Skip to content

Commit a3ce40a

Browse files
committed
acrolinx
1 parent 52c82ef commit a3ce40a

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/active-directory/develop/workload-identity-federation-considerations.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ Resources in these regions can still use federated identity credentials created
5252

5353
*Applies to: applications and user-assigned managed identities (public preview)*
5454

55-
Only issuers that provide tokens signed using the RS256 algorithm are supported for token exchange using workload identity federation. Exchanging tokens signed with other algorithms may work, but have not been tested.
55+
Only issuers that provide tokens signed using the RS256 algorithm are supported for token exchange using workload identity federation. Exchanging tokens signed with other algorithms may work, but haven't been tested.
5656

5757
## Azure Active Directory issuers aren't supported
5858

@@ -87,7 +87,7 @@ When you use automation or Azure Resource Manager templates (ARM templates) to c
8787

8888
If federated identity credentials are provisioned in a loop, you can [provision them serially](https://learn.microsoft.com/en-us/azure/azure-resource-manager/templates/copy-resources#serial-or-parallel) by setting *"mode": "serial"*.
8989

90-
You can also provision multiple new federated identity credential sequentially using the *dependsOn* property. The following Azure Resource Manager template (ARM template) example creates three new federated identity credentials sequentially on a user-assigned managed identity by using the *dependsOn* property:
90+
You can also provision multiple new federated identity credentials sequentially using the *dependsOn* property. The following Azure Resource Manager template (ARM template) example creates three new federated identity credentials sequentially on a user-assigned managed identity by using the *dependsOn* property:
9191

9292
```json
9393
{
@@ -162,7 +162,7 @@ You can also provision multiple new federated identity credential sequentially u
162162

163163
*Applies to: applications and user-assigned managed identities (public preview)*
164164

165-
It is possible to use a deny [Azure Policy](../../governance/policy/overview.md) as in the following ARM template example:
165+
It's possible to use a deny [Azure Policy](../../governance/policy/overview.md) as in the following ARM template example:
166166

167167
```json
168168
{
@@ -200,7 +200,7 @@ The following error codes may be returned when creating, updating, getting, list
200200
| HTTP code | Error message | Comments |
201201
|-------------------|----------------|----------------|
202202
| 405 | The request format was unexpected: Support for federated identity credentials not enabled. | Federated identity credentials aren't enabled in this region. Refer to “Currently Supported regions”. |
203-
| 400 | Federated identity credentials must have exactly 1 audience.| Currently, federated identity credentials support a single audience “api://AzureADTokenExchange”.|
203+
| 400 | Federated identity credentials must have exactly one audience.| Currently, federated identity credentials support a single audience “api://AzureADTokenExchange”.|
204204
| 400 | Federated Identity Credential from HTTP body has empty properties | All federated identity credential properties are mandatory. |
205205
| 400 | Federated Identity Credential name '{ficName}' is invalid. | Alphanumeric, dash, underscore, no more than 3-120 symbols. First symbol is alphanumeric. |
206206
| 404 | The parent user-assigned identity doesn't exist. | Check user assigned identity name in federated identity credentials resource path. |

0 commit comments

Comments
 (0)