Comment on page
Microsoft DevicesProvisioning
Best practices and references below are based on published guidance from the cloud service provider and may reference native capabilities the cloud service provider offers. If you are not using the native security capabilities, the same security requirement can be met using other security capabilities your organization utilizes
Name | ||
Tags |
Authorization Policies | ||
Authorization Policies-Key Name | ||
Authorization Policies-Primary Key | ||
Authorization Policies-Rights |
Ip Filter Rules | ||
Ip Filter Rules-Action | ||
Ip Filter Rules-Filter Name | ||
Ip Filter Rules-Ip Mask | ||
Ip Filter Rules-Target |
Provisioning State | ||
State |
Public Network Access |
Certificate |
Certificate |
Name | |
Private Link Service Connection State-Actions Required | |
Private Link Service Connection State-Description | |
Private Link Service Connection State-Status | |
Description-Description |
Last modified 1yr ago