Skip to content

Commit d46f03b

Browse files
committed
remove 'aad' from screenshots and add period to alt-text
1 parent 9c491c4 commit d46f03b

16 files changed

+18
-18
lines changed

articles/azure-signalr/howto-disable-local-auth.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ In this section, you will learn how to use the Azure portal to disable local aut
3030

3131
4. Click **Save** button.
3232

33-
![Screenshot of disabling local auth](./media/howto-disable-local-auth/disable-local-auth.png)
33+
![Screenshot of disabling local auth.](./media/howto-disable-local-auth/disable-local-auth.png)
3434

3535
## Use Azure Resource Manager template
3636

@@ -110,7 +110,7 @@ You can disable local authentication by setting `disableLocalAuth` property to t
110110

111111
You can assign the [Azure SignalR Service should have local authentication methods disabled](https://ms.portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2Ff70eecba-335d-4bbc-81d5-5b17b03d498f) Azure policy to an Azure subscription or a resource group to enforce disabling of local authentication for all SignalR resources in the subscription or the resource group.
112112

113-
![Screenshot of disabling local auth policy](./media/howto-disable-local-auth/disable-local-auth-policy.png)
113+
![Screenshot of disabling local auth policy.](./media/howto-disable-local-auth/disable-local-auth-policy.png)
114114

115115
## Next steps
116116

-9.64 KB
Loading
-14 KB
Loading
-17.6 KB
Loading
-8.37 KB
Loading

articles/azure-signalr/signalr-howto-authorize-application.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -24,14 +24,14 @@ The first step is to register an Azure application.
2424
2. Under **Manage** section, select **App registrations**.
2525
3. Select **New registration**.
2626

27-
![Screenshot of registering an application](./media/signalr-howto-authorize-application/register-an-application.png)
27+
![Screenshot of registering an application.](./media/signalr-howto-authorize-application/register-an-application.png)
2828

2929
4. Enter a display **Name** for your application.
3030
5. Select **Register** to confirm the register.
3131

3232
Once you have your application registered, you can find the **Application (client) ID** and **Directory (tenant) ID** under its Overview page. These GUIDs can be useful in the following steps.
3333

34-
![Screenshot of an application](./media/signalr-howto-authorize-application/application-overview.png)
34+
![Screenshot of an application.](./media/signalr-howto-authorize-application/application-overview.png)
3535

3636
To learn more about registering an application, see
3737
- [Quickstart: Register an application with the Microsoft identity platform](../active-directory/develop/quickstart-register-app.md).
@@ -47,7 +47,7 @@ The application requires a client secret to prove its identity when requesting a
4747

4848
1. Under **Manage** section, select **Certificates & secrets**
4949
1. On the **Client secrets** tab, select **New client secret**.
50-
![Screenshot of creating a client secret](./media/signalr-howto-authorize-application/new-client-secret.png)
50+
![Screenshot of creating a client secret.](./media/signalr-howto-authorize-application/new-client-secret.png)
5151
1. Enter a **description** for the client secret, and choose a **expire time**.
5252
1. Copy the value of the **client secret** and then paste it to a secure location.
5353
> [!NOTE]
@@ -57,7 +57,7 @@ The application requires a client secret to prove its identity when requesting a
5757

5858
You can also upload a certification instead of creating a client secret.
5959

60-
![Screenshot of uploading a certification](./media/signalr-howto-authorize-application/upload-certificate.png)
60+
![Screenshot of uploading a certification.](./media/signalr-howto-authorize-application/upload-certificate.png)
6161

6262
To learn more about adding credentials, see
6363

articles/azure-signalr/signalr-howto-authorize-managed-identity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ This example shows you how to configure `System-assigned managed identity` on a
2626
1. Open [Azure portal](https://portal.azure.com/), Search for and select a Virtual Machine.
2727
1. Under **Settings** section, select **Identity**.
2828
1. On the **System assigned** tab, toggle the **Status** to **On**.
29-
![Screenshot of an application](./media/signalr-howto-authorize-managed-identity/identity-virtual-machine.png)
29+
![Screenshot of an application.](./media/signalr-howto-authorize-managed-identity/identity-virtual-machine.png)
3030
1. Select the **Save** button to confirm the change.
3131

3232

articles/azure-web-pubsub/howto-authorize-from-application.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -23,14 +23,14 @@ The first step is to register an Azure application.
2323
2. Under **Manage** section, select **App registrations**.
2424
3. Click **New registration**.
2525

26-
![Screenshot of registering an application](./media/howto-authorize-from-application/register-an-application.png)
26+
![Screenshot of registering an application.](./media/howto-authorize-from-application/register-an-application.png)
2727

2828
4. Enter a display **Name** for your application.
2929
5. Click **Register** to confirm the register.
3030

3131
Once you have your application registered, you can find the **Application (client) ID** and **Directory (tenant) ID** under its Overview page. These GUIDs can be useful in the following steps.
3232

33-
![Screenshot of an application](./media/howto-authorize-from-application/application-overview.png)
33+
![Screenshot of an application.](./media/howto-authorize-from-application/application-overview.png)
3434

3535
To learn more about registering an application, see
3636
- [Quickstart: Register an application with the Microsoft identity platform](../active-directory/develop/quickstart-register-app.md).
@@ -45,7 +45,7 @@ The application requires a client secret to prove its identity when requesting a
4545

4646
1. Under **Manage** section, select **Certificates & secrets**
4747
1. On the **Client secrets** tab, click **New client secret**.
48-
![Screenshot of creating a client secret](./media/howto-authorize-from-application/new-client-secret.png)
48+
![Screenshot of creating a client secret.](./media/howto-authorize-from-application/new-client-secret.png)
4949
1. Enter a **description** for the client secret, and choose a **expire time**.
5050
1. Copy the value of the **client secret** and then paste it to a secure location.
5151
> [!NOTE]
@@ -54,7 +54,7 @@ The application requires a client secret to prove its identity when requesting a
5454

5555
You can also upload a certification instead of creating a client secret.
5656

57-
![Screenshot of uploading a certification](./media/howto-authorize-from-application/upload-certificate.png)
57+
![Screenshot of uploading a certification.](./media/howto-authorize-from-application/upload-certificate.png)
5858

5959
To learn more about adding credentials, see
6060

@@ -74,15 +74,15 @@ This sample shows how to assign a `Web PubSub Service Owner` role to a service p
7474

7575
The following screenshot shows an example of the Access control (IAM) page for a Web PubSub resource.
7676

77-
![Screenshot of access control](./media/howto-authorize-from-application/access-control.png)
77+
![Screenshot of access control.](./media/howto-authorize-from-application/access-control.png)
7878

7979
1. Click **Add > Add role assignment**.
8080

8181
1. On the **Roles** tab, select `Web PubSub Service Owner`.
8282

8383
1. Click **Next**.
8484

85-
![Screenshot of adding role assignment](./media/howto-authorize-from-application/add-role-assignment.png)
85+
![Screenshot of adding role assignment.](./media/howto-authorize-from-application/add-role-assignment.png)
8686

8787
1. On the **Members** tab, under **Assign access to** section, select **User, group, or service principal**.
8888

@@ -94,7 +94,7 @@ This sample shows how to assign a `Web PubSub Service Owner` role to a service p
9494

9595
4. Click **Next**.
9696

97-
![Screenshot of assigning role to service principals](./media/howto-authorize-from-application/assign-role-to-service-principals.png)
97+
![Screenshot of assigning role to service principals.](./media/howto-authorize-from-application/assign-role-to-service-principals.png)
9898

9999
5. Click **Review + assign** to confirm the change.
100100

articles/azure-web-pubsub/howto-authorize-from-managed-identity.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ This is an example for configuring `System-assigned managed identity` on a `Virt
2323
1. Open [Azure portal](https://portal.azure.com/), Search for and select a Virtual Machine.
2424
1. Under **Settings** section, select **Identity**.
2525
1. On the **System assigned** tab, toggle the **Status** to **On**.
26-
![Screenshot of virtual machine - identity](./media/howto-authorize-from-managed-identity/identity-virtual-machine.png)
26+
![Screenshot of virtual machine - identity.](./media/howto-authorize-from-managed-identity/identity-virtual-machine.png)
2727
1. Click the **Save** button to confirm the change.
2828

2929
### How to create user-assigned managed identities
@@ -57,15 +57,15 @@ This sample shows how to assign a `Web PubSub Service Owner` role to a system-as
5757

5858
The following screenshot shows an example of the Access control (IAM) page for a Web PubSub resource.
5959

60-
![Screenshot of access control](./media/howto-authorize-from-managed-identity/access-control.png)
60+
![Screenshot of access control.](./media/howto-authorize-from-managed-identity/access-control.png)
6161

6262
1. Click **Add > Add role assignment**.
6363

6464
1. On the **Roles** tab, select `Web PubSub Service Owner`.
6565

6666
1. Click **Next**.
6767

68-
![Screenshot of adding role assignment](./media/howto-authorize-from-managed-identity/add-role-assignment.png)
68+
![Screenshot of adding role assignment.](./media/howto-authorize-from-managed-identity/add-role-assignment.png)
6969

7070
1. On the **Members** tab, under **Assign access to** section, select **Managed identity**.
7171

@@ -79,7 +79,7 @@ This sample shows how to assign a `Web PubSub Service Owner` role to a system-as
7979

8080
2. Click **Next**.
8181

82-
![Screenshot of assigning role to managed identities](./media/howto-authorize-from-managed-identity/assign-role-to-managed-identities.png)
82+
![Screenshot of assigning role to managed identities.](./media/howto-authorize-from-managed-identity/assign-role-to-managed-identities.png)
8383

8484
3. Click **Review + assign** to confirm the change.
8585

-19.7 KB
Loading

0 commit comments

Comments
 (0)