Skip to content

Commit 6c1addf

Browse files
committed
acrolinx
1 parent 4b518f4 commit 6c1addf

File tree

3 files changed

+8
-8
lines changed

3 files changed

+8
-8
lines changed

articles/service-bus-messaging/service-bus-migrate-azure-credentials.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Application requests to Azure Service Bus must be authenticated using either acc
2323

2424
## Security risks associated with access keys
2525

26-
The following code example demonstrates how to connect to Azure Service Bus using a connection string that includes an access key. When you create a Service Bus, Azure generates these keys and connection strings automatically. Many developers gravitate towards this solution because it feels familiar to options they have worked with in the past. If your application currently uses connection strings, consider migrating to passwordless connections using the steps described in this document.
26+
The following code example demonstrates how to connect to Azure Service Bus using a connection string that includes an access key. When you create a Service Bus, Azure generates these keys and connection strings automatically. Many developers gravitate towards this solution because it feels familiar to options they've worked with in the past. If your application currently uses connection strings, consider migrating to passwordless connections using the steps described in this document.
2727

2828
```csharp
2929
var serviceBusClient = new ServiceBusClient("<NAMESPACE-CONNECTION-STRING>", clientOptions);
@@ -37,7 +37,7 @@ Connection strings should be used with caution. Developers must be diligent to n
3737

3838
## Steps to migrate an app to use passwordless authentication
3939

40-
The following steps explain how to migrate an existing application to use passwordless connections instead of a key-based solution. These same migration steps should apply whether you are using access keys directly, or through connection strings.
40+
The following steps explain how to migrate an existing application to use passwordless connections instead of a key-based solution. These same migration steps should apply whether you're using access keys directly, or through connection strings.
4141

4242
### Configure roles and users for local development authentication
4343

@@ -49,7 +49,7 @@ For local development, make sure you're authenticated with the same Azure AD acc
4949

5050
[!INCLUDE [default-azure-credential-sign-in](../../includes/passwordless/default-azure-credential-sign-in.md)]
5151

52-
Next you will need to update your code to use passwordless connections.
52+
Next you'll need to update your code to use passwordless connections.
5353

5454
1. To use `DefaultAzureCredential` in a .NET application, add the **Azure.Identity** NuGet package to your application.
5555

@@ -86,7 +86,7 @@ After making these code changes, run your application locally. The new configura
8686

8787
### Configure the Azure hosting environment
8888

89-
Once your application is configured to use passwordless connections and runs locally, the same code can authenticate to Azure services after it is deployed to Azure. For example, an application deployed to an Azure App Service instance that has a managed identity enabled can connect to Azure Service Bus.
89+
Once your application is configured to use passwordless connections and runs locally, the same code can authenticate to Azure services after it's deployed to Azure. For example, an application deployed to an Azure App Service instance that has a managed identity enabled can connect to Azure Service Bus.
9090

9191
#### Create the managed identity using the Azure portal
9292

@@ -192,7 +192,7 @@ Next, you need to grant permissions to the managed identity you created to acces
192192

193193
### [Service Connector](#tab/assign-role-service-connector)
194194

195-
If you connected your services using the Service Connector you do not need to complete this step. The necessary configurations were handled for you:
195+
If you connected your services using the Service Connector you don't need to complete this step. The necessary configurations were handled for you:
196196

197197
* If you selected a managed identity while creating the connection, a system-assigned managed identity was created for your app and assigned the **Azure Service Bus Data Owner** role on the Service Bus.
198198

@@ -218,7 +218,7 @@ If you connected your services using the Service Connector you do not need to co
218218

219219
### [Azure CLI](#tab/assign-role-azure-cli)
220220

221-
To assign a role at the resource level using the Azure CLI, you first must retrieve the resource ID using the az servicebus show command. You can filter the output properties using the --query parameter.
221+
To assign a role at the resource level using the Azure CLI, you first must retrieve the resource ID using the `az servicebus show` command. You can filter the output properties using the --query parameter.
222222

223223
```azurecli
224224
az servicebus show \

includes/passwordless/migration-guide/create-managed-identity-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ The following compute services are currently supported:
1010
* Azure Spring Cloud
1111
* Azure Container Apps (preview)
1212

13-
For this migration guide you will use App Service, but the steps are similar on Azure Spring Apps and Azure Container Apps.
13+
For this migration guide you'll use App Service, but the steps are similar on Azure Spring Apps and Azure Container Apps.
1414

1515
> [!NOTE]
1616
> Azure Spring Apps currently only supports Service Connector using connection strings.

includes/passwordless/service-bus/service-bus-assign-roles-tabbed.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ The following example will assign the **Azure Service Bus Data Owner** role to y
4141

4242
### [Azure CLI](#tab/roles-azure-cli)
4343

44-
To assign a role at the resource level using the Azure CLI, you first must retrieve the resource id using the `az servicesbus namespace show` command. You can filter the output properties using the `--query` parameter.
44+
To assign a role at the resource level using the Azure CLI, you first must retrieve the resource ID using the `az servicesbus namespace show` command. You can filter the output properties using the `--query` parameter.
4545

4646
```azurecli
4747
az servicebus namespace show --resource-group '<your-resource-group-name>' --name '<your-service-bus-namespace>' --query id

0 commit comments

Comments
 (0)