Skip to content

Commit ddf1e3e

Browse files
authored
Merge pull request #13573 from cfe84/patch-2
Fixed link to key-vault get-started in service fabric documentation
2 parents 90dbe1b + c460dc9 commit ddf1e3e

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/service-fabric/service-fabric-cluster-security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ Users who are assigned the Administrator role have full access to management cap
8181
Set the Administrator and User client roles when you create the cluster. Assign roles by providing separate identities (for example, by using certificates or Azure AD) for each role type. For more information about default access control settings and how to change default settings, see [Role-Based Access Control for Service Fabric clients](service-fabric-cluster-security-roles.md).
8282

8383
## X.509 certificates and Service Fabric
84-
X.509 digital certificates commonly are used to authenticate clients and servers. They also are used to encrypt and digitally sign messages. Service Fabric uses X.509 certificates to secure a cluster and provide application security features. For more information about X.509 digital certificates, see [Working with certificates](http://msdn.microsoft.com/library/ms731899.aspx). You use [Key Vault][key-vault-get-started] to manage certificates for Service Fabric clusters in Azure.
84+
X.509 digital certificates commonly are used to authenticate clients and servers. They also are used to encrypt and digitally sign messages. Service Fabric uses X.509 certificates to secure a cluster and provide application security features. For more information about X.509 digital certificates, see [Working with certificates](http://msdn.microsoft.com/library/ms731899.aspx). You use [Key Vault](../key-vault/key-vault-get-started.md) to manage certificates for Service Fabric clusters in Azure.
8585

8686
Some important things to consider:
8787

0 commit comments

Comments
 (0)