You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-app-configuration/quickstart-bicep.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
26
26
27
27
## Authorization
28
28
29
-
Managing Azure App Configuration resource inside a Bicep file requires Azure Resource Manager role, such as contributor or owner. Accessing Azure App Configuration data (key-values, snapshots) requires Azure Resource Manager role and Azure App Configuration [data plane role](concept-enable-rbac.md)under[pass-through](./quickstart-deployment-overview.md#arm-authentication-mode) ARM authentication mode.
29
+
Managing an Azure App Configuration resource with Bicep file requires an Azure Resource Manager role, such as contributor or owner. Accessing Azure App Configuration data (key-values, snapshots) requires an Azure Resource Manager role and addtional an Azure App Configuration [data plane role](concept-enable-rbac.md)when the configuration store's ARM authentication mode is set to[pass-through](./quickstart-deployment-overview.md#arm-authentication-mode) ARM authentication mode.
Azure App Configuration supports following methods to read and manage your configuration for deployment:
15
+
Azure App Configuration supports the following methods to read and manage your configuration for deployment:
16
16
17
17
-[ARM template](./quickstart-resource-manager.md)
18
18
-[Bicep](./quickstart-bicep.md)
@@ -31,20 +31,20 @@ To learn more about Azure RBAC and Microsoft Entra ID, see [Authorize access to
31
31
32
32
## Manage Azure App Configuration data in deployment
33
33
34
-
Azure App Configuration data, such as key-values and snapshots, can be managed in deployment. It is recommended to configure **Pass-through** ARM authentication mode to require proper Azure App Configuration data plane authorization.
34
+
Azure App Configuration data, such as key-values and snapshots, can be managed in deployment. When managing App Configuration data using this method, it is recommended to set configuration store's ARM authentication mode to **Pass-through**. This ensures that data access requires a combination of data plane and ARM management roles as well as ensuring that data access can be properly attributed to the deployment caller for audit purpose.
35
35
36
36
### ARM authentication mode
37
37
38
38
# [Azure portal](#tab/portal)
39
39
40
-
To configure ARM authentication mode of Azure App Configuration resource in the Azure portal, follow these steps:
40
+
To configure the ARM authentication mode of an Azure App Configuration resource in the Azure portal, follow these steps:
41
41
42
-
1. Navigate to your Azure App Configuration resource in the Azure portal.
43
-
2. Locate the **Access settings** setting under **Settings**.
42
+
1. Navigate to your Azure App Configuration resource in the Azure portal
43
+
2. Locate the **Access settings** setting under **Settings**
44
44
45
45
:::image type="content" border="true" source="./media/access-settings-blade.png" alt-text="Screenshot showing how to access an Azure App Configuration resources access settings blade":::
46
46
47
-
3. Select the recommended **Pass-through** authentication mode under **Azure Resource Manager Authentication Mode**.
47
+
3. Select the recommended **Pass-through** authentication mode under **Azure Resource Manager Authentication Mode**
48
48
49
49
:::image type="content" border="true" source="./media/quickstarts/deployment/select-passthrough-authentication-mode.png" alt-text="Screenshot showing pass-through authentication mode being selected under Azure Resource Manager Authentication Mode":::
50
50
@@ -55,36 +55,43 @@ To configure ARM authentication mode of Azure App Configuration resource in the
55
55
56
56
### Azure App Configuration Authorization
57
57
58
-
In addition to the permissions required for managing Azure App Configuration resource, you must have Azure App Configuration data plane permissions to read and manage Azure App Configuration data in deployment under pass-through mode. Azure App Configuration data plane permissions include Microsoft.AppConfiguration/configurationStores/keyValues/read and Microsoft.AppConfiguration/configurationStores/snapshots/read. Built-in roles with this action include:
58
+
When your App Configuration resource has its ARM authentication mode set to **Pass-through**, you must have Azure App Configuration data plane permissions to read and manage Azure App Configuration data in deployment. This is in addition to baseline management permission requirements of the resource. Azure App Configuration data plane permissions include Microsoft.AppConfiguration/configurationStores/keyValues/read and Microsoft.AppConfiguration/configurationStores/snapshots/read. Built-in roles with this action include:
59
59
60
60
- App Configuration Data Owner
61
61
- App Configuration Data Reader
62
62
63
63
To learn more about Azure RBAC and Microsoft Entra ID, see [Authorize access to Azure App Configuration using Microsoft Entra ID](./concept-enable-rbac.md).
64
64
65
-
### ARM private access
65
+
### Private network access
66
66
67
-
[Azure Resource Management Private Link](../azure-resource-manager/management/create-private-link-access-portal.md) can be set up to restrict access for managing resources in your virtual network. Azure App Configuration supports ARM Private Link access to the App Configuration data under pass-through authentication mode and ARM private access enabled.
67
+
When an App Configuration resource is restricted to private network access, deployments accessing App Configuration data through public networks will be blocked. To enable successful deployments when access to an App Configuration resource is restricted to private networks the following actions must be taken:
68
+
69
+
-[Azure Resource Management Private Link](../azure-resource-manager/management/create-private-link-access-portal.md) must be set up
70
+
- The App Configuration resource must have its ARM authentication mode set to **Pass-through**
71
+
- The App Configuration resource must have its ARM private access enabled
72
+
- Deployments accessing App Configuration data must run through the configured ARM private link
73
+
74
+
If all of these criteria are met, then deployments accessing App Configuration data will be successful.
68
75
69
76
# [Azure portal](#tab/portal)
70
77
71
-
To configure ARM private access of Azure App Configuration resource in the Azure portal, follow these steps:
78
+
To enable the ARM private access of an Azure App Configuration resource in the Azure portal, follow these steps:
72
79
73
-
1. Navigate to your Azure App Configuration resource in the Azure portal.
74
-
2. Locate the **Networking** setting under **Settings**.
80
+
1. Navigate to your Azure App Configuration resource in the Azure portal
81
+
2. Locate the **Networking** setting under **Settings**
75
82
76
83
:::image type="content" border="true" source="./media/networking-blade.png" alt-text="Screenshot showing how to access an Azure App Configuration resources networking blade":::
0 commit comments