You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-functions/functions-identity-based-connections-tutorial.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.date: 10/20/2021
10
10
11
11
# Tutorial: Create a function app that connects to Azure services using identities instead of secrets
12
12
13
-
This tutorial shows you how to configure a function app using Azure Active Directory identities instead of secrets or connection strings, where possible. Using identities helps you avoid accidentally leaking sensitive secrets and can provide better visibility into how data is accessed. To learn more about identity-based connections, see [configure an identity-based connection.](functions-reference.md#configure-an-identity-based-connection).
13
+
This tutorial shows you how to configure a function app using Azure Active Directory identities instead of secrets or connection strings, where possible. Using identities helps you avoid accidentally leaking sensitive secrets and can provide better visibility into how data is accessed. To learn more about identity-based connections, see [configure an identity-based connection](functions-reference.md#configure-an-identity-based-connection).
14
14
15
15
While the procedures shown work generally for all languages, this tutorial currently supports C# class library functions on Windows specifically.
16
16
@@ -106,7 +106,7 @@ In order to use Azure Key Vault, your app will need to have an identity that can
106
106
107
107
1. Select **Save**. It might take a minute or two for the role to show up when you refresh the role assignments list for the identity.
108
108
109
-
The identity will now be able to read secrets stored in the vault. Later in the tutorial, you will add additional role assignments for different purposes.
109
+
The identity will now be able to read secrets stored in the key vault. Later in the tutorial, you will add additional role assignments for different purposes.
110
110
111
111
### Generate a template for creating a function app
112
112
@@ -304,7 +304,7 @@ Next you will update your function app to use its system-assigned identity when
304
304
| Option | Suggested value | Description |
305
305
| ------------ | ---------------- | ----------- |
306
306
| **Name** | AzureWebJobsStorage__accountName | Update the name from **AzureWebJobsStorage** to the exact name `AzureWebJobsStorage__accountName`. This setting tells the host to use the identity instead of looking for a stored secret. The new setting uses a double underscore (`__`), which is a special character in application settings. |
307
-
| **Value** | Your account name | Update the name from the connection string to just your **AccountName**. |
307
+
| **Value** | Your account name | Update the name from the connection string to just your **StorageAccountName**. |
308
308
309
309
This configuration will let the system know that it should use an identity to connect to the resource.
Copy file name to clipboardExpand all lines: articles/azure-functions/functions-infrastructure-as-code.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -296,7 +296,7 @@ On Linux, the function app must have its `kind` set to `functionapp,linux`, and
296
296
}
297
297
```
298
298
299
-
The [`WEBSITE_CONTENTAZUREFILECONNECTIONSTRING`](functions-app-settings.md#website_contentazurefileconnectionstring) and [`WEBSITE_CONTENTSHARE`](functions-app-settings.md#website_contentshare) settings aren't supported on Linux.
299
+
The [`WEBSITE_CONTENTAZUREFILECONNECTIONSTRING`](functions-app-settings.md#website_contentazurefileconnectionstring) and [`WEBSITE_CONTENTSHARE`](functions-app-settings.md#website_contentshare) settings aren't supported on a Linux Consumption plan.
Copy file name to clipboardExpand all lines: articles/azure-functions/functions-openapi-definition.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,7 +36,7 @@ To create an API Management instance linked to your function app:
36
36
37
37

38
38
39
-
1. Choose **Create** to create the API Management instance, which may take several minutes.
39
+
1. Choose **Export** to create the API Management instance, which may take several minutes.
40
40
41
41
1. After Azure creates the instance, it enables the **Enable Application Insights** option on the page. Select it to send logs to the same place as the function application.
Copy file name to clipboardExpand all lines: articles/azure-functions/functions-run-local.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -215,7 +215,7 @@ The following considerations apply to project initialization:
215
215
216
216
+ When you don't provide a project name, the current folder is initialized.
217
217
218
-
+ If you plan to publish your project to a custom Linux container, use the `--dockerfile` option to make sure that a Dockerfile is generated for your project. To learn more, see [Create a function on Linux using a custom image](functions-create-function-linux-custom-image.md).
218
+
+ If you plan to publish your project to a custom Linux container, use the `--docker` option to make sure that a Dockerfile is generated for your project. To learn more, see [Create a function on Linux using a custom image](functions-create-function-linux-custom-image.md).
219
219
220
220
Certain languages may have additional considerations:
Copy file name to clipboardExpand all lines: articles/iot-edge/how-to-manage-device-certificates.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -188,7 +188,7 @@ For more information about the function of the different certificates on an IoT
188
188
For these two automatically generated certificates, you have the option of setting a flag in the config file to configure the number of days for the lifetime of the certificates.
189
189
190
190
>[!NOTE]
191
-
>There is a third auto-generated certificate that the IoT Edge security manager creates, the **IoT Edge hub server certificate**. This certificate always has a 90 day lifetime, but is automatically renewed before expiring. The auto-generated CA lifetime value set in the config file doesn't affect this certificate.
191
+
>There is a third auto-generated certificate that the IoT Edge security manager creates, the **IoT Edge hub server certificate**. This certificate always has a 30 day lifetime, but is automatically renewed before expiring. The auto-generated CA lifetime value set in the config file doesn't affect this certificate.
192
192
193
193
Upon expiry after the specified number of days, IoT Edge has to be restarted to regenerate the device CA certificate. The device CA certificate won't be renewed automatically.
0 commit comments