Skip to content

Commit e615923

Browse files
Merge pull request #244180 from rwike77/filenames4
renamed files
2 parents e37791e + 44eebb1 commit e615923

16 files changed

+10
-10
lines changed

includes/active-directory-msi-cross-tenant-cmk-create-identities-authorize-key-vault.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ To create a new registration:
3636
1. Select **Register**.
3737
1. Note the **ApplicationId/ClientId** of the application.
3838

39-
:::image type="content" source="media/active-directory-msi-cross-tenant-cmk-create-identities-authorize-key-vault/register-application.png" alt-text="Screen shot showing how to create a new multi-tenant application registration." lightbox="media/active-directory-msi-cross-tenant-cmk-create-identities-authorize-key-vault/register-application.png" border="true":::
39+
:::image type="content" source="media/msi-cross-tenant-cmk-create-identities-authorize-key-vault/register-application.png" alt-text="Screen shot showing how to create a new multi-tenant application registration." lightbox="media/msi-cross-tenant-cmk-create-identities-authorize-key-vault/register-application.png" border="true":::
4040

4141
#### The service provider creates a user-assigned managed identity
4242

@@ -50,7 +50,7 @@ Create a user-assigned managed identity to be used as a federated identity crede
5050

5151
`/subscriptions/tttttttt-0000-tttt-0000-tttt0000tttt/resourcegroups/XTCMKDemo/providers/Microsoft.ManagedIdentity/userAssignedIdentities/ConsotoCMKDemoUA`
5252

53-
:::image type="content" source="media/active-directory-msi-cross-tenant-cmk-create-identities-authorize-key-vault/create-user-assigned-managed-identity.png" alt-text="Screen shot showing how to create a resource group and a user-assigned managed identity." lightbox="media/active-directory-msi-cross-tenant-cmk-create-identities-authorize-key-vault/create-user-assigned-managed-identity.png" border="true":::
53+
:::image type="content" source="media/msi-cross-tenant-cmk-create-identities-authorize-key-vault/create-user-assigned-managed-identity.png" alt-text="Screen shot showing how to create a resource group and a user-assigned managed identity." lightbox="media/msi-cross-tenant-cmk-create-identities-authorize-key-vault/create-user-assigned-managed-identity.png" border="true":::
5454

5555
#### The service provider configures the user-assigned managed identity as a federated credential on the application
5656

@@ -60,17 +60,17 @@ Configure a user-assigned managed identity as a federated identity credential on
6060
2. Select **Certificates & secrets**.
6161
3. Select **Federated credentials**.
6262

63-
:::image type="content" source="media/active-directory-msi-cross-tenant-cmk-create-identities-authorize-key-vault/certificates-secrets.png" alt-text="Screen shot showing how to navigate to Certificate and secrets." lightbox="media/active-directory-msi-cross-tenant-cmk-create-identities-authorize-key-vault/certificates-secrets.png" border="true":::
63+
:::image type="content" source="media/msi-cross-tenant-cmk-create-identities-authorize-key-vault/certificates-secrets.png" alt-text="Screen shot showing how to navigate to Certificate and secrets." lightbox="media/msi-cross-tenant-cmk-create-identities-authorize-key-vault/certificates-secrets.png" border="true":::
6464

6565
4. Select **+ Add credential**.
6666
5. Under **Federated credential scenario**, select **Customer Managed Keys**.
6767
6. Click **Select a managed identity**. From the pane, select the subscription. Under **Managed identity**, select **User-assigned managed identity**. In the **Select** box, search for the managed identity you created earlier, then click **Select** at the bottom of the pane.
6868

69-
:::image type="content" source="media/active-directory-msi-cross-tenant-cmk-create-identities-authorize-key-vault/select-managed-identity.png" alt-text="Screen shot showing how to select a managed identity." lightbox="media/active-directory-msi-cross-tenant-cmk-create-identities-authorize-key-vault/select-managed-identity.png" border="true":::
69+
:::image type="content" source="media/msi-cross-tenant-cmk-create-identities-authorize-key-vault/select-managed-identity.png" alt-text="Screen shot showing how to select a managed identity." lightbox="media/msi-cross-tenant-cmk-create-identities-authorize-key-vault/select-managed-identity.png" border="true":::
7070

7171
7. Under **Credential details**, provide a name and optional description for the credential and select **Add**.
7272

73-
:::image type="content" source="media/active-directory-msi-cross-tenant-cmk-create-identities-authorize-key-vault/add-credential.png" alt-text="Screen shot showing how to add a credential." lightbox="media/active-directory-msi-cross-tenant-cmk-create-identities-authorize-key-vault/add-credential.png" border="true":::
73+
:::image type="content" source="media/msi-cross-tenant-cmk-create-identities-authorize-key-vault/add-credential.png" alt-text="Screen shot showing how to add a credential." lightbox="media/msi-cross-tenant-cmk-create-identities-authorize-key-vault/add-credential.png" border="true":::
7474

7575
# [PowerShell](#tab/azure-powershell)
7676

@@ -258,7 +258,7 @@ To create the key vault, the user's account must be assigned the **Key Vault Con
258258
1. On the **Access policy** tab, select **Azure role-based access control** for **Permission model**.
259259
1. Select **Review + create** and then **Create**.
260260

261-
:::image type="content" source="media/active-directory-msi-cross-tenant-cmk-create-identities-authorize-key-vault/create-key-vault.png" alt-text="Screen shot showing how to create a key vault." lightbox="media/active-directory-msi-cross-tenant-cmk-create-identities-authorize-key-vault/create-key-vault.png" border="true":::
261+
:::image type="content" source="media/msi-cross-tenant-cmk-create-identities-authorize-key-vault/create-key-vault.png" alt-text="Screen shot showing how to create a key vault." lightbox="media/msi-cross-tenant-cmk-create-identities-authorize-key-vault/create-key-vault.png" border="true":::
262262

263263
Take note of the key vault name and URI Applications that access your key vault must use this URI.
264264

includes/active-directory-msi-cross-tenant-cmk-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ Azure platform services and resources that are owned by the service provider and
1818

1919
The image below shows a data encryption at rest with federated identity in a cross-tenant CMK workflow spanning a service provider and its customer.
2020

21-
:::image type="content" source="media/active-directory-msi-cross-tenant-cmk-overview/cross-tenant-cmk.png" alt-text="Screenshot showing a cross-tenant CMK with a federated identity." lightbox="media/active-directory-msi-cross-tenant-cmk-overview/cross-tenant-cmk.png" border="true":::
21+
:::image type="content" source="media/msi-cross-tenant-cmk-overview/cross-tenant-cmk.png" alt-text="Screenshot showing a cross-tenant CMK with a federated identity." lightbox="media/msi-cross-tenant-cmk-overview/cross-tenant-cmk.png" border="true":::
2222

2323
In the example above, there are two Azure AD tenants: an independent service provider's tenant (*Tenant1*), and a customer's tenant (*Tenant2*). *Tenant1* hosts Azure platform services and *Tenant2* hosts the customer's key vault.
2424

includes/active-directory-msi-tut-disable.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,4 +16,4 @@ ms.custom: include file
1616

1717
To disable the system-assigned identity on your VM, set the status of the system-assigned identity to **Off**.
1818

19-
![Screenshot shows the System assigned tab for a virtual machine where you can turn off the System assigned status.](./media/active-directory-msi-tut-disable/identity.png)
19+
![Screenshot shows the System assigned tab for a virtual machine where you can turn off the System assigned status.](./media/msi-tut-disable/identity.png)

includes/active-directory-msi-tut-enable.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.custom: include file
1212

1313
Enabling a system-assigned managed identity is a one-click experience. You can either enable it during the creation of a VM or in the properties of an existing VM.
1414

15-
![Screenshot shows the System assigned tab for a virtual machine where you can turn on the System assigned status.](./media/active-directory-msi-tut-enable/identity.png)
15+
![Screenshot shows the System assigned tab for a virtual machine where you can turn on the System assigned status.](./media/msi-tut-enable/identity.png)
1616

1717

1818
**To enable a system-assigned managed identity on a new VM:**

includes/cdn-app-dev-prep.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,4 +58,4 @@ If, instead of a service principal, you'd rather have interactive individual use
5858
3. There is no need to create a **client authentication key**.
5959
4. Instead of assigning a service principal to the **CDN Profile Contributor** role, we're going to assign individual users or groups. In this example, you can see that I've assigned *CDN Demo User* to the **CDN Profile Contributor** role.
6060

61-
![Individual user access](./media/cdn-app-dev-prep/cdn-aad-user-include.png)
61+
![Individual user access](./media/cdn-app-dev-prep/cdn-user-include.png)

0 commit comments

Comments
 (0)