About This Page
This page is part of the Azure documentation. It contains code examples and configuration instructions for working with Azure services.
Bias Analysis
Bias Types:
⚠️
powershell_heavy
⚠️
windows_tools
⚠️
missing_linux_example
⚠️
windows_first
Summary:
The documentation exclusively uses Azure PowerShell cmdlets for all configuration steps, with no mention of Azure CLI, Bash, or cross-platform alternatives. All examples and prerequisites assume the use of PowerShell, which is traditionally associated with Windows environments, and there is no guidance for Linux or macOS users. The document also references installing PowerShell modules and does not provide parity for users who might prefer or require Linux-native tools.
Recommendations:
- Provide equivalent Azure CLI (az) command examples for all PowerShell cmdlets, as Azure CLI is cross-platform and widely used on Linux and macOS.
- Explicitly mention that all steps can be performed on Linux/macOS using Azure CLI or PowerShell Core, and provide instructions for those environments.
- Include a section or notes for Linux users, such as how to install and use Azure CLI or PowerShell Core on Linux.
- Avoid assuming PowerShell as the default tool; present both PowerShell and CLI examples side by side or allow users to select their preferred environment.
- Clarify any platform-specific limitations or differences, if any, for Linux/macOS users.
Create pull request
Flagged Code Snippets
> [!NOTE]
> * ExpressRoute is a trusted service within Azure that supports Network Security policies within Azure Key Vault. For more information, see [Configure Azure Key Vault Firewall and Virtual Networks](/azure/key-vault/general/network-security).
> * You shouldn't place the Azure Key Vault behind a private endpoint, as this will prevent the communication with the ExpressRoute management plane. The ExpressRoute management plane is responsible for managing the MACsec keys and parameters for your connection.
1. To create a new user identity, you need to use the `New-AzUserAssignedIdentity` cmdlet. This cmdlet creates a user-assigned managed identity in Microsoft Entra ID and registers it with the specified subscription and resource group. A user-assigned managed identity is a stand-alone Azure resource that can be assigned to any Azure service that supports managed identities. You can use this identity to authenticate and authorize access to Azure resources without storing any credentials in your code or configuration files. For more information, see [What is managed identities for Azure resources?](/entra/identity/managed-identities-azure-resources/overview).
Install the following module in Administrator mode if PowerShell doesn't recognize `New-AzUserAssignedIdentity` or `Get-AzUserAssignedIdentity` as valid cmdlets. Then, run the command again.
> [!NOTE]
> * CKN must be an even-length string up to 64 hexadecimal digits (0-9, A-F).
> * CAK length depends on cipher suite specified:
> * For GcmAes128 and GcmAesXpn128, the CAK must be an even-length string with 32 hexadecimal digits (0-9, A-F).
> * For GcmAes256 and GcmAesXpn256, the CAK must be an even-length string with 64 hexadecimal digits (0-9, A-F).
> * For CAK, the full length of the key must be used. If the key is shorter than the required length, then `0's` will be added to the end of the key to meet the length requirement. For example, CAK of 1234 will be 12340000... for both 128-bit and 256-bit based on the cipher.
1. Grant the user identity the authorization to perform the `GET` operation.