You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-app-configuration/use-key-vault-references-dotnet-core.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ ms.custom: mvc
22
22
23
23
In this tutorial, you learn how to use the Azure App Configuration service together with Azure Key Vault. App Configuration and Key Vault are complementary services used side by side in most application deployments.
24
24
25
-
App Configuration helps you use the services together by creating keys that reference values stored in Key Vault. When App Configuration creates such keys, it stores URIs to Key Vault values rather than the values themselves.
25
+
App Configuration helps you use the services together by creating keys that reference values stored in Key Vault. When App Configuration creates such keys, it stores the URIs of Key Vault values rather than the values themselves.
26
26
27
27
Your application uses the App Configuration client provider to retrieve the Key Vault values, just as it does for any other keys stored in App Configuration. Because the client provider recognizes the keys as Key Vault references, it uses Key Vault to retrieve their values.
28
28
@@ -46,14 +46,14 @@ Before you start this tutorial, install the [.NET Core SDK](https://dotnet.micro
46
46
47
47
## Create a vault
48
48
49
-
1. Select the **Create a resource** option in the upper-left corner of the Azure portal.
49
+
1. Select the **Create a resource** option in the upper-left corner of the Azure portal:
50
50
51
51

52
52
1. In the search box, enter **Key Vault**.
53
53
1. From the results list, select **Key Vault**.
54
-
1.On the **Key Vault** pane, select **Create**.
55
-
1.On the **Create key vault** pane, provide the following information:
56
-
- In the **Name** box, enter **Contoso-vault2**. The name must be unique.
54
+
1.In the **Key Vault** pane, select **Create**.
55
+
1.In the **Create key vault** pane, provide the following information:
56
+
- In **Name**, a unique name is required. For this tutorial, enter **Contoso-vault2**.
57
57
- In **Subscription**, choose a subscription.
58
58
- Under **Resource Group**, select **Create new** and enter a resource group name.
59
59
- In the **Location** drop-down menu, choose a location.
@@ -68,9 +68,9 @@ At this point, your Azure account is the only one authorized to access this new
68
68
69
69
To add a secret to the vault, you need to take just a few additional steps. In this case, add a message that you can use to test Key Vault retrieval. The message is called **Message**, and you store the value "Hello from Key Vault" in it.
70
70
71
-
1.On the **Key Vault** properties pages, select **Secrets**.
71
+
1.From the Key Vault properties pages, select **Secrets**.
72
72
1. Select **Generate/Import**.
73
-
1. In the **Create a secret**window, enter the following values:
73
+
1. In the **Create a secret**pane, enter the following values:
74
74
-**Upload options**: Enter **manual**.
75
75
-**Name**: Enter **Message**.
76
76
-**Value**: Enter **Hello from Key Vault**.
@@ -79,11 +79,11 @@ To add a secret to the vault, you need to take just a few additional steps. In t
79
79
80
80
## Add a Key Vault reference to App Configuration
81
81
82
-
1. Sign in to the [Azure portal](https://portal.azure.com). Select **All resources**, and select the App Configuration store instance that you created in the quickstart.
82
+
1. Sign in to the [Azure portal](https://portal.azure.com). Select **All resources**, and then select the App Configuration store instance that you created in the quickstart.
83
83
84
84
1. Select **Configuration Explorer**.
85
85
86
-
1. Select **+ Create** > **Key vault reference**, and then enter or select the following values:
86
+
1. Select **+ Create** > **Key vault reference**, and then specify the following values:
-**Subscription**, **Resource group**, and **Key vault**: Enter the values corresponding to those in the key vault you created in the previous section.
@@ -97,7 +97,7 @@ To add a secret to the vault, you need to take just a few additional steps. In t
97
97
az ad sp create-for-rbac -n "http://mySP" --sdk-auth
98
98
```
99
99
100
-
This operation returns the following series of key/value pairs:
100
+
This operation returns a series of key/value pairs:
101
101
102
102
```console
103
103
{
@@ -194,7 +194,7 @@ To add a secret to the vault, you need to take just a few additional steps. In t
194
194
dotnet build
195
195
```
196
196
197
-
1. After the build is successfully completed, use the following command to run the web app locally:
197
+
1. After the build is complete, use the following command to run the web app locally:
0 commit comments