Skip to content

Commit 5df736b

Browse files
committed
merging steps secure settings and manage secrets
1 parent 14b26b4 commit 5df736b

File tree

2 files changed

+8
-8
lines changed

2 files changed

+8
-8
lines changed

articles/iot-operations/deploy-iot-ops/howto-enable-secure-settings.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,13 +14,13 @@ ms.date: 09/17/2024
1414

1515
[!INCLUDE [public-preview-note](../includes/public-preview-note.md)]
1616

17-
The secure settings for Azure IoT Operations include secret management and user-assigned managed identity. These settings are recommended for production use.
17+
The secure settings for Azure IoT Operations includes the setup of secrets management and a user-assigned managed identity for components that connect to a resource outside of the cluster, for example, an OPC UA server, or a dataflow source or destination endpoint.
1818

19-
The end-to-end sample articles skip the secure settings configuration and instead deploy Azure IoT Operations with only test settings. The test settings are easier and quicker to get you started with a deployment, but after your initial deployment you might want to start using the secure settings. This article provides instructions for enabling secure settings on an existing deployment.
19+
The test settings are easier and quicker to get you started with a deployment, but after your initial deployment you might want to start using the secure settings. This article provides instructions for enabling secure settings on an existing deployment.
2020

2121
## Prerequisites
2222

23-
* An Azure IoT Operations instance deployed with test settings, as in [Quickstart: Run Azure IoT Operations Preview in GitHub Codespaces](../get-started-end-to-end-sample/quickstart-deploy.md).
23+
* An Azure IoT Operations instance deployed with test settings.
2424

2525
* Azure CLI installed on your development machine. For more information, see [How to install the Azure CLI](/cli/azure/install-azure-cli). This scenario requires Azure CLI version 2.53.0 or higher. Use `az --version` to check your version and `az upgrade` to update if necessary.
2626

@@ -53,7 +53,7 @@ Use the following steps to enable workload identity on an existing connected K3s
5353
1. Add the new connectedk8s cli source.
5454

5555
```azurecli
56-
az extension add --source PATH_TO_WHL_FILE
56+
az extension add --source <PATH_TO_WHL_FILE>
5757
```
5858

5959
1. Export environment variables and set the release tag to 0.1.15392-private.

articles/iot-operations/deploy-iot-ops/howto-manage-secrets.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ Create an Azure Key Vault and add a secret:
7777
# Get the object ID of the currently logged-in user
7878
ASSIGNEE_ID=$(az ad signed-in-user show --query id -o tsv)
7979
80-
# Assign the "Key Vault Secrets Officer" role to the currently logged-in user
80+
# Assign the "Key Vault Secrets Officer" role
8181
az role assignment create --role "Key Vault Secrets Officer" \
8282
--assignee $ASSIGNEE_ID \
8383
--scope /subscriptions/$SUBSCRIPTION_ID/resourcegroups/$RESOURCE_GROUP/providers/Microsoft.KeyVault/vaults/$KEYVAULT_NAME
@@ -94,7 +94,7 @@ Create an Azure Key Vault and add a secret:
9494
# Get the object ID of the currently logged-in user
9595
$ASSIGNEE_ID=$(az ad signed-in-user show --query id -o tsv)
9696
97-
# Assign the "Key Vault Secrets Officer" role to the currently logged-in user
97+
# Assign the "Key Vault Secrets Officer" role
9898
az role assignment create --role "Key Vault Secrets Officer" `
9999
--assignee $ASSIGNEE_ID `
100100
--scope /subscriptions/$SUBSCRIPTION_ID/resourcegroups/$RESOURCE_GROUP/providers/Microsoft.KeyVault/vaults/$KEYVAULT_NAME
@@ -128,12 +128,12 @@ Create a user-assigned managed identity and give it permissions to access the Az
128128
# Get the client ID of the user-assigned managed identity and save it as an environment variable.
129129
USER_ASSIGNED_CLIENT_ID=$(az identity show --resource-group $RESOURCE_GROUP --name $IDENTITY_NAME --query 'clientId' -o tsv)
130130
131-
# Give the user-assigned managed identity `Key Vault Reader` permission
131+
# Assign the `Key Vault Reader` role
132132
az role assignment create --role "Key Vault Reader" \
133133
--assignee $USER_ASSIGNED_CLIENT_ID \
134134
--scope /subscriptions/$SUBSCRIPTION_ID/resourcegroups/$RESOURCE_GROUP/providers/Microsoft.KeyVault/vaults/$KEYVAULT_NAME
135135
136-
# Give the user-assigned managed identity `Key Vault Secrets User` permission
136+
# Assign the `Key Vault Secrets User` role
137137
az role assignment create --role "Key Vault Secrets User" \
138138
--assignee $USER_ASSIGNED_CLIENT_ID \
139139
--scope /subscriptions/$SUBSCRIPTION_ID/resourcegroups/$RESOURCE_GROUP/providers/Microsoft.KeyVault/vaults/$KEYVAULT_NAME

0 commit comments

Comments
 (0)