Skip to content

Commit 363ce79

Browse files
committed
revert changes to articles not related with dataflows
1 parent 92c13eb commit 363ce79

File tree

3 files changed

+11
-11
lines changed

3 files changed

+11
-11
lines changed

articles/iot-operations/deploy-iot-ops/howto-deploy-iot-operations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -178,7 +178,7 @@ Use these steps if you chose the **Secure settings** option on the **Dependency
178178
| Parameter | Value |
179179
| --------- | ----- |
180180
| **Subscription** | Select the subscription that contains your Azure key vault. |
181-
| **Azure Key Vault** | Select an Azure key vault select **Create new**.<br><br>Ensure that your key vault has **Azure role-based access control** as its permission model. To check this setting, select **Manage selected vault** > **Settings** > **Access configuration**.<br><br>Ensure to [give your user account permissions to manage secrets](/azure/key-vault/secrets/quick-create-cli#give-your-user-account-permissions-to-manage-secrets-in-key-vault) with the `Key Vault Secrets Officer` role. |
181+
| **Azure Key Vault** | Select an Azure key vault select **Create new**.<br><br>Ensure that your key vault has **Azure role-based access control** as its permission model. To check this setting, select **Manage selected vault** > **Settings** > **Access configuration**. |
182182
| **User assigned managed identity for secrets** | Select an identity or select **Create new**. |
183183
| **User assigned managed identity for AIO components** | Select an identity or select **Create new**. Don't use the same managed identity as the one you selected for secrets. |
184184

articles/iot-operations/deploy-iot-ops/howto-enable-secure-settings.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -100,7 +100,7 @@ Secrets management for Azure IoT Operations uses the Secret Store extension to s
100100

101101
To set up secrets management:
102102

103-
1. [Create an Azure key vault](/azure/key-vault/secrets/quick-create-cli#create-a-key-vault) that's used to store secrets, and [give your user account permissions to manage secrets](/azure/key-vault/secrets/quick-create-cli#give-your-user-account-permissions-to-manage-secrets-in-key-vault) with the `Key Vault Secrets Officer` role.
103+
1. [Create an Azure key vault](/azure/key-vault/secrets/quick-create-cli#create-a-key-vault) that's used to store secrets, and [give your user account permissions to manage secrets](/azure/key-vault/secrets/quick-create-cli#give-your-user-account-permissions-to-manage-secrets-in-key-vault) with the `Key Vaults Secrets Officer` role.
104104
1. [Create a user-assigned managed identity](/entra/identity/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-azp#create-a-user-assigned-managed-identity) for the Secret Store extension.
105105
1. Use the [az iot ops secretsync enable](/cli/azure/iot/ops/secretsync#az-iot-ops-secretsync-enable) command to set up the Azure IoT Operations instance for secret synchronization. This command:
106106

@@ -112,7 +112,7 @@ To set up secrets management:
112112

113113
```azurecli
114114
# Variable block
115-
AIO_INSTANCE_NAME="<AIO_INSTANCE_NAME>"
115+
INSTANCE_NAME="<INSTANCE_NAME>"
116116
RESOURCE_GROUP="<RESOURCE_GROUP>"
117117
USER_ASSIGNED_MI_NAME="<USER_ASSIGNED_MI_NAME>"
118118
KEYVAULT_NAME="<KEYVAULT_NAME>"
@@ -124,7 +124,7 @@ To set up secrets management:
124124
KEYVAULT_RESOURCE_ID=$(az keyvault show --name $KEYVAULT_NAME --resource-group $RESOURCE_GROUP --query id --output tsv)
125125
126126
#Enable secret synchronization
127-
az iot ops secretsync enable --instance $AIO_INSTANCE_NAME \
127+
az iot ops secretsync enable --name $INSTANCE_NAME \
128128
--resource-group $RESOURCE_GROUP \
129129
--mi-user-assigned $USER_ASSIGNED_MI_RESOURCE_ID \
130130
--kv-resource-id $KEYVAULT_RESOURCE_ID
@@ -134,7 +134,7 @@ To set up secrets management:
134134
135135
```azurecli
136136
# Variable block
137-
AIO_INSTANCE_NAME="<AIO_INSTANCE_NAME>"
137+
INSTANCE_NAME="<INSTANCE_NAME>"
138138
$RESOURCE_GROUP="<RESOURCE_GROUP>"
139139
$USER_ASSIGNED_MI_NAME="<USER_ASSIGNED_MI_NAME>"
140140
$KEYVAULT_NAME="<KEYVAULT_NAME>"
@@ -146,7 +146,7 @@ To set up secrets management:
146146
$KEYVAULT_RESOURCE_ID=$(az keyvault show --name $KEYVAULT_NAME --resource-group $RESOURCE_GROUP --query id --output tsv)
147147
148148
# Enable secret synchronization
149-
az iot ops secretsync enable --instance $AIO_INSTANCE_NAME `
149+
az iot ops secretsync enable --name $INSTANCE_NAME `
150150
--resource-group $RESOURCE_GROUP `
151151
--mi-user-assigned $USER_ASSIGNED_MI_RESOURCE_ID `
152152
--kv-resource-id $KEYVAULT_RESOURCE_ID
@@ -171,15 +171,15 @@ Some Azure IoT Operations components, like dataflow endpoints, use a user-assign
171171
172172
```azurecli
173173
# Variable block
174-
AIO_INSTANCE_NAME="<AIO_INSTANCE_NAME>"
174+
INSTANCE_NAME="<INSTANCE_NAME>"
175175
RESOURCE_GROUP="<RESOURCE_GROUP>"
176176
USER_ASSIGNED_MI_NAME="<USER_ASSIGNED_MI_NAME FOR CLOUD CONNECTIONS>"
177177
178178
#Get the resource ID of the user-assigned managed identity
179179
USER_ASSIGNED_MI_RESOURCE_ID=$(az identity show --name $USER_ASSIGNED_MI_NAME --resource-group $RESOURCE_GROUP --query id --output tsv)
180180
181181
#Assign the identity to the Azure IoT Operations instance
182-
az iot ops identity assign --name $AIO_INSTANCE_NAME \
182+
az iot ops identity assign --name $INSTANCE_NAME \
183183
--resource-group $RESOURCE_GROUP \
184184
--mi-user-assigned $USER_ASSIGNED_MI_RESOURCE_ID
185185
```
@@ -188,7 +188,7 @@ Some Azure IoT Operations components, like dataflow endpoints, use a user-assign
188188
189189
```azurecli
190190
# Variable block
191-
$AIO_INSTANCE_NAME="<AIO_INSTANCE_NAME>"
191+
$INSTANCE_NAME="<INSTANCE_NAME>"
192192
$RESOURCE_GROUP="<RESOURCE_GROUP>"
193193
$USER_ASSIGNED_MI_NAME="<USER_ASSIGNED_MI_NAME FOR CLOUD CONNECTIONS>"
194194
@@ -197,7 +197,7 @@ Some Azure IoT Operations components, like dataflow endpoints, use a user-assign
197197
198198
199199
# Assign the identity to the Azure IoT Operations instance
200-
az iot ops identity assign --name $AIO_INSTANCE_NAME `
200+
az iot ops identity assign --name $INSTANCE_NAME `
201201
--resource-group $RESOURCE_GROUP `
202202
--mi-user-assigned $USER_ASSIGNED_MI_RESOURCE_ID
203203
```

articles/iot-operations/secure-iot-ops/howto-manage-secrets.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Secrets management for Azure IoT Operations uses Secret Store extension to sync
2626
> [!NOTE]
2727
> Azure IoT Operations instances work with only one Azure Key Vault, multiple key vaults per instance isn't supported.
2828
29-
Once the [set up secrets management](../deploy-iot-ops/howto-enable-secure-settings.md#set-up-secrets-management) steps are completed, you can start adding secrets to Azure Key Vault, and sync them to the edge to be used in **Asset Endpoints** or **Dataflow Endpoints** using the [operations experience](https://iotoperations.azure.com) web UI.
29+
Once the setup secrets management steps are completed, you can start adding secrets to Azure Key Vault, and sync them to the edge to be used in **Asset Endpoints** or **Dataflow Endpoints** using the [operations experience](https://iotoperations.azure.com) web UI.
3030

3131
Secrets are used in asset endpoints and dataflow endpoints for authentication. In this section, we use asset endpoints as an example, the same can be applied to dataflow endpoints. You have the option to directly create the secret in Azure Key Vault and have it automatically synchronized down to the edge, or use an existing secret reference from the key vault:
3232

0 commit comments

Comments
 (0)