You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-app-configuration/quickstart-deployment-overview.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ You must have permissions to manage Azure App Configuration resources. Azure rol
23
23
- The Azure Resource Manager Owner role
24
24
- The Azure Resource Manager Contributor role
25
25
26
-
To learn more about Azure RBAC and Microsoft Entra ID, see [Authorize access to Azure App Configuration using Microsoft Entra ID](./concetp-enable-rbac.md)
26
+
To learn more about Azure RBAC and Microsoft Entra ID, see [Authorize access to Azure App Configuration using Microsoft Entra ID](./concetp-enable-rbac.md).
27
27
28
28
## Manage Azure App Configuration data in deployment
29
29
Azure App Configuration data, such as key-values and snapshots, can be managed in deployment. It's recommended to configure **Pass-through** ARM authentication mode to require proper Azure App Configuration data plane authorization.
@@ -38,31 +38,31 @@ To configure ARM authentication mode of Azure App Configuration resource in the
38
38
39
39
:::image type="content" border="true" source="./media/access-settings-blade.png" alt-text="Screenshot showing how to access an Azure App Configuration resources access settings blade":::
40
40
41
-
3. Select the recommended **Pass-through** authentication mode under **Azure Resouce Manager Authentication Mode**.
41
+
3. Select the recommended **Pass-through** authentication mode under **Azure Resource Manager Authentication Mode**.
42
42
43
43
:::image type="content" border="true" source="./media/quickstarts/deployment/select-passthrough-authentication-mode.png" alt-text="Screenshot showing pass-through authentication mode being selected under Azure Resource Manager Authentication Mode":::
44
44
45
45
---
46
46
47
47
> [!NOTE]
48
-
> Local authentication mode is for backward compatibility and has several limitations. It does not support proper auditing for accessing data in deployment. Under local authentication mode, key-value data access inside an ARM template/Bicep/Terraform is disabled if [access key authentication is disabled](./howto-disable-access-key-authentication.md#limitations). Azure App Configuration data plane permissions are not required for accessing data under local authentication mode.
48
+
> Local authentication mode is for backward compatibility and has several limitations. It does not support proper auditing for accessing data in deployment. Under local authentication mode, key-value data access inside an ARM template/Bicep/Terraform is disabled if [access key authentication is disabled](./howto-disable-access-key-authentication.md#limitations). Azure App Configuration data plane permissions are not required for accessing data under local authentication mode.
49
49
50
50
### Authorization
51
-
You must have permissions to read and manage Azure App Configuration data in deployment. In addition to the permissions required for Azure App Configuration resource, which are provided by built-in Owner or Contributor roles, Azure App Configuration data plane permissions including Microsoft.AppConfiguration/configurationStores/keyValues/read and Microsoft.AppConfiguration/configurationStores/snapshots/read are also required under pass-through authentication mode. Built-in roles with this action include:
51
+
In addition to the permissions required for managing Azure App Configuration resource, you must have data plane permissions to read and manage Azure App Configuration data in deployment under pass-through mode. Azure App Configuration data plane permissions includes Microsoft.AppConfiguration/configurationStores/keyValues/read and Microsoft.AppConfiguration/configurationStores/snapshots/read. Built-in roles with this action include:
52
52
- App Configuration Data Owner
53
53
- App Configuration Data Reader
54
54
55
55
To learn more about Azure RBAC and Microsoft Entra ID, see [Authorize access to Azure App Configuration using Microsoft Entra ID](./concetp-enable-rbac.md)
56
56
57
-
### ARM prviate access
57
+
### ARM private access
58
58
[Azure Resource Management Private Link](../../includes/resource-manager-create-rmpl.md) can be set up to restrict access for managing resources in your virtual network. Azure App Configuration supports ARM Private Link access to the App Configuration data with pass-through authentication mode and ARM private access enabled.
59
59
60
60
# [Azure portal](#tab/portal)
61
61
62
62
To configure ARM private access of Azure App Configuration resource in the Azure portal, follow these steps:
63
63
64
64
1. Navigate to your Azure App Configuration resource in the Azure portal.
65
-
2. Locate the **Networkinng** setting under **Settings**.
65
+
2. Locate the **Networking** setting under **Settings**.
66
66
67
67
:::image type="content" border="true" source="./media/networking-blade.png" alt-text="Screenshot showing how to access an Azure App Configuration resources networking blade":::
0 commit comments