This page contains Windows bias

About This Page

This page is part of the Azure documentation. It contains code examples and configuration instructions for working with Azure services.

Bias Analysis

Bias Types:
⚠️ powershell_heavy
⚠️ windows_first
⚠️ missing_linux_example
Summary:
The documentation page demonstrates a Windows bias by providing only PowerShell-based configuration examples and referencing PowerShell as the primary CLI tool for managing Azure Application Gateway and Key Vault integration. There are no equivalent Azure CLI (cross-platform) or Bash examples, and PowerShell is mentioned before or instead of other tools throughout the page. This may disadvantage Linux or macOS users who prefer or require non-Windows tooling.
Recommendations:
  • Provide equivalent Azure CLI (az) examples alongside PowerShell commands for all configuration steps, especially for referencing Key Vault secrets and configuring Application Gateway.
  • When mentioning scripting or automation, present Azure CLI and PowerShell in parallel, or lead with Azure CLI as the more cross-platform option.
  • Include Bash shell snippets for common tasks, or clarify that all steps can be performed on Linux/macOS using Azure CLI.
  • Avoid language that assumes PowerShell is the default or only automation tool; explicitly state that both PowerShell and Azure CLI are supported.
  • Add a 'Platform considerations' section to clarify tool parity and direct users to appropriate instructions for their OS.
GitHub Create pull request

Scan History

Date Scan ID Status Bias Status
2025-07-12 23:44 #41 in_progress ❌ Biased
2025-07-12 00:58 #8 cancelled ✅ Clean
2025-07-10 05:06 #7 processing ✅ Clean
2025-07-09 23:22 #6 cancelled ✅ Clean

Flagged Code Snippets

# Get the Application Gateway we want to modify $appgw = Get-AzApplicationGateway -Name MyApplicationGateway -ResourceGroupName MyResourceGroup # Specify the resource id to the user assigned managed identity - This can be found by going to the properties of the managed identity Set-AzApplicationGatewayIdentity -ApplicationGateway $appgw -UserAssignedIdentityId "/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/MyResourceGroup/providers/Microsoft.ManagedIdentity/userAssignedIdentities/MyManagedIdentity" # Get the secret ID from Key Vault $secret = Get-AzKeyVaultSecret -VaultName "MyKeyVault" -Name "CertificateName" $secretId = $secret.Id.Replace($secret.Version, "") # Remove the secret version so Application Gateway uses the latest version in future syncs # Specify the secret ID from Key Vault Add-AzApplicationGatewaySslCertificate -KeyVaultSecretId $secretId -ApplicationGateway $appgw -Name $secret.Name # Commit the changes to the Application Gateway Set-AzApplicationGateway -ApplicationGateway $appgw