From 02fe64557b6b5df039f254c18092f6e290c22b6b Mon Sep 17 00:00:00 2001 From: Chad Kittel Date: Wed, 27 Dec 2023 12:57:38 -0600 Subject: [PATCH] Microsoft Entra ID rebranding (#238) --- solutions/azure-hub-spoke-connected-group/azuredeploy.json | 4 ++-- .../azure-hub-spoke-connected-group/bicep/modules/avnm.bicep | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/solutions/azure-hub-spoke-connected-group/azuredeploy.json b/solutions/azure-hub-spoke-connected-group/azuredeploy.json index f4cc1c13..e38dc2c0 100644 --- a/solutions/azure-hub-spoke-connected-group/azuredeploy.json +++ b/solutions/azure-hub-spoke-connected-group/azuredeploy.json @@ -2587,7 +2587,7 @@ "kind": "Custom", "properties": { "access": "AlwaysAllow", - "description": "Always allow outbound traffic to Azure Active Directory", + "description": "Always allow outbound traffic to Microsoft Entra ID", "destinationPortRanges": [ "0-65535" ], @@ -2614,7 +2614,7 @@ "[resourceId('Microsoft.Network/networkManagers/securityAdminConfigurations/ruleCollections', format('avnm-{0}', parameters('location')), format('sg-{0}', parameters('location')), format('rc-{0}', parameters('location')))]" ], "metadata": { - "description": "This example rule always allows outbound traffic to Azure Active Directory, overriding NSG outbound restrictions" + "description": "This example rule always allows outbound traffic to Microsoft Entra ID, overriding NSG outbound restrictions" } }, { diff --git a/solutions/azure-hub-spoke-connected-group/bicep/modules/avnm.bicep b/solutions/azure-hub-spoke-connected-group/bicep/modules/avnm.bicep index 42db2d0d..8da3f42c 100644 --- a/solutions/azure-hub-spoke-connected-group/bicep/modules/avnm.bicep +++ b/solutions/azure-hub-spoke-connected-group/bicep/modules/avnm.bicep @@ -288,14 +288,14 @@ resource rule3 'Microsoft.Network/networkManagers/securityAdminConfigurations/ru } } -@description('This example rule always allows outbound traffic to Azure Active Directory, overriding NSG outbound restrictions') +@description('This example rule always allows outbound traffic to Microsoft Entra ID, overriding NSG outbound restrictions') resource rule4 'Microsoft.Network/networkManagers/securityAdminConfigurations/ruleCollections/rules@2023-04-01' = { name: 'r-alwaysallow-${location}' kind: 'Custom' parent: rulesCollection properties: { access: 'AlwaysAllow' - description: 'Always allow outbound traffic to Azure Active Directory' + description: 'Always allow outbound traffic to Microsoft Entra ID' destinationPortRanges: [ '0-65535' ] destinations: [ {