You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-functions/functions-identity-based-connections-tutorial-2.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Use identity-based connections with Azure Functions triggers and bindings
3
3
description: Learn how to use identity-based connections instead of secrets when connecting to a Service Bus queue using Azure Functions.
4
4
ms.service: azure-functions
5
5
ms.topic: tutorial
6
-
ms.date: 06/18/2024
6
+
ms.date: 06/27/2024
7
7
ms.devlang: csharp
8
8
9
9
#Customer intent: As a function developer, I want to learn how to use managed identities so that I can avoid needing to handle secrets or connection strings in my application settings.
@@ -90,13 +90,13 @@ You've granted your function app access to the Service Bus namespace using manag
90
90
91
91
1. In your function app, expand **Settings**, and then select **Environment variables**.
92
92
93
-
1. In the **App settings** tab, select **+ Add** to create a setting. Use the information in the following table:
93
+
1. In the **App settings** tab, select **+ Add** to create a setting. Use the information in the following table to enter the **Name** and **Value** for the new setting:
94
94
95
95
| Name | Value | Description |
96
96
| ------------ | ---------------- | ----------- |
97
97
|**ServiceBusConnection__fullyQualifiedNamespace**| <SERVICE_BUS_NAMESPACE>.servicebus.windows.net | This setting connects your function app to the Service Bus using an identity-based connection instead of secrets. |
98
98
99
-
1.After you enter the name and value for the new setting, select **Apply**, and then select **Apply**again.
99
+
1.Select **Apply**, and then select **Apply**and **Confirm** to save your changes and restart the app function.
100
100
101
101
> [!NOTE]
102
102
> When you use [Azure App Configuration](../../articles/azure-app-configuration/quickstart-azure-functions-csharp.md) or [Key Vault](../key-vault/general/overview.md) to provide settings for Managed Identity connections, setting names should use a valid key separator, such as `:` or `/`, in place of the `__` to ensure names are resolved correctly.
Copy file name to clipboardExpand all lines: articles/azure-functions/functions-identity-based-connections-tutorial.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Create a function app without default storage secrets in its definition
3
3
description: Learn how to remove storage connection strings from your function app definition and use identity-based connections instead.
4
4
ms.service: azure-functions
5
5
ms.topic: tutorial
6
-
ms.date: 06/18/2024
6
+
ms.date: 06/27/2024
7
7
titleSuffix: Azure Functions
8
8
9
9
#Customer intent: As a function developer, I want to learn how to use managed identities so that I can avoid needing to handle secrets or connection strings in my application settings.
@@ -66,7 +66,7 @@ First you need a key vault to store secrets in. You configure it to use [Azure r
66
66
67
67
Use the default selections for the "Recovery options" sections.
68
68
69
-
1. Make a note of the name you used, as you'll need it later.
69
+
1. Make a note of the name you used, for use later.
70
70
71
71
1. Select **Next: Access Policy** to navigate to the **Access Policy** tab.
72
72
@@ -93,7 +93,7 @@ In order to use Azure Key Vault, your app needs to have an identity that can be
93
93
94
94
1. Select **Review + create**. Review the configuration, and then select **Create**.
95
95
96
-
1. When the identity is created, navigate to it in the portal. Select **Properties**, and make note of the **Resource ID**, as you'll need it later.
96
+
1. When the identity is created, navigate to it in the portal. Select **Properties**, and make note of the **Resource ID** for use later.
97
97
98
98
1. Select **Azure Role Assignments**, and select **Add role assignment (Preview)**.
99
99
@@ -138,7 +138,7 @@ Because the portal experience for creating a function app doesn't interact with
138
138
139
139
1. In the template page, select **Deploy**, then in the Custom deployment page, select **Edit template**.
140
140
141
-
:::image type="content" source="./media/functions-identity-connections-tutorial/function-app-portal-template-deploy-button.png" alt-text="Screenshot of where to find the deploy button at the top of the template screen.":::
141
+
:::image type="content" source="./media/functions-identity-connections-tutorial/function-app-portal-template-deploy-button.png" alt-text="Screenshot that shows the Deploy button at the top of the Template page.":::
142
142
143
143
### Edit the template
144
144
@@ -207,7 +207,7 @@ You now edit the template to store the Azure Files connection string in Key Vaul
207
207
208
208
This `identity` block also sets up a system-assigned identity, which you use later in this tutorial.
209
209
210
-
1. Add the `keyVaultReferenceIdentity` property to the `properties` object for the function app as in the below example. Substitute "IDENTITY_RESOURCE_ID" for the resource ID of your user-assigned identity.
210
+
1. Add the `keyVaultReferenceIdentity` property to the `properties` object for the function app, as in the following example. Substitute "IDENTITY_RESOURCE_ID" for the resource ID of your user-assigned identity.
211
211
212
212
```json
213
213
{
@@ -259,7 +259,7 @@ Whenever your app would need to add a reference to a secret, you would just need
259
259
260
260
## Use managed identity for AzureWebJobsStorage
261
261
262
-
Next you use the system-assigned identity you configured in the previous steps for the `AzureWebJobsStorage` connection. `AzureWebJobsStorage` is used by the Functions runtime and by several triggers and bindings to coordinate between multiple running instances. It's required for your function app to operate, and like Azure Files, is configured with a connection string by default when you create a new function app.
262
+
Next, you use the system-assigned identity you configured in the previous steps for the `AzureWebJobsStorage` connection. `AzureWebJobsStorage` is used by the Functions runtime and by several triggers and bindings to coordinate between multiple running instances. It's required for your function app to operate, and like Azure Files, is configured with a connection string by default when you create a new function app.
263
263
264
264
### Grant the system-assigned identity access to the storage account
265
265
@@ -303,18 +303,18 @@ Next you update your function app to use its system-assigned identity when it us
303
303
304
304
1. In your function app, expand **Settings**, and then select **Environment variables**.
305
305
306
-
1. In the **App settings** tab, select the **AzureWebJobsStorage** app setting, and change it based on the following values.
306
+
1. In the **App settings** tab, select the **AzureWebJobsStorage** app setting, and edit it according to the following table:
307
307
308
308
| Option | Suggested value | Description |
309
309
| ------------ | ---------------- | ----------- |
310
-
| **Name** | AzureWebJobsStorage__accountName | Update the name from **AzureWebJobsStorage** to the exact name `AzureWebJobsStorage__accountName`. This setting tells the host to use the identity instead of looking for a stored secret. The new setting uses a double underscore (`__`), which is a special character in application settings. |
310
+
| **Name** | AzureWebJobsStorage__accountName | Change the name from **AzureWebJobsStorage** to the exact name `AzureWebJobsStorage__accountName`. This setting instructs the host to use the identity instead of searching for a stored secret. The new setting uses a double underscore (`__`), which is a special character in application settings. |
311
311
| **Value** | Your account name | Update the name from the connection string to just your **StorageAccountName**. |
312
312
313
-
This configuration lets the system know that it should use an identity to connect to the resource.
313
+
This configuration tells the system to use an identity to connect to the resource.
314
314
315
-
1. Select **Apply**, and then select **Apply** again to save your changes.
315
+
1. Select **Apply**, and then select **Apply** and **Confirm** to save your changes and restart the app function.
316
316
317
-
You've removed the storage connection string requirement for AzureWebJobsStorage by configuring your app to instead connect to blobs using managed identities.
317
+
You've now removed the storage connection string requirement for AzureWebJobsStorage by configuring your app to instead connect to blobs using managed identities.
318
318
319
319
> [!NOTE]
320
320
> The `__accountName` syntax is unique to the AzureWebJobsStorage connection and cannot be used for other storage connections. To learn to define other connections, check the reference for each trigger and binding your app uses.
0 commit comments