You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -87,7 +87,7 @@ When you use the Azure role-based access control permission model, follow this p
87
87
:::image type="content" alt-text="Screenshot that shows Azure role-based access control selected as the vault permission model." source="media/howto-custom-domain/portal-key-vault-perm-model-rbac.png" :::
88
88
89
89
1. Go to your Key Vault resource.
90
-
1. On the menu on the left, select **Access control (IAM)**.
90
+
1. On the left pane, select **Access control (IAM)**.
91
91
1. Select **Add** > **Add role assignment**.
92
92
93
93
:::image type="content" alt-text="Screenshot that shows the IAM Add role assignment option." source="media/howto-custom-domain/portal-key-vault-iam.png" :::
@@ -111,7 +111,7 @@ When you use the Azure role-based access control permission model, follow this p
111
111
To add the custom certificate to your Azure SignalR Service resource, follow these steps:
112
112
113
113
1. In the Azure portal, go to your Azure SignalR Service resource.
114
-
1. On the menu on the left, select **Custom domain**.
114
+
1. On the left pane, select **Custom domain**.
115
115
1. Under **Custom certificate**, select **Add**.
116
116
117
117
:::image type="content" alt-text="Screenshot that shows custom certificate management." source="media/howto-custom-domain/portal-custom-certificate-management.png" :::
@@ -129,28 +129,28 @@ To add the custom certificate to your Azure SignalR Service resource, follow the
129
129
130
130
## Create a custom domain CNAME record
131
131
132
-
You must create a CNAME record for your custom domain in an Azure DNS zone or with your non-Microsoft registrar service. The CNAME record creates an alias from your custom domain to the default domain of Azure SignalR Service. Azure SignalR Service uses the record to validate the ownership of your custom domain.
132
+
You must create a `CNAME` record for your custom domain in an Azure DNS zone or with your non-Microsoft registrar service. The `CNAME` record creates an alias from your custom domain to the default domain of Azure SignalR Service. Azure SignalR Service uses the record to validate the ownership of your custom domain.
133
133
134
-
For example, if your default domain is `contoso.service.signalr.net` and your custom domain is `contoso.example.com`, you need to create a CNAME record on `example.com`.
134
+
For example, if your default domain is `contoso.service.signalr.net` and your custom domain is `contoso.example.com`, you need to create a `CNAME` record on `example.com`.
135
135
136
-
After you create the CNAME record, you can perform a DNS lookup to see the CNAME information. In the example, the output from the `linux dig` (DNS lookup) command looks similar to this output:
136
+
After you create the `CNAME` record, you can perform a DNS lookup to see the `CNAME` information. In the example, the output from the `linux dig` (DNS lookup) command looks similar to this output:
137
137
138
138
```
139
139
contoso.example.com. 0 IN CNAME contoso.service.signalr.net.
140
140
```
141
141
142
-
If you're using an Azure DNS zone, see [Manage DNS records](~/articles/dns/dns-operations-recordsets-portal.md) to learn how to add a CNAME record.
142
+
If you're using an Azure DNS zone, see [Manage DNS records](~/articles/dns/dns-operations-recordsets-portal.md) to learn how to add a `CNAME` record.
143
143
144
144
:::image type="content" alt-text="Screenshot that shows adding a CNAME record in an Azure DNS zone." source="media/howto-custom-domain/portal-dns-cname.png" :::
145
145
146
-
If you're using other DNS providers, follow the provider's guide to create a CNAME record.
146
+
If you're using other DNS providers, follow the provider's guide to create a `CNAME` record.
147
147
148
148
## Add a custom domain
149
149
150
150
Now add the custom domain to your Azure SignalR Service resource.
151
151
152
152
1. In the Azure portal, go to your Azure SignalR Service resource.
153
-
1. On the menu on the left, select **Custom domain**.
153
+
1. On the left pane, select **Custom domain**.
154
154
1. Under **Custom domain**, select **Add**.
155
155
156
156
:::image type="content" alt-text="Screenshot that shows custom domain management." source="media/howto-custom-domain/portal-custom-domain-management.png" :::
It should return the `200` status code without any certificate error.
198
198
199
-
## Access Key Vault in private network
199
+
## Access Key Vault in a private network
200
200
201
201
If you configured a [private endpoint](../private-link/private-endpoint-overview.md) to your key vault, Azure SignalR Service can't access your key vault via a public network. You can give Azure SignalR Service access to your key vault through a private network by creating a [shared private endpoint](./howto-shared-private-endpoints-key-vault.md).
202
202
203
-
After you create a shared private endpoint, add a custom certificate. For more information, see [Add a custom certificate to Azure SignalR Service](#add-a-custom-certificate-to-your-azure-signalr-service).
203
+
After you create a shared private endpoint, add a custom certificate. For more information, see [Add a custom certificate to Azure SignalR Service resource](#add-a-custom-certificate-to-your-azure-signalr-service-resource).
204
204
205
205
>[!IMPORTANT]
206
206
>You don't have to change the domain in your key vault URI. For example, if your key vault base URI is `https://contoso.vault.azure.net`, you use this URI to configure a custom certificate.
Copy file name to clipboardExpand all lines: articles/azure-signalr/signalr-howto-authorize-cross-tenant.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -152,7 +152,7 @@ The key point is to use an inner credential to get a `clientAssertion` parameter
152
152
153
153
Yourgoalistogetatokenwiththefollowingclaims. Use [jwt.io](https://jwt.io/) to help you decode the token:
154
154
155
-
-**oid**:ThevalueshouldbeequaltoyourenterpriseapplicationobjectID. Ifyoudon't know where to get it, see [How to retrieve an Enterprise Object ID](/answers/questions/1007608/how-retrieve-enterprise-object-id-from-azure-activ).
155
+
-**oid**:ThevalueshouldbeequaltoyourenterpriseapplicationobjectID. Ifyoudon't know where to get it, see [Retrieve an enterprise object ID](/answers/questions/1007608/how-retrieve-enterprise-object-id-from-azure-activ).
156
156
-**tid**:ThevalueshouldbeequaltothedirectoryIDofyourtenantB. Ifyouaren't sure about your tenant ID, see [Find your Microsoft Entra tenant](/azure/azure-portal/get-subscription-tenant-id#find-your-microsoft-entra-tenant).
157
157
-**audience**:Theaudiencemustbe `https://signalr.azure.com/.default` to access Azure SignalR Service resources.
0 commit comments