- Microsoft Azure Security
- Roberto Freato
- 206字
- 2021-07-23 19:30:20
Conventions
In this book, you will find a number of styles of text that distinguish between different kinds of information. Here are some examples of these styles, and an explanation of their meaning.
Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "If you have multiple subscriptions, list them with the Get-AzureSubscription
cmdlet."
A block of code is set as follows:
{ "sku" : { "family" : "A", "name" : "standard" }, "tenantId" : "[…]", "accessPolicies" : [ { "tenantId" : "[…]", "objectId" : "[…]", "permissions" : { "secrets" : ["all"], "keys" : ["get", "create", "delete", "list", "update", "import", "backup", "restore"] } } ], "enabledForDeployment" : false, "vaultUri" : "https://[name].vault.azure.net/" }
Any command-line input or output is written as follows:
Set-AzureKeyVaultAccessPolicy -VaultName [vaultName] - ServicePrincipalName [clientID] -PermissionsToSecrets all
New terms and important words are shown in bold. Words that you see on the screen, in menus or dialog boxes for example, appear in the text like this: "On the bottom menu, click on the MANAGE MULTI-FACTOR AUTH button."
推薦閱讀
- OpenStack Cloud Computing Cookbook(Third Edition)
- Practical Data Analysis Cookbook
- Practical UX Design
- PostgreSQL 11從入門到精通(視頻教學(xué)版)
- 零基礎(chǔ)學(xué)Java程序設(shè)計
- MATLAB定量決策五大類問題
- MySQL數(shù)據(jù)庫基礎(chǔ)實例教程(微課版)
- 自制編程語言
- 區(qū)塊鏈技術(shù)與應(yīng)用
- Hands-On GUI Programming with C++ and Qt5
- 大話Java:程序設(shè)計從入門到精通
- PrimeFaces Blueprints
- 零基礎(chǔ)學(xué)C語言(第4版)
- Machine Learning for OpenCV
- Microsoft HoloLens By Example