Skip to content

Commit 9b962d0

Browse files
author
BobbySchmidt2
committed
use-key-vault-references-dotnet-core
1 parent 29fe931 commit 9b962d0

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

articles/azure-app-configuration/use-key-vault-references-dotnet-core.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ ms.custom: mvc
2222

2323
In this tutorial, you learn how to use the Azure App Configuration service together with Azure Key Vault. App Configuration and Key Vault are complementary services used side by side in most application deployments.
2424

25-
App Configuration helps you use the services together by creating keys that reference values stored in Key Vault. When App Configuration creates such keys, it stores URIs to Key Vault values rather than the values themselves.
25+
App Configuration helps you use the services together by creating keys that reference values stored in Key Vault. When App Configuration creates such keys, it stores the URIs of Key Vault values rather than the values themselves.
2626

2727
Your application uses the App Configuration client provider to retrieve the Key Vault values, just as it does for any other keys stored in App Configuration. Because the client provider recognizes the keys as Key Vault references, it uses Key Vault to retrieve their values.
2828

@@ -46,14 +46,14 @@ Before you start this tutorial, install the [.NET Core SDK](https://dotnet.micro
4646

4747
## Create a vault
4848

49-
1. Select the **Create a resource** option in the upper-left corner of the Azure portal.
49+
1. Select the **Create a resource** option in the upper-left corner of the Azure portal:
5050

5151
![Output after key vault creation is complete](./media/quickstarts/search-services.png)
5252
1. In the search box, enter **Key Vault**.
5353
1. From the results list, select **Key Vault**.
54-
1. On the **Key Vault** pane, select **Create**.
55-
1. On the **Create key vault** pane, provide the following information:
56-
- In the **Name** box, enter **Contoso-vault2**. The name must be unique.
54+
1. In the **Key Vault** pane, select **Create**.
55+
1. In the **Create key vault** pane, provide the following information:
56+
- In **Name**, a unique name is required. For this tutorial, enter **Contoso-vault2**.
5757
- In **Subscription**, choose a subscription.
5858
- Under **Resource Group**, select **Create new** and enter a resource group name.
5959
- In the **Location** drop-down menu, choose a location.
@@ -68,9 +68,9 @@ At this point, your Azure account is the only one authorized to access this new
6868

6969
To add a secret to the vault, you need to take just a few additional steps. In this case, add a message that you can use to test Key Vault retrieval. The message is called **Message**, and you store the value "Hello from Key Vault" in it.
7070

71-
1. On the **Key Vault** properties pages, select **Secrets**.
71+
1. From the Key Vault properties pages, select **Secrets**.
7272
1. Select **Generate/Import**.
73-
1. In the **Create a secret** window, enter the following values:
73+
1. In the **Create a secret** pane, enter the following values:
7474
- **Upload options**: Enter **manual**.
7575
- **Name**: Enter **Message**.
7676
- **Value**: Enter **Hello from Key Vault**.
@@ -79,11 +79,11 @@ To add a secret to the vault, you need to take just a few additional steps. In t
7979

8080
## Add a Key Vault reference to App Configuration
8181

82-
1. Sign in to the [Azure portal](https://portal.azure.com). Select **All resources**, and select the App Configuration store instance that you created in the quickstart.
82+
1. Sign in to the [Azure portal](https://portal.azure.com). Select **All resources**, and then select the App Configuration store instance that you created in the quickstart.
8383

8484
1. Select **Configuration Explorer**.
8585

86-
1. Select **+ Create** > **Key vault reference**, and then enter or select the following values:
86+
1. Select **+ Create** > **Key vault reference**, and then specify the following values:
8787
- **Key**: Select **TestApp:Settings:KeyVaultMessage**.
8888
- **Label**: Leave this value blank.
8989
- **Subscription**, **Resource group**, and **Key vault**: Enter the values corresponding to those in the key vault you created in the previous section.
@@ -97,7 +97,7 @@ To add a secret to the vault, you need to take just a few additional steps. In t
9797
az ad sp create-for-rbac -n "http://mySP" --sdk-auth
9898
```
9999
100-
This operation returns the following series of key/value pairs:
100+
This operation returns a series of key/value pairs:
101101
102102
```console
103103
{
@@ -194,7 +194,7 @@ To add a secret to the vault, you need to take just a few additional steps. In t
194194
dotnet build
195195
```
196196
197-
1. After the build is successfully completed, use the following command to run the web app locally:
197+
1. After the build is complete, use the following command to run the web app locally:
198198
199199
```
200200
dotnet run

0 commit comments

Comments
 (0)