Skip to content

Commit 0dcb313

Browse files
committed
Update note placement and add to more files
1 parent 2643047 commit 0dcb313

17 files changed

+85
-40
lines changed

articles/service-connector/quickstart-cli-aks-connection.md

Lines changed: 21 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -40,24 +40,6 @@ This quickstart shows you how to connect Azure Kubernetes Service (AKS) to other
4040

4141
## Create a service connection
4242

43-
### [Using an access key](#tab/Using-access-key)
44-
45-
Run the following Azure CLI command to create a service connection to an Azure Blob Storage with an access key, providing the following information.
46-
47-
```azurecli
48-
az aks connection create storage-blob --secret
49-
```
50-
51-
Provide the following information as prompted:
52-
53-
* **Source compute service resource group name:** the resource group name of the AKS cluster.
54-
* **AKS cluster name:** the name of your AKS cluster that connects to the target service.
55-
* **Target service resource group name:** the resource group name of the Blob Storage.
56-
* **Storage account name:** the account name of your Blob Storage.
57-
58-
> [!NOTE]
59-
> If you don't have a Blob Storage, you can run `az aks connection create storage-blob --new --secret` to provision a new one and directly get connected to your aks cluster.
60-
6143
### [Using a workload identity](#tab/Using-Managed-Identity)
6244

6345
> [!IMPORTANT]
@@ -81,6 +63,27 @@ az aks connection create storage-blob \
8163
8264
---
8365

66+
### [Using an access key](#tab/Using-access-key)
67+
68+
> [!WARNING]
69+
> Microsoft recommends that you use the most secure authentication flow available. The authentication flow described in this procedure requires a very high degree of trust in the application, and carries risks that are not present in other flows. You should only use this flow when other more secure flows, such as managed identities, aren't viable.
70+
71+
Run the following Azure CLI command to create a service connection to an Azure Blob Storage with an access key, providing the following information.
72+
73+
```azurecli
74+
az aks connection create storage-blob --secret
75+
```
76+
77+
Provide the following information as prompted:
78+
79+
* **Source compute service resource group name:** the resource group name of the AKS cluster.
80+
* **AKS cluster name:** the name of your AKS cluster that connects to the target service.
81+
* **Target service resource group name:** the resource group name of the Blob Storage.
82+
* **Storage account name:** the account name of your Blob Storage.
83+
84+
> [!NOTE]
85+
> If you don't have a Blob Storage, you can run `az aks connection create storage-blob --new --secret` to provision a new one and directly get connected to your aks cluster.
86+
8487
## View connections
8588

8689
Use the Azure CLI [az aks connection list](/cli/azure/functionapp/connection#az-functionapp-connection-list) command to list connections to your AKS Cluster, providing the following information:

articles/service-connector/quickstart-cli-app-service-connection.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -60,6 +60,9 @@ az webapp connection create storage-blob
6060
6161
#### [Using an access key](#tab/Using-access-key)
6262

63+
> [!WARNING]
64+
> Microsoft recommends that you use the most secure authentication flow available. The authentication flow described in this procedure requires a very high degree of trust in the application, and carries risks that are not present in other flows. You should only use this flow when other more secure flows, such as managed identities, aren't viable.
65+
6366
Use the Azure CLI [az webapp connection create](/cli/azure/webapp/connection/create) command to create a service connection to an Azure Blob Storage with an access key, providing the following information:
6467

6568
- **Source compute service resource group name:** the resource group name of the App Service.

articles/service-connector/quickstart-cli-container-apps.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -77,6 +77,9 @@ Create a connection using a managed identity or an access key.
7777
7878
### [Access key](#tab/using-access-key)
7979
80+
> [!WARNING]
81+
> Microsoft recommends that you use the most secure authentication flow available. The authentication flow described in this procedure requires a very high degree of trust in the application, and carries risks that are not present in other flows. You should only use this flow when other more secure flows, such as managed identities, aren't viable.
82+
8083
1. Run the `az containerapp connection create` command to create a service connection between Container Apps and Azure Blob Storage using an access key.
8184
8285
```azurecli

articles/service-connector/quickstart-cli-functions-connection.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -61,6 +61,9 @@ az functionapp connection create storage-blob --system-identity
6161
6262
#### [Using an access key](#tab/Using-access-key)
6363

64+
> [!WARNING]
65+
> Microsoft recommends that you use the most secure authentication flow available. The authentication flow described in this procedure requires a very high degree of trust in the application, and carries risks that are not present in other flows. You should only use this flow when other more secure flows, such as managed identities, aren't viable.
66+
6467
Use the Azure CLI [az functionapp connection create](/cli/azure/functionapp/connection/create) command to create a service connection to an Azure Blob Storage with an access key, providing the following information:
6568

6669
- **Source compute service resource group name:** the resource group name of the Function App.

articles/service-connector/quickstart-cli-spring-cloud-connection.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -78,6 +78,9 @@ Create a connection from Azure Spring Apps using a managed identity or an access
7878
7979
### [Access key](#tab/Using-access-key)
8080
81+
> [!WARNING]
82+
> Microsoft recommends that you use the most secure authentication flow available. The authentication flow described in this procedure requires a very high degree of trust in the application, and carries risks that are not present in other flows. You should only use this flow when other more secure flows, such as managed identities, aren't viable.
83+
8184
1. Run the `az spring connection create` command to create a service connection between Azure Spring Apps and an Azure Blob Storage using an access key.
8285
8386
```azurecli

articles/service-connector/quickstart-portal-aks-connection.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -48,15 +48,18 @@ Sign in to the Azure portal at [https://portal.azure.com/](https://portal.azure.
4848
### [Workload identity](#tab/UMI)
4949

5050
Select **Workload identity** to authenticate through [Microsoft Entra workload identity](/entra/workload-id/workload-identities-overview) to one or more instances of an Azure service. Then select a user-assigned managed identity to enable workload identity.
51-
52-
### [Connection string](#tab/CS)
53-
54-
Select **Connection string** to generate or configure one or multiple key-value pairs with pure secrets or tokens.
5551

5652
### [Service principal](#tab/SP)
5753

5854
Select **Service principal** to use a service principal that defines the access policy and permissions for the user/application.
5955

56+
### [Connection string](#tab/CS)
57+
58+
> [!WARNING]
59+
> Microsoft recommends that you use the most secure authentication flow available. The authentication flow described in this procedure requires a very high degree of trust in the application, and carries risks that are not present in other flows. You should only use this flow when other more secure flows, such as managed identities, aren't viable.
60+
61+
Select **Connection string** to generate or configure one or multiple key-value pairs with pure secrets or tokens.
62+
6063
---
6164

6265
1. Select **Next: Networking** to configure the network access to your target service and select **Configure firewall rules to enable access to your target service**.

articles/service-connector/quickstart-portal-app-service-connection.md

Lines changed: 10 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -53,20 +53,25 @@ Sign in to the Azure portal at [https://portal.azure.com/](https://portal.azure.
5353

5454
Select **User-assigned managed identity** to authenticate through a standalone identity assigned to one or more instances of an Azure service.
5555

56-
### [Connection string](#tab/CS)
57-
58-
Select **Connection string** to generate or configure one or multiple key-value pairs with pure secrets or tokens.
59-
6056
### [Service principal](#tab/SP)
6157

6258
Select **Service principal** to use a service principal that defines the access policy and permissions for the user/application in Microsoft Entra ID.
6359

60+
### [Connection string](#tab/CS)
61+
62+
> [!WARNING]
63+
> Microsoft recommends that you use the most secure authentication flow available. The authentication flow described in this procedure requires a very high degree of trust in the application, and carries risks that are not present in other flows. You should only use this flow when other more secure flows, such as managed identities, aren't viable.
64+
65+
Select **Connection string** to generate or configure one or multiple key-value pairs with pure secrets or tokens.
66+
67+
---
68+
6469
1. Select **Next: Networking** to configure the network access to your target service and select **Configure firewall rules to enable access to your target service**.
6570

6671
1. Select **Next: Review + Create** to review the provided information. Then select **Create** to create the service connection. This operation might take a minute to complete.
6772

6873
> [!NOTE]
69-
> You need enough permissions to create connection successfully, for more details, see [Permission requirements](./concept-permission.md).
74+
> You need enough permissions to create a connection successfully, for more details, see [Permission requirements](./concept-permission.md).
7075
7176
## View service connections in App Service
7277

articles/service-connector/quickstart-portal-container-apps.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -75,15 +75,18 @@ Use Service Connector to create a new service connection in Container Apps.
7575

7676
For more information, go to [create a user-assigned managed identity](../active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities.md?pivots=identity-mi-methods-azp).
7777

78-
### [Connection string](#tab/CS)
79-
80-
Select **Connection string** to generate or configure one or multiple key-value pairs with pure secrets or tokens.
81-
8278
### [Service principal](#tab/SP)
8379

8480
1. Select **Service principal** to use a service principal that defines the access policy and permissions for the user/application in Microsoft Entra ID.
8581
1. Select a service principal from the list and enter a **secret**
8682

83+
### [Connection string](#tab/CS)
84+
85+
> [!WARNING]
86+
> Microsoft recommends that you use the most secure authentication flow available. The authentication flow described in this procedure requires a very high degree of trust in the application, and carries risks that are not present in other flows. You should only use this flow when other more secure flows, such as managed identities, aren't viable.
87+
88+
Select **Connection string** to generate or configure one or multiple key-value pairs with pure secrets or tokens.
89+
8790
---
8891

8992
1. Select **Next: Networking** to select the network configuration and select **Configure firewall rules to enable access to target service** so that your container can reach the Blob Storage.

articles/service-connector/tutorial-connect-web-app-app-configuration.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -202,6 +202,9 @@ Start by creating your Azure resources.
202202

203203
### [Connection string](#tab/connectionstring)
204204

205+
> [!WARNING]
206+
> Microsoft recommends that you use the most secure authentication flow available. The authentication flow described in this procedure requires a very high degree of trust in the application, and carries risks that are not present in other flows. You should only use this flow when other more secure flows, such as managed identities, aren't viable.
207+
205208
Import the test configuration file to Azure App Configuration using a connection string.
206209
207210
1. Cd into the folder `ServiceConnectorSample`

articles/service-connector/tutorial-java-spring-confluent-kafka.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,9 @@ Learn how to access Apache Kafka on Confluent Cloud for a Spring Boot applicatio
2020
> * Build and deploy the Spring Boot app
2121
> * Connect Apache Kafka on Confluent Cloud to Azure Spring Apps using Service Connector
2222
23+
> [!WARNING]
24+
> Microsoft recommends that you use the most secure authentication flow available. The authentication flow described in this procedure requires a very high degree of trust in the application, and carries risks that are not present in other flows. You should only use this flow when other more secure flows, such as managed identities, aren't viable.
25+
2326
## Prerequisites
2427

2528
* An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/).

0 commit comments

Comments
 (0)