Skip to content

Commit 971b87a

Browse files
committed
GitHub UI path updates
1 parent 0d0a64b commit 971b87a

File tree

2 files changed

+6
-6
lines changed

2 files changed

+6
-6
lines changed

articles/app-service/deploy-container-github-action.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -126,7 +126,7 @@ OpenID Connect is an authentication method that uses short-lived tokens. Setting
126126
127127
# [Publish profile](#tab/publish-profile)
128128
129-
In [GitHub](https://github.com/), browse your repository, select **Security > Secrets and variables > Actions > New repository secret**.
129+
In [GitHub](https://github.com/), browse your repository, select **Settings > Security > Secrets and variables > Actions > New repository secret**.
130130
131131
To use [app-level credentials](#generate-deployment-credentials), paste the contents of the downloaded publish profile file into the secret's value field. Name the secret `AZURE_WEBAPP_PUBLISH_PROFILE`.
132132
@@ -140,7 +140,7 @@ When you configure your GitHub workflow, you use the `AZURE_WEBAPP_PUBLISH_PROFI
140140

141141
# [Service principal](#tab/service-principal)
142142

143-
In [GitHub](https://github.com/), browse your repository, select **Security > Secrets and variables > Actions > New repository secret**.
143+
In [GitHub](https://github.com/), browse your repository, select **Settings > Security > Secrets and variables > Actions > New repository secret**.
144144

145145
To use [user-level credentials](#generate-deployment-credentials), paste the entire JSON output from the Azure CLI command into the secret's value field. Give the secret the name like `AZURE_CREDENTIALS`.
146146

@@ -156,7 +156,7 @@ When you configure the workflow file later, you use the secret for the input `cr
156156
157157
You need to provide your application's **Client ID**, **Tenant ID** and **Subscription ID** to the login action. These values can either be provided directly in the workflow or can be stored in GitHub secrets and referenced in your workflow. Saving the values as GitHub secrets is the more secure option.
158158
159-
1. Open your GitHub repository and go to **Security > Secrets and variables > Actions > New repository secret**.
159+
1. Open your GitHub repository and go to **Settings > Security > Secrets and variables > Actions > New repository secret**.
160160
161161
1. Create secrets for `AZURE_CLIENT_ID`, `AZURE_TENANT_ID`, and `AZURE_SUBSCRIPTION_ID`. Use these values from your Active Directory application for your GitHub secrets. You can find these values in the Azure portal by searching for your active directory application.
162162

articles/app-service/deploy-github-actions.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -160,7 +160,7 @@ To learn how to create a Create an active directory application, service princip
160160
161161
# [Publish profile](#tab/applevel)
162162
163-
In [GitHub](https://github.com/), browse your repository, select **Settings > Secrets > Add a new secret**.
163+
In [GitHub](https://github.com/), browse your repository, select **Settings > Security > Secrets and variables > Actions > New repository secret**.
164164
165165
To use [app-level credentials](#generate-deployment-credentials), paste the contents of the downloaded publish profile file into the secret's value field. Name the secret `AZURE_WEBAPP_PUBLISH_PROFILE`.
166166
@@ -174,7 +174,7 @@ When you configure your GitHub workflow, you use the `AZURE_WEBAPP_PUBLISH_PROFI
174174

175175
# [Service principal](#tab/userlevel)
176176

177-
In [GitHub](https://github.com/), browse your repository, select **Settings > Secrets > Add a new secret**.
177+
In [GitHub](https://github.com/), browse your repository, select **Settings > Security > Secrets and variables > Actions > New repository secret**.
178178

179179
To use [user-level credentials](#generate-deployment-credentials), paste the entire JSON output from the Azure CLI command into the secret's value field. Give the secret the name `AZURE_CREDENTIALS`.
180180

@@ -190,7 +190,7 @@ When you configure the workflow file later, you use the secret for the input `cr
190190
191191
You need to provide your application's **Client ID**, **Tenant ID** and **Subscription ID** to the login action. These values can either be provided directly in the workflow or can be stored in GitHub secrets and referenced in your workflow. Saving the values as GitHub secrets is the more secure option.
192192
193-
1. Open your GitHub repository and go to **Settings**.
193+
1. Open your GitHub repository and go to **Settings > Security > Secrets and variables > Actions > New repository secret**.
194194
195195
1. Create secrets for `AZURE_CLIENT_ID`, `AZURE_TENANT_ID`, and `AZURE_SUBSCRIPTION_ID`. Use these values from your Active Directory application for your GitHub secrets:
196196

0 commit comments

Comments
 (0)