Skip to content

Commit 9cb295a

Browse files
committed
Fixing spacing for OIDC article addition
1 parent 7ea821e commit 9cb295a

File tree

2 files changed

+24
-24
lines changed

2 files changed

+24
-24
lines changed

articles/app-service/deploy-container-github-action.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -106,19 +106,19 @@ OpenID Connect is an authentication method that uses short-lived tokens. Setting
106106
107107
1. Run the following command to [create a new federated identity credential](/graph/api/application-post-federatedidentitycredentials?view=graph-rest-beta&preserve-view=true) for your active directory application.
108108
109-
* Replace `APPLICATION-OBJECT-ID` with the **objectId (generated while creating app)** for your Active Directory application.
110-
* Set a value for `CREDENTIAL-NAME` to reference later.
111-
* Set the `subject`. The value of this is defined by GitHub depending on your workflow:
112-
* Jobs in your GitHub Actions environment: `repo:< Organization/Repository >:environment:< Name >`
113-
* For Jobs not tied to an environment, include the ref path for branch/tag based on the ref path used for triggering the workflow: `repo:< Organization/Repository >:ref:< ref path>`. For example, `repo:n-username/ node_express:ref:refs/heads/my-branch` or `repo:n-username/ node_express:ref:refs/tags/my-tag`.
114-
* For workflows triggered by a pull request event: `repo:< Organization/Repository >:pull_request`.
115-
116-
```azurecli
117-
az rest --method POST --uri 'https://graph.microsoft.com/beta/applications/<APPLICATION-OBJECT-ID>/federatedIdentityCredentials' --body '{"name":"<CREDENTIAL-NAME>","issuer":"https://token.actions.githubusercontent.com","subject":"repo:organization/repository:ref:refs/heads/main","description":"Testing","audiences":["api://AzureADTokenExchange"]}'
118-
```
119-
120-
To learn how to create a Create an active directory application, service principal, and federated credentials in Azure portal, see [Connect GitHub and Azure](/azure/developer/github/connect-from-azure#use-the-azure-login-action-with-openid-connect).
121-
109+
* Replace `APPLICATION-OBJECT-ID` with the **objectId (generated while creating app)** for your Active Directory application.
110+
* Set a value for `CREDENTIAL-NAME` to reference later.
111+
* Set the `subject`. The value of this is defined by GitHub depending on your workflow:
112+
* Jobs in your GitHub Actions environment: `repo:< Organization/Repository >:environment:< Name >`
113+
* For Jobs not tied to an environment, include the ref path for branch/tag based on the ref path used for triggering the workflow: `repo:< Organization/Repository >:ref:< ref path>`. For example, `repo:n-username/ node_express:ref:refs/heads/my-branch` or `repo:n-username/ node_express:ref:refs/tags/my-tag`.
114+
* For workflows triggered by a pull request event: `repo:< Organization/Repository >:pull_request`.
115+
116+
```azurecli
117+
az rest --method POST --uri 'https://graph.microsoft.com/beta/applications/<APPLICATION-OBJECT-ID>/federatedIdentityCredentials' --body '{"name":"<CREDENTIAL-NAME>","issuer":"https://token.actions.githubusercontent.com","subject":"repo:organization/repository:ref:refs/heads/main","description":"Testing","audiences":["api://AzureADTokenExchange"]}'
118+
```
119+
120+
To learn how to create a Create an active directory application, service principal, and federated credentials in Azure portal, see [Connect GitHub and Azure](/azure/developer/github/connect-from-azure#use-the-azure-login-action-with-openid-connect).
121+
122122
123123
---
124124
## Configure the GitHub secret for authentication

articles/app-service/deploy-github-actions.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -130,17 +130,17 @@ OpenID Connect is an authentication method that uses short-lived tokens. Setting
130130
131131
1. Run the following command to [create a new federated identity credential](/graph/api/application-post-federatedidentitycredentials?view=graph-rest-beta&preserve-view=true) for your active directory application.
132132
133-
* Replace `APPLICATION-OBJECT-ID` with the **objectId (generated while creating app)** for your Active Directory application.
134-
* Set a value for `CREDENTIAL-NAME` to reference later.
135-
* Set the `subject`. The value of this is defined by GitHub depending on your workflow:
136-
* Jobs in your GitHub Actions environment: `repo:< Organization/Repository >:environment:< Name >`
137-
* For Jobs not tied to an environment, include the ref path for branch/tag based on the ref path used for triggering the workflow: `repo:< Organization/Repository >:ref:< ref path>`. For example, `repo:n-username/ node_express:ref:refs/heads/my-branch` or `repo:n-username/ node_express:ref:refs/tags/my-tag`.
138-
* For workflows triggered by a pull request event: `repo:< Organization/Repository >:pull_request`.
139-
140-
```azurecli
141-
az rest --method POST --uri 'https://graph.microsoft.com/beta/applications/<APPLICATION-OBJECT-ID>/federatedIdentityCredentials' --body '{"name":"<CREDENTIAL-NAME>","issuer":"https://token.actions.githubusercontent.com","subject":"repo:organization/repository:ref:refs/heads/main","description":"Testing","audiences":["api://AzureADTokenExchange"]}'
142-
```
143-
133+
* Replace `APPLICATION-OBJECT-ID` with the **objectId (generated while creating app)** for your Active Directory application.
134+
* Set a value for `CREDENTIAL-NAME` to reference later.
135+
* Set the `subject`. The value of this is defined by GitHub depending on your workflow:
136+
* Jobs in your GitHub Actions environment: `repo:< Organization/Repository >:environment:< Name >`
137+
* For Jobs not tied to an environment, include the ref path for branch/tag based on the ref path used for triggering the workflow: `repo:< Organization/Repository >:ref:< ref path>`. For example, `repo:n-username/ node_express:ref:refs/heads/my-branch` or `repo:n-username/ node_express:ref:refs/tags/my-tag`.
138+
* For workflows triggered by a pull request event: `repo:< Organization/Repository >:pull_request`.
139+
140+
```azurecli
141+
az rest --method POST --uri 'https://graph.microsoft.com/beta/applications/<APPLICATION-OBJECT-ID>/federatedIdentityCredentials' --body '{"name":"<CREDENTIAL-NAME>","issuer":"https://token.actions.githubusercontent.com","subject":"repo:organization/repository:ref:refs/heads/main","description":"Testing","audiences":["api://AzureADTokenExchange"]}'
142+
```
143+
144144
To learn how to create a Create an active directory application, service principal, and federated credentials in Azure portal, see [Connect GitHub and Azure](/azure/developer/github/connect-from-azure#use-the-azure-login-action-with-openid-connect).
145145
146146
---

0 commit comments

Comments
 (0)