You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Private endpoints of secured resources created through Azure Web PubSub Service APIs are referred to as *shared private-link resources*. This is because you're "sharing" access to a resource, such as an Azure Key Vault, that has been integrated with the [Azure Private Link service](../private-link/private-link-overview.md). These private endpoints are created inside the Azure Web PubSub Service execution environment and aren't directly visible to you.
18
+
Private endpoints of secured resources created through Azure Web PubSub Service APIs are referred to as *shared private-link resources*. This is because you're "sharing" access to a resource, such as an Azure Key Vault, that has been integrated with the [Azure Private Link service](../private-link/private-link-overview.md). These private endpoints are created inside the Azure Web PubSub Service execution environment and aren't directly visible to you.
19
19
20
20
> [!NOTE]
21
21
> The examples in this article use the following resource IDs:
@@ -44,13 +44,13 @@ Private endpoints of secured resources created through Azure Web PubSub Service
1. Enter a **Name** for the shared private endpoint.
47
-
1. Enter your key vault resource by choosing **Select from your resources** and selecting your resource from the lists, or by choosing **Specify resource ID** and entering you key vault resource ID.
47
+
1. Enter your key vault resource by choosing **Select from your resources** and selecting your resource from the lists, or by choosing **Specify resource ID** and entering your key vault resource ID.
48
48
1. Enter *please approve* for the **Request message**.
49
49
1. Select **Add**.
50
50
51
51
:::image type="content" alt-text="Screenshot of adding a shared private endpoint." source="media\howto-secure-shared-private-endpoints-key-vault\portal-shared-private-endpoints-add.png" :::
52
52
53
-
The shared private endpoint resource provisioning state will be**Succeeded**. The connection state is **Pending** approval at target resource side.
53
+
The shared private endpoint resource provisioning state is**Succeeded**. The connection state is **Pending** approval at target resource side.
54
54
55
55
:::image type="content" alt-text="Screenshot of an added shared private endpoint." source="media\howto-secure-shared-private-endpoints-key-vault\portal-shared-private-endpoints-added.png" lightbox="media\howto-secure-shared-private-endpoints-key-vault\portal-shared-private-endpoints-added.png" :::
56
56
@@ -75,7 +75,7 @@ The contents of the *create-pe.json* file, which represents the request body to
75
75
}
76
76
```
77
77
78
-
The process of creating an outbound private endpoint is a long-running (asynchronous) operation. As in all asynchronous Azure operations, the `PUT` call returns an `Azure-AsyncOperation` header value that looks like the following:
78
+
The process of creating an outbound private endpoint is a long-running (asynchronous) operation. As in all asynchronous Azure operations, the `PUT` call returns an `Azure-AsyncOperation` header value that looks like the following output:
@@ -162,7 +162,7 @@ It takes a few minutes for the approval to be propagated to Azure Web PubSub Ser
162
162
az rest --method get --uri https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/contoso/providers/Microsoft.SignalRService/webpubsub/contoso-webpubsub/sharedPrivateLinkResources/func-pe?api-version=2022-08-01-preview
163
163
```
164
164
165
-
This would return a JSON, where the connection state would show up as "status" under the "properties" section.
165
+
This command would return a JSON, where the connection state would show up as "status" under the "properties" section.
166
166
167
167
```json
168
168
{
@@ -178,11 +178,11 @@ This would return a JSON, where the connection state would show up as "status" u
178
178
179
179
```
180
180
181
-
When the "Provisioning State" (`properties.provisioningState`) of the resource is `Succeeded` and "Connection State" (`properties.status`) is `Approved`, the shared private link resource is functional and Azure Web PubSub Service can communicate over the private endpoint.
181
+
When the "Provisioning State" (`properties.provisioningState`) of the resource is `Succeeded` and "Connection State" (`properties.status`) is `Approved`, the shared private link resource is functional, and Azure Web PubSub Service can communicate over the private endpoint.
182
182
183
183
-----
184
184
185
-
Now you can configure features like a custom domain as usual. You don't have to use a special domain for Key Vault. DNS resolution is automatically handled by Azure Web PubSub Service.
185
+
Now you can configure features like a custom domain as usual. You don't have to use a special domain for Key Vault. The Azure Web PubSub Service automatically handles DNS resolution.
Copy file name to clipboardExpand all lines: articles/azure-web-pubsub/howto-secure-shared-private-endpoints.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -71,7 +71,7 @@ You use the following API call with the [Azure CLI](/cli/azure/) to create a sha
71
71
az rest --method put --uri https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/contoso/providers/Microsoft.SignalRService/webPubSub/contoso-webpubsub/sharedPrivateLinkResources/func-pe?api-version=2021-06-01-preview --body @create-pe.json --debug
72
72
```
73
73
74
-
The *create-pe.json* file contains the request body to the API. It will be similar to the following example:
74
+
The *create-pe.json* file contains the request body to the API. It is similar to the following example:
0 commit comments