Skip to content

Commit 33c72bc

Browse files
Merge pull request #37096 from WilliamDAssafMSFT/20260417-lightbox-svg
20260417 fix svg lightbox
2 parents 7d92d47 + 3715d2a commit 33c72bc

2 files changed

Lines changed: 7 additions & 7 deletions

File tree

azure-sql/managed-instance/managed-instance-link-feature-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ You can use databases that are replicated through the link between SQL Server an
4444
- Migrating to Azure
4545
- Copying data on-premises
4646

47-
:::image type="content" source="./media/managed-instance-link-feature-overview/mi-link-main-scenario.svg" alt-text="Diagram that illustrates the main Managed Instance link scenario." lightbox="./media/managed-instance-link-feature-overview/mi-link-main-scenario.svg":::
47+
:::image type="content" source="./media/managed-instance-link-feature-overview/mi-link-main-scenario.svg" alt-text="Diagram that illustrates the main Managed Instance link scenario." :::
4848

4949
<a id="prerequisites"></a>
5050

@@ -89,7 +89,7 @@ You also need the following tools:
8989

9090
The link feature for SQL Managed Instance works by creating a distributed availability group between SQL Server and Azure SQL Managed Instance. The solution supports single-node systems with or without existing availability groups, or multiple node systems with existing availability groups.
9191

92-
:::image type="content" source="./media/managed-instance-link-feature-overview/mi-link-distributed-availability-group.svg" alt-text="Diagram showing how the link feature for SQL Managed Instance works using distributed availability group technology." lightbox="./media/managed-instance-link-feature-overview/mi-link-distributed-availability-group.svg":::
92+
:::image type="content" source="./media/managed-instance-link-feature-overview/mi-link-distributed-availability-group.svg" alt-text="Diagram showing how the link feature for SQL Managed Instance works using distributed availability group technology.":::
9393

9494
A private connection such as a VPN or Azure ExpressRoute connects an on-premises network and Azure. If you host SQL Server on an Azure VM, the internal Azure backbone can connect the VM and SQL managed instance, such as with virtual network peering. The two systems establish trust using certificate-based authentication, where SQL Server and SQL Managed Instance exchange public keys of their respective certificates.
9595

docs/linux/sql-server-linux-ad-auth-understanding.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -102,15 +102,15 @@ As with Kerberos authentication on Windows, the first two steps to obtain a tick
102102

103103
- The client starts the Kerberos handshake by requesting a session key from the DC for that SPN. Both the TGT and the SPN are sent to the DC.
104104

105-
:::image type="content" source="media/sql-server-linux-ad-auth-understanding/active-directory-authentication-explained-tgt-spn.png" alt-text="Diagram showing Active Directory authentication for SQL Server on Linux - Ticket-Granting Ticket and Service Principal Name sent to Domain Controller." lightbox="media/sql-server-linux-ad-auth-understanding/active-directory-authentication-explained-tgt-spn.svg":::
105+
:::image type="content" source="media/sql-server-linux-ad-auth-understanding/active-directory-authentication-explained-tgt-spn.svg" alt-text="Diagram showing Active Directory authentication for SQL Server on Linux - Ticket-Granting Ticket and Service Principal Name sent to Domain Controller.":::
106106

107107
- After the DC validates the TGT and SPN, it sends the session key to the client, for connecting to the [!INCLUDE [ssNoVersion](../includes/ssnoversion-md.md)] SPN.
108108

109-
:::image type="content" source="media/sql-server-linux-ad-auth-understanding/active-directory-authentication-explained-session-key-received.png" alt-text="Diagram showing Active Directory authentication for SQL Server on Linux - session key returned to client by DC." lightbox="media/sql-server-linux-ad-auth-understanding/active-directory-authentication-explained-session-key-received.svg":::
109+
:::image type="content" source="media/sql-server-linux-ad-auth-understanding/active-directory-authentication-explained-session-key-received.svg" alt-text="Diagram showing Active Directory authentication for SQL Server on Linux - session key returned to client by DC.":::
110110

111111
- The encrypted blob from the session key is sent to the server.
112112

113-
:::image type="content" source="media/sql-server-linux-ad-auth-understanding/active-directory-authentication-explained-session-key-sent.png" alt-text="Diagram showing Active Directory authentication for SQL Server on Linux - session key sent to server." lightbox="media/sql-server-linux-ad-auth-understanding/active-directory-authentication-explained-session-key-sent.svg":::
113+
:::image type="content" source="media/sql-server-linux-ad-auth-understanding/active-directory-authentication-explained-session-key-sent.svg" alt-text="Diagram showing Active Directory authentication for SQL Server on Linux - session key sent to server.":::
114114

115115
- [!INCLUDE [ssNoVersion](../includes/ssnoversion-md.md)] reads the password for the SPN from its keytab (`mssql.keytab`), which is a file on disk containing encrypted (SPN, password) tuples.
116116

@@ -120,7 +120,7 @@ As with Kerberos authentication on Windows, the first two steps to obtain a tick
120120

121121
- The connection is either accepted or denied.
122122

123-
:::image type="content" source="media/sql-server-linux-ad-auth-understanding/active-directory-authentication-explained-approved-or-denied.png" alt-text="Diagram showing Active Directory authentication for SQL Server on Linux - connection accepted or denied." lightbox="media/sql-server-linux-ad-auth-understanding/active-directory-authentication-explained-approved-or-denied.svg":::
123+
:::image type="content" source="media/sql-server-linux-ad-auth-understanding/active-directory-authentication-explained-approved-or-denied.svg" alt-text="Diagram showing Active Directory authentication for SQL Server on Linux - connection accepted or denied.":::
124124

125125
## Configure Kerberos for SQL Server containers
126126

@@ -135,7 +135,7 @@ You must use the SPN that is stored in `mssql.keytab` to connect to the [!INCLUD
135135
> [!NOTE]
136136
> [!INCLUDE [connect-instance-client](../includes/connect-instance-client.md)]
137137
138-
:::image type="content" source="media/sql-server-linux-ad-auth-understanding/active-directory-authentication-explained-container.png" alt-text="Diagram showing Active Directory authentication for SQL Server Containers." lightbox="media/sql-server-linux-ad-auth-understanding/active-directory-authentication-explained-container.svg":::
138+
:::image type="content" source="media/sql-server-linux-ad-auth-understanding/active-directory-authentication-explained-container.svg" alt-text="Diagram showing Active Directory authentication for SQL Server Containers.":::
139139

140140
## SQL Server group refresh
141141

0 commit comments

Comments
 (0)