Skip to content

Commit 9f04019

Browse files
committed
Address feedback
1 parent ae41175 commit 9f04019

File tree

2 files changed

+7
-7
lines changed

2 files changed

+7
-7
lines changed

articles/azure-app-configuration/concept-enable-rbac.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,15 +36,15 @@ All requests for [control plane](../azure-resource-manager/management/control-pl
3636
> [!NOTE]
3737
> After a role assignment is made for an identity, allow up to 15 minutes for the permission to propagate before accessing data stored in App Configuration using this identity.
3838
39-
## Authentication with Token Credentials
39+
## Authentication with token credentials
4040

4141
To enable your application to authenticate with Microsoft Entra ID, the Azure Identity library supports various token credentials for Microsoft Entra ID authentication. For example, you might choose Visual Studio Credential when developing your application in Visual Studio, Workload Identity Credential when your application runs on Kubernetes, or Managed Identity Credential when your application is deployed in Azure services like Azure Functions.
4242

4343
### Use DefaultAzureCredential
4444

4545
The `DefaultAzureCredential` is a preconfigured [chain of token credentials](/dotnet/azure/sdk/authentication/credential-chains#defaultazurecredential-overview) that automatically attempts an ordered sequence of the most common authentication methods. Using the `DefaultAzureCredential` allows you to keep the same code in both local development and Azure environments. However, it's important to know which credential is being used in each environment, as you need to grant the appropriate roles for authorization to work. For example, authorize your own account when you expect the `DefaultAzureCredential` to fall back to your user identity during local development. Similarly, enable managed identity in Azure Functions and assign it the necessary role when you expect the `DefaultAzureCredential` to fall back to the `ManagedIdentityCredential` when your Function App runs in Azure.
4646

47-
### Assign App Configuration Data Roles
47+
### Assign App Configuration data roles
4848

4949
Regardless of which credential you use, you must assign it the appropriate roles before it can access your App Configuration store. If your application only needs to read data from your App Configuration store, assign it the *App Configuration Data Reader* role. If your application also needs to write data to your App Configuration store, assign it the *App Configuration Data Owner* role.
5050

articles/azure-app-configuration/quickstart-dotnet-core-app.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ You can connect to your App Configuration store using Microsoft Entra ID (recomm
4747
4848
1. Add NuGet package references by running the following command:
4949
50-
### [Microsoft Entra ID](#tab/entra-id)
50+
### [Microsoft Entra ID (recommended)](#tab/entra-id)
5151
```dotnetcli
5252
dotnet add package Microsoft.Extensions.Configuration.AzureAppConfiguration
5353
dotnet add package Azure.Identity
@@ -68,7 +68,7 @@ You can connect to your App Configuration store using Microsoft Entra ID (recomm
6868
1. Open the *Program.cs* file, and add the following namespaces:
6969
7070
71-
### [Microsoft Entra ID](#tab/entra-id)
71+
### [Microsoft Entra ID (recommended)](#tab/entra-id)
7272
```csharp
7373
using Microsoft.Extensions.Configuration;
7474
using Microsoft.Extensions.Configuration.AzureAppConfiguration;
@@ -84,7 +84,7 @@ You can connect to your App Configuration store using Microsoft Entra ID (recomm
8484
8585
1. Connect to your App Configuration store by calling the `AddAzureAppConfiguration` method in the `Program.cs` file.
8686
87-
### [Microsoft Entra ID](#tab/entra-id)
87+
### [Microsoft Entra ID (recommended)](#tab/entra-id)
8888
You use the `DefaultAzureCredential` to authenticate to your App Configuration store. Follow the [instructions](./concept-enable-rbac.md#authentication-with-token-credentials) to assign your credential the **App Configuration Data Reader** role. Be sure to allow sufficient time for the permission to propagate before running your application.
8989
9090
```csharp
@@ -113,7 +113,7 @@ You can connect to your App Configuration store using Microsoft Entra ID (recomm
113113
114114
1. Set an environment variable.
115115
116-
### [Microsoft Entra ID](#tab/entra-id)
116+
### [Microsoft Entra ID (recommended)](#tab/entra-id)
117117
Set the environment variable named **Endpoint** to the endpoint of your App Configuration store found under the *Overview* of your store in the Azure portal.
118118
119119
If you use the Windows command prompt, run the following command and restart the command prompt to allow the change to take effect:
@@ -168,7 +168,7 @@ You can connect to your App Configuration store using Microsoft Entra ID (recomm
168168
dotnet run
169169
```
170170
171-
![Quickstart app launch local](./media/quickstarts/dotnet-core-app-run.png)
171+
:::image type="content" source="./media/quickstarts/dotnet-core-app-run.png" alt-text="Screenshot of a terminal window showing the app running locally.":::
172172
173173
## Clean up resources
174174

0 commit comments

Comments
 (0)