You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-app-configuration/concept-enable-rbac.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,15 +36,15 @@ All requests for [control plane](../azure-resource-manager/management/control-pl
36
36
> [!NOTE]
37
37
> After a role assignment is made for an identity, allow up to 15 minutes for the permission to propagate before accessing data stored in App Configuration using this identity.
38
38
39
-
## Authentication with Token Credentials
39
+
## Authentication with token credentials
40
40
41
41
To enable your application to authenticate with Microsoft Entra ID, the Azure Identity library supports various token credentials for Microsoft Entra ID authentication. For example, you might choose Visual Studio Credential when developing your application in Visual Studio, Workload Identity Credential when your application runs on Kubernetes, or Managed Identity Credential when your application is deployed in Azure services like Azure Functions.
42
42
43
43
### Use DefaultAzureCredential
44
44
45
45
The `DefaultAzureCredential` is a preconfigured [chain of token credentials](/dotnet/azure/sdk/authentication/credential-chains#defaultazurecredential-overview) that automatically attempts an ordered sequence of the most common authentication methods. Using the `DefaultAzureCredential` allows you to keep the same code in both local development and Azure environments. However, it's important to know which credential is being used in each environment, as you need to grant the appropriate roles for authorization to work. For example, authorize your own account when you expect the `DefaultAzureCredential` to fall back to your user identity during local development. Similarly, enable managed identity in Azure Functions and assign it the necessary role when you expect the `DefaultAzureCredential` to fall back to the `ManagedIdentityCredential` when your Function App runs in Azure.
46
46
47
-
### Assign App Configuration Data Roles
47
+
### Assign App Configuration data roles
48
48
49
49
Regardless of which credential you use, you must assign it the appropriate roles before it can access your App Configuration store. If your application only needs to read data from your App Configuration store, assign it the *App Configuration Data Reader* role. If your application also needs to write data to your App Configuration store, assign it the *App Configuration Data Owner* role.
@@ -68,7 +68,7 @@ You can connect to your App Configuration store using Microsoft Entra ID (recomm
68
68
1. Open the *Program.cs* file, and add the following namespaces:
69
69
70
70
71
-
### [Microsoft Entra ID](#tab/entra-id)
71
+
### [Microsoft Entra ID (recommended)](#tab/entra-id)
72
72
```csharp
73
73
using Microsoft.Extensions.Configuration;
74
74
using Microsoft.Extensions.Configuration.AzureAppConfiguration;
@@ -84,7 +84,7 @@ You can connect to your App Configuration store using Microsoft Entra ID (recomm
84
84
85
85
1. Connect to your App Configuration store by calling the `AddAzureAppConfiguration` method in the `Program.cs` file.
86
86
87
-
### [Microsoft Entra ID](#tab/entra-id)
87
+
### [Microsoft Entra ID (recommended)](#tab/entra-id)
88
88
You use the `DefaultAzureCredential` to authenticate to your App Configuration store. Follow the [instructions](./concept-enable-rbac.md#authentication-with-token-credentials) to assign your credential the **App Configuration Data Reader** role. Be sure to allow sufficient time for the permission to propagate before running your application.
89
89
90
90
```csharp
@@ -113,7 +113,7 @@ You can connect to your App Configuration store using Microsoft Entra ID (recomm
113
113
114
114
1. Set an environment variable.
115
115
116
-
### [Microsoft Entra ID](#tab/entra-id)
116
+
### [Microsoft Entra ID (recommended)](#tab/entra-id)
117
117
Set the environment variable named **Endpoint** to the endpoint of your App Configuration store found under the *Overview* of your store in the Azure portal.
118
118
119
119
If you use the Windows command prompt, run the following command and restart the command prompt to allow the change to take effect:
@@ -168,7 +168,7 @@ You can connect to your App Configuration store using Microsoft Entra ID (recomm
:::image type="content" source="./media/quickstarts/dotnet-core-app-run.png" alt-text="Screenshot of a terminal window showing the app running locally.":::
0 commit comments