Skip to content

Commit 79fe67e

Browse files
Merge pull request #295336 from Akhilesh-microsoft/ACA/manage_secrets_uuf367750
[UUF367750]: Analyzed and fixed the documentation issue; reviewed and fixed the issues w.r.t freshness. Updated ms.date
2 parents 64418cc + 7641f4d commit 79fe67e

File tree

1 file changed

+5
-2
lines changed

1 file changed

+5
-2
lines changed

articles/container-apps/manage-secrets.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: container-apps
55
author: craigshoemaker
66
ms.service: azure-container-apps
77
ms.topic: how-to
8-
ms.date: 02/03/2025
8+
ms.date: 02/28/2025
99
ms.author: cshoe
1010
ms.custom: devx-track-azurecli, devx-track-azurepowershell, build-2023
1111
---
@@ -136,6 +136,9 @@ To grant access to Key Vault secrets, [create an access policy](/azure/key-vault
136136

137137
1. In the *System assigned* tab, set the *Status* to **On**.
138138

139+
> [!NOTE]
140+
> You can also use a user-assigned managed identity, which can be reused across multiple resources and persists independently of the app lifecycle. To use it, select the *User assigned* tab and choose an existing identity.
141+
139142
1. Select **Save** to enable system assigned managed identity.
140143

141144
1. A popup appears to confirm that you want to enable system assigned managed identity and register your container app with Microsoft Entra ID. Select **Yes**.
@@ -209,7 +212,7 @@ Secrets Key Vault references aren't supported in PowerShell.
209212
---
210213

211214
> [!NOTE]
212-
> If you're using [UDR With Azure Firewall](networking.md#user-defined-routes-udr), you will need to add the `AzureKeyVault` service tag and the *login.microsoft.com* FQDN to the allow list for your firewall. Refer to [configuring UDR with Azure Firewall](networking.md#configuring-udr-with-azure-firewall) to decide which additional service tags you need.
215+
> If you're using [UDR With Azure Firewall](networking.md#user-defined-routes-udr), you need to add the `AzureKeyVault` service tag and the *login.microsoft.com* FQDN to the allow list for your firewall. Refer to [configuring UDR with Azure Firewall](networking.md#configuring-udr-with-azure-firewall) to decide which additional service tags you need.
213216
214217
#### Key Vault secret URI and secret rotation
215218

0 commit comments

Comments
 (0)