Skip to content

Commit

Permalink
Microsoft Entra ID rebranding (#238)
Browse files Browse the repository at this point in the history
  • Loading branch information
ckittel authored Dec 27, 2023
1 parent 69a575d commit 02fe645
Show file tree
Hide file tree
Showing 2 changed files with 4 additions and 4 deletions.
4 changes: 2 additions & 2 deletions solutions/azure-hub-spoke-connected-group/azuredeploy.json
Original file line number Diff line number Diff line change
Expand Up @@ -2587,7 +2587,7 @@
"kind": "Custom",
"properties": {
"access": "AlwaysAllow",
"description": "Always allow outbound traffic to Azure Active Directory",
"description": "Always allow outbound traffic to Microsoft Entra ID",
"destinationPortRanges": [
"0-65535"
],
Expand All @@ -2614,7 +2614,7 @@
"[resourceId('Microsoft.Network/networkManagers/securityAdminConfigurations/ruleCollections', format('avnm-{0}', parameters('location')), format('sg-{0}', parameters('location')), format('rc-{0}', parameters('location')))]"
],
"metadata": {
"description": "This example rule always allows outbound traffic to Azure Active Directory, overriding NSG outbound restrictions"
"description": "This example rule always allows outbound traffic to Microsoft Entra ID, overriding NSG outbound restrictions"
}
},
{
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -288,14 +288,14 @@ resource rule3 'Microsoft.Network/networkManagers/securityAdminConfigurations/ru
}
}

@description('This example rule always allows outbound traffic to Azure Active Directory, overriding NSG outbound restrictions')
@description('This example rule always allows outbound traffic to Microsoft Entra ID, overriding NSG outbound restrictions')
resource rule4 'Microsoft.Network/networkManagers/securityAdminConfigurations/ruleCollections/rules@2023-04-01' = {
name: 'r-alwaysallow-${location}'
kind: 'Custom'
parent: rulesCollection
properties: {
access: 'AlwaysAllow'
description: 'Always allow outbound traffic to Azure Active Directory'
description: 'Always allow outbound traffic to Microsoft Entra ID'
destinationPortRanges: [ '0-65535' ]
destinations: [
{
Expand Down

0 comments on commit 02fe645

Please sign in to comment.