About This Page
This page is part of the Azure documentation. It contains code examples and configuration instructions for working with Azure services.
Bias Analysis
Bias Types:
⚠️
powershell_heavy
⚠️
windows_tools
⚠️
missing_linux_example
⚠️
windows_first
Summary:
The documentation page demonstrates a Windows bias by providing only PowerShell commands for key vault and certificate management steps, referencing Windows-specific tools (such as RDP and Visual Studio), and omitting equivalent Linux/CLI/Bash examples. The use of PowerShell is presented as the default, with no mention of cross-platform alternatives like Azure CLI or Bash scripts. This may hinder Linux users or those working in non-Windows environments.
Recommendations:
- For every PowerShell example, provide an equivalent Azure CLI (az) command example, which is cross-platform and widely used on Linux.
- Mention and demonstrate how to use Bash or shell scripts for file uploads and automation steps, especially for storage and configuration file handling.
- When referencing RDP, also mention SSH as a remote access method for Linux-based roles, if applicable.
- List cross-platform tools (e.g., Azure CLI, VS Code) before or alongside Windows-specific tools (e.g., PowerShell, Visual Studio) in both instructions and related content.
- Add a note clarifying that all steps can be performed on Linux/macOS using Azure CLI and SDKs, and link to relevant documentation.
- Ensure that terminology and examples do not assume a Windows-only environment (e.g., avoid only referencing Windows file paths or tools).
Create pull request
Flagged Code Snippets
New-AzKeyVault -Name "ContosKeyVault” -ResourceGroupName “ContosoOrg” -Location “East US”
$Policy = New-AzKeyVaultCertificatePolicy -SecretContentType "application/x-pkcs12" - SubjectName "CN=contoso.com" -IssuerName "Self" -ValidityInMonths 6 -ReuseKeyOnRenewal
Add-AzKeyVaultCertificate -VaultName "ContosKeyVault" -Name "ContosCert" -CertificatePolicy $Policy
string rdpExtensionPublicConfig = "<PublicConfig>" +
"<UserName>adminRdpTest</UserName>" +
"<Expiration>2021-10-27T23:59:59</Expiration>" +
"</PublicConfig>";
string rdpExtensionPrivateConfig = "<PrivateConfig>" +
"<Password>VsmrdpTest!</Password>" +
"</PrivateConfig>";
Extension rdpExtension = new Extension
{
Name = name,
Properties = new CloudServiceExtensionProperties
{
Publisher = "Microsoft.Windows.Azure.Extensions",
Type = "RDP",
TypeHandlerVersion = "1.2.1",
AutoUpgradeMinorVersion = true,
Settings = rdpExtensionPublicConfig,
ProtectedSettings = rdpExtensionPrivateConfig,
RolesAppliedTo = [“*”],
}
};
CloudServiceExtensionProfile cloudServiceExtensionProfile = new CloudServiceExtensionProfile
{
Extensions = rdpExtension
};
Set-AzKeyVaultAccessPolicy -VaultName 'ContosKeyVault' -ResourceGroupName 'ContosoOrg' -UserPrincipalName 'user@domain.com' -PermissionsToCertificates create,get,list,delete
Set-AzKeyVaultAccessPolicy -VaultName 'ContosKeyVault' -ResourceGroupName 'ContosOrg' -ObjectId 'xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx' -PermissionsToCertificates create,get,list,delete