You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/service-fabric/service-fabric-application-secret-store.md
+49-48Lines changed: 49 additions & 48 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.date: 07/25/2019
10
10
This article describes how to use Central Secrets Store (CSS) in Azure Service Fabric to create secrets in Service Fabric applications. CSS is a local secret store cache that keeps sensitive data, such as a password, tokens, and keys, encrypted in memory.
11
11
12
12
## Enable Central Secrets Store
13
-
Add the following script to your cluster configuration under `fabricSettings` to enable CSS. It's recommended that you use a certificate other than a cluster certificate for CSS. Make sure the encryption certificate is installed on all nodes and that `NetworkService` has read permission to the certificate's private key.
13
+
Add the following script to your cluster configuration under `fabricSettings` to enable CSS. We recommend that you use a certificate other than a cluster certificate for CSS. Make sure the encryption certificate is installed on all nodes and that `NetworkService` has read permission to the certificate's private key.
14
14
```json
15
15
"fabricSettings":
16
16
[
@@ -43,9 +43,9 @@ This article describes how to use Central Secrets Store (CSS) in Azure Service F
43
43
]
44
44
```
45
45
## Declare a secret resource
46
-
You can create a secret resource by using either the Resource Manager template or the REST API.
46
+
You can create a secret resource by using either the Azure Resource Manager template or the REST API.
47
47
48
-
### Use the Resource Manager
48
+
### Use Resource Manager
49
49
50
50
Use the following template to use Resource Manager to create the secret resource. The template creates a `supersecret` secret resource, but no value is set for the secret resource yet.
51
51
@@ -130,54 +130,55 @@ Follow these steps to use the secret in your Service Fabric application.
130
130
131
131
1. Add a section in the **settings.xml** file with the following snippet. Note here that the value is in the format {`secretname:version`}.
The environment variable `SecretPath` will point to the directory where all secrets are stored. Each parameter listed under the `testsecrets` section is stored in a separate file. The application can now use the secret as follows:
The environment variable `SecretPath` will point to the directory where all secrets are stored. Each parameter listed under the `testsecrets` section is stored in a separate file. The application can now use the secret as follows:
4. Youcanbindasecrettoaprocessenvironmentvariablebyspecifying `Type='SecretsStoreRef`. The following snippet is an example of how to bind the `supersecret` version `ver1` to the environment variable `MySuperSecret` in **ServiceManifest.xml**.
1. Youcanbindasecrettoaprocessenvironmentvariablebyspecifying `Type='SecretsStoreRef`. The following snippet is an example of how to bind the `supersecret` version `ver1` to the environment variable `MySuperSecret` in **ServiceManifest.xml**.
0 commit comments