Skip to content

Commit e6eb6a3

Browse files
authored
Pencil edits - add periods, spaces to image alt text
1 parent a573331 commit e6eb6a3

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

articles/iot-hub/iot-hub-managed-identity.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ In IoT Hub, managed identities can be used for egress connectivity from IoT Hub
3030
3. Under **System-assigned** tab, select **On** and click **Save**.
3131
4. To remove system-assigned managed identity from an IoT hub, select **Off** and click **Save**.
3232

33-
:::image type="content" source="./media/iot-hub-managed-identity/system-assigned.png" alt-text="Screenshot showing where to turn on system-assigned managed identity for an IoT hub":::
33+
:::image type="content" source="./media/iot-hub-managed-identity/system-assigned.png" alt-text="Screenshot showing where to turn on system-assigned managed identity for an I O T hub.":::
3434

3535
### Enable system-assigned managed identity at hub creation time using ARM template
3636

@@ -124,7 +124,7 @@ In this section, you learn how to add and remove a user-assigned managed identit
124124
3. Under **User-Assigned** tab, click **Associate a user-assigned managed identity**. Choose the user-assigned managed identity you want to add to your hub and then click **Select**.
125125
4. You can remove a user-assigned identity from an IoT hub. Choose the user-assigned identity you want to remove, and click **Remove** button. Note you are only removing it from IoT hub, and this removal does not delete the user-assigned identity as a resource. To delete the user-assigned identity as a resource, follow the instructions in [Delete a user-assigned managed identity](./../active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities.md#delete-a-user-assigned-managed-identity).
126126

127-
:::image type="content" source="./media/iot-hub-managed-identity/user-assigned.png" alt-text="Screenshot showing how to add user-assigned managed identity for an IoT hub":::
127+
:::image type="content" source="./media/iot-hub-managed-identity/user-assigned.png" alt-text="Screenshot showing how to add user-assigned managed identity for an I O T hub.":::
128128

129129
### Enable user-assigned managed identity at hub creation time using ARM template
130130

@@ -241,11 +241,11 @@ In this section, we use the [message routing](iot-hub-devguide-messages-d2c.md)
241241
242242
3. For user-assigned, choose **User-assigned managed identity** under **Assign access to**. Select your subscription and your user-assigned managed identity in the drop-down list. Click the **Save** button.
243243

244-
:::image type="content" source="./media/iot-hub-managed-identity/eventhub-iam-user-assigned.png" alt-text="Screenshot that shows message routing with user assigned":::
244+
:::image type="content" source="./media/iot-hub-managed-identity/eventhub-iam-user-assigned.png" alt-text="Screenshot that shows message routing with user assigned.":::
245245

246246
4. For system-assigned, under **Assign access to** choose **User, group, or service principal** and select your IoT Hub's resource name in the drop-down list. Click **Save**.
247247

248-
:::image type="content" source="./media/iot-hub-managed-identity/eventhub-iam-system-assigned.png" alt-text="Screenshot that shows message routing with system assigned":::
248+
:::image type="content" source="./media/iot-hub-managed-identity/eventhub-iam-system-assigned.png" alt-text="Screenshot that shows message routing with system assigned.":::
249249

250250
If you need to restrict the connectivity to your custom endpoint through a VNet, you need to turn on the trusted Microsoft first party exception, to give your IoT hub access to the specific endpoint. For example, if you're adding an event hub custom endpoint, navigate to the **Firewalls and virtual networks** tab in your event hub and enable **Allow access from selected networks** option. Under the **Exceptions** list, check the box for **Allow trusted Microsoft services to access event hubs**. Click the **Save** button. This also applies to storage account and service bus. Learn more about [IoT Hub support for virtual networks](./virtual-network-support.md).
251251

@@ -256,7 +256,7 @@ In this section, we use the [message routing](iot-hub-devguide-messages-d2c.md)
256256

257257
6. At the bottom of the page, choose your preferred **Authentication type**. In this section, we use the **User-Assigned** as the example. In the dropdown, select the preferred user-assigned managed identity then click **Create**.
258258

259-
:::image type="content" source="./media/iot-hub-managed-identity/eventhub-routing-endpoint.png" alt-text="Screenshot that shows event hub with user assigned":::
259+
:::image type="content" source="./media/iot-hub-managed-identity/eventhub-routing-endpoint.png" alt-text="Screenshot that shows event hub with user assigned.":::
260260

261261
7. Custom endpoint successfully created.
262262

@@ -280,7 +280,7 @@ IoT Hub's [file upload](iot-hub-devguide-file-upload.md) feature allows devices
280280
5. On your IoT hub's resource page, navigate to **File upload** tab.
281281
6. On the page that shows up, select the container that you intend to use in your blob storage, configure the **File notification settings, SAS TTL, Default TTL, and Maximum delivery count** as desired. Choose the preferred authentication type, and click **Save**. If you get an error at this step, temporarily set your storage account to allow access from **All networks**, then try again. You can configure firewall on the storage account once the File upload configuration is complete.
282282

283-
:::image type="content" source="./media/iot-hub-managed-identity/file-upload.png" alt-text="Screen shot that shows file upload with msi":::
283+
:::image type="content" source="./media/iot-hub-managed-identity/file-upload.png" alt-text="Screen shot that shows file upload with msi.":::
284284

285285
> [!NOTE]
286286
> In the file upload scenario, both hub and your device need to connect with your storage account. The steps above are for connecting your IoT hub to your storage account with desired authentication type. You still need to connect your device to storage using the SAS URI. Today the SAS URI is generated using connection string. We'll add support to generate SAS URI with managed identity soon. Please follow the steps in [file upload](iot-hub-devguide-file-upload.md).
@@ -385,4 +385,4 @@ Use the links below to learn more about IoT Hub features:
385385

386386
* [Message routing](./iot-hub-devguide-messages-d2c.md)
387387
* [File upload](./iot-hub-devguide-file-upload.md)
388-
* [Bulk device import/export](./iot-hub-bulk-identity-mgmt.md)
388+
* [Bulk device import/export](./iot-hub-bulk-identity-mgmt.md)

0 commit comments

Comments
 (0)