Skip to content

Commit 4f1c1bc

Browse files
committed
removed preview
1 parent 189d78c commit 4f1c1bc

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/active-directory/develop/workload-identity-federation-create-trust-gcp.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,14 +9,14 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: how-to
1111
ms.workload: identity
12-
ms.date: 07/18/2022
12+
ms.date: 08/07/2022
1313
ms.author: ryanwi
1414
ms.custom: aaddev
1515
ms.reviewer: udayh
1616
#Customer intent: As an application developer, I want to create a trust relationship with a Google Cloud identity so my service in Google Cloud can access Azure AD protected resources without managing secrets.
1717
---
1818

19-
# Access Azure AD protected resources from an app in Google Cloud (preview)
19+
# Access Azure AD protected resources from an app in Google Cloud
2020

2121
Software workloads running in Google Cloud need an Azure Active Directory (Azure AD) application to authenticate and access Azure AD protected resources. A common practice is to configure that application with credentials (a secret or certificate). The credentials are used by a Google Cloud workload to request an access token from Microsoft identity platform. These credentials pose a security risk and have to be stored securely and rotated regularly. You also run the risk of service downtime if the credentials expire.
2222

0 commit comments

Comments
 (0)