Skip to content

Commit f973f14

Browse files
committed
fixes
1 parent bfa7890 commit f973f14

File tree

1 file changed

+7
-8
lines changed

1 file changed

+7
-8
lines changed

articles/container-registry/container-registry-customer-managed-keys.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -355,10 +355,10 @@ az group deployment create \
355355

356356
### Show encryption status
357357

358-
To show the status of registry encryption, run the [az acr encryption show-status][az-acr-encryption-show-status] command:
358+
To show the status of registry encryption, run the [az acr encryption show][az-acr-encryption-show] command:
359359

360360
```azurecli
361-
az acr encryption show-status --name <registry-name>
361+
az acr encryption show --name <registry-name>
362362
```
363363

364364
## Use the registry
@@ -367,7 +367,7 @@ After enabling a customer-managed key in a registry, you can perform the same re
367367

368368
## Rotate key
369369

370-
Rotate a customer-managed key in Azure Key Vault according to your compliance policies. Create a new key, or update a key version, and then update the registry to encrypt data using the key. You can perform these steps using the Azure CLI or in the portal.
370+
Rotate a customer-managed key used for registry encryption to your compliance policies. Create a new key, or update a key version, and then update the registry to encrypt data using the key. You can perform these steps using the Azure CLI or in the portal.
371371

372372
When rotating a key, typically you specify the same identity used when creating the registry. Optionally, configure a new user-assigned identity for key access, or enable and specify the registry's system-assigned identity.
373373

@@ -414,9 +414,8 @@ For example, to generate and configure a new key version:
414414

415415
1. In the portal, navigate to your registry.
416416
1. Under **Settings**, select **Encryption** > **Change key**.
417-
1. Select **Select key**.
418-
![Rotate key in the Azure portal](./media/container-registry-customer-managed-keys/rotate-key.png)
419-
417+
1. Select **Select key**
418+
![Rotate key in the Azure portal](./media/container-registry-customer-managed-keys/rotate-key.png)
420419
1. In the **Select key from Azure Key Vault** window, select the key vault and key you configured previously, and in **Version**, select **Create new**.
421420
1. In the **Create a key** window, select **Generate**, and then **Create**.
422421
1. Complete the key selection and select **Save**.
@@ -438,13 +437,13 @@ Revoking the key effectively blocks access to all registry data, since the regis
438437

439438
### System-assigned identity
440439

441-
You can configure a registry's system-assigned managed identity to access the key vault for encryption keys. If you're unfamiliar with the different managed identities for Azure resources, see [the overview](../active-directory/managed-identities-azure-resources/overview.md).
440+
You can configure a registry's system-assigned managed identity to access the key vault for encryption keys. If you're unfamiliar with the different managed identities for Azure resources, see the [overview](../active-directory/managed-identities-azure-resources/overview.md).
442441

443442
To enable the registry's system-assigned identity in the portal:
444443

445444
1. In the portal, navigate to your registry.
446445
1. Select **Settings** > **Identity**.
447-
1. Under **System assigned**, set Status to **On**. Select **Save**.
446+
1. Under **System assigned**, set **Status** to **On**. Select **Save**.
448447
1. Copy the **Object ID** of the identity.
449448

450449
To grant the identity access to your key vault:

0 commit comments

Comments
 (0)