You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/deploy-container-github-action.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -126,7 +126,7 @@ OpenID Connect is an authentication method that uses short-lived tokens. Setting
126
126
127
127
# [Publish profile](#tab/publish-profile)
128
128
129
-
In [GitHub](https://github.com/), browse your repository, select **Security > Secrets and variables > Actions > New repository secret**.
129
+
In [GitHub](https://github.com/), browse your repository, select **Settings > Security > Secrets and variables > Actions > New repository secret**.
130
130
131
131
To use [app-level credentials](#generate-deployment-credentials), paste the contents of the downloaded publish profile file into the secret's value field. Name the secret `AZURE_WEBAPP_PUBLISH_PROFILE`.
132
132
@@ -140,7 +140,7 @@ When you configure your GitHub workflow, you use the `AZURE_WEBAPP_PUBLISH_PROFI
140
140
141
141
# [Service principal](#tab/service-principal)
142
142
143
-
In [GitHub](https://github.com/), browse your repository, select **Security > Secrets and variables > Actions > New repository secret**.
143
+
In [GitHub](https://github.com/), browse your repository, select **Settings > Security > Secrets and variables > Actions > New repository secret**.
144
144
145
145
To use [user-level credentials](#generate-deployment-credentials), paste the entire JSON output from the Azure CLI command into the secret's value field. Give the secret the name like `AZURE_CREDENTIALS`.
146
146
@@ -156,7 +156,7 @@ When you configure the workflow file later, you use the secret for the input `cr
156
156
157
157
You need to provide your application's **Client ID**, **Tenant ID** and **Subscription ID** to the login action. These values can either be provided directly in the workflow or can be stored in GitHub secrets and referenced in your workflow. Saving the values as GitHub secrets is the more secure option.
158
158
159
-
1. Open your GitHub repository and go to **Security > Secrets and variables > Actions > New repository secret**.
159
+
1. Open your GitHub repository and go to **Settings > Security > Secrets and variables > Actions > New repository secret**.
160
160
161
161
1. Create secrets for `AZURE_CLIENT_ID`, `AZURE_TENANT_ID`, and `AZURE_SUBSCRIPTION_ID`. Use these values from your Active Directory application for your GitHub secrets. You can find these values in the Azure portal by searching for your active directory application.
Copy file name to clipboardExpand all lines: articles/app-service/deploy-github-actions.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -160,7 +160,7 @@ To learn how to create a Create an active directory application, service princip
160
160
161
161
# [Publish profile](#tab/applevel)
162
162
163
-
In [GitHub](https://github.com/), browse your repository, select **Settings > Secrets > Add a new secret**.
163
+
In [GitHub](https://github.com/), browse your repository, select **Settings > Security > Secrets and variables > Actions > New repository secret**.
164
164
165
165
To use [app-level credentials](#generate-deployment-credentials), paste the contents of the downloaded publish profile file into the secret's value field. Name the secret `AZURE_WEBAPP_PUBLISH_PROFILE`.
166
166
@@ -174,7 +174,7 @@ When you configure your GitHub workflow, you use the `AZURE_WEBAPP_PUBLISH_PROFI
174
174
175
175
# [Service principal](#tab/userlevel)
176
176
177
-
In [GitHub](https://github.com/), browse your repository, select **Settings > Secrets > Add a new secret**.
177
+
In [GitHub](https://github.com/), browse your repository, select **Settings > Security > Secrets and variables > Actions > New repository secret**.
178
178
179
179
To use [user-level credentials](#generate-deployment-credentials), paste the entire JSON output from the Azure CLI command into the secret's value field. Give the secret the name `AZURE_CREDENTIALS`.
180
180
@@ -190,7 +190,7 @@ When you configure the workflow file later, you use the secret for the input `cr
190
190
191
191
You need to provide your application's **Client ID**, **Tenant ID** and **Subscription ID** to the login action. These values can either be provided directly in the workflow or can be stored in GitHub secrets and referenced in your workflow. Saving the values as GitHub secrets is the more secure option.
192
192
193
-
1. Open your GitHub repository and go to **Settings**.
193
+
1. Open your GitHub repository and go to **Settings > Security > Secrets and variables > Actions > New repository secret**.
194
194
195
195
1. Create secrets for `AZURE_CLIENT_ID`, `AZURE_TENANT_ID`, and `AZURE_SUBSCRIPTION_ID`. Use these values from your Active Directory application for your GitHub secrets:
0 commit comments