Skip to content

Commit 2460c5c

Browse files
authored
Merge pull request #110474 from Nickomang/release-sf-7.1
Updated (preview) for MI and Request Drain
2 parents 25ee262 + e422cbc commit 2460c5c

5 files changed

+8
-13
lines changed

articles/service-fabric/concepts-managed-identity.md

Lines changed: 3 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.date: 12/09/2019
66
ms.custom: sfrev
77
---
88

9-
# Using Managed identities for Azure with Service Fabric (Preview)
9+
# Using Managed identities for Azure with Service Fabric
1010

1111
A common challenge when building cloud applications is how to securely manage the credentials in your code for authenticating to various services without saving them locally on a developer workstation or in source control. *Managed identities for Azure* solve this problem for all your resources in Azure Active Directory (Azure AD) by providing them with automatically managed identities within Azure AD. You can use a service's identity to authenticate to any service that supports Azure AD authentication, including Key Vault, without any credentials stored in your code.
1212

@@ -42,7 +42,7 @@ Managed identities for Service Fabric are only supported in Azure-deployed Servi
4242

4343
The system-assigned identity of an application is unique to that application; a user-assigned identity is a standalone resource, which may be assigned to multiple applications. Within an application, a single identity (whether system-assigned or user-assigned) can be assigned to multiple services of the application, but each individual service can only be assigned one identity. Lastly, a service must be assigned an identity explicitly to have access to this feature. In effect, the mapping of an application's identities to its constituent services allows for in-application isolation — a service may only use the identity mapped to it.
4444

45-
Currently, the following scenarios are supported for this preview feature:
45+
Currently, the following scenarios are supported for this feature:
4646

4747
- Deploy a new application with one or more services and one or more assigned identities
4848

@@ -52,12 +52,7 @@ The following scenarios are not supported or not recommended; note these actions
5252

5353
- Remove or change the identities assigned to an application; if you must make changes, submit separate deployments to first add a new identity assignment, and then to remove a previously assigned one. Removal of an identity from an existing application can have undesirable effects, including leaving your application in a state that is not upgradeable. It is safe to delete the application altogether if the removal of an identity is necessary; note this will delete the system-assigned identity (if so defined) associated with the application, and will remove any associations with the user-assigned identities assigned to the application.
5454

55-
- Service Fabric support for managed identities is not integrated at this time into the [AzureServiceTokenProvider](../key-vault/service-to-service-authentication.md); the integration will be achieved by the end of the preview period for the managed identity feature.
56-
57-
>
58-
> [!NOTE]
59-
>
60-
> This feature is in preview. It may be subject to frequent changes and not suitable for production deployments.
55+
- Service Fabric support for managed identities is not integrated at this time into the [AzureServiceTokenProvider](../key-vault/service-to-service-authentication.md).
6156

6257
## Next steps
6358

articles/service-fabric/configure-new-azure-service-fabric-enable-managed-identity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.date: 12/09/2019
66
ms.custom: sfrev
77
---
88

9-
# Configure managed identity support for a new Service Fabric cluster (preview)
9+
# Configure managed identity support for a new Service Fabric cluster
1010

1111
To use [Managed identities for Azure resources](../active-directory/managed-identities-azure-resources/overview.md) in your Service Fabric applications, first enable the *Managed Identity Token Service* on the cluster. This service is responsible for the authentication of Service Fabric applications using their managed identities, and for obtaining access tokens on their behalf. Once the service is enabled, you can see it in Service Fabric Explorer under the **System** section in the left pane, running under the name **fabric:/System/ManagedIdentityTokenService** next to other system services.
1212

articles/service-fabric/how-to-deploy-service-fabric-application-system-assigned-managed-identity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.topic: article
66
ms.date: 07/25/2019
77
---
88

9-
# Deploy Service Fabric application with system-assigned managed identity (preview)
9+
# Deploy Service Fabric application with system-assigned managed identity
1010

1111
In order to access the managed identity feature for Azure Service Fabric applications, you must first enable the Managed Identity Token Service on the cluster. This service is responsible for the authentication of Service Fabric applications using their managed identities, and for obtaining access tokens on their behalf. Once the service is enabled, you can see it in Service Fabric Explorer under the **System** section in the left pane, running under the name **fabric:/System/ManagedIdentityTokenService** next to other system services.
1212

articles/service-fabric/how-to-deploy-service-fabric-application-user-assigned-managed-identity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: This article shows you how to deploy Service Fabric application wit
55
ms.topic: article
66
ms.date: 12/09/2019
77
---
8-
# Deploy Service Fabric application with a User-Assigned Managed Identity (preview)
8+
# Deploy Service Fabric application with a User-Assigned Managed Identity
99

1010
To deploy a Service Fabric application with managed identity, the application needs to be deployed through Azure Resource Manager, typically with an Azure Resource Manager template. For more information on how to deploy Service Fabric application through Azure Resource Manager, see [Manage applications and services as Azure Resource Manager resources](service-fabric-application-arm-resource.md).
1111

articles/service-fabric/how-to-managed-identity-service-fabric-app-code.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
22
title: Use managed identity with an application
3-
description: How to use managed identities in Azure Service Fabric application code to access Azure Services. This feature is in public preview.
3+
description: How to use managed identities in Azure Service Fabric application code to access Azure Services.
44

55
ms.topic: article
66
ms.date: 10/09/2019
77
---
88

9-
# How to leverage a Service Fabric application's managed identity to access Azure services
9+
# How to leverage a Service Fabric application's managed identity to access Azure services
1010

1111
Service Fabric applications can leverage managed identities to access other Azure resources which support Azure Active Directory-based authentication. An application can obtain an [access token](../active-directory/develop/developer-glossary.md#access-token) representing its identity, which may be system-assigned or user-assigned, and use it as a 'bearer' token to authenticate itself to another service - also known as a [protected resource server](../active-directory/develop/developer-glossary.md#resource-server). The token represents the identity assigned to the Service Fabric application, and will only be issued to Azure resources (including SF applications) which share that identity. Refer to the [managed identity overview](../active-directory/managed-identities-azure-resources/overview.md) documentation for a detailed description of managed identities, as well as the distinction between system-assigned and user-assigned identities. We will refer to a managed-identity-enabled Service Fabric application as the [client application](../active-directory/develop/developer-glossary.md#client-application) throughout this article.
1212

0 commit comments

Comments
 (0)