Skip to content

Commit a5e1d52

Browse files
committed
fix warnings
Signed-off-by: Hannah Hunter <[email protected]>
1 parent 45a56ef commit a5e1d52

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

articles/container-apps/dapr-component-authentication.md renamed to articles/container-apps/dapr-component-connect-services.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Connecting to services via Dapr components
3-
description: Learn more about how Dapr components work on your Azure Container App service to develop applications.
3+
description: Learn more about connecting Dapr components with Azure and external services.
44
ms.author: hannahhunter
55
author: hhunter-ms
66
ms.service: azure-container-apps
@@ -9,7 +9,7 @@ ms.topic: conceptual
99
ms.date: 09/23/2024
1010
---
1111

12-
## Connecting to services via Dapr components
12+
# Connecting to services via Dapr components
1313

1414
Securely establish connections to Azure and external services for Dapr components using any of the following approaches.
1515

@@ -18,14 +18,14 @@ Securely establish connections to Azure and external services for Dapr component
1818
- [An Azure Key Vault secret store](#azure-key-vault-secret-stores), which uses managed identity, or
1919
- [Platform-Managed Kubernetes secrets](#platform-managed-kubernetes-secrets)
2020

21-
### Using managed identity
21+
## Using managed identity
2222

2323
For Azure-hosted services, Dapr can use [the managed identity of the scoped container apps][aca-managed-id] to authenticate to the backend service provider. When using managed identity, you don't need to include secret information in a component manifest. Using managed identity is preferred as it eliminates storage of sensitive input in components and doesn't require managing a secret store.
2424

2525
> [!NOTE]
2626
> The `azureClientId` metadata field (the client ID of the managed identity) is **required** for any component authenticating with user-assigned managed identity.
2727
28-
### Using a Dapr secret store component reference
28+
## Using a Dapr secret store component reference
2929

3030
When you create Dapr components for non-Entra ID enabled services, certain metadata fields require sensitive input values. The recommended approach for retrieving these secrets is to reference an existing Dapr secret store component that securely accesses secret information.
3131

@@ -34,14 +34,14 @@ To set up a reference:
3434
1. [Create a Dapr secret store component using the Azure Container Apps schema.](#creating-a-dapr-secret-store-component) The component type for all supported Dapr secret stores begins with `secretstores.`.
3535
1. [Create extra components (as needed) which reference the Dapr secret store component](#referencing-dapr-secret-store-components) you created to retrieve the sensitive metadata input.
3636

37-
#### Creating a Dapr secret store component
37+
### Creating a Dapr secret store component
3838

3939
When creating a secret store component in Azure Container Apps, you can provide sensitive information in the metadata section in either of the following ways:
4040

4141
- [For an **Azure Key Vault secret store**,](#using-managed-identity) use managed identity to establish the connection.
4242
- [For **non-Azure secret stores**,](#platform-managed-kubernetes-secrets) use platform-managed Kubernetes secrets that are defined directly as part of the component manifest.
4343

44-
##### Azure Key Vault secret stores
44+
#### Azure Key Vault secret stores
4545

4646
The following component showcases the simplest possible secret store configuration using an Azure Key Vault secret store. In this example, publisher and subscriber applications are configured to both have a system or user-assigned managed identity with appropriate permissions on the Azure Key Vault instance.
4747

@@ -60,7 +60,7 @@ scopes:
6060
- subscriber-app
6161
```
6262
63-
##### Platform-managed Kubernetes secrets
63+
#### Platform-managed Kubernetes secrets
6464
6565
Kubernetes secrets, Local environment variables, and Local file Dapr secret stores aren't supported in Azure Container Apps. As an alternative for the upstream Dapr default Kubernetes secret store, Azure Container Apps provides a platform-managed approach for creating and leveraging Kubernetes secrets.
6666
@@ -88,7 +88,7 @@ scopes:
8888
- subscriber-app
8989
```
9090
91-
#### Referencing Dapr secret store components
91+
### Referencing Dapr secret store components
9292
9393
Once you [create a Dapr secret store using one of the previous approaches](#creating-a-dapr-secret-store-component), you can reference that secret store from other Dapr components in the same environment. The following example demonstrates using Entra ID authentication.
9494

0 commit comments

Comments
 (0)