You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Assign the proper App Configuration role assignments to the credentials being used within the task so that the task can access the App Configuration store.
31
+
32
+
1. Go to your target App Configuration store.
33
+
1. In the left menu, select **Access control (IAM)**.
34
+
1. In the right pane, select **Add role assignments**.
35
+
36
+
:::image type="content" border="true" source="./media/azure-app-configuration-role-assignment/add-role-assignment-button.png" alt-text="Screenshot shows the Add role assignments button.":::
37
+
1. For **Role**, select **App Configuration Data Reader**. This role allows the task to read from the App Configuration store.
38
+
1. Select the service principal associated with the service connection that you created in the previous section.
39
+
40
+
:::image type="content" border="true" source="./media/azure-app-configuration-role-assignment/add-role-assignment-data-reader.png" alt-text="Screenshot shows the Add role assignment dialog.":::
41
+
1. Select **Review + assign**.
42
+
1. If the store contains Key Vault references, go to relevant Key Vault and assign **Key Vault Secret User** role to the service principal created in the previous step. From the Key Vault menu, select **Access policies** and ensure [Azure role-based access control](../key-vault/general/rbac-guide.md) is selected as the permission model.
Assign the proper App Configuration role assignments to the credentials being used within the task so that the task can access the App Configuration store.
31
+
32
+
1. Go to your target App Configuration store.
33
+
1. In the left menu, select **Access control (IAM)**.
34
+
1. In the right pane, select **Add role assignments**.
35
+
36
+
:::image type="content" border="true" source="./media/azure-app-configuration-role-assignment/add-role-assignment-button.png" alt-text="Screenshot shows the Add role assignments button.":::
37
+
1. For **Role**, select **App Configuration Data Owner**. This role allows the task to read from and write to the App Configuration store.
38
+
1. Select the service principal associated with the service connection that you created in the previous section.
39
+
40
+
:::image type="content" border="true" source="./media/azure-app-configuration-role-assignment/add-role-assignment-data-owner.png" alt-text="Screenshot shows the Add role assignment dialog.":::
41
+
1. Select **Review + assign**.
31
42
32
43
## Use in builds
33
44
@@ -50,7 +61,7 @@ This section will cover how to use the Azure App Configuration Push task in an A
50
61
51
62
## Use in releases
52
63
53
-
This section will cover how to use the Azure App Configuration Push task in an Azure DevOps release pipelines.
64
+
This section will cover how to use the Azure App Configuration Push task in an Azure DevOps release pipeline.
54
65
55
66
1. Navigate to release pipeline page by selecting **Pipelines** > **Releases**. Documentation for release pipelines can be found [here](/azure/devops/pipelines/release).
56
67
1. Choose an existing release pipeline. If you don’t have one, select **+ New** to create a new one.
@@ -111,4 +122,4 @@ Depending on the file content profile you selected, please refer to examples in
111
122
112
123
**Why am I receiving a 409 error when attempting to push key-values to my configuration store?**
113
124
114
-
A 409 Conflict error message will occur if the task tries to remove or overwrite a key-value that is locked in the App Configuration store.
125
+
A 409 Conflict error message will occur if the task tries to remove or overwrite a key-value that is locked in the App Configuration store.
0 commit comments