Skip to content

Commit a1b78cc

Browse files
Apply suggestions from code review
Co-authored-by: Craig Shoemaker <[email protected]>
1 parent 96687a4 commit a1b78cc

File tree

2 files changed

+5
-5
lines changed

2 files changed

+5
-5
lines changed

articles/container-apps/managed-identity.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -349,10 +349,10 @@ Container Apps allows you to specify [init containers](containers.md#init-contai
349349

350350
Starting in API version `2024-02-02-preview`, you can control which managed identities are available to your container app during the init and main phases to follow the security principle of least privilege. The following options are available:
351351

352-
- `Init`: available only to init containers. Use this when you want to perform some intilization work that requires a managed identity, but you no longer need the managed identity in the main container. This option is currently only supported in [workload profile consumption environments](environment.md#types)
353-
- `Main`: available only to main containers. Use this if your init container does not need managed identity.
354-
- `All`: available to all containers. This is the default setting.
355-
- `None`: not available to any containers. Use this when you have a managed identity that is only used for ACR image pull, scale rules, or Key Vault secrets and does not need to be available to the code running in your containers.
352+
- `Init`: Available only to init containers. Use this when you want to perform some intilization work that requires a managed identity, but you no longer need the managed identity in the main container. This option is currently only supported in [workload profile consumption environments](environment.md#types)
353+
- `Main`: Available only to main containers. Use this if your init container does not need managed identity.
354+
- `All`: Available to all containers. This value is the default setting.
355+
- `None`: Not available to any containers. Use this when you have a managed identity that is only used for ACR image pull, scale rules, or Key Vault secrets and does not need to be available to the code running in your containers.
356356

357357
The following ARM template example shows how to configure a container app on a workload profile consumption environment that:
358358

articles/container-apps/scale-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -405,7 +405,7 @@ Container Apps scale rules support secrets-based authentication. Scale rules for
405405

406406
To configure secrets-based authentication for a Container Apps scale rule, you configure the secrets in the container app and reference them in the scale rule.
407407

408-
A KEDA scaler supports using secrets in a [TriggerAuthentication](https://keda.sh/docs/latest/concepts/authentication/) that is referenced by the authenticationRef property. You can map the TriggerAuthentication object to the Container Apps scale rule.
408+
A KEDA scaler supports secrets in a [TriggerAuthentication](https://keda.sh/docs/latest/concepts/authentication/) which the `authenticationRef` property uses for reference. You can map the `TriggerAuthentication` object to the Container Apps scale rule.
409409

410410
1. Find the `TriggerAuthentication` object referenced by the KEDA `ScaledObject` specification. Identify each `secretTargetRef` of the `TriggerAuthentication` object.
411411

0 commit comments

Comments
 (0)