You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-functions/functions-identity-based-connections-tutorial.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.date: 10/20/2021
10
10
11
11
# Tutorial: Create a function app that connects to Azure services using identities instead of secrets
12
12
13
-
This tutorial shows you how to configure a function app using Azure Active Directory identities instead of secrets or connection strings, where possible. Using identities helps you avoid accidentally leaking sensitive secrets and can provide better visibility into how data is accessed. To learn more about identity-based connections, see [configure an identity-based connection.](functions-reference.md#configure-an-identity-based-connection).
13
+
This tutorial shows you how to configure a function app using Azure Active Directory identities instead of secrets or connection strings, where possible. Using identities helps you avoid accidentally leaking sensitive secrets and can provide better visibility into how data is accessed. To learn more about identity-based connections, see [configure an identity-based connection](functions-reference.md#configure-an-identity-based-connection).
14
14
15
15
While the procedures shown work generally for all languages, this tutorial currently supports C# class library functions on Windows specifically.
16
16
@@ -106,7 +106,7 @@ In order to use Azure Key Vault, your app will need to have an identity that can
106
106
107
107
1. Select **Save**. It might take a minute or two for the role to show up when you refresh the role assignments list for the identity.
108
108
109
-
The identity will now be able to read secrets stored in the vault. Later in the tutorial, you will add additional role assignments for different purposes.
109
+
The identity will now be able to read secrets stored in the key vault. Later in the tutorial, you will add additional role assignments for different purposes.
110
110
111
111
### Generate a template for creating a function app
112
112
@@ -304,7 +304,7 @@ Next you will update your function app to use its system-assigned identity when
304
304
| Option | Suggested value | Description |
305
305
| ------------ | ---------------- | ----------- |
306
306
| **Name** | AzureWebJobsStorage__accountName | Update the name from **AzureWebJobsStorage** to the exact name `AzureWebJobsStorage__accountName`. This setting tells the host to use the identity instead of looking for a stored secret. The new setting uses a double underscore (`__`), which is a special character in application settings. |
307
-
| **Value** | Your account name | Update the name from the connection string to just your **AccountName**. |
307
+
| **Value** | Your account name | Update the name from the connection string to just your **StorageAccountName**. |
308
308
309
309
This configuration will let the system know that it should use an identity to connect to the resource.
0 commit comments