Skip to content

Commit 29a83d7

Browse files
committed
Standardize placeholders in security docset to lowercase kebab-case
1 parent 4bfff9b commit 29a83d7

2 files changed

Lines changed: 13 additions & 13 deletions

File tree

articles/security/develop/threat-modeling-tool-authentication.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: jegeib
66
ms.service: azure-information-protection
77
ms.subservice: azure-information-protection-policy
88
ms.topic: article
9-
ms.date: 02/07/2017
9+
ms.date: 03/26/2026
1010
ms.author: jegeib
1111
ms.custom: devx-track-csharp
1212
---
@@ -483,7 +483,7 @@ await deviceClient.SendEventAsync(message);
483483
```javascript
484484
var clientFromConnectionString = require('azure-iot-device-amqp').clientFromConnectionString;
485485
var Message = require('azure-iot-device').Message;
486-
var connectionString = 'HostName=<HostName>DeviceId=<DeviceId>SharedAccessKey=<SharedAccessKey>';
486+
var connectionString = 'HostName=<host-name>DeviceId=<device-id>SharedAccessKey=<shared-access-key>';
487487
var client = clientFromConnectionString(connectionString);
488488
```
489489
#### SAS Token
@@ -492,7 +492,7 @@ await deviceClient.SendEventAsync(message);
492492
* Create a sas token :
493493
```javascript
494494
resourceUri = encodeURIComponent(resourceUri.toLowerCase()).toLowerCase();
495-
var deviceName = "<deviceName >";
495+
var deviceName = "<device-name>";
496496
var expires = (Date.now() / 1000) + expiresInMins * 60;
497497
var toSign = resourceUri + '\n' + expires;
498498
// using crypto
@@ -515,13 +515,13 @@ await deviceClient.SendEventAsync(message);
515515
* Generate a self signed X509 certificate using any tool such as OpenSSL to generate a .cert and .key files to store the certificate and the key respectively
516516
* Provision a device that accepts secured connection using certificates.
517517
```javascript
518-
var connectionString = '<connectionString>';
518+
var connectionString = '<connection-string>';
519519
var registry = iothub.Registry.fromConnectionString(connectionString);
520-
var deviceJSON = {deviceId:"<deviceId>",
520+
var deviceJSON = {deviceId:"<device-id>",
521521
authentication: {
522522
x509Thumbprint: {
523-
primaryThumbprint: "<PrimaryThumbprint>",
524-
secondaryThumbprint: "<SecondaryThumbprint>"
523+
primaryThumbprint: "<primary-thumbprint>",
524+
secondaryThumbprint: "<secondary-thumbprint>"
525525
}
526526
}}
527527
var device = deviceJSON;
@@ -531,7 +531,7 @@ await deviceClient.SendEventAsync(message);
531531
```javascript
532532
var Protocol = require('azure-iot-device-http').Http;
533533
var Client = require('azure-iot-device').Client;
534-
var connectionString = 'HostName=<HostName>DeviceId=<DeviceId>x509=true';
534+
var connectionString = 'HostName=<host-name>DeviceId=<device-id>x509=true';
535535
var client = Client.fromConnectionString(connectionString, Protocol);
536536
var options = {
537537
key: fs.readFileSync('./key.pem', 'utf8'),

articles/security/fundamentals/trusted-hardware-identity-management.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: security
66
ms.subservice: security-fundamentals
77
ms.topic: article
88
ms.author: mbaldwin
9-
ms.date: 04/16/2025
9+
ms.date: 03/26/2026
1010
---
1111

1212
# Trusted Hardware Identity Management
@@ -184,25 +184,25 @@ Follow these steps to request AMD collateral in a confidential container:
184184
1. Create a resource group in one of the CVM supported regions:
185185

186186
```bash
187-
az group create --resource-group <RG_NAME> --location <LOCATION>
187+
az group create --resource-group <resource-group> --location <location>
188188
```
189189

190190
2. Create an AKS cluster with one CVM node in the resource group:
191191

192192
```bash
193-
az aks create --name <CLUSTER_NAME> --resource-group <RG_NAME> -l <LOCATION> --node-vm-size Standard_DC4as_v5 --nodepool-name <POOL_NAME> --node-count 1
193+
az aks create --name <aks-cluster-name> --resource-group <resource-group> -l <location> --node-vm-size Standard_DC4as_v5 --nodepool-name <pool-name> --node-count 1
194194
```
195195

196196
3. Configure kubectl to connect to the cluster:
197197

198198
```bash
199-
az aks get-credentials --resource-group <RG_NAME> --name <CLUSTER_NAME>
199+
az aks get-credentials --resource-group <resource-group> --name <aks-cluster-name>
200200
```
201201

202202
- Add a CVM node pool to an existing AKS cluster:
203203

204204
```bash
205-
az aks nodepool add --cluster-name <CLUSTER_NAME> --resource-group <RG_NAME> --name <POOL_NAME > --node-vm-size Standard_DC4as_v5 --node-count 1
205+
az aks nodepool add --cluster-name <aks-cluster-name> --resource-group <resource-group> --name <pool-name> --node-vm-size Standard_DC4as_v5 --node-count 1
206206
```
207207

208208
2. Verify the connection to your cluster by using the `kubectl get` command. This command returns a list of the cluster nodes.

0 commit comments

Comments
 (0)