Skip to content

Commit 2fde2b9

Browse files
author
unknown
committed
Added image border
1 parent 1f6f30b commit 2fde2b9

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

articles/azure-app-configuration/pull-key-value-devops-pipeline.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33,11 +33,11 @@ Assign the proper App Configuration role assignments to the credentials being us
3333
1. In the left menu, select **Access control (IAM)**.
3434
1. In the right pane, select **Add role assignments**.
3535

36-
![Screenshot shows the Add role assignments button.](./media/azure-app-configuration-role-assignment/add-role-assignment-button.png)
36+
<kbd>![Screenshot shows the Add role assignments button.](./media/azure-app-configuration-role-assignment/add-role-assignment-button.png)</kbd>
3737
1. For **Role**, select **App Configuration Data Reader**. This role allows the task to read from the App Configuration store.
3838
1. Select the service principal associated with the service connection that you created in the previous section.
3939

40-
![Screenshot shows the Add role assignment dialog.](./media/azure-app-configuration-role-assignment/add-role-assignment-data-reader.png)
40+
<kbd>![Screenshot shows the Add role assignment dialog.](./media/azure-app-configuration-role-assignment/add-role-assignment-data-reader.png)</kbd>
4141

4242
1. If the store contains Key Vault references, go to relevant Key Vault and assign **Key Vault Secret User** role to the service principal created in the previous step. From the Key Vault menu, select **Access policies** and ensure [Azure role-based access control](../articles/key-vault/general/rbac-guide.md) is selected as the permission model.
4343

articles/azure-app-configuration/push-kv-devops-pipeline.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33,11 +33,11 @@ Assign the proper App Configuration role assignments to the credentials being us
3333
1. In the left menu, select **Access control (IAM)**.
3434
1. In the right pane, select **Add role assignments**.
3535

36-
![Screenshot shows the Add role assignments button.](./media/azure-app-configuration-role-assignment/add-role-assignment-button.png)
36+
<kbd>![Screenshot shows the Add role assignments button.](./media/azure-app-configuration-role-assignment/add-role-assignment-button.png)</kbd>
3737
1. For **Role**, select **App Configuration Data Owner**. This role allows the task to read from and write to the App Configuration store.
3838
1. Select the service principal associated with the service connection that you created in the previous section.
3939

40-
![Screenshot shows the Add role assignment dialog.](./media/azure-app-configuration-role-assignment/add-role-assignment-data-owner.png)
40+
<kbd>![Screenshot shows the Add role assignment dialog.](./media/azure-app-configuration-role-assignment/add-role-assignment-data-owner.png)</kbd>
4141

4242
## Use in builds
4343

0 commit comments

Comments
 (0)