Skip to content

Commit 5b13d7b

Browse files
author
Tijoy Tom
committed
Updating the CSS doc to include a note about using windows auth for CSS enabled clusters
1 parent 32f01de commit 5b13d7b

File tree

1 file changed

+3
-67
lines changed

1 file changed

+3
-67
lines changed

articles/service-fabric/service-fabric-application-secret-store.md

Lines changed: 3 additions & 67 deletions
Original file line numberDiff line numberDiff line change
@@ -43,31 +43,9 @@ Add the following script to your cluster configuration under `fabricSettings` to
4343
]
4444
```
4545
## Declare a secret resource
46-
You can create a secret resource by using either the Azure Resource Manager template or the REST API.
47-
48-
### Use Resource Manager
49-
50-
Use the following template to use Resource Manager to create the secret resource. The template creates a `supersecret` secret resource, but no value is set for the secret resource yet.
51-
52-
53-
```json
54-
"resources": [
55-
{
56-
"apiVersion": "2018-07-01-preview",
57-
"name": "supersecret",
58-
"type": "Microsoft.ServiceFabricMesh/secrets",
59-
"location": "[parameters('location')]",
60-
"dependsOn": [],
61-
"properties": {
62-
"kind": "inlinedValue",
63-
"description": "Application Secret",
64-
"contentType": "text/plain",
65-
}
66-
}
67-
]
68-
```
69-
70-
### Use the REST API
46+
You can create a secret resource by using the REST API.
47+
> [!NOTE]
48+
> If the cluster is using windows authentication, the REST request is sent over unsecured HTTP channel. The recommendation is to use a X509 based cluster with secure endpoints.
7149
7250
To create a `supersecret` secret resource by using the REST API, make a PUT request to `https://<clusterfqdn>:19080/Resources/Secrets/supersecret?api-version=6.4-preview`. You need the cluster certificate or admin client certificate to create a secret resource.
7351

@@ -77,48 +55,6 @@ Invoke-WebRequest -Uri https://<clusterfqdn>:19080/Resources/Secrets/supersecre
7755

7856
## Set the secret value
7957

80-
### Use the Resource Manager template
81-
82-
Use the following Resource Manager template to create and set the secret value. This template sets the secret value for the `supersecret` secret resource as version `ver1`.
83-
```json
84-
{
85-
"parameters": {
86-
"supersecret": {
87-
"type": "string",
88-
"metadata": {
89-
"description": "supersecret value"
90-
}
91-
}
92-
},
93-
"resources": [
94-
{
95-
"apiVersion": "2018-07-01-preview",
96-
"name": "supersecret",
97-
"type": "Microsoft.ServiceFabricMesh/secrets",
98-
"location": "[parameters('location')]",
99-
"dependsOn": [],
100-
"properties": {
101-
"kind": "inlinedValue",
102-
"description": "Application Secret",
103-
"contentType": "text/plain",
104-
}
105-
},
106-
{
107-
"apiVersion": "2018-07-01-preview",
108-
"name": "supersecret/ver1",
109-
"type": "Microsoft.ServiceFabricMesh/secrets/values",
110-
"location": "[parameters('location')]",
111-
"dependsOn": [
112-
"Microsoft.ServiceFabricMesh/secrets/supersecret"
113-
],
114-
"properties": {
115-
"value": "[parameters('supersecret')]"
116-
}
117-
}
118-
],
119-
```
120-
### Use the REST API
121-
12258
Use the following script to use the REST API to set the secret value.
12359
```powershell
12460
$Params = @{"properties": {"value": "mysecretpassword"}}

0 commit comments

Comments
 (0)