Skip to content

Commit 4dba108

Browse files
committed
Fix the warning of broken link
1 parent cd176ad commit 4dba108

File tree

3 files changed

+5
-5
lines changed

3 files changed

+5
-5
lines changed

articles/azure-app-configuration/concept-enable-rbac.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ To enable your application to authenticate with Microsoft Entra ID, the Azure Id
4242

4343
### Use DefaultAzureCredential
4444

45-
The `DefaultAzureCredential` is a preconfigured [chain of token credentials](/dotnet/azure/sdk/authentication/credential-chains.md#defaultazurecredential-overview) that automatically attempts an ordered sequence of the most common authentication methods. Using the `DefaultAzureCredential` allows you to keep the same code in both local development and Azure environments. However, it's important to know which credential is being used in each environment, as you need to grant the appropriate roles for authorization to work. For example, authorize your own account when you expect the `DefaultAzureCredential` to fall back to your user identity during local development. Similarly, enable managed identity in Azure Functions and assign it the necessary role when you expect the `DefaultAzureCredential` to fall back to the `ManagedIdentityCredential` when your Function App runs in Azure.
45+
The `DefaultAzureCredential` is a preconfigured [chain of token credentials](/dotnet/azure/sdk/authentication/credential-chains#defaultazurecredential-overview) that automatically attempts an ordered sequence of the most common authentication methods. Using the `DefaultAzureCredential` allows you to keep the same code in both local development and Azure environments. However, it's important to know which credential is being used in each environment, as you need to grant the appropriate roles for authorization to work. For example, authorize your own account when you expect the `DefaultAzureCredential` to fall back to your user identity during local development. Similarly, enable managed identity in Azure Functions and assign it the necessary role when you expect the `DefaultAzureCredential` to fall back to the `ManagedIdentityCredential` when your Function App runs in Azure.
4646

4747
### Assign App Configuration Data Roles
4848

articles/azure-app-configuration/overview-managed-identity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: azure-app-configuration
99
ms.custom: devx-track-azurecli
1010
---
1111

12-
# How to use managed identities for Azure App Configuration
12+
# Add managed identities for Azure App Configuration
1313

1414
This article shows you how to create a managed identity for Azure App Configuration. A managed identity from Microsoft Entra ID allows Azure App Configuration to easily access other Microsoft Entra protected resources. The identity is managed by the Azure platform. It doesn't require you to provision or rotate any secrets. For more about managed identities in Microsoft Entra ID, see [Managed identities for Azure resources](../active-directory/managed-identities-azure-resources/overview.md).
1515

articles/azure-app-configuration/quickstart-dotnet-core-app.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ You can use the [.NET command-line interface (CLI)](/dotnet/core/tools/) to crea
4343
4444
## Connect to an App Configuration store
4545
46-
You can connect to your App Configuration store using Microsoft Entra ID (recommended), or a connection string
46+
You can connect to your App Configuration store using Microsoft Entra ID (recommended), or a connection string.
4747
4848
1. Add NuGet package references by running the following command:
4949
@@ -85,7 +85,7 @@ You can connect to your App Configuration store using Microsoft Entra ID (recomm
8585
1. Connect to your App Configuration store by calling the `AddAzureAppConfiguration` method in the `Program.cs` file.
8686
8787
### [Microsoft Entra ID](#tab/entra-id)
88-
You can use any token credentials to authenticate to your App Configuration store as appropriate. In this example, you use the `DefaultAzureCredential`. Follow the [instructions](./concept-enable-rbac.md#authentication-with-token-credentials) to assign your credential the **App Configuration Data Reader** role and allow sufficient time for the permission to propagate before running your application.
88+
You use the `DefaultAzureCredential` to authenticate to your App Configuration store. Follow the [instructions](./concept-enable-rbac.md#authentication-with-token-credentials) to assign your credential the **App Configuration Data Reader** role. Be sure to allow sufficient time for the permission to propagate before running your application. You may replace the `DefaultAzureCredential` with another token credential as appropriate.
8989
9090
```csharp
9191
var builder = new ConfigurationBuilder();
@@ -169,7 +169,7 @@ You can connect to your App Configuration store using Microsoft Entra ID (recomm
169169
```
170170
171171
![Quickstart app launch local](./media/quickstarts/dotnet-core-app-run.png)
172-
172+
173173
## Clean up resources
174174
175175
[!INCLUDE [azure-app-configuration-cleanup](../../includes/azure-app-configuration-cleanup.md)]

0 commit comments

Comments
 (0)