Skip to content

Commit 940745a

Browse files
author
unknown
committed
Added image border
1 parent 2fde2b9 commit 940745a

File tree

2 files changed

+4
-5
lines changed

2 files changed

+4
-5
lines changed

articles/azure-app-configuration/pull-key-value-devops-pipeline.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -33,12 +33,11 @@ Assign the proper App Configuration role assignments to the credentials being us
3333
1. In the left menu, select **Access control (IAM)**.
3434
1. In the right pane, select **Add role assignments**.
3535

36-
<kbd>![Screenshot shows the Add role assignments button.](./media/azure-app-configuration-role-assignment/add-role-assignment-button.png)</kbd>
36+
:::image type="content" border="true" source="./media/azure-app-configuration-role-assignment/add-role-assignment-button.png" alt-text="Screenshot shows the Add role assignments button.":::
3737
1. For **Role**, select **App Configuration Data Reader**. This role allows the task to read from the App Configuration store.
3838
1. Select the service principal associated with the service connection that you created in the previous section.
3939

40-
<kbd>![Screenshot shows the Add role assignment dialog.](./media/azure-app-configuration-role-assignment/add-role-assignment-data-reader.png)</kbd>
41-
40+
:::image type="content" border="true" source="./media/azure-app-configuration-role-assignment/add-role-assignment-data-reader.png" alt-text="Screenshot shows the Add role assignment dialog.":::
4241
1. If the store contains Key Vault references, go to relevant Key Vault and assign **Key Vault Secret User** role to the service principal created in the previous step. From the Key Vault menu, select **Access policies** and ensure [Azure role-based access control](../articles/key-vault/general/rbac-guide.md) is selected as the permission model.
4342

4443
## Use in builds

articles/azure-app-configuration/push-kv-devops-pipeline.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33,11 +33,11 @@ Assign the proper App Configuration role assignments to the credentials being us
3333
1. In the left menu, select **Access control (IAM)**.
3434
1. In the right pane, select **Add role assignments**.
3535

36-
<kbd>![Screenshot shows the Add role assignments button.](./media/azure-app-configuration-role-assignment/add-role-assignment-button.png)</kbd>
36+
:::image type="content" border="true" source="./media/azure-app-configuration-role-assignment/add-role-assignment-button.png" alt-text="Screenshot shows the Add role assignments button.":::
3737
1. For **Role**, select **App Configuration Data Owner**. This role allows the task to read from and write to the App Configuration store.
3838
1. Select the service principal associated with the service connection that you created in the previous section.
3939

40-
<kbd>![Screenshot shows the Add role assignment dialog.](./media/azure-app-configuration-role-assignment/add-role-assignment-data-owner.png)</kbd>
40+
:::image type="content" border="true" source="./media/azure-app-configuration-role-assignment/add-role-assignment-data-owner.png" alt-text="Screenshot shows the Add role assignment dialog.":::
4141

4242
## Use in builds
4343

0 commit comments

Comments
 (0)