Skip to content

Commit 388c4bd

Browse files
committed
edit pass: key-vault-articles
1 parent edc6c59 commit 388c4bd

File tree

1 file changed

+13
-13
lines changed

1 file changed

+13
-13
lines changed

articles/key-vault/quick-create-net.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.custom: mvc
1515

1616
# Quickstart: Set and retrieve a secret from Azure Key Vault by using a .NET web app
1717

18-
In this quickstart, you go over the necessary steps for getting an Azure web application to read information from Azure Key Vault by using managed service identities. You learn how to:
18+
In this quickstart, you follow the necessary steps for getting an Azure web application to read information from Azure Key Vault by using managed service identities. You learn how to:
1919

2020
> [!div class="checklist"]
2121
> * Create a key vault.
@@ -44,24 +44,24 @@ Before we go any further, please read the [basic concepts](key-vault-whatis.md#b
4444
* See [What’s New in Visual Studio for Mac](https://visualstudio.microsoft.com/vs/mac/).
4545

4646
* All platforms:
47-
* Git [download](https://git-scm.com/downloads).
47+
* Git ([download](https://git-scm.com/downloads)).
4848
* An Azure subscription. If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
49-
* [Azure CLI](https://docs.microsoft.com/cli/azure/install-azure-cli?view=azure-cli-latest). You need Azure CLI version 2.0.4 or later. This is available for Windows, Mac, and Linux.
49+
* [Azure CLI](https://docs.microsoft.com/cli/azure/install-azure-cli?view=azure-cli-latest) version 2.0.4 or later. This is available for Windows, Mac, and Linux.
5050

5151
## Log in to Azure
5252

53-
To log in to the Azure by using the Azure CLI, enter:
53+
To log in to Azure by using the Azure CLI, enter:
5454

5555
```azurecli
5656
az login
5757
```
5858

5959
## Create a resource group
6060

61-
Create a resource group with the [az group create](/cli/azure/group#az-group-create) command. An Azure resource group is a logical container into which Azure resources are deployed and managed.
61+
Create a resource group by using the [az group create](/cli/azure/group#az-group-create) command. An Azure resource group is a logical container into which Azure resources are deployed and managed.
6262

6363
Select a resource group name and fill in the placeholder.
64-
The following example creates a resource group in the *East US* location.
64+
The following example creates a resource group in the East US location.
6565

6666
```azurecli
6767
# To list locations: az account list-locations --output table
@@ -74,9 +74,9 @@ The resource group that you just created is used throughout this article.
7474

7575
Next you create a key vault in the resource group that you created in the previous step. Provide the following information:
7676

77-
* Vault name: The key vault name must be a string of 3-24 characters in length and contain only (0-9, a-z, A-Z, and -).
77+
* Key vault name: The name must be a string of 3-24 characters and must contain only (0-9, a-z, A-Z, and -).
7878
* Resource group name.
79-
* The location: **East US**.
79+
* Location: **East US**.
8080

8181
```azurecli
8282
az keyvault create --name "<YourKeyVaultName>" --resource-group "<YourResourceGroupName>" --location "East US"
@@ -86,7 +86,7 @@ At this point, your Azure account is the only one that's authorized to perform a
8686

8787
## Add a secret to the key vault
8888

89-
We're adding a secret to help illustrate how this works. You might be storing a SQL connection string or any other information that you need to keep securely but make available to your application. In this tutorial, the password will be **AppSecret** and will store the value of **MySecret** in it.
89+
We're adding a secret to help illustrate how this works. You might be storing a SQL connection string or any other information that you need to keep securely but make available to your application.
9090

9191
Type the following commands to create a secret in the key vault called **AppSecret**. This secret will store the value **MySecret**.
9292

@@ -100,7 +100,7 @@ To view the value contained in the secret as plain text:
100100
az keyvault secret show --name "AppSecret" --vault-name "<YourKeyVaultName>"
101101
```
102102

103-
This command shows the secret information, including the URI. After you complete these steps, you should have a URI to a secret in an key vault. Make note of this information. You'll need it in a later step.
103+
This command shows the secret information, including the URI. After you complete these steps, you should have a URI to a secret in a key vault. Make note of this information. You'll need it in a later step.
104104

105105
## Clone the repo
106106

@@ -112,7 +112,7 @@ git clone https://github.com/Azure-Samples/key-vault-dotnet-core-quickstart.git
112112

113113
## Open and edit the solution
114114

115-
Edit the program.cs file to run the sample with your specific key vault name.
115+
Edit the program.cs file to run the sample with your specific key vault name:
116116

117117
1. Browse to the folder key-vault-dotnet-core-quickstart.
118118
2. Open the key-vault-dotnet-core-quickstart.sln file in Visual Studio 2017.
@@ -126,12 +126,12 @@ From the main menu of Visual Studio 2017, select **Debug** > **Start** without d
126126

127127
## Publish the web application to Azure
128128

129-
Publish this app to Azure to see it live as a web app, and to see that you fetch the secret value:
129+
Publish this app to Azure to see it live as a web app, and to see that you can fetch the secret value:
130130

131131
1. In Visual Studio, select the **key-vault-dotnet-core-quickstart** project.
132132
2. Select **Publish** > **Start**.
133133
3. Create a new **App Service**, and then select **Publish**.
134-
4. Change the app name to be **keyvaultdotnetcorequickstart**.
134+
4. Change the app name to **keyvaultdotnetcorequickstart**.
135135
5. Select **Create**.
136136

137137
>[!VIDEO https://sec.ch9.ms/ch9/e93d/a6ac417f-2e63-4125-a37a-8f34bf0fe93d/KeyVault_high.mp4]

0 commit comments

Comments
 (0)