Skip to content

Commit e43811c

Browse files
committed
Minor fixes
1 parent 57ee584 commit e43811c

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/deployment-environments/how-to-configure-extensibility-generic-container-image.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -141,7 +141,7 @@ To use a custom image stored in a public registry, you need to enable anonymous
141141
> [!Caution]
142142
> Enabling anonymous (unauthenticated) pull access makes all registry content publicly available for read (pull) actions.
143143
144-
To use a custom image stored in the ACR, you need to ensure that ADE can access your image. When you create an ACR instance, it's secure by default and only allows authenticated users to gain access. With this configuration, you don't have to enable anonymous image pull access.
144+
To use a custom image stored in the ACR, you need to ensure that ADE has appropriate permissions to access your image. When you create an ACR instance, it's secure by default and only allows authenticated users to gain access. With this configuration, you don't have to enable anonymous pull access.
145145

146146
#### Use a public registry with anonymous pull
147147

@@ -161,7 +161,7 @@ docker push {YOUR_REGISTRY}.azurecr.io/{YOUR_IMAGE_LOCATION}:{YOUR_TAG}
161161
```
162162
#### Use ACR with secured access
163163

164-
By default, access to pull or push content from an Azure container registry is only available to authenticated users. You can further secure access to ACR by limiting access from public networks and assigning specific roles.
164+
By default, access to pull or push content from an Azure container registry is only available to authenticated users. You can further secure access to ACR by limiting access from certain networks and assigning specific roles.
165165

166166
##### Limit network access
167167

@@ -182,7 +182,7 @@ To disable access from public networks:
182182

183183
##### Assign the AcrPull role
184184

185-
Creating environments by using container images uses the ADE infrastructure. Each project has one or more project environment types, which need read access to the container image that defines the environment to be deployed. To access the images within your ACR securely, assign the AcrPull role to each project environment type.
185+
Creating environments by using container images uses the ADE infrastructure, including projects and environment types. Each project has one or more project environment types, which need read access to the container image that defines the environment to be deployed. To access the images within your ACR securely, assign the AcrPull role to each project environment type.
186186

187187
To assign the AcrPull role to the Project Environment Type:
188188

0 commit comments

Comments
 (0)