You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/spring-apps/connect-managed-identity-to-azure-sql.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -115,5 +115,5 @@ Rebuild the app and deploy it to the Azure Spring Apps provisioned in the second
115
115
116
116
*[How to access Storage blob with managed identity in Azure Spring Apps](https://github.com/Azure-Samples/azure-spring-apps-samples/tree/main/managed-identity-storage-blob)
117
117
*[How to enable system-assigned managed identity for applications in Azure Spring Apps](./how-to-enable-system-assigned-managed-identity.md)
118
-
*[Learn more about managed identities for Azure resources](../active-directory/managed-identities-azure-resources/overview.md)
118
+
*[What are managed identities for Azure resources?](/entra/identity/managed-identities-azure-resources/overview)
119
119
*[Authenticate Azure Spring Apps with Key Vault in GitHub Actions](./github-actions-key-vault.md)
Copy file name to clipboardExpand all lines: articles/spring-apps/expose-apps-gateway-end-to-end-tls.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -184,9 +184,9 @@ az network public-ip create \
184
184
--sku Standard
185
185
```
186
186
187
-
## Create a Managed Identity for Application Gateway
187
+
## Create a managed identity for Application Gateway
188
188
189
-
Application Gateway will need to be able to access Key Vault to read the certificate. To do so, it will use a User-assigned [Managed Identity](../active-directory/managed-identities-azure-resources/overview.md). Create the Managed Identity by using the following command:
189
+
Application Gateway will need to be able to access Key Vault to read the certificate. To do so, it will use a user-assigned [managed identity](/entra/identity/managed-identities-azure-resources/overview). Create the managed identity by using the following command:
Then fetch the objectId for the Managed Identity as it will be used later on to give rights to access the certificate in Key Vault:
198
+
Then fetch the objectId for the managed identity as it will be used later on to give rights to access the certificate in Key Vault:
199
199
200
200
```azurecli
201
201
export APPGW_IDENTITY_CLIENTID=$(az identity show \
@@ -211,7 +211,7 @@ export APPGW_IDENTITY_OID=$(az ad sp show \
211
211
212
212
## Set policy on Key Vault
213
213
214
-
Configure Key Vault using the following command so that the Managed Identity for Application Gateway is allowed to access the certificate stored in Key Vault:
214
+
Configure Key Vault using the following command so that the managed identity for Application Gateway is allowed to access the certificate stored in Key Vault:
215
215
216
216
```azurecli
217
217
az keyvault set-policy \
@@ -224,7 +224,7 @@ az keyvault set-policy \
224
224
225
225
## Create Application Gateway
226
226
227
-
Create an application gateway using `az network application-gateway create` and specify your application's private fully qualified domain name (FQDN) as servers in the backend pool. Make sure to use the user-assigned Managed Identity and to point to the certificate in Key Vault using the certificate's Secret ID. Then update the HTTP setting using `az network application-gateway http-settings update` to use the public host name.
227
+
Create an application gateway using `az network application-gateway create` and specify your application's private fully qualified domain name (FQDN) as servers in the backend pool. Make sure to use the user-assigned managed identity and to point to the certificate in Key Vault using the certificate's Secret ID. Then update the HTTP setting using `az network application-gateway http-settings update` to use the public host name.
Copy file name to clipboardExpand all lines: articles/spring-apps/expose-apps-gateway-tls-termination.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -105,7 +105,7 @@ az network public-ip create \
105
105
106
106
### Create a managed identity for the application gateway
107
107
108
-
Your application gateway will need to be able to access Key Vault to read the certificate. To do this, the application gateway will use a user-assigned managed identity. For more information, see [What are managed identities for Azure resources?](../active-directory/managed-identities-azure-resources/overview.md). Create the managed identity by using the following command, replacing the *\<...>* placeholder:
108
+
Your application gateway will need to be able to access Key Vault to read the certificate. To do this, the application gateway will use a user-assigned managed identity. For more information, see [What are managed identities for Azure resources?](/entra/identity/managed-identities-azure-resources/overview) Create the managed identity by using the following command, replacing the *\<...>* placeholder:
Copy file name to clipboardExpand all lines: articles/spring-apps/how-to-enable-system-assigned-managed-identity.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,7 @@ Managed identities for Azure resources provide an automatically managed identity
24
24
25
25
## Prerequisites
26
26
27
-
If you're unfamiliar with managed identities for Azure resources, see the [Managed identities for Azure resources overview section](../active-directory/managed-identities-azure-resources/overview.md).
27
+
If you're unfamiliar with managed identities for Azure resources, see [What are managed identities for Azure resources?](/entra/identity/managed-identities-azure-resources/overview)
28
28
29
29
::: zone pivot="sc-enterprise"
30
30
@@ -91,9 +91,9 @@ az spring app identity assign \
91
91
92
92
An app can use its managed identity to get tokens to access other resources protected by Microsoft Entra ID, such as Azure Key Vault. These tokens represent the application accessing the resource, not any specific user of the application.
93
93
94
-
You may need to [configure the target resource to allow access from your application](../active-directory/managed-identities-azure-resources/howto-assign-access-portal.md). For example, if you request a token to access Key Vault, make sure you have added an access policy that includes your application's identity. Otherwise, your calls to Key Vault are rejected, even if they include the token. To learn more about which resources support Microsoft Entra tokens, see [Azure services that support Microsoft Entra authentication](../active-directory/managed-identities-azure-resources/services-support-managed-identities.md#azure-services-that-support-azure-ad-authentication).
94
+
You may need to [configure the target resource to allow access from your application](/entra/identity/managed-identities-azure-resources/howto-assign-access-portal). For example, if you request a token to access Key Vault, make sure you have added an access policy that includes your application's identity. Otherwise, your calls to Key Vault are rejected, even if they include the token. To learn more about which resources support Microsoft Entra tokens, see [Azure services that can use managed identities to access other services](/entra/identity/managed-identities-azure-resources/managed-identities-status).
95
95
96
-
Azure Spring Apps shares the same endpoint for token acquisition with Azure Virtual Machine. We recommend using Java SDK or spring boot starters to acquire a token. See [How to use VM token](../active-directory/managed-identities-azure-resources/how-to-use-vm-token.md) for various code and script examples and guidance on important topics such as handling token expiration and HTTP errors.
96
+
Azure Spring Apps shares the same endpoint for token acquisition with Azure Virtual Machine. We recommend using Java SDK or spring boot starters to acquire a token. See [How to use VM token](/entra/identity/managed-identities-azure-resources/how-to-use-vm-token) for various code and script examples and guidance on important topics such as handling token expiration and HTTP errors.
97
97
98
98
## Disable system-assigned identity from an app
99
99
@@ -135,5 +135,5 @@ az ad sp show --id <object-ID> --query appId
135
135
136
136
## Next steps
137
137
138
-
*[Learn more about managed identities for Azure resources](../active-directory/managed-identities-azure-resources/overview.md)
138
+
*[What are managed identities for Azure resources?](/entra/identity/managed-identities-azure-resources/overview)
139
139
*[How to use managed identities with Java SDK](https://github.com/Azure-Samples/azure-spring-apps-samples)
Copy file name to clipboardExpand all lines: articles/spring-apps/how-to-manage-user-assigned-managed-identities.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,14 +23,14 @@ Managed identities for Azure resources provide an automatically managed identity
23
23
24
24
## Prerequisites
25
25
26
-
- If you're unfamiliar with managed identities for Azure resources, see the [Managed identities for Azure resources overview section](../active-directory/managed-identities-azure-resources/overview.md).
26
+
- If you're unfamiliar with managed identities for Azure resources, see [What are managed identities for Azure resources?](/entra/identity/managed-identities-azure-resources/overview)
27
27
28
28
::: zone pivot="sc-enterprise"
29
29
30
30
- An already provisioned Azure Spring Apps Enterprise plan instance. For more information, see [Quickstart: Build and deploy apps to Azure Spring Apps using the Enterprise plan](quickstart-deploy-apps-enterprise.md).
31
31
-[Azure CLI version 2.45.0 or higher](/cli/azure/install-azure-cli).
- At least one already provisioned user-assigned managed identity. For more information, see [Manage user-assigned managed identities](../active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities.md).
33
+
- At least one already provisioned user-assigned managed identity. For more information, see [Manage user-assigned managed identities](/entra/identity/managed-identities-azure-resources/how-manage-user-assigned-managed-identities).
34
34
35
35
::: zone-end
36
36
@@ -39,7 +39,7 @@ Managed identities for Azure resources provide an automatically managed identity
39
39
- An already provisioned Azure Spring Apps instance. For more information, see [Quickstart: Deploy your first application to Azure Spring Apps](./quickstart.md).
40
40
-[Azure CLI version 2.45.0 or higher](/cli/azure/install-azure-cli).
- At least one already provisioned user-assigned managed identity. For more information, see [Manage user-assigned managed identities](../active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities.md).
42
+
- At least one already provisioned user-assigned managed identity. For more information, see [Manage user-assigned managed identities](/entra/identity/managed-identities-azure-resources/how-manage-user-assigned-managed-identities).
43
43
44
44
::: zone-end
45
45
@@ -87,9 +87,9 @@ az spring app identity assign \
87
87
88
88
An application can use its managed identity to get tokens to access other resources protected by Microsoft Entra ID, such as Azure Key Vault. These tokens represent the application accessing the resource, not any specific user of the application.
89
89
90
-
You may need to configure the target resource to allow access from your application. For more information, see [Assign a managed identity access to a resource by using the Azure portal](../active-directory/managed-identities-azure-resources/howto-assign-access-portal.md). For example, if you request a token to access Key Vault, be sure you've added an access policy that includes your application's identity. Otherwise, your calls to Key Vault are rejected, even if they include the token. To learn more about which resources support Microsoft Entra tokens, see [Azure services that support Microsoft Entra authentication](../active-directory/managed-identities-azure-resources/services-azure-active-directory-support.md)
90
+
You may need to configure the target resource to allow access from your application. For more information, see [Assign a managed identity access to a resource by using the Azure portal](/entra/identity/managed-identities-azure-resources/howto-assign-access-portal). For example, if you request a token to access Key Vault, be sure you've added an access policy that includes your application's identity. Otherwise, your calls to Key Vault are rejected, even if they include the token. To learn more about which resources support Microsoft Entra tokens, see [Azure services that support Microsoft Entra authentication](/entra/identity/managed-identities-azure-resources/services-id-authentication-support)
91
91
92
-
Azure Spring Apps shares the same endpoint for token acquisition with Azure Virtual Machines. We recommend using Java SDK or Spring Boot starters to acquire a token. For various code and script examples, and guidance on important topics such as handling token expiration and HTTP errors, see [How to use managed identities for Azure resources on an Azure VM to acquire an access token](../active-directory/managed-identities-azure-resources/how-to-use-vm-token.md).
92
+
Azure Spring Apps shares the same endpoint for token acquisition with Azure Virtual Machines. We recommend using Java SDK or Spring Boot starters to acquire a token. For various code and script examples, and guidance on important topics such as handling token expiration and HTTP errors, see [How to use managed identities for Azure resources on an Azure VM to acquire an access token](/entra/identity/managed-identities-azure-resources/how-to-use-vm-token).
93
93
94
94
## Remove user-assigned managed identities from an existing app
95
95
@@ -123,5 +123,5 @@ For user-assigned managed identity limitations, see [Quotas and service plans fo
123
123
124
124
## Next steps
125
125
126
-
-[Learn more about managed identities for Azure resources](../active-directory/managed-identities-azure-resources/overview.md)
126
+
-[What are managed identities for Azure resources?](/entra/identity/managed-identities-azure-resources/overview)
127
127
-[How to use managed identities with Java SDK](https://github.com/Azure-Samples/azure-spring-apps-samples)
Copy file name to clipboardExpand all lines: articles/spring-apps/how-to-set-up-sso-with-azure-ad.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -53,7 +53,7 @@ Register your application to establish a trust relationship between your app and
53
53
1. In *Redirect URI (optional)* select **Web**, then enter the URL from the above section in the text box. The redirect URI is the location where Microsoft Entra ID redirects your client and sends security tokens after authentication.
54
54
1. Select **Register** to finish registering the application.
55
55
56
-
:::image type="content" source="./media/how-to-setup-sso-with-azure-ad/sso-create-app-registration.png" alt-text="Screenshot of how to fill out the Add App Registration screen." lightbox="./media/how-to-setup-sso-with-azure-ad/sso-create-app-registration.png":::
56
+
:::image type="content" source="media/how-to-set-up-sso-with-azure-ad/sso-create-app-registration.png" alt-text="Screenshot of how to fill out the Add App Registration screen." lightbox="media/how-to-set-up-sso-with-azure-ad/sso-create-app-registration.png":::
57
57
58
58
When registration finishes, you'll see the *Application (client) ID* on the **Overview** screen of the *App registrations** page.
59
59
@@ -65,9 +65,9 @@ You can also add redirect URIs after app registration by following these steps:
65
65
1. Select **Web**, then select **Add URI** under *Redirect URIs*.
66
66
1. Add a new redirect URI, then select **Save**.
67
67
68
-
:::image type="content" source="./media/how-to-setup-sso-with-azure-ad/sso-redirect-uri.png" alt-text="Screenshot of adding a redirect U R I to the authentication screen." lightbox="./media/how-to-setup-sso-with-azure-ad/sso-redirect-uri.png":::
68
+
:::image type="content" source="media/how-to-set-up-sso-with-azure-ad/sso-redirect-uri.png" alt-text="Screenshot of adding a redirect U R I to the authentication screen." lightbox="media/how-to-set-up-sso-with-azure-ad/sso-redirect-uri.png":::
69
69
70
-
For more information on Application Registration, see [Quickstart: Register an app in the Microsoft identity platform](../active-directory/develop/quickstart-register-app.md#quickstart-register-an-application-with-the-microsoft-identity-platform).
70
+
For more information on Application Registration, see [Quickstart: Register an application with the Microsoft identity platform](/entra/identity-platform/quickstart-register-app).
71
71
72
72
## Add a client secret
73
73
@@ -83,7 +83,7 @@ The application uses a client secret to authenticate itself in SSO workflow. You
83
83
84
84
## Configure scope
85
85
86
-
The `scope` property of SSO is a list of scopes to be included in JWT identity tokens. They're often referred to permissions. Identity platform supports several [OpenID Connect scopes](../active-directory/develop/v2-permissions-and-consent.md#openid-connect-scopes), such as `openid`, `email` and `profile`.
86
+
The `scope` property of SSO is a list of scopes to be included in JWT identity tokens. They're often referred to permissions. Identity platform supports several OpenID Connect scopes, such as `openid`, `email` and `profile`. For more information, see the [OpenID Connect scopes](/entra/identity-platform/scopes-oidc#openid-connect-scopes) section of [Scopes and permissions in the Microsoft identity platform](/entra/identity-platform/scopes-oidc).
Copy file name to clipboardExpand all lines: articles/spring-apps/how-to-use-managed-identities.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,7 +38,7 @@ For user-assigned managed identities, see [How to assign and remove user-assigne
38
38
39
39
An application can use its managed identity to get tokens to access other resources protected by Microsoft Entra ID, such as Azure Key Vault. These tokens represent the application accessing the resource, not any specific user of the application.
40
40
41
-
You can configure the target resource to allow access from your application. For more information, see [Assign a managed identity access to a resource by using the Azure portal](/entra/identity/managed-identities-azure-resources/howto-assign-access-portal). For example, if you request a token to access Key Vault, be sure you have added an access policy that includes your application's identity. Otherwise, your calls to Key Vault will be rejected, even if they include the token. To learn more about which resources support Microsoft Entra tokens, see [Azure services that support Microsoft Entra authentication](/entra/identity/managed-identities-azure-resources/services-id-authentication-support.
41
+
You can configure the target resource to allow access from your application. For more information, see [Assign a managed identity access to a resource by using the Azure portal](/entra/identity/managed-identities-azure-resources/howto-assign-access-portal). For example, if you request a token to access Key Vault, be sure you have added an access policy that includes your application's identity. Otherwise, your calls to Key Vault will be rejected, even if they include the token. To learn more about which resources support Microsoft Entra tokens, see [Azure services that support Microsoft Entra authentication](/entra/identity/managed-identities-azure-resources/services-id-authentication-support).
42
42
43
43
Azure Spring Apps shares the same endpoint for token acquisition with Azure Virtual Machines. We recommend using Java SDK or Spring Boot starters to acquire a token. For various code and script examples, as well as guidance on important topics like handling token expiration and HTTP errors, see [How to use managed identities for Azure resources on an Azure VM to acquire an access token](/entra/identity/managed-identities-azure-resources/how-to-use-vm-token).
44
44
@@ -75,5 +75,5 @@ The following table shows the mappings between concepts in Managed Identity scop
75
75
76
76
## Next steps
77
77
78
-
-[Learn more about managed identities for Azure resources](/entra/identity/managed-identities-azure-resources/overview)
78
+
-[What are managed identities for Azure resources?](/entra/identity/managed-identities-azure-resources/overview)
79
79
-[How to use managed identities with Java SDK](https://github.com/Azure-Samples/azure-spring-apps-samples)
0 commit comments