You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-functions/dotnet-isolated-in-process-differences.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.custom:
6
6
- devx-track-dotnet
7
7
- ignite-2023
8
8
ms.topic: conceptual
9
-
ms.date: 08/03/2023
9
+
ms.date: 05/06/2025
10
10
recommendations: false
11
11
#Customer intent: As a developer, I need to understand the differences between running in-process and running in an isolated worker process so that I can choose the best process model for my functions.
12
12
---
@@ -37,7 +37,7 @@ Use the following table to compare feature and functional differences between th
37
37
| Imperative bindings<sup>1</sup> | Not supported - instead [work with SDK types directly](./dotnet-isolated-process-guide.md#register-azure-clients)|[Supported](functions-dotnet-class-library.md#binding-at-runtime)|
38
38
| Dependency injection |[Supported](dotnet-isolated-process-guide.md#dependency-injection) (improved model consistent with .NET ecosystem) |[Supported](functions-dotnet-dependency-injection.md)|
39
39
| Middleware |[Supported](dotnet-isolated-process-guide.md#middleware)| Not supported |
40
-
| Logging |[`ILogger<T>`]/[`ILogger`] obtained from [FunctionContext](/dotnet/api/microsoft.azure.functions.worker.functioncontext) or via [dependency injection](dotnet-isolated-process-guide.md#dependency-injection)|[`ILogger`] passed to the function<br/>[`ILogger<T>`]via[dependency injection](functions-dotnet-dependency-injection.md)|
40
+
| Logging |[`ILogger<T>`]/[`ILogger`] obtained from [FunctionContext](/dotnet/api/microsoft.azure.functions.worker.functioncontext) or by using [dependency injection](dotnet-isolated-process-guide.md#dependency-injection)|[`ILogger`] passed to the function<br/>[`ILogger<T>`]by using[dependency injection](functions-dotnet-dependency-injection.md)|
@@ -47,13 +47,13 @@ Use the following table to compare feature and functional differences between th
47
47
48
48
<sup>1</sup> When you need to interact with a service using parameters determined at runtime, using the corresponding service SDKs directly is recommended over using imperative bindings. The SDKs are less verbose, cover more scenarios, and have advantages for error handling and debugging purposes. This recommendation applies to both models.
49
49
50
-
<sup>2</sup> Cold start times could be additionally impacted on Windows when using some preview versions of .NET due to just-in-time loading of preview frameworks. This impact applies to both the in-process and out-of-process models but can be noticeable when comparing across different versions. This delay for preview versions isn't present on Linux plans.
50
+
<sup>2</sup> Cold start times could be additionally affected on Windows when using some preview versions of .NET due to just-in-time loading of preview frameworks. This impact applies to both the in-process and out-of-process models but can be noticeable when comparing across different versions. This delay for preview versions isn't present on Linux plans.
51
51
52
52
<sup>3</sup> C# Script functions also run in-process and use the same libraries as in-process class library functions. For more information, see the [Azure Functions C# script (.csx) developer reference](functions-reference-csharp.md).
53
53
54
54
<sup>4</sup> Service SDK types include types from the [Azure SDK for .NET](/dotnet/azure/sdk/azure-sdk-for-dotnet) such as [BlobClient](/dotnet/api/azure.storage.blobs.blobclient).
55
55
56
-
<sup>5</sup> ASP.NET Core types are not supported for .NET Framework.
56
+
<sup>5</sup> ASP.NET Core types aren't supported for .NET Framework.
title: Use key vault secrets in customization files
3
-
description: Learn how to use Azure Key Vault secrets in team and user customization files to clone private repositories.
2
+
title: Fetch Azure Key Vault Secrets from Dev Box Customizations Files
3
+
description: Discover how to fetch Azure Key Vault secrets by using team and user customization files to enhance security and simplify workflows.
4
+
#customer intent: As a platform engineer, I want to configure Azure Key Vault secrets so that my development teams can securely access private repositories during Dev Box customization.
4
5
author: RoseHJM
5
6
ms.author: rosemalcolm
6
7
ms.service: dev-box
7
8
ms.custom:
8
9
- ignite-2024
10
+
- ai-gen-docs-bap
11
+
- ai-gen-title
12
+
- ai-seo-date:05/10/2025
13
+
- ai-gen-description
9
14
ms.topic: how-to
10
-
ms.date: 04/20/2025
11
-
12
-
#customer intent: As a Dev Center Admin or Project Admin, I want to create image definition files so that my development teams can create customized dev boxes.
15
+
ms.date: 05/10/2025
13
16
---
14
17
15
-
# Clone a private repository by using a customization file
18
+
# Use Azure Key Vault secrets in customization files
You can use secrets from your Azure key vault in your YAML customizations to clone private repositories, or with any custom task you author that requires an access token. In a team customization file, you can use a personal access token (PAT) stored in a key vault to access a private repository.
23
+
You can use secrets from your Azure key vault in your YAML customizations to clone private repositories, or with any task you author that requires an access token. For example, in a team customization file, you can use a personal access token (PAT) stored in a key vault to access a private repository.
24
+
25
+
## Use key vault secrets in customization files
21
26
22
-
## Use key vault secrets in team customization files
27
+
To use a secret, like a PAT, in your customization files, store your PAT as a key vault secret.
23
28
24
-
To clone a private repository, store your PAT as a key vault secret. See [Grant the managed identity access to the key vault secret](../deployment-environments/how-to-configure-managed-identity.md#grant-the-managed-identity-access-to-the-key-vault-secret), and use it when you invoke the `git-clone` task in your customization.
29
+
Both team and user customizations support fetching secrets from a key vault. Team customizations, also known as image definition files, define the base image for the dev box with the`image` parameter, and list the tasks that run when a dev box is created. User customizations list the tasks that run when a dev box is created. The following examples show how to use a key vault secret in both types of customizations.
25
30
26
-
To configure your key vault secrets for use in your YAML customizations:
31
+
To configure key vault secrets for use in your YAML customizations:
27
32
28
33
1. Ensure that your dev center project's managed identity has the Key Vault Reader role and the Key Vault Secrets User role on your key vault.
29
34
2. Grant the Key Vault Secrets User role for the key vault secret to each user or user group that should be able to consume the secret during the customization of a dev box. The user or group granted the role must include the managed identity for the dev center, the admin's user account, and any user or group that needs the secret during dev box customization.
30
35
31
-
For more information, see:
36
+
You can use a key vault secret in-line with the built-in PowerShell task:
32
37
33
-
-[Configure a managed identity for a dev center](../deployment-environments/how-to-configure-managed-identity.md#configure-a-managed-identity-for-a-dev-center)
34
-
-[Grant the managed identity access to the key vault secret](../deployment-environments/how-to-configure-managed-identity.md#grant-the-managed-identity-access-to-the-key-vault-secret)
This example shows an image definition file. The `KEY_VAULT_SECRET_URI` is the URI of the secret in your key vault.
35
48
36
49
You can reference the secret in your YAML customization in the following format, which uses the `git-clone` task as an example:
37
50
@@ -45,37 +58,34 @@ tasks:
45
58
directory: C:\Workspaces
46
59
pat: '{{KEY_VAULT_SECRET_URI}}'
47
60
```
61
+
This example shows a user customization file. There is no `image` specified.
48
62
49
-
## Use key vault secrets in user customization files
50
-
51
-
To clone a private Azure Repos repository from a user customization file, you don't need to configure a secret in Azure Key Vault. If you want to clone a private Azure Repos repository from a user customization file, you don't need to configure a secret in Azure Key Vault. Instead, you can use `{{ado}}` or `{{ado://your-ado-organization-name}}` as a parameter. This parameter fetches an access token on your behalf when you're creating a dev box. The access token has read-only permission to your repository.
52
-
53
-
The `git-clone` task in the quickstart catalog uses the access token to clone your repository. Here's an example:
63
+
User customizations let you obtain an Azure DevOps token to clone private repositories without explicitly specifying a PAT from the key vault. The service automatically exchanges your Azure token for an Azure DevOps token at run time.
54
64
55
65
```yml
56
-
tasks:
57
-
- name: git-clone
58
-
description: Clone this repository into C:\Workspaces
The dev center needs access to your key vault. Dev centers don't support service tags, so if your key vault is private, allow trusted Microsoft services to bypass the firewall.
76
+
The Dev Box VS Code extension and Dev Box CLI don't support hydrating secrets in the inner-loop testing workflow for customizations.
66
77
67
-
Dev centers don't support service tags, so if the key vault is private, allow trusted Microsoft services to bypass the firewall.
78
+
## Configure key vault access
68
79
69
-
:::image type="content" source="media/how-to-use-secrets-customization-files/trusted-services-bypass-firewall.png" alt-text="Screenshot that shows the option to allow trusted Microsoft services to bypass the firewall in Azure Key Vault settings." lightbox="media/how-to-use-secrets-customization-files/trusted-services-bypass-firewall.png":::
80
+
The dev center needs access to your key vault. Because dev centers don't support service tags, if your key vault is private, let trusted Microsoft servicesbypass the firewall.
70
81
71
-
To learn howto allow trusted Microsoft services to bypass the firewall, see [Configure Azure Key Vault networking settings](/azure/key-vault/general/how-to-azure-key-vault-network-security).
82
+
:::image type="content" source="media/how-to-use-secrets-customization-files/trusted-services-bypass-firewall.png" alt-text="Screenshot that shows the option to allow trusted Microsoft services to bypass the firewall in Azure Key Vault settings." lightbox="media/how-to-use-secrets-customization-files/trusted-services-bypass-firewall.png":::
72
83
73
-
## Share a customization file from a code repository
84
+
To learn how to let trusted Microsoft services bypass the firewall, see [Configure Azure Key Vault networking settings](/azure/key-vault/general/how-to-azure-key-vault-network-security).
74
85
75
-
Make the customization file available to dev box pools by naming it *imagedefinition.yaml* and uploading it to the repository that hosts the catalog. When you create a dev box pool, you can select the customization file from the catalog to apply to the dev boxes in the pool.
76
86
77
87
## Related content
78
88
79
89
- [Microsoft Dev Box team customizations](concept-what-are-team-customizations.md)
80
90
- [Configure imaging for Dev Box team customizations](how-to-configure-customization-imaging.md)
81
-
- [Add and configure a catalog from GitHub or Azure Repos](../deployment-environments/how-to-configure-catalog.md)
91
+
- Learn how to [add and configure a catalog from GitHub or Azure Repos](../deployment-environments/how-to-configure-catalog.md).
Copy file name to clipboardExpand all lines: articles/frontdoor/apex-domain.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,6 +10,8 @@ ms.date: 03/31/2024
10
10
11
11
# Apex domains in Azure Front Door
12
12
13
+
**Applies to:**:heavy_check_mark: Front Door Standard :heavy_check_mark: Front Door Premium
14
+
13
15
Apex domains, also called *root domains*, or *naked domains*, are at the root of a Domain Name System (DNS) zone and don't contain subdomains. For example, `contoso.com` is an apex domain.
14
16
15
17
Azure Front Door supports apex domains, but requires special considerations. This article describes how apex domains work in Azure Front Door.
Copy file name to clipboardExpand all lines: articles/frontdoor/billing.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,6 +10,8 @@ ms.date: 12/28/2023
10
10
11
11
# Understand Azure Front Door billing
12
12
13
+
**Applies to:**:heavy_check_mark: Front Door Standard :heavy_check_mark: Front Door Premium
14
+
13
15
Azure Front Door provides a rich set of features for your internet-facing workloads. Front Door helps you to accelerate your application's performance, improves your security, and provides you with tools to inspect and modify your HTTP traffic.
14
16
15
17
Front Door's billing model includes several components. Front Door charges a base fee for each profile that you deploy. You're also charged for requests and data transfer based on your usage. *Billing meters* collect information about your Front Door usage. Your monthly Azure bill aggregates the billing information across the month and applies the pricing to determine the amount you need to pay.
Copy file name to clipboardExpand all lines: articles/frontdoor/domain.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,6 +10,8 @@ ms.author: jodowns
10
10
11
11
# Domains in Azure Front Door
12
12
13
+
**Applies to:**:heavy_check_mark: Front Door Standard :heavy_check_mark: Front Door Premium
14
+
13
15
A *domain* represents a custom domain name that Azure Front Door uses to receive your application's traffic. Azure Front Door supports adding three types of domain names:
14
16
15
17
-**Subdomains** are the most common type of custom domain name. An example subdomain is `myapplication.contoso.com`.
# Connect Azure Front Door Premium to an Azure Application Gateway with Private Link
15
15
16
+
**Applies to:**:heavy_check_mark: Front Door Premium
17
+
16
18
This article guides you through the steps to configure an Azure Front Door Premium to connect privately to your Azure Application Gateway using Azure Private Link.
# Connect Azure Front Door Premium to a storage static website with Private Link
14
14
15
+
**Applies to:**:heavy_check_mark: Front Door Premium
16
+
15
17
::: zone pivot="front-door-portal"
16
18
17
19
This article guides you through how to configure Azure Front Door Premium tier to connect to your storage static website privately using the Azure Private Link service.
Copy file name to clipboardExpand all lines: articles/frontdoor/manager.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,6 +10,8 @@ ms.date: 11/13/2024
10
10
11
11
# What is Azure Front Door Manager?
12
12
13
+
**Applies to:**:heavy_check_mark: Front Door Standard :heavy_check_mark: Front Door Premium
14
+
13
15
Azure Front Door Manager in Azure Front Door Standard and Premium provides an overview of the endpoints configured for your Azure Front Door profile. With Front Door Manager, you can manage your collection of endpoints, configure routing rules, domains, origin groups, and apply security policies to protect your web application.
14
16
15
17
:::image type="content" source="./media/manager/manager.png" alt-text="Screenshot of the Azure Front Door Manager page." lightbox="./media/manager/manager-expanded.png":::
0 commit comments