You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/deploy-container-github-action.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -106,19 +106,19 @@ OpenID Connect is an authentication method that uses short-lived tokens. Setting
106
106
107
107
1. Run the following command to [create a new federated identity credential](/graph/api/application-post-federatedidentitycredentials?view=graph-rest-beta&preserve-view=true) for your active directory application.
108
108
109
-
* Replace `APPLICATION-OBJECT-ID` with the **objectId (generated while creating app)** for your Active Directory application.
110
-
* Set a value for `CREDENTIAL-NAME` to reference later.
111
-
* Set the `subject`. The value of this is defined by GitHub depending on your workflow:
112
-
* Jobs in your GitHub Actions environment: `repo:< Organization/Repository >:environment:< Name >`
113
-
* For Jobs not tied to an environment, include the ref path for branch/tag based on the ref path used for triggering the workflow: `repo:< Organization/Repository >:ref:< ref path>`. For example, `repo:n-username/ node_express:ref:refs/heads/my-branch` or `repo:n-username/ node_express:ref:refs/tags/my-tag`.
114
-
* For workflows triggered by a pull request event: `repo:< Organization/Repository >:pull_request`.
115
-
116
-
```azurecli
117
-
az rest --method POST --uri 'https://graph.microsoft.com/beta/applications/<APPLICATION-OBJECT-ID>/federatedIdentityCredentials' --body '{"name":"<CREDENTIAL-NAME>","issuer":"https://token.actions.githubusercontent.com","subject":"repo:organization/repository:ref:refs/heads/main","description":"Testing","audiences":["api://AzureADTokenExchange"]}'
118
-
```
119
-
120
-
To learn how to create a Create an active directory application, service principal, and federated credentials in Azure portal, see [Connect GitHub and Azure](/azure/developer/github/connect-from-azure#use-the-azure-login-action-with-openid-connect).
121
-
109
+
* Replace `APPLICATION-OBJECT-ID` with the **objectId (generated while creating app)** for your Active Directory application.
110
+
* Set a value for `CREDENTIAL-NAME` to reference later.
111
+
* Set the `subject`. The value of this is defined by GitHub depending on your workflow:
112
+
* Jobs in your GitHub Actions environment: `repo:< Organization/Repository >:environment:< Name >`
113
+
* For Jobs not tied to an environment, include the ref path for branch/tag based on the ref path used for triggering the workflow: `repo:< Organization/Repository >:ref:< ref path>`. For example, `repo:n-username/ node_express:ref:refs/heads/my-branch` or `repo:n-username/ node_express:ref:refs/tags/my-tag`.
114
+
* For workflows triggered by a pull request event: `repo:< Organization/Repository >:pull_request`.
115
+
116
+
```azurecli
117
+
az rest --method POST --uri 'https://graph.microsoft.com/beta/applications/<APPLICATION-OBJECT-ID>/federatedIdentityCredentials' --body '{"name":"<CREDENTIAL-NAME>","issuer":"https://token.actions.githubusercontent.com","subject":"repo:organization/repository:ref:refs/heads/main","description":"Testing","audiences":["api://AzureADTokenExchange"]}'
118
+
```
119
+
120
+
To learn how to create a Create an active directory application, service principal, and federated credentials in Azure portal, see [Connect GitHub and Azure](/azure/developer/github/connect-from-azure#use-the-azure-login-action-with-openid-connect).
Copy file name to clipboardExpand all lines: articles/app-service/deploy-github-actions.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -130,17 +130,17 @@ OpenID Connect is an authentication method that uses short-lived tokens. Setting
130
130
131
131
1. Run the following command to [create a new federated identity credential](/graph/api/application-post-federatedidentitycredentials?view=graph-rest-beta&preserve-view=true) for your active directory application.
132
132
133
-
* Replace `APPLICATION-OBJECT-ID` with the **objectId (generated while creating app)** for your Active Directory application.
134
-
* Set a value for `CREDENTIAL-NAME` to reference later.
135
-
* Set the `subject`. The value of this is defined by GitHub depending on your workflow:
136
-
* Jobs in your GitHub Actions environment: `repo:< Organization/Repository >:environment:< Name >`
137
-
* For Jobs not tied to an environment, include the ref path for branch/tag based on the ref path used for triggering the workflow: `repo:< Organization/Repository >:ref:< ref path>`. For example, `repo:n-username/ node_express:ref:refs/heads/my-branch` or `repo:n-username/ node_express:ref:refs/tags/my-tag`.
138
-
* For workflows triggered by a pull request event: `repo:< Organization/Repository >:pull_request`.
139
-
140
-
```azurecli
141
-
az rest --method POST --uri 'https://graph.microsoft.com/beta/applications/<APPLICATION-OBJECT-ID>/federatedIdentityCredentials' --body '{"name":"<CREDENTIAL-NAME>","issuer":"https://token.actions.githubusercontent.com","subject":"repo:organization/repository:ref:refs/heads/main","description":"Testing","audiences":["api://AzureADTokenExchange"]}'
142
-
```
143
-
133
+
* Replace `APPLICATION-OBJECT-ID` with the **objectId (generated while creating app)** for your Active Directory application.
134
+
* Set a value for `CREDENTIAL-NAME` to reference later.
135
+
* Set the `subject`. The value of this is defined by GitHub depending on your workflow:
136
+
* Jobs in your GitHub Actions environment: `repo:< Organization/Repository >:environment:< Name >`
137
+
* For Jobs not tied to an environment, include the ref path for branch/tag based on the ref path used for triggering the workflow: `repo:< Organization/Repository >:ref:< ref path>`. For example, `repo:n-username/ node_express:ref:refs/heads/my-branch` or `repo:n-username/ node_express:ref:refs/tags/my-tag`.
138
+
* For workflows triggered by a pull request event: `repo:< Organization/Repository >:pull_request`.
139
+
140
+
```azurecli
141
+
az rest --method POST --uri 'https://graph.microsoft.com/beta/applications/<APPLICATION-OBJECT-ID>/federatedIdentityCredentials' --body '{"name":"<CREDENTIAL-NAME>","issuer":"https://token.actions.githubusercontent.com","subject":"repo:organization/repository:ref:refs/heads/main","description":"Testing","audiences":["api://AzureADTokenExchange"]}'
142
+
```
143
+
144
144
To learn how to create a Create an active directory application, service principal, and federated credentials in Azure portal, see [Connect GitHub and Azure](/azure/developer/github/connect-from-azure#use-the-azure-login-action-with-openid-connect).
0 commit comments