You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/iot-central/core/howto-integrate-with-devops.md
+6-4Lines changed: 6 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,7 +50,7 @@ You need the following prerequisites to complete the steps in this guide:
50
50
51
51
## Download the sample code
52
52
53
-
To get started, fork the IoT Central CI/CD GitHub repository and then clone your fork to your local machine:
53
+
To get started, fork the IoT Central CI/CD GitHub repository and then clne your fork to your local machine:o
54
54
55
55
1. To fork the GitHub repository, open the [IoT Central CI/CD GitHub repository](https://github.com/Azure/iot-central-CICD-sample) and select **Fork**.
56
56
@@ -212,8 +212,8 @@ Now that you have a configuration file that represents the settings for your dev
@@ -237,7 +237,9 @@ Now that you have a configuration file that represents the settings for your dev
237
237
az keyvault secret set --name FileUpload --vault-name {your production key vault name} --value '{your production storage account connection string}'
238
238
```
239
239
240
-
1. If your application uses data exports, add secrets for the destinations to the production key vault. The config file doesn't contain any actual secrets for your destination, the secrets are stored in your key vault.
240
+
1. If your application uses managed identities for data export destinations, there are no secrets for you to manage. However, you do need to enable the system-assigned managed identity for your production IoT Central application and give it the necessary permissions to write to the destination.
241
+
242
+
1. If your application uses connection strings for data export destinations, add secrets for the destinations to the production key vault. The config file doesn't contain any actual secrets for your destination, the secrets are stored in your key vault.
241
243
1. Update the secrets in the config file with the name of the secret in your key vault.
0 commit comments