This page contains Windows bias

About This Page

This page is part of the Azure documentation. It contains code examples and configuration instructions for working with Azure services.

Bias Analysis

Bias Types:
⚠️ powershell_heavy
⚠️ windows_first
⚠️ missing_linux_example
Summary:
The documentation page demonstrates a bias toward Windows and PowerShell by providing only PowerShell-based command-line examples for configuring Application Gateway with Key Vault certificates. There are no equivalent Azure CLI (cross-platform) or Bash/Linux shell examples. The instructions and code samples assume the use of PowerShell, which is most commonly associated with Windows environments, and the 'Next steps' section links exclusively to a PowerShell guide. This may hinder Linux or macOS users who prefer or require CLI/Bash-based workflows.
Recommendations:
  • Add equivalent Azure CLI (az) command examples alongside PowerShell for all configuration steps, especially for referencing Key Vault secrets and managing Application Gateway.
  • Explicitly mention that all steps can be performed on Linux/macOS using Azure CLI or Bash, and provide links to relevant documentation.
  • In the 'Next steps' section, include links to guides for Azure CLI and ARM/Bicep templates, not just PowerShell.
  • Where possible, provide Bash script snippets or instructions for common Linux workflows (e.g., using environment variables, jq for JSON parsing, etc.).
  • Ensure that references to tools and commands are cross-platform or, if not, that alternatives are clearly documented.
GitHub Create pull request

Scan History

Date Scan ID Status Bias Status
2025-09-12 00:00 #109 completed ✅ Clean
2025-08-12 00:00 #78 in_progress ❌ Biased
2025-08-11 00:00 #77 completed ❌ Biased
2025-08-10 00:00 #76 completed ❌ Biased
2025-08-09 00:00 #75 completed ❌ Biased
2025-08-08 00:00 #74 completed ❌ Biased
2025-08-07 00:00 #73 completed ❌ Biased
2025-08-06 00:00 #72 completed ❌ Biased
2025-08-05 00:00 #71 completed ❌ Biased
2025-08-04 00:00 #70 in_progress ❌ Biased
2025-08-03 00:00 #69 completed ❌ Biased
2025-08-02 00:00 #68 in_progress ❌ Biased
2025-08-01 00:00 #67 completed ❌ Biased
2025-07-31 00:00 #66 completed ✅ Clean
2025-07-30 00:00 #65 completed ✅ Clean
2025-07-29 00:01 #64 completed ✅ Clean
2025-07-28 00:00 #63 completed ✅ Clean
2025-07-27 00:00 #62 completed ✅ Clean
2025-07-26 00:01 #61 completed ✅ Clean
2025-07-25 00:00 #60 completed ✅ Clean
2025-07-24 00:00 #59 completed ✅ Clean
2025-07-23 00:00 #58 completed ✅ Clean
2025-07-22 00:01 #57 completed ✅ Clean
2025-07-21 00:00 #56 completed ❌ Biased
2025-07-19 13:51 #54 completed ✅ Clean
2025-07-17 00:00 #53 completed ❌ Biased
2025-07-16 00:00 #52 completed ❌ Biased
2025-07-13 21:37 #48 completed ❌ Biased
2025-07-09 13:09 #3 cancelled ✅ Clean
2025-07-08 04:23 #2 cancelled ❌ Biased

Flagged Code Snippets

# Get the Application Gateway we want to modify $appgw = Get-AzApplicationGateway -Name MyApplicationGateway -ResourceGroupName MyResourceGroup # Specify the resource id to the user assigned managed identity - This can be found by going to the properties of the managed identity Set-AzApplicationGatewayIdentity -ApplicationGateway $appgw -UserAssignedIdentityId "/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/MyResourceGroup/providers/Microsoft.ManagedIdentity/userAssignedIdentities/MyManagedIdentity" # Get the secret ID from Key Vault $secret = Get-AzKeyVaultSecret -VaultName "MyKeyVault" -Name "CertificateName" $secretId = $secret.Id.Replace($secret.Version, "") # Remove the secret version so Application Gateway uses the latest version in future syncs # Specify the secret ID from Key Vault Add-AzApplicationGatewaySslCertificate -KeyVaultSecretId $secretId -ApplicationGateway $appgw -Name $secret.Name # Commit the changes to the Application Gateway Set-AzApplicationGateway -ApplicationGateway $appgw