Skip to content

Commit 4989ca7

Browse files
author
unknown
committed
Minor updates
1 parent 2f69ab0 commit 4989ca7

File tree

2 files changed

+4
-2
lines changed

2 files changed

+4
-2
lines changed

articles/azure-app-configuration/pull-key-value-devops-pipeline.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,13 +31,14 @@ Assign the proper App Configuration role assignments to the credentials being us
3131

3232
1. Go to your target App Configuration store.
3333
1. In the left menu, select **Access control (IAM)**.
34-
1. In the right pane, select **Add role assignments**.
34+
1. In the right pane, select **Add role assignment**.
3535

3636
:::image type="content" border="true" source="./media/azure-app-configuration-role-assignment/add-role-assignment-button.png" alt-text="Screenshot shows the Add role assignments button.":::
3737
1. For **Role**, select **App Configuration Data Reader**. This role allows the task to read from the App Configuration store.
3838
1. Select the service principal associated with the service connection that you created in the previous section.
3939

4040
:::image type="content" border="true" source="./media/azure-app-configuration-role-assignment/add-role-assignment-data-reader.png" alt-text="Screenshot shows the Add role assignment dialog.":::
41+
1. Select **Review + assign**.
4142
1. If the store contains Key Vault references, go to relevant Key Vault and assign **Key Vault Secret User** role to the service principal created in the previous step. From the Key Vault menu, select **Access policies** and ensure [Azure role-based access control](../key-vault/general/rbac-guide.md) is selected as the permission model.
4243

4344
## Use in builds

articles/azure-app-configuration/push-kv-devops-pipeline.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,13 +31,14 @@ Assign the proper App Configuration role assignments to the credentials being us
3131

3232
1. Go to your target App Configuration store.
3333
1. In the left menu, select **Access control (IAM)**.
34-
1. In the right pane, select **Add role assignments**.
34+
1. In the right pane, select **Add role assignment**.
3535

3636
:::image type="content" border="true" source="./media/azure-app-configuration-role-assignment/add-role-assignment-button.png" alt-text="Screenshot shows the Add role assignments button.":::
3737
1. For **Role**, select **App Configuration Data Owner**. This role allows the task to read from and write to the App Configuration store.
3838
1. Select the service principal associated with the service connection that you created in the previous section.
3939

4040
:::image type="content" border="true" source="./media/azure-app-configuration-role-assignment/add-role-assignment-data-owner.png" alt-text="Screenshot shows the Add role assignment dialog.":::
41+
1. Select **Review + assign**.
4142

4243
## Use in builds
4344

0 commit comments

Comments
 (0)