Skip to content

Commit 622b560

Browse files
committed
Minor edits
1 parent 5501047 commit 622b560

File tree

2 files changed

+14
-14
lines changed

2 files changed

+14
-14
lines changed

articles/azure-functions/functions-identity-based-connections-tutorial-2.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Use identity-based connections with Azure Functions triggers and bindings
33
description: Learn how to use identity-based connections instead of secrets when connecting to a Service Bus queue using Azure Functions.
44
ms.service: azure-functions
55
ms.topic: tutorial
6-
ms.date: 06/18/2024
6+
ms.date: 06/27/2024
77
ms.devlang: csharp
88

99
#Customer intent: As a function developer, I want to learn how to use managed identities so that I can avoid needing to handle secrets or connection strings in my application settings.
@@ -90,13 +90,13 @@ You've granted your function app access to the Service Bus namespace using manag
9090

9191
1. In your function app, expand **Settings**, and then select **Environment variables**.
9292

93-
1. In the **App settings** tab, select **+ Add** to create a setting. Use the information in the following table:
93+
1. In the **App settings** tab, select **+ Add** to create a setting. Use the information in the following table to enter the **Name** and **Value** for the new setting:
9494

9595
| Name | Value | Description |
9696
| ------------ | ---------------- | ----------- |
9797
| **ServiceBusConnection__fullyQualifiedNamespace** | <SERVICE_BUS_NAMESPACE>.servicebus.windows.net | This setting connects your function app to the Service Bus using an identity-based connection instead of secrets. |
9898

99-
1. After you enter the name and value for the new setting, select **Apply**, and then select **Apply** again.
99+
1. Select **Apply**, and then select **Apply** and **Confirm** to save your changes and restart the app function.
100100

101101
> [!NOTE]
102102
> When you use [Azure App Configuration](../../articles/azure-app-configuration/quickstart-azure-functions-csharp.md) or [Key Vault](../key-vault/general/overview.md) to provide settings for Managed Identity connections, setting names should use a valid key separator, such as `:` or `/`, in place of the `__` to ensure names are resolved correctly.

articles/azure-functions/functions-identity-based-connections-tutorial.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Create a function app without default storage secrets in its definition
33
description: Learn how to remove storage connection strings from your function app definition and use identity-based connections instead.
44
ms.service: azure-functions
55
ms.topic: tutorial
6-
ms.date: 06/18/2024
6+
ms.date: 06/27/2024
77
titleSuffix: Azure Functions
88

99
#Customer intent: As a function developer, I want to learn how to use managed identities so that I can avoid needing to handle secrets or connection strings in my application settings.
@@ -66,7 +66,7 @@ First you need a key vault to store secrets in. You configure it to use [Azure r
6666

6767
Use the default selections for the "Recovery options" sections.
6868

69-
1. Make a note of the name you used, as you'll need it later.
69+
1. Make a note of the name you used, for use later.
7070

7171
1. Select **Next: Access Policy** to navigate to the **Access Policy** tab.
7272

@@ -93,7 +93,7 @@ In order to use Azure Key Vault, your app needs to have an identity that can be
9393

9494
1. Select **Review + create**. Review the configuration, and then select **Create**.
9595

96-
1. When the identity is created, navigate to it in the portal. Select **Properties**, and make note of the **Resource ID**, as you'll need it later.
96+
1. When the identity is created, navigate to it in the portal. Select **Properties**, and make note of the **Resource ID** for use later.
9797

9898
1. Select **Azure Role Assignments**, and select **Add role assignment (Preview)**.
9999

@@ -138,7 +138,7 @@ Because the portal experience for creating a function app doesn't interact with
138138

139139
1. In the template page, select **Deploy**, then in the Custom deployment page, select **Edit template**.
140140

141-
:::image type="content" source="./media/functions-identity-connections-tutorial/function-app-portal-template-deploy-button.png" alt-text="Screenshot of where to find the deploy button at the top of the template screen.":::
141+
:::image type="content" source="./media/functions-identity-connections-tutorial/function-app-portal-template-deploy-button.png" alt-text="Screenshot that shows the Deploy button at the top of the Template page.":::
142142

143143
### Edit the template
144144

@@ -207,7 +207,7 @@ You now edit the template to store the Azure Files connection string in Key Vaul
207207

208208
This `identity` block also sets up a system-assigned identity, which you use later in this tutorial.
209209

210-
1. Add the `keyVaultReferenceIdentity` property to the `properties` object for the function app as in the below example. Substitute "IDENTITY_RESOURCE_ID" for the resource ID of your user-assigned identity.
210+
1. Add the `keyVaultReferenceIdentity` property to the `properties` object for the function app, as in the following example. Substitute "IDENTITY_RESOURCE_ID" for the resource ID of your user-assigned identity.
211211

212212
```json
213213
{
@@ -259,7 +259,7 @@ Whenever your app would need to add a reference to a secret, you would just need
259259

260260
## Use managed identity for AzureWebJobsStorage
261261

262-
Next you use the system-assigned identity you configured in the previous steps for the `AzureWebJobsStorage` connection. `AzureWebJobsStorage` is used by the Functions runtime and by several triggers and bindings to coordinate between multiple running instances. It's required for your function app to operate, and like Azure Files, is configured with a connection string by default when you create a new function app.
262+
Next, you use the system-assigned identity you configured in the previous steps for the `AzureWebJobsStorage` connection. `AzureWebJobsStorage` is used by the Functions runtime and by several triggers and bindings to coordinate between multiple running instances. It's required for your function app to operate, and like Azure Files, is configured with a connection string by default when you create a new function app.
263263

264264
### Grant the system-assigned identity access to the storage account
265265

@@ -303,18 +303,18 @@ Next you update your function app to use its system-assigned identity when it us
303303

304304
1. In your function app, expand **Settings**, and then select **Environment variables**.
305305

306-
1. In the **App settings** tab, select the **AzureWebJobsStorage** app setting, and change it based on the following values.
306+
1. In the **App settings** tab, select the **AzureWebJobsStorage** app setting, and edit it according to the following table:
307307

308308
| Option | Suggested value | Description |
309309
| ------------ | ---------------- | ----------- |
310-
| **Name** | AzureWebJobsStorage__accountName | Update the name from **AzureWebJobsStorage** to the exact name `AzureWebJobsStorage__accountName`. This setting tells the host to use the identity instead of looking for a stored secret. The new setting uses a double underscore (`__`), which is a special character in application settings. |
310+
| **Name** | AzureWebJobsStorage__accountName | Change the name from **AzureWebJobsStorage** to the exact name `AzureWebJobsStorage__accountName`. This setting instructs the host to use the identity instead of searching for a stored secret. The new setting uses a double underscore (`__`), which is a special character in application settings. |
311311
| **Value** | Your account name | Update the name from the connection string to just your **StorageAccountName**. |
312312

313-
This configuration lets the system know that it should use an identity to connect to the resource.
313+
This configuration tells the system to use an identity to connect to the resource.
314314

315-
1. Select **Apply**, and then select **Apply** again to save your changes.
315+
1. Select **Apply**, and then select **Apply** and **Confirm** to save your changes and restart the app function.
316316

317-
You've removed the storage connection string requirement for AzureWebJobsStorage by configuring your app to instead connect to blobs using managed identities.
317+
You've now removed the storage connection string requirement for AzureWebJobsStorage by configuring your app to instead connect to blobs using managed identities.
318318

319319
> [!NOTE]
320320
> The `__accountName` syntax is unique to the AzureWebJobsStorage connection and cannot be used for other storage connections. To learn to define other connections, check the reference for each trigger and binding your app uses.

0 commit comments

Comments
 (0)