Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit 32233da

Browse files
author
Thomas Weiss
committedFeb 18, 2022
Addressed GH issues
1 parent ebfabc4 commit 32233da

File tree

6 files changed

+7
-7
lines changed

6 files changed

+7
-7
lines changed
 

‎articles/cosmos-db/how-to-configure-firewall.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Configure an IP firewall for your Azure Cosmos DB account
33
description: Learn how to configure IP access control policies for firewall support on Azure Cosmos accounts.
44
ms.service: cosmos-db
55
ms.topic: how-to
6-
ms.date: 03/03/2021
6+
ms.date: 02/18/2022
77
ms.author: thweiss
88
author: ThomasWeiss
99
ms.custom: devx-track-azurecli, devx-track-azurepowershell
@@ -32,7 +32,7 @@ You can secure the data stored in your Azure Cosmos DB account by using IP firew
3232

3333
To set the IP access control policy in the Azure portal, go to the Azure Cosmos DB account page and select **Firewall and virtual networks** on the navigation menu. Change the **Allow access from** value to **Selected networks**, and then select **Save**.
3434

35-
![Screenshot showing how to open the Firewall page in the Azure portal](./media/how-to-configure-firewall/azure-portal-firewall.png)
35+
:::image type="content" source="./media/how-to-configure-firewall/azure-portal-firewall.png" alt-text="Screenshot showing how to open the Firewall page in the Azure portal" border="true":::
3636

3737
When IP access control is turned on, the Azure portal provides the ability to specify IP addresses, IP address ranges, and switches. Switches enable access to other Azure services and the Azure portal. The following sections give details about these switches.
3838

@@ -52,13 +52,13 @@ When you enable an IP access control policy programmatically, you need to add th
5252

5353
You can enable requests to access the Azure portal by selecting the **Allow access from Azure portal** option, as shown in the following screenshot:
5454

55-
![Screenshot showing how to enable Azure portal access](./media/how-to-configure-firewall/enable-azure-portal.png)
55+
:::image type="content" source="./media/how-to-configure-firewall/enable-azure-portal.png" alt-text="Screenshot showing how to enable Azure portal access" border="true":::
5656

5757
### Allow requests from global Azure datacenters or other sources within Azure
5858

5959
If you access your Azure Cosmos DB account from services that don’t provide a static IP (for example, Azure Stream Analytics and Azure Functions), you can still use the IP firewall to limit access. You can enable access from other sources within the Azure by selecting the **Accept connections from within Azure datacenters** option, as shown in the following screenshot:
6060

61-
![Screenshot showing how to accept connections from Azure datacenters](./media/how-to-configure-firewall/enable-azure-services.png)
61+
:::image type="content" source="./media/how-to-configure-firewall/enable-azure-services.png" alt-text="Screenshot showing how to accept connections from Azure datacenters" border="true":::
6262

6363
When you enable this option, the IP address `0.0.0.0` is added to the list of allowed IP addresses. The `0.0.0.0` IP address restricts requests to your Azure Cosmos DB account from Azure datacenter IP range. This setting does not allow access for any other IP ranges to your Azure Cosmos DB account.
6464

@@ -73,7 +73,7 @@ The portal automatically detects the client IP address. It might be the client I
7373

7474
To add your current IP to the list of IPs, select **Add my current IP**. Then select **Save**.
7575

76-
:::image type="content" source="./media/how-to-configure-firewall/enable-current-ip.png" alt-text="Screenshot showing a how to configure firewall settings for the current IP":::
76+
:::image type="content" source="./media/how-to-configure-firewall/enable-current-ip.png" alt-text="Screenshot showing a how to configure firewall settings for the current IP" border="true":::
7777

7878
### Requests from cloud services
7979

‎articles/cosmos-db/how-to-setup-cmk.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to configure customer-managed keys for your Azure Cosmos
44
author: ThomasWeiss
55
ms.service: cosmos-db
66
ms.topic: how-to
7-
ms.date: 02/03/2022
7+
ms.date: 02/18/2022
88
ms.author: thweiss
99
ms.custom: devx-track-azurepowershell, devx-track-azurecli
1010
ms.devlang: azurecli
@@ -62,7 +62,7 @@ If you're using an existing Azure Key Vault instance, you can verify that these
6262

6363
1. Under **Select principal**, select **None selected**.
6464

65-
1. Search for **Azure Cosmos DB** principal and select it (to make it easier to find, you can also search by principal ID: `a232010e-820c-4083-83bb-3ace5fc29d0b` for any Azure region except Azure Government regions where the principal ID is `57506a73-e302-42a9-b869-6f12d9ec29e9`). If the **Azure Cosmos DB** principal isn't in the list, you might need to re-register the **Microsoft.DocumentDB** resource provider as described in the [Register the resource provider](#register-resource-provider) section of this article.
65+
1. Search for **Azure Cosmos DB** principal and select it (to make it easier to find, you can also search by application ID: `a232010e-820c-4083-83bb-3ace5fc29d0b` for any Azure region except Azure Government regions where the application ID is `57506a73-e302-42a9-b869-6f12d9ec29e9`). If the **Azure Cosmos DB** principal isn't in the list, you might need to re-register the **Microsoft.DocumentDB** resource provider as described in the [Register the resource provider](#register-resource-provider) section of this article.
6666

6767
> [!NOTE]
6868
> This registers the Azure Cosmos DB first-party-identity in your Azure Key Vault access policy. To replace this first-party identity by your Azure Cosmos DB account managed identity, see [Using a managed identity in the Azure Key Vault access policy](#using-managed-identity).
Loading
Loading
Loading
Loading

0 commit comments

Comments
 (0)
Please sign in to comment.