Skip to content

Commit 7a26834

Browse files
committed
edits
1 parent 6c1addf commit 7a26834

File tree

3 files changed

+5
-4
lines changed

3 files changed

+5
-4
lines changed

articles/service-bus-messaging/service-bus-migrate-azure-credentials.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ Connection strings should be used with caution. Developers must be diligent to n
3737

3838
## Steps to migrate an app to use passwordless authentication
3939

40-
The following steps explain how to migrate an existing application to use passwordless connections instead of a key-based solution. These same migration steps should apply whether you're using access keys directly, or through connection strings.
40+
The following steps explain how to migrate an existing application to use passwordless connections instead of a key-based solution. You'll first configure a local development environment, and then apply those concepts to an Azure app hosting environment. These same migration steps should apply whether you're using access keys directly, or through connection strings.
4141

4242
### Configure roles and users for local development authentication
4343

includes/passwordless/migration-guide/create-managed-identity-portal.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,7 @@ The Service Connector will automatically create a system-assigned managed identi
3737
1. On the main overview page of your Azure App Service instance, select **Identity** from the left navigation.
3838

3939
1. Under the **System assigned** tab, make sure to set the **Status** field to **on**. A system assigned identity is managed by Azure internally and handles administrative tasks for you. The details and IDs of the identity are never exposed in your code.
40+
4041
:::image type="content" source="../media/migration-create-identity-small.png" alt-text="Screenshot showing how to create a system assigned managed identity." lightbox="../media/migration-create-identity.png":::
4142

4243
### [Azure Spring Apps](#tab/spring-apps)

includes/passwordless/service-bus/service-bus-assign-roles-tabbed.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.author: alexwolf
1010
ms.custom: include file
1111
---
1212

13-
When developing locally, make sure that the user account that is accessing Service Bus has the correct permissions. You'll need **Azure Service Bus Data Owner** to send and receive data. To assign yourself this role, you'll need to be assigned the **User Access Administrator** role, or another role that includes the **Microsoft.Authorization/roleAssignments/write** action. You can assign Azure RBAC roles to a user using the Azure portal, Azure CLI, or Azure PowerShell. You can learn more about the available scopes for role assignments on the [scope overview](../../../articles/role-based-access-control/scope-overview.md) page.
13+
When developing locally, make sure that the user account that is accessing Service Bus has the correct permissions. In this example you'll use the **Azure Service Bus Data Owner** role to send and receive data, though more granular roles are also available. To assign yourself this role, you'll need to be assigned the **User Access Administrator** role, or another role that includes the **Microsoft.Authorization/roleAssignments/write** action. You can assign Azure RBAC roles to a user using the Azure portal, Azure CLI, or Azure PowerShell. You can learn more about the available scopes for role assignments on the [scope overview](../../../articles/role-based-access-control/scope-overview.md) page.
1414

1515
In this scenario, you'll assign permissions to your user account scoped to a specific Service Bus namespace, to follow the [Principle of Least Privilege](../../../articles/active-directory/develop/secure-least-privileged-access.md). This practice gives users only the minimum permissions needed and creates more secure production environments.
1616

@@ -47,7 +47,7 @@ To assign a role at the resource level using the Azure CLI, you first must retri
4747
az servicebus namespace show --resource-group '<your-resource-group-name>' --name '<your-service-bus-namespace>' --query id
4848
```
4949

50-
Copy the output `Id` from the preceding command. You can then assign roles using the [az role](/cli/azure/role) command of the Azure CLI.
50+
Copy the output `ID` from the preceding command. You can then assign roles using the [az role](/cli/azure/role) command of the Azure CLI.
5151

5252
```azurecli
5353
az role assignment create --assignee "<user@domain>" \
@@ -63,7 +63,7 @@ To assign a role at the resource level using Azure PowerShell, you first must re
6363
Get-AzResource -ResourceGroupName "<yourResourceGroupname>" -Name "<yourServiceBusName>"
6464
```
6565

66-
Copy the `Id` value from the preceding command output. You can then assign roles using the [New-AzRoleAssignment](/powershell/module/az.resources/new-azroleassignment) command in PowerShell.
66+
Copy the `ID` value from the preceding command output. You can then assign roles using the [New-AzRoleAssignment](/powershell/module/az.resources/new-azroleassignment) command in PowerShell.
6767

6868
```azurepowershell
6969
New-AzRoleAssignment -SignInName <user@domain> `

0 commit comments

Comments
 (0)