Skip to content

Commit 75605f8

Browse files
committed
prmerger feedback
1 parent f6584cb commit 75605f8

File tree

2 files changed

+9
-3
lines changed

2 files changed

+9
-3
lines changed

articles/app-service/tutorial-connect-app-access-sql-database-as-user-dotnet.md

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,11 @@
11
---
22
title: 'Tutorial - Web app accesses SQL Database as the user'
33
description: Secure database connectivity with Azure Active Directory authentication from .NET web app, using the signed-in user. Learn how to apply it to other Azure services.
4+
author: cephalin
45

6+
ms.service: app-service
7+
ms.workload: identity
8+
ms.author: cephalin
59
ms.devlang: csharp
610
ms.topic: tutorial
711
ms.date: 04/21/2023
@@ -101,7 +105,7 @@ You enable authentication with Azure Active Directory as the identity provider.
101105
102106
1. Accept the default settings and select **Add**.
103107
104-
:::image type="content" source="./media/tutorial-connect-app-access-sql-database-as-user-dotnet/add-aad-provider.png" alt-text="Screenshot showing the add identity provider page.":::
108+
:::image type="content" source="./media/tutorial-connect-app-access-sql-database-as-user-dotnet/add-azure-ad-provider.png" alt-text="Screenshot showing the add identity provider page." lightbox="./media/tutorial-connect-app-access-sql-database-as-user-dotnet/add-azure-ad-provider.png":::
105109
106110
> [!TIP]
107111
> If you run into errors and reconfigure your app's authentication settings, the tokens in the token store may not be regenerated from the new settings. To make sure your tokens are regenerated, you need to sign out and sign back in to your app. An easy way to do it is to use your browser in private mode, and close and reopen the browser in private mode after changing the settings in your apps.
@@ -118,7 +122,7 @@ Currently, your Azure app connects to SQL Database uses SQL authentication (user
118122
119123
1. In the **Request API permissions** page for Azure SQL Database, select **Delegated permissions** and **user_impersonation**, then select **Add permissions**.
120124
121-
:::image type="content" source="./media/tutorial-connect-app-access-sql-database-as-user-dotnet/select-permission.png" alt-text="Screenshot of the Request API permissions page showing Delegated permissions, user_impersonation, and the Add permission button selected.":::
125+
:::image type="content" source="./media/tutorial-connect-app-access-sql-database-as-user-dotnet/select-permission.png" alt-text="Screenshot of the Request API permissions page showing Delegated permissions, user_impersonation, and the Add permission button selected." lightbox="./media/tutorial-connect-app-access-sql-database-as-user-dotnet/select-permission.png":::
122126
123127
## 4. Configure App Service to return a usable access token
124128
@@ -194,7 +198,9 @@ public MyDatabaseContext (DbContextOptions<MyDatabaseContext> options, IHttpCont
194198
195199
1. Publish your changes in Visual Studio. In the **Solution Explorer**, right-click your **DotNetAppSqlDb** project and select **Publish**.
196200
197-
![Publish from Solution Explorer](./media/app-service-web-tutorial-dotnet-sqldatabase/solution-explorer-publish.png)
201+
![Publish from Solution Explorer]()
202+
203+
:::image type="content" source="./media/app-service-web-tutorial-dotnet-sqldatabase/solution-explorer-publish.png" alt-text="Screenshot showing how to publish from the Solution Explorer in Visual Studio." lightbox="./media/app-service-web-tutorial-dotnet-sqldatabase/solution-explorer-publish.png":::
198204
199205
1. In the publish page, select **Publish**.
200206

0 commit comments

Comments
 (0)