Skip to content

Commit 4e30ebb

Browse files
committed
edits
1 parent 4793751 commit 4e30ebb

File tree

4 files changed

+10
-13
lines changed

4 files changed

+10
-13
lines changed

articles/app-service/configure-basic-auth-disable.md

Lines changed: 10 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -45,15 +45,15 @@ For other deployment methods that use basic authentication, such as Visual Studi
4545

4646
### [Azure CLI](#tab/cli)
4747

48-
Run the following Azure CLI commands, replacing the placeholders with your resource group name and app name.
48+
Run the following Azure CLI commands in the Bash environment of Azure Cloud Shell by selecting **Open Cloud Shell** at the upper right of the code block.
4949

50-
To disable FTP basic authentication access, run the following command. You must have owner-level access to the app.
50+
To disable FTP basic authentication access, run the following command, replacing the placeholders with your app's resource group and name. You must have owner-level access to the app.
5151

5252
```azurecli-interactive
5353
az resource update --resource-group <group-name> --name ftp --namespace Microsoft.Web --resource-type basicPublishingCredentialsPolicies --parent sites/<app-name> --set properties.allow=false
5454
```
5555

56-
To disable basic authentication access for the Web Deploy port and Git deploy `https://\<app-name>.scm.azurewebsites.net`, run the following command.
56+
To disable basic authentication access for the Web Deploy port and Git deploy `https://\<app-name>.scm.azurewebsites.net`, run the following command. Replace the placeholders with your app's resource group and name.
5757

5858
```azurecli-interactive
5959
az resource update --resource-group <resource-group> --name scm --namespace Microsoft.Web --resource-type basicPublishingCredentialsPolicies --parent sites/<app-name> --set properties.allow=false
@@ -78,7 +78,7 @@ The following table shows how various deployment methods behave when basic authe
7878
| [Local Git](deploy-local-git.md) | Doesn't work. |
7979
| Azure CLI| In Azure CLI 2.48.1 or higher, the following commands fall back to Microsoft Entra authentication:<br/>[`az webapp up`](/cli/azure/webapp#az-webapp-up).<br/>[`az webapp deploy`](/cli/azure/webapp#az-webapp-deploy).<br/>[`az webapp log deployment show`](/cli/azure/webapp/log/deployment#az-webapp-log-deployment-show).<br/>[`az webapp log deployment list`](/cli/azure/webapp/log/deployment#az-webapp-log-deployment-list).<br/>[`az webapp log download`](/cli/azure/webapp/log#az-webapp-log-download).<br/>[`az webapp log tail`](/cli/azure/webapp/log#az-webapp-log-tail).<br/>[`az webapp browse`](/cli/azure/webapp#az-webapp-browse).<br/>[`az webapp create-remote-connection`](/cli/azure/webapp#az-webapp-create-remote-connection).<br/>[`az webapp ssh`](/cli/azure/webapp#az-webapp-ssh).<br/>[`az functionapp deploy`](/cli/azure/functionapp#az-functionapp-deploy).<br/>[`az functionapp log deployment list`](/cli/azure/functionapp/log/deployment#az-functionapp-log-deployment-list).<br/>[`az functionapp log deployment show`](/cli/azure/functionapp/log/deployment#az-functionapp-log-deployment-show).<br/>[`az functionapp deployment source config-zip`](/cli/azure/functionapp/deployment/source#az-functionapp-deployment-source-config-zip).|
8080
| [Maven plugin](https://github.com/microsoft/azure-maven-plugins) or [Gradle plugin](https://github.com/microsoft/azure-gradle-plugins) | Works. |
81-
| [GitHub Actions](deploy-continuous-deployment.md?tabs=github) | Existing GitHub Actions workflows that use basic authentication can't authenticate. In the portal **Deployment Center**, disconnect the existing GitHub configuration and create a new GitHub Actions configuration that uses user-assigned identity. <br/> If the existing GitHub Actions deployment is [manually configured](deploy-github-actions.md), try using a service principal or OpenID Connect instead. <br/> For new GitHub Actions workflows, use the **User-assigned identity** option. |
81+
| [GitHub Actions](deploy-continuous-deployment.md?tabs=github) | Existing GitHub Actions workflows that use basic authentication don't work. Disconnect the existing GitHub configuration and create a new GitHub Actions configuration that uses user-assigned identity. <br/> If the existing GitHub Actions deployment is [manually configured](deploy-github-actions.md), try using a service principal or OpenID Connect instead. <br/> For new GitHub Actions workflows, use the **User-assigned identity** option. |
8282
| [GitHub with the App Service build service](deploy-continuous-deployment.md?tabs=github) | Doesn't work. |
8383
| Deployment from the portal [creation wizard](https://portal.azure.com/#create/Microsoft.WebSite) | If you select a **Continuous deployment** source when **Basic authentication** is set to **Disable**, GitHub Actions is configured with the **user-assigned identity** option (OpenID Connect). |
8484
| [Bitbucket](deploy-continuous-deployment.md?tabs=bitbucket) | Doesn't work. |
@@ -89,7 +89,7 @@ The following table shows how various deployment methods behave when basic authe
8989

9090
### Visual Studio basic authentication disabled warning
9191

92-
Visual Studio requires basic authentication to deploy to Azure App Service. If you disable basic authentication, the warning reminds you that your app configuration changed and you can no longer deploy to it. Either you disabled basic authentication on the app yourself, or your organization policy disabled basic authentication for App Service apps.
92+
Visual Studio requires basic authentication to deploy to Azure App Service. If you disable basic authentication, a Visual Studio warning reminds you that your app configuration changed and you can no longer deploy to your app. Either you disabled basic authentication on the app yourself, or your organization policy disabled basic authentication for App Service apps.
9393

9494
## Create a custom role to prevent enabling basic authentication
9595

@@ -104,12 +104,11 @@ To prevent lower-privileged users from enabling basic authentication for any app
104104
1. Search and select **Microsoft Web Apps**.
105105
1. Search for and expand **microsoft.web/sites/basicPublishingCredentialsPolicies**.
106106
1. Select the box for **Write**, and then select **Add**. This step adds the operation to **NotActions** for the role.
107-
108-
:::image type="content" source="media/configure-basic-auth-disable/custom-role-no-basic-auth.png" alt-text="Screenshot that shows excluding Write for basicPublishingCredentialsPolicies.":::
109-
107+
1. Select **Exclude permissions** again.
108+
1. Search for and expand **microsoft.web/sites/slots/basicPublishingCredentialsPolicies**, select the **Write** box, and then select **Add**.
110109
1. Your **Permissions** tab should look like the following screenshot. Select **Review + create**, and then select **Create**.
111110

112-
:::image type="content" source="media/configure-basic-auth-disable/create-role.png" alt-text="Screenshot that shows the creation of a custom role with all basic authentication permissions excluded.":::
111+
:::image type="content" source="media/configure-basic-auth-disable/custom-role-no-basic-auth.png" alt-text="Screenshot that shows excluding Write for basicPublishingCredentialsPolicies.":::
113112

114113
You can now assign this role to your organization's users. For more information, see [Create or update Azure custom roles by using the Azure portal](/azure/role-based-access-control/custom-roles-portal#step-2-choose-how-to-start).
115114

@@ -123,10 +122,8 @@ az role definition create --role-definition '{
123122
"IsCustom": true,
124123
"Description": "Prevents users from enabling basic authentication for all App Service apps or slots.",
125124
"NotActions": [
126-
"Microsoft.Web/sites/basicPublishingCredentialsPolicies/ftp/Write",
127-
"Microsoft.Web/sites/basicPublishingCredentialsPolicies/scm/Write",
128-
"Microsoft.Web/sites/slots/basicPublishingCredentialsPolicies/ftp/Write",
129-
"Microsoft.Web/sites/slots/basicPublishingCredentialsPolicies/scm/Write"
125+
"Microsoft.Web/sites/basicPublishingCredentialsPolicies/Write"
126+
"Microsoft.Web/sites/slots/basicPublishingCredentialsPolicies/Write"
130127
],
131128
"AssignableScopes": ["/subscriptions/<subscription-guid>"]
132129
}'
266 Bytes
Loading
Binary file not shown.
26 KB
Loading

0 commit comments

Comments
 (0)