Skip to content

Commit 651709f

Browse files
Clarify pattern matching in AAD OIDC for GitHub
Pattern matching not being supported in GH OIDC credentials is a bit of a foot-gun. Explain that pattern matching is not supported and suggest using environment instead of branch or tag.
1 parent 351360d commit 651709f

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/active-directory/develop/workload-identity-federation-create-trust.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ In the **Federated credential scenario** drop-down box, select **GitHub actions
4949

5050
Specify the **Organization** and **Repository** for your GitHub Actions workflow.
5151

52-
For **Entity type**, select **Environment**, **Branch**, **Pull request**, or **Tag** and specify the value. The values must exactly match the configuration in the [GitHub workflow](https://docs.github.com/actions/using-workflows/workflow-syntax-for-github-actions#on). For more info, read the [examples](#entity-type-examples).
52+
For **Entity type**, select **Environment**, **Branch**, **Pull request**, or **Tag** and specify the value. The values must exactly match the configuration in the [GitHub workflow](https://docs.github.com/actions/using-workflows/workflow-syntax-for-github-actions#on). Pattern matching is not supported for branches and tags. Specify an environment if your on-push workflow runs against many branches or tags. For more info, read the [examples](#entity-type-examples).
5353

5454
Add a **Name** for the federated credential.
5555

0 commit comments

Comments
 (0)