Skip to content

Commit 82c0967

Browse files
committed
attempt to fix numbering
1 parent a9da03d commit 82c0967

File tree

1 file changed

+22
-22
lines changed

1 file changed

+22
-22
lines changed

articles/spring-apps/enterprise/tutorial-managed-identities-key-vault.md

Lines changed: 22 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -266,31 +266,31 @@ This app has access to get secrets from Azure Key Vault. Use the Azure Key Vault
266266

267267
1. To use managed identity for an app deployed to Azure Spring Apps, add properties with the following content to the *src/main/resources/application.properties* file.
268268

269-
### [System-assigned managed identity](#tab/system-assigned-managed-identity)
269+
### [System-assigned managed identity](#tab/system-assigned-managed-identity)
270270

271-
```properties
272-
spring.cloud.azure.keyvault.secret.property-sources[0].endpoint=<your-keyvault-url>
273-
spring.cloud.azure.keyvault.secret.property-sources[0].credential.managed-identity-enabled=true
274-
```
271+
```properties
272+
spring.cloud.azure.keyvault.secret.property-sources[0].endpoint=<your-keyvault-url>
273+
spring.cloud.azure.keyvault.secret.property-sources[0].credential.managed-identity-enabled=true
274+
```
275275

276-
### [User-assigned managed identity](#tab/user-assigned-managed-identity)
276+
### [User-assigned managed identity](#tab/user-assigned-managed-identity)
277277

278-
Use the following command to query the client ID of the user-assigned managed identity:
278+
Use the following command to query the client ID of the user-assigned managed identity:
279279

280-
```azurecli
281-
az identity show \
282-
--resource-group ${RESOURCE_GROUP} \
283-
--name ${USER_ASSIGNED_IDENTITY} \
284-
--query clientId --output tsv
285-
```
280+
```azurecli
281+
az identity show \
282+
--resource-group ${RESOURCE_GROUP} \
283+
--name ${USER_ASSIGNED_IDENTITY} \
284+
--query clientId --output tsv
285+
```
286286

287-
```properties
288-
spring.cloud.azure.keyvault.secret.property-sources[0].endpoint=<your-keyvault-url>
289-
spring.cloud.azure.keyvault.secret.property-sources[0].credential.managed-identity-enabled=true
290-
spring.cloud.azure.keyvault.secret.property-sources[0].credential.client-id=<client-ID-of-user-assigned-managed-identity>
291-
```
287+
```properties
288+
spring.cloud.azure.keyvault.secret.property-sources[0].endpoint=<your-keyvault-url>
289+
spring.cloud.azure.keyvault.secret.property-sources[0].credential.managed-identity-enabled=true
290+
spring.cloud.azure.keyvault.secret.property-sources[0].credential.client-id=<client-ID-of-user-assigned-managed-identity>
291+
```
292292

293-
---
293+
---
294294

295295
> [!NOTE]
296296
> You must add the key vault URL in the *application.properties* file as shown previously. Otherwise, the key vault URL may not be captured during runtime.
@@ -340,7 +340,7 @@ spring.cloud.azure.keyvault.secret.property-sources[0].credential.client-id=<cli
340340

341341
::: zone pivot="sc-standard"
342342

343-
1. Use the following command to deploy your app to Azure Spring Apps:
343+
5. Use the following command to deploy your app to Azure Spring Apps:
344344

345345
```azurecli
346346
az spring app deploy \
@@ -354,7 +354,7 @@ spring.cloud.azure.keyvault.secret.property-sources[0].credential.client-id=<cli
354354

355355
::: zone pivot="sc-enterprise"
356356

357-
1. Use the following command to deploy your app to Azure Spring Apps:
357+
5. Use the following command to deploy your app to Azure Spring Apps:
358358

359359
```azurecli
360360
az spring app deploy \
@@ -367,7 +367,7 @@ spring.cloud.azure.keyvault.secret.property-sources[0].credential.client-id=<cli
367367

368368
::: zone-end
369369

370-
1. To test your app, access the public endpoint or test endpoint by using the following command:
370+
6. To test your app, access the public endpoint or test endpoint by using the following command:
371371

372372
```bash
373373
curl https://${SPRING_APPS}-${APP}.azuremicroservices.io/get

0 commit comments

Comments
 (0)