Skip to content

Commit 764afa3

Browse files
committed
updated text per PM feedback
1 parent 84aaf36 commit 764afa3

7 files changed

+48
-16
lines changed

azure-local/manage/disconnected-operations-deploy.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -173,9 +173,9 @@ To prepare the first machine for the disconnected operations appliance, follow t
173173
1. Modify your path to correct location.
174174
175175
If you initialized a data disk or are using a different path than C: modify the `$applianceConfigBasePath`.
176-
176+
177177
Here's an example:
178-
178+
179179
```powershell
180180
$applianceConfigBasePath = 'D:\AzureLocalDisconnectedOperations\'
181181
```
@@ -711,7 +711,7 @@ To initialize each node, follow these steps. Modify where necessary to match you
711711
> Nodes appear in the local portal shortly after you run the steps, and the extensions appear on the nodes a few minutes after installation.
712712
>
713713
> You can also use the [Configurator App](../deploy/deployment-arc-register-configurator-app.md?view=azloc-2506&preserve-view=true) to initialize each node.
714-
714+
715715
### For fully air-gapped or disconnected deployments (where nodes have no line of sight to internet connection)
716716
717717
To enable Azure Local to be air-gapped or deployed fully disconnected, you must do the following on each node:
@@ -757,7 +757,7 @@ Follow these steps to create an Azure Local instance (cluster):
757757

758758
> [!NOTE]
759759
> If you create Azure Key Vault during deployment, wait about 20 minutes for RBAC permissions to take effect.
760-
>
760+
>
761761
> If you see a validation error, it’s a known issue. Permissions might still be propagating. Wait a bit, refresh your browser, and redeploy the cluster.
762762
763763
## Tasks after deploying disconnected operations

azure-local/manage/disconnected-operations-identity.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -348,8 +348,7 @@ $GroupEntry.CommitChanges()
348348
```
349349

350350
> [!NOTE]
351-
> If the GSMA account for your ADFS farm can't read user properties the sign-in fails. This occurs even if the username and password are correct on the ADFS sign-in page.
352-
351+
> If the GSMA account for your ADFS farm can't read user properties, the sign in fails even if the credentials entered on the ADFS sign in page are correct.
353352
354353
::: moniker-end
355354

azure-local/manage/disconnected-operations-network.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -118,6 +118,7 @@ Add-DnsServerPrimaryZone -Name $ExternalFqdn -ReplicationScope Domain
118118
119119
Add-DnsServerResourceRecordA -Name "*" -IPv4Address $IngressIpAddress -ZoneName $ExternalFqdn
120120
```
121+
121122
#### Verify your DNS setup
122123

123124
Here's an example:

azure-local/manage/disconnected-operations-on-demand-logs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -342,7 +342,7 @@ Trigger log collection for your disconnected environment with the `Invoke-Applia
342342
343343
Mode LastWriteTime Length Name
344344
---- ------------- ------ ----
345-
d---- 4/10/2025 3:05 PM LO_06ec98de-c1c4-406f-a5a9-89f2b803c70f_IRVM01
345+
---- 4/10/2025 3:05 PM LO_06ec98de-c1c4-406f-a5a9-89f2b803c70f_IRVM01
346346
```
347347
348348
1. Send diagnostic data to Microsoft.

azure-local/manage/disconnected-operations-pki.md

Lines changed: 39 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ Mandatory certificates are grouped by area with the appropriate subject alternat
3939
- Make sure your disconnected operations infrastructure can reach the CRL endpoint specified in the certificates' CRL distribution point (CDP) extension.
4040
- Don't use a public or external CA. Deployments fail if certificates come from a public CA, because internet connectivity is required to access the CRL and online certificate status protocol (OCSP) services for HTTPS.
4141

42-
### Ingress endpoints
42+
### Ingress endpoint certificate requirements
4343

4444
This table lists the mandatory certificates required for disconnected operations on Azure Local.
4545

@@ -51,7 +51,7 @@ This table lists the mandatory certificates required for disconnected operations
5151
| Azure Table storage | *.table.fqdn |
5252
| Azure Blob storage | *.blob.fqdn |
5353
| Azure Data Policy | data.policy.fqdn |
54-
| Arc configuration data plane <br/>Azure Arc-enabled Kubernetes | autonomous.dp.kubernetesconfiguration.fqdn |
54+
| Arc configuration data plane <br/br> Azure Arc-enabled Kubernetes | autonomous.dp.kubernetesconfiguration.fqdn |
5555
| Arc for Server Agent data service | agentserviceapi.fqdn |
5656
| Arc for server | his.fqdn |
5757
| Arc guest notification service | guestnotificationservice.fqdn |
@@ -66,7 +66,6 @@ This table lists the mandatory certificates required for disconnected operations
6666
| Public portal | portal.fqdn <br></br> hosting.fqdn <br></br> portalcontroller.fqdn <br></br> catalogapi.fqdn |
6767
| Secure token service | login.fqdn |
6868

69-
7069
### Management endpoints
7170

7271
The management endpoint requires two certificates, and you must put them in the same folder, *ManagementEndpointCerts*. The certificates are:
@@ -204,7 +203,7 @@ $AzLCerts = @(
204203
$cert | Export-PfxCertificate -FilePath "$extCertFilePath\$filePrefix.pfx" -Password $certPassword -Force
205204
Write-Verbose "Certificate for $certSubject and private key exported to $extCertFilePath" -Verbose
206205
}
207-
```
206+
```
208207

209208
- Copy the original certificates (24 .pfx files / *.pfx) obtained from your CA to the directory structure represented in IngressEndpointCerts.
210209

@@ -287,7 +286,7 @@ _continue_ = "DNS=$subject"
287286
288287
```
289288

290-
- Copy the management certificates (*.pfx) to the directory structure represented in ManagementEndpointCerts.
289+
Copy the management certificates (*.pfx) to the directory structure represented in ManagementEndpointCerts.
291290

292291
## Export Root CA certificate
293292

@@ -303,8 +302,8 @@ For more information, see [Active Directory Certificate Services](/troubleshoot/
303302

304303
To secure your identity integration, we recommend that you pass these two parameters:
305304

306-
- LdapsCertChainInfo
307-
- OidcCertChainInfo
305+
- LdapsCertChainInfo
306+
- OidcCertChainInfo
308307

309308
These checks confirm that the certificates and chain for these endpoints haven’t been changed or tampered with.
310309

@@ -319,6 +318,39 @@ $ldapsCertChain = Get-CertChainInfo -endpoint 'https://dc01.azurestack.local'
319318

320319
Here's an example of the output from Get-CertChainInfo
321320

321+
```powershell
322+
# Returns: System.Security.Cryptography.X509Certificates.X509Certificate2[]
323+
>> Get-CertChainInfo
324+
>>
325+
Thumbprint Subject
326+
---------- -------
327+
TESTING580E20618EA15357FC1028622518DDC4D CN=www.website.com, O=Contoso Corporation, L=Redmond, S=WA, C=US
328+
TESTINGDAA2345B48E507320B695D386080E5B25 CN=www.website.com, O=Contoso Corporation, L=Redmond, S=WA, C=US
329+
TESTING9BFD666761B268073FE06D1CC8D4F82A4 CN=www.website.com, O=Contoso Corporation, L=Redmond, S=WA, C=US
330+
```
331+
332+
## Related content
333+
334+
- [Plan hardware for Azure local with disconnected operations](disconnected-operations-overview.md#preview-participation-criteria)
335+
- [Plan and understand identity](disconnected-operations-identity.md)
336+
- [Plan and understand networking](disconnected-operations-network.md)
337+
- [Set up disconnected operations](disconnected-operations-set-up.md)
338+
339+
::: moniker-end
340+
341+
::: moniker range="<=azloc-2505"
342+
343+
This feature is available only in Azure Local 2506
344+
345+
::: moniker-end
346+
347+
```powershell
348+
$oidcCertChain = Get-CertChainInfo -endpoint 'https://adfs.azurestack.local'
349+
$ldapsCertChain = Get-CertChainInfo -endpoint 'https://dc01.azurestack.local'
350+
```
351+
352+
Here's an example of the output from Get-CertChainInfo
353+
322354
```powershell
323355
# Returns: System.Security.Cryptography.X509Certificates.X509Certificate2[]
324356
>> Get-CertChainInfo

azure-local/manage/disconnected-operations-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ You can use Azure Policy to enforce tags on various resources. In this example,
7171
:::image type="content" source="media/disconnected-operations/azure-policy/tag-name.png" alt-text="Screenshot of the parameters page to set a tag name." lightbox="media/disconnected-operations/azure-policy/tag-name.png":::
7272

7373
After the policy is created, you can't create resource groups without the required tag.
74-
74+
7575
:::image type="content" source="media/disconnected-operations/azure-policy/created-tag.png" alt-text="Screenshot of the tag created and required for resource groups." lightbox="media/disconnected-operations/azure-policy/created-tag.png":::
7676

7777
## Supported built-in policies

azure-local/manage/disconnected-operations-security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -100,7 +100,7 @@ To back up Host Guardian Service certificates from your cluster, run these comma
100100
```powershell
101101
Export-ApplianceHGSCertificates -Path D:\AzureLocal\HGSBackup
102102
```
103-
103+
104104
## Configure syslog forwarding
105105
106106
You can use the syslog protocol for Azure Local with disconnected operations VM appliance to forward security events to a customer-managed security information and event management (SIEM) system.

0 commit comments

Comments
 (0)