You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/service-bus-messaging/service-bus-migrate-azure-credentials.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ Application requests to Azure Service Bus must be authenticated using either acc
23
23
24
24
## Security risks associated with access keys
25
25
26
-
The following code example demonstrates how to connect to Azure Service Bus using a connection string that includes an access key. When you create a Service Bus, Azure generates these keys and connection strings automatically. Many developers gravitate towards this solution because it feels familiar to options they have worked with in the past. If your application currently uses connection strings, consider migrating to passwordless connections using the steps described in this document.
26
+
The following code example demonstrates how to connect to Azure Service Bus using a connection string that includes an access key. When you create a Service Bus, Azure generates these keys and connection strings automatically. Many developers gravitate towards this solution because it feels familiar to options they've worked with in the past. If your application currently uses connection strings, consider migrating to passwordless connections using the steps described in this document.
@@ -37,7 +37,7 @@ Connection strings should be used with caution. Developers must be diligent to n
37
37
38
38
## Steps to migrate an app to use passwordless authentication
39
39
40
-
The following steps explain how to migrate an existing application to use passwordless connections instead of a key-based solution. These same migration steps should apply whether you are using access keys directly, or through connection strings.
40
+
The following steps explain how to migrate an existing application to use passwordless connections instead of a key-based solution. These same migration steps should apply whether you're using access keys directly, or through connection strings.
41
41
42
42
### Configure roles and users for local development authentication
43
43
@@ -49,7 +49,7 @@ For local development, make sure you're authenticated with the same Azure AD acc
Next you will need to update your code to use passwordless connections.
52
+
Next you'll need to update your code to use passwordless connections.
53
53
54
54
1. To use `DefaultAzureCredential` in a .NET application, add the **Azure.Identity** NuGet package to your application.
55
55
@@ -86,7 +86,7 @@ After making these code changes, run your application locally. The new configura
86
86
87
87
### Configure the Azure hosting environment
88
88
89
-
Once your application is configured to use passwordless connections and runs locally, the same code can authenticate to Azure services after it is deployed to Azure. For example, an application deployed to an Azure App Service instance that has a managed identity enabled can connect to Azure Service Bus.
89
+
Once your application is configured to use passwordless connections and runs locally, the same code can authenticate to Azure services after it's deployed to Azure. For example, an application deployed to an Azure App Service instance that has a managed identity enabled can connect to Azure Service Bus.
90
90
91
91
#### Create the managed identity using the Azure portal
92
92
@@ -192,7 +192,7 @@ Next, you need to grant permissions to the managed identity you created to acces
If you connected your services using the Service Connector you do not need to complete this step. The necessary configurations were handled for you:
195
+
If you connected your services using the Service Connector you don't need to complete this step. The necessary configurations were handled for you:
196
196
197
197
* If you selected a managed identity while creating the connection, a system-assigned managed identity was created for your app and assigned the **Azure Service Bus Data Owner** role on the Service Bus.
198
198
@@ -218,7 +218,7 @@ If you connected your services using the Service Connector you do not need to co
218
218
219
219
### [Azure CLI](#tab/assign-role-azure-cli)
220
220
221
-
To assign a role at the resource level using the Azure CLI, you first must retrieve the resource ID using the az servicebus show command. You can filter the output properties using the --query parameter.
221
+
To assign a role at the resource level using the Azure CLI, you first must retrieve the resource ID using the `az servicebus show` command. You can filter the output properties using the --query parameter.
Copy file name to clipboardExpand all lines: includes/passwordless/service-bus/service-bus-assign-roles-tabbed.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,7 +41,7 @@ The following example will assign the **Azure Service Bus Data Owner** role to y
41
41
42
42
### [Azure CLI](#tab/roles-azure-cli)
43
43
44
-
To assign a role at the resource level using the Azure CLI, you first must retrieve the resource id using the `az servicesbus namespace show` command. You can filter the output properties using the `--query` parameter.
44
+
To assign a role at the resource level using the Azure CLI, you first must retrieve the resource ID using the `az servicesbus namespace show` command. You can filter the output properties using the `--query` parameter.
45
45
46
46
```azurecli
47
47
az servicebus namespace show --resource-group '<your-resource-group-name>' --name '<your-service-bus-namespace>' --query id
0 commit comments