](../../private-link/create-private-endpoint-template.md).
139139

@@ -177,4 +177,4 @@ If your request is automatically approved, you can continue to the next section.
177177

178178
## Next steps
179179

180-
To learn more about private links, see [Azure Private Link](../../private-link/index.yml).
180+
To learn more about private links, see [Azure Private Link](../../private-link/index.yml).

0 commit comments

Comments
 (0)