Skip to content

Commit 83baac8

Browse files
committed
credentials edits
1 parent b5ff248 commit 83baac8

File tree

1 file changed

+18
-18
lines changed

1 file changed

+18
-18
lines changed

articles/azure-functions/durable/durable-functions-configure-durable-functions-with-credentials.md

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
11
---
2-
title: "Quickstart: Authenticate a durable function app by using Microsoft Entra ID"
3-
description: Authenticate a durable function app in Azure Functions by using either managed identity credentials or client secret credentials in Microsoft Entra ID.
2+
title: "Quickstart: Authenticate a Durable Functions app by using Microsoft Entra ID"
3+
description: Authenticate a Durable Functions app in Azure Functions by using either managed identity credentials or client secret credentials in Microsoft Entra ID.
44
author: naiyuantian
55
ms.topic: quickstart
66
ms.date: 02/01/2023
77
ms.author: azfuncdf
88
---
99

10-
# Quickstart: Authenticate a durable function app by using Microsoft Entra ID
10+
# Quickstart: Authenticate a Durable Functions app by using Microsoft Entra ID
1111

1212
[Microsoft Entra ID](/entra/fundamentals/whatis) is a cloud-based identity and access management service. Identity-based connections allow Durable Functions, a feature of Azure Functions, to make authorized requests against Microsoft Entra-protected resources, such as an Azure Storage account, without using manually managed secrets. When Durable Functions uses the default Azure storage provider, it must authenticate against an Azure storage account.
1313

14-
In this quickstart, we demonstrate how to configure a durable function app to use two different kinds of identity-based connections:
14+
In this quickstart, you complete the steps to set up a Durable Functions app to use two different kinds of identity-based connections:
1515

1616
* Managed identity credentials (recommended)
1717
* Client secret credentials
@@ -22,10 +22,10 @@ If you don't have an Azure account, create a [free account](https://azure.micros
2222

2323
To complete this quickstart, you need:
2424

25-
* An existing durable function project created in the Azure portal or a local durable function project deployed to Azure.
26-
* Familiarity running a durable function app in Azure.
25+
* An existing Durable Functions project created in the Azure portal or a local Durable Functions project deployed to Azure.
26+
* Familiarity running a Durable Functions app in Azure.
2727

28-
If you don't have an existing durable function project deployed in Azure, we recommend that you start with one of the following quickstarts:
28+
If you don't have an existing Durable Functions project deployed in Azure, we recommend that you start with one of the following quickstarts:
2929

3030
* [Create your first Durable Functions app - C#](durable-functions-isolated-create-first-csharp.md)
3131
* [Create your first Durable Functions app - JavaScript](quickstart-js-vscode.md)
@@ -60,7 +60,7 @@ Before you can use your app's managed identity, make some changes to the app con
6060

6161
1. In the list of settings, select **AzureWebJobsStorage** and select the **Delete** icon.
6262

63-
![Screenshot of the default storage settings and deleting AzureWebJobsStorage.](./media/durable-functions-configure-df-with-credentials/durable-functions-managed-identity-scenario-01.png)
63+
:::image type="content" source="media/durable-functions-configure-df-with-credentials/durable-functions-managed-identity-scenario-01.png" alt-text="Screenshot that shows default storage settings and deleting AzureWebJobsStorage.":::
6464

6565
1. Add a setting to link your Azure storage account to the application.
6666

@@ -91,7 +91,7 @@ Before you can use your app's managed identity, make some changes to the app con
9191

9292
You can get the values for these URI variables in the storage account on the **Endpoints** tab.
9393

94-
![Screenshot that shows an example of an endpoint as a specific service URL.](media/durable-functions-configure-df-with-credentials/durable-functions-managed-identity-scenario-02.png)
94+
:::image type="content" source="media/durable-functions-configure-df-with-credentials/durable-functions-managed-identity-scenario-02.png" alt-text="Screenshot that shows an example of an endpoint as a specific service URI.":::
9595

9696
1. Finish your managed identity configuration:
9797

@@ -103,11 +103,11 @@ Before you can use your app's managed identity, make some changes to the app con
103103

104104
* For **AzureWebJobsStorage__clientId**, get this GUID value from the Microsoft Entra admin center.
105105

106-
![Screenshot that shows the user identity client ID.](media/durable-functions-configure-df-with-credentials/durable-functions-managed-identity-scenario-03.png)
106+
:::image type="content" source="media/durable-functions-configure-df-with-credentials/durable-functions-managed-identity-scenario-03.png" alt-text="Screenshot that shows the user identity client ID.":::
107107

108108
## Configure your app to use client secret credentials
109109

110-
Registering a client application in Microsoft Entra ID is another way that you can configure access to an Azure service for your durable function app. In the following steps, you use client secret credentials for authentication to your Azure Storage account. Function apps can use this method both locally and in Azure. Using a client secret credential is *less recommended* than using managed identity credentials because a client secret is more complicated to configure and manage. A client secret credential also requires sharing a secret credential with the Azure Functions service.
110+
Registering a client application in Microsoft Entra ID is another way that you can configure access to an Azure service for your Durable Functions app. In the following steps, you use client secret credentials for authentication to your Azure Storage account. Function apps can use this method both locally and in Azure. Using a client secret credential is *less recommended* than using managed identity credentials because a client secret is more complicated to configure and manage. A client secret credential also requires sharing a secret credential with the Azure Functions service.
111111

112112
<a name='register-a-client-application-on-azure-active-directory'></a>
113113

@@ -127,7 +127,7 @@ Registering a client application in Microsoft Entra ID is another way that you c
127127

128128
The secret value doesn't appear again after you leave the pane, so be sure that you *copy the secret and save it*.
129129

130-
![Screenshot of the Add a client secret pane.](media/durable-functions-configure-df-with-credentials/durable-functions-client-secret-scenario-01.png)
130+
:::image type="content" source="media/durable-functions-configure-df-with-credentials/durable-functions-client-secret-scenario-01.png" alt-text="Screenshot that shows the Add a client secret pane.":::
131131

132132
### Assign access roles to your application
133133

@@ -143,11 +143,11 @@ To add the roles:
143143

144144
1. In the resource menu, select **Access Control (IAM)**, and then select **Add role assignment**.
145145

146-
![Screenshot of the Access control pane with Add role assignment highlighted.](media/durable-functions-configure-df-with-credentials/durable-functions-client-secret-scenario-02.png)
146+
:::image type="content" source="media/durable-functions-configure-df-with-credentials/durable-functions-client-secret-scenario-02.png" alt-text="Screenshot that shows the Access control pane with Add role assignment highlighted.":::
147147

148148
1. Select the role you want to add, select **Next**, and then search for your application. Review the role, and then add the role.
149149

150-
![Screenshot of the role assignment pane.](media/durable-functions-configure-df-with-credentials/durable-functions-client-secret-scenario-03.png)
150+
:::image type="content" source="media/durable-functions-configure-df-with-credentials/durable-functions-client-secret-scenario-03.png" alt-text="Screenshot that shows the role assignment pane.":::
151151

152152
### Configure the client secret
153153

@@ -170,7 +170,7 @@ In the Azure portal, run and test the application. To run and test the app local
170170
* **Non-Azure cloud**: If your application runs in a cloud outside of Azure, you must add a specific service URI (endpoint) for the storage account instead of an account name.
171171

172172
> [!NOTE]
173-
> If you're using [Azure Government](../../azure-government/documentation-government-welcome.md) or any other cloud that's separate from public Azure, you must use the option to provide a specific service URL. For more information about using Azure Storage with Azure Government, see [Develop by using the Storage API in Azure Government](../../azure-government/documentation-government-get-started-connect-to-storage.md).
173+
> If you use [Azure Government](../../azure-government/documentation-government-welcome.md) or any other cloud that's separate from public Azure, you must use the option to provide a specific service URL. For more information about using Azure Storage with Azure Government, see [Develop by using the Storage API in Azure Government](../../azure-government/documentation-government-get-started-connect-to-storage.md).
174174
175175
* `AzureWebJobsStorage__<blobServiceUri>`
176176

@@ -186,7 +186,7 @@ In the Azure portal, run and test the application. To run and test the app local
186186

187187
You can get the values for these URI variables in the storage account on the **Endpoints** tab.
188188

189-
![Screenshot that shows an example of an endpoint as a specific service URI.](media/durable-functions-configure-df-with-credentials/durable-functions-managed-identity-scenario-02.png)
189+
:::image type="content" source="media/durable-functions-configure-df-with-credentials/durable-functions-managed-identity-scenario-02.png" alt-text="Screenshot that shows an example of an endpoint as a specific service URI.":::
190190

191191
1. To add client secret credentials, specify the following values:
192192

@@ -196,6 +196,6 @@ In the Azure portal, run and test the application. To run and test the app local
196196

197197
* **AzureWebJobsStorage__tenantId**: The tenant ID that the Microsoft Entra application is registered in. Get this GUID value on the Microsoft Entra application pane.
198198

199-
The values to use for the client ID and the tenant ID appear on your client application’s overview pane. The client secret value is the one that you saved in an earlier step. The client secret value isn't available after the page is refreshed.
199+
The values to use for the client ID and the tenant ID appear on your client application Overview pane. The client secret value is the one that you saved in an earlier step. The client secret value isn't available after the page is refreshed.
200200

201-
![Screenshot that shows the tenant ID and client ID on a Microsoft Entra application pane.](media/durable-functions-configure-df-with-credentials/durable-functions-client-secret-scenario-04.png)
201+
:::image type="content" source="media/durable-functions-configure-df-with-credentials/durable-functions-client-secret-scenario-04.png" alt-text="Screenshot that shows the tenant ID and client ID on a Microsoft Entra application pane.":::

0 commit comments

Comments
 (0)