Skip to content

Commit e802774

Browse files
committed
edit pass: signalr-how-to-guides
1 parent bad8272 commit e802774

File tree

2 files changed

+15
-15
lines changed

2 files changed

+15
-15
lines changed

articles/azure-signalr/howto-custom-domain.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Before you can add a custom domain, you need to add a custom TLS/SSL certificate
3636
You can use either a system-assigned or user-assigned managed identity. This article demonstrates how to use a system-assigned managed identity.
3737

3838
1. In the Azure portal, go to your Azure SignalR Service resource.
39-
1. On the menu on the left, select **Identity**.
39+
1. On the left pane, select **Identity**.
4040
1. On the **System assigned** table, set **Status** to **On**.
4141

4242
:::image type="content" alt-text="Screenshot that shows enabling managed identity." source="media/howto-custom-domain/portal-identity.png" :::
@@ -56,7 +56,7 @@ The steps to grant permission depend on whether you selected **Vault access poli
5656
If you're using **Vault access policy** as your key vault permission model, follow this procedure to add a new access policy.
5757

5858
1. Go to your key vault resource.
59-
1. On the menu on the left, select **Access policies**.
59+
1. On the left pane, select **Access policies**.
6060
1. Select **Create**.
6161

6262
:::image type="content" source="media/howto-custom-domain/portal-key-vault-access-policies.png" alt-text="Screenshot that shows the Key Vault Access policies page.":::
@@ -76,9 +76,9 @@ If you're using **Vault access policy** as your key vault permission model, foll
7676

7777
1. On the **Review + create** tab, select **Create**.
7878

79-
The managed identity for your Azure SignalR Service instance is listed in the access policies table.
79+
The managed identity for your Azure SignalR Service instance is listed in the access policies table.
8080

81-
:::image type="content" source="media/howto-custom-domain/portal-key-vault-access-policies-created.png" alt-text="Screenshot that shows the Key Vault Access policies page.":::
81+
:::image type="content" source="media/howto-custom-domain/portal-key-vault-access-policies-created.png" alt-text="Screenshot that shows the Key Vault Access policies table.":::
8282

8383
#### [Azure role-based access control](#tab/azure-rbac)
8484

@@ -87,7 +87,7 @@ When you use the Azure role-based access control permission model, follow this p
8787
:::image type="content" alt-text="Screenshot that shows Azure role-based access control selected as the vault permission model." source="media/howto-custom-domain/portal-key-vault-perm-model-rbac.png" :::
8888

8989
1. Go to your Key Vault resource.
90-
1. On the menu on the left, select **Access control (IAM)**.
90+
1. On the left pane, select **Access control (IAM)**.
9191
1. Select **Add** > **Add role assignment**.
9292

9393
:::image type="content" alt-text="Screenshot that shows the IAM Add role assignment option." source="media/howto-custom-domain/portal-key-vault-iam.png" :::
@@ -111,7 +111,7 @@ When you use the Azure role-based access control permission model, follow this p
111111
To add the custom certificate to your Azure SignalR Service resource, follow these steps:
112112

113113
1. In the Azure portal, go to your Azure SignalR Service resource.
114-
1. On the menu on the left, select **Custom domain**.
114+
1. On the left pane, select **Custom domain**.
115115
1. Under **Custom certificate**, select **Add**.
116116

117117
:::image type="content" alt-text="Screenshot that shows custom certificate management." source="media/howto-custom-domain/portal-custom-certificate-management.png" :::
@@ -129,28 +129,28 @@ To add the custom certificate to your Azure SignalR Service resource, follow the
129129

130130
## Create a custom domain CNAME record
131131

132-
You must create a CNAME record for your custom domain in an Azure DNS zone or with your non-Microsoft registrar service. The CNAME record creates an alias from your custom domain to the default domain of Azure SignalR Service. Azure SignalR Service uses the record to validate the ownership of your custom domain.
132+
You must create a `CNAME` record for your custom domain in an Azure DNS zone or with your non-Microsoft registrar service. The `CNAME` record creates an alias from your custom domain to the default domain of Azure SignalR Service. Azure SignalR Service uses the record to validate the ownership of your custom domain.
133133

134-
For example, if your default domain is `contoso.service.signalr.net` and your custom domain is `contoso.example.com`, you need to create a CNAME record on `example.com`.
134+
For example, if your default domain is `contoso.service.signalr.net` and your custom domain is `contoso.example.com`, you need to create a `CNAME` record on `example.com`.
135135

136-
After you create the CNAME record, you can perform a DNS lookup to see the CNAME information. In the example, the output from the `linux dig` (DNS lookup) command looks similar to this output:
136+
After you create the `CNAME` record, you can perform a DNS lookup to see the `CNAME` information. In the example, the output from the `linux dig` (DNS lookup) command looks similar to this output:
137137

138138
```
139139
contoso.example.com. 0 IN CNAME contoso.service.signalr.net.
140140
```
141141

142-
If you're using an Azure DNS zone, see [Manage DNS records](~/articles/dns/dns-operations-recordsets-portal.md) to learn how to add a CNAME record.
142+
If you're using an Azure DNS zone, see [Manage DNS records](~/articles/dns/dns-operations-recordsets-portal.md) to learn how to add a `CNAME` record.
143143

144144
:::image type="content" alt-text="Screenshot that shows adding a CNAME record in an Azure DNS zone." source="media/howto-custom-domain/portal-dns-cname.png" :::
145145

146-
If you're using other DNS providers, follow the provider's guide to create a CNAME record.
146+
If you're using other DNS providers, follow the provider's guide to create a `CNAME` record.
147147

148148
## Add a custom domain
149149

150150
Now add the custom domain to your Azure SignalR Service resource.
151151

152152
1. In the Azure portal, go to your Azure SignalR Service resource.
153-
1. On the menu on the left, select **Custom domain**.
153+
1. On the left pane, select **Custom domain**.
154154
1. Under **Custom domain**, select **Add**.
155155

156156
:::image type="content" alt-text="Screenshot that shows custom domain management." source="media/howto-custom-domain/portal-custom-domain-management.png" :::
@@ -196,11 +196,11 @@ $ curl -vvv https://contoso.example.com/api/health
196196

197197
It should return the `200` status code without any certificate error.
198198

199-
## Access Key Vault in private network
199+
## Access Key Vault in a private network
200200

201201
If you configured a [private endpoint](../private-link/private-endpoint-overview.md) to your key vault, Azure SignalR Service can't access your key vault via a public network. You can give Azure SignalR Service access to your key vault through a private network by creating a [shared private endpoint](./howto-shared-private-endpoints-key-vault.md).
202202

203-
After you create a shared private endpoint, add a custom certificate. For more information, see [Add a custom certificate to Azure SignalR Service](#add-a-custom-certificate-to-your-azure-signalr-service).
203+
After you create a shared private endpoint, add a custom certificate. For more information, see [Add a custom certificate to Azure SignalR Service resource](#add-a-custom-certificate-to-your-azure-signalr-service-resource).
204204

205205
>[!IMPORTANT]
206206
>You don't have to change the domain in your key vault URI. For example, if your key vault base URI is `https://contoso.vault.azure.net`, you use this URI to configure a custom certificate.

articles/azure-signalr/signalr-howto-authorize-cross-tenant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -152,7 +152,7 @@ The key point is to use an inner credential to get a `clientAssertion` parameter
152152
153153
Your goal is to get a token with the following claims. Use [jwt.io](https://jwt.io/) to help you decode the token:
154154
155-
- **oid**: The value should be equal to your enterprise application object ID. If you don't know where to get it, see [How to retrieve an Enterprise Object ID](/answers/questions/1007608/how-retrieve-enterprise-object-id-from-azure-activ).
155+
- **oid**: The value should be equal to your enterprise application object ID. If you don't know where to get it, see [Retrieve an enterprise object ID](/answers/questions/1007608/how-retrieve-enterprise-object-id-from-azure-activ).
156156
- **tid**: The value should be equal to the directory ID of your tenant B. If you aren't sure about your tenant ID, see [Find your Microsoft Entra tenant](/azure/azure-portal/get-subscription-tenant-id#find-your-microsoft-entra-tenant).
157157
- **audience**: The audience must be `https://signalr.azure.com/.default` to access Azure SignalR Service resources.
158158

0 commit comments

Comments
 (0)