You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: SECURITY.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ Instead, please report them to the Microsoft Security Response Center (MSRC) at
14
14
15
15
If you prefer to submit without logging in, send email to [secure@microsoft.com](mailto:secure@microsoft.com). If possible, encrypt your message with our PGP key; please download it from the [Microsoft Security Response Center PGP Key page](https://aka.ms/security.md/msrc/pgp).
16
16
17
-
You should receive a response within 24 hours. If for some reason you do not, please follow up via email to ensure we received your original message. Additional information can be found at [microsoft.com/msrc](https://www.microsoft.com/msrc).
17
+
You should receive a response within 24 hours. If for some reason you do not, please follow up via email to ensure we received your original message. Additional information can be found at [microsoft.com/msrc](https://www.microsoft.com/msrc).
18
18
19
19
Please include the requested information listed below (as much as you can provide) to help us better understand the nature and scope of the possible issue:
type: 'SystemAssigned'// This resource's identity is automatically assigned priviledge access to ACR, Storage, Key Vault, and Application Insights.
156
+
type: 'SystemAssigned'// This resource's identity is automatically assigned priviledge access to ACR, Storage, Key Vault, and Application Insights.
157
157
}
158
158
properties: {
159
159
friendlyName: 'Azure OpenAI Chat Hub'
160
160
description: 'Hub to support the Microsoft Learn Azure OpenAI basic chat implementation. https://learn.microsoft.com/azure/architecture/ai-ml/architecture/basic-openai-e2e-chat'
161
-
publicNetworkAccess: 'Enabled'// Production readiness change: The "Baseline" architecture adds ingress and egress network control over this "Basic" implementation.
161
+
publicNetworkAccess: 'Enabled'// Production readiness change: The "Baseline" architecture adds ingress and egress network control over this "Basic" implementation.
162
162
ipAllowlist: []
163
163
serverlessComputeSettings: null
164
164
enableServiceSideCMKEncryption: false
165
165
managedNetwork: {
166
-
isolationMode: 'Disabled'// Production readiness change: The "Baseline" architecture adds ingress and egress network control over this "Basic" implementation.
166
+
isolationMode: 'Disabled'// Production readiness change: The "Baseline" architecture adds ingress and egress network control over this "Basic" implementation.
167
167
}
168
168
allowRoleAssignmentOnRG: false// Require role assignments at the resource level.
categoryGroup: 'allLogs'// Production readiness change: In production, this is probably excessive. Please tune to just the log streams that add value to your workload's operations.
296
+
categoryGroup: 'allLogs'// Production readiness change: In production, this is probably excessive. Please tune to just the log streams that add value to your workload's operations.
Copy file name to clipboardExpand all lines: infra-as-code/bicep/modules/keyvaultRoleAssignment.bicep
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -1,8 +1,8 @@
1
1
/*
2
2
This template creates a role assignment for a managed identity to access secrets in key vault.
3
3
4
-
To ensure that each deployment has a unique role assignment ID, you can use the guid() function with a seed value that is based in part on the
5
-
managed identity's principal ID. However, because Azure Resource Manager requires each resource's name to be available at the beginning of the deployment,
4
+
To ensure that each deployment has a unique role assignment ID, you can use the guid() function with a seed value that is based in part on the
5
+
managed identity's principal ID. However, because Azure Resource Manager requires each resource's name to be available at the beginning of the deployment,
6
6
you can't use this approach in the same Bicep file that defines the managed identity. This sample uses a Bicep module to work around this issue.
publicNetworkAccess: 'Enabled'// Production readiness change: This sample uses identity as the perimeter. Production scenarios should layer in network perimeter control as well.
25
+
publicNetworkAccess: 'Enabled'// Production readiness change: This sample uses identity as the perimeter. Production scenarios should layer in network perimeter control as well.
0 commit comments