Skip to content

Commit ea242b9

Browse files
committed
fixing media a(rrgh)nchors
1 parent 17fcd67 commit ea242b9

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

articles/service-fabric/cluster-security-certificate-management.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -65,14 +65,17 @@ These steps are illustrated below; note the differences in provisioning between
6565

6666
*Fig. 1.* Issuance and provisioning flow of certificates declared by thumbprint.
6767
<center>
68+
6869
![Provisioning certificates declared by thumbprint][Image1]
6970
</center>
7071

7172
*Fig. 2.* Issuance and provisioning flow of certificates declared by subject common name.
7273
<center>
74+
7375
![Provisioning certificates declared by subject common name][Image2]
7476
</center>
7577

78+
7679
### Certificate enrollment
7780
This topic is covered in detail in the Key Vault [documentation](../key-vault/create-certificate.md); we're including a synopsis here for continuity and easier reference. Continuing with Azure as the context, and using Azure Key Vault as the secret management service, an authorized certificate requester must have at least certificate management permissions on the vault, granted by the vault owner; the requester would then enroll into a certificate as follows:
7881
- creates a certificate policy in Azure Key Vault (AKV), which specifies the domain/subject of the certificate, the desired issuer, key type and length, intended key usage and more; see [Certificates in Azure Key Vault](../key-vault/certificate-scenarios.md) for details.

0 commit comments

Comments
 (0)