Skip to content

Commit a78805e

Browse files
Merge pull request #286008 from dominicbetts/central-security-update-cicd
IoT Central: CICD updates
2 parents 4056cce + 852870a commit a78805e

File tree

1 file changed

+6
-4
lines changed

1 file changed

+6
-4
lines changed

articles/iot-central/core/howto-integrate-with-devops.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ You need the following prerequisites to complete the steps in this guide:
5050

5151
## Download the sample code
5252

53-
To get started, fork the IoT Central CI/CD GitHub repository and then clone your fork to your local machine:
53+
To get started, fork the IoT Central CI/CD GitHub repository and then clne your fork to your local machine:o
5454

5555
1. To fork the GitHub repository, open the [IoT Central CI/CD GitHub repository](https://github.com/Azure/iot-central-CICD-sample) and select **Fork**.
5656

@@ -212,8 +212,8 @@ Now that you have a configuration file that represents the settings for your dev
212212
"displayName": "Blob destination",
213213
"type": "blobstorage@v1",
214214
"authorization": {
215-
"type": "connectionString",
216-
"connectionString": "DefaultEndpointsProtocol=https;AccountName=yourexportaccount;AccountKey=*****;EndpointSuffix=core.windows.net",
215+
"type": "systemAssignedManagedIdentity",
216+
"endpointUri": "https://yourstorageaccount.blob.core.windows.net/",
217217
"containerName": "dataexport"
218218
},
219219
"status": "waiting"
@@ -237,7 +237,9 @@ Now that you have a configuration file that represents the settings for your dev
237237
az keyvault secret set --name FileUpload --vault-name {your production key vault name} --value '{your production storage account connection string}'
238238
```
239239
240-
1. If your application uses data exports, add secrets for the destinations to the production key vault. The config file doesn't contain any actual secrets for your destination, the secrets are stored in your key vault.
240+
1. If your application uses managed identities for data export destinations, there are no secrets for you to manage. However, you do need to enable the system-assigned managed identity for your production IoT Central application and give it the necessary permissions to write to the destination.
241+
242+
1. If your application uses connection strings for data export destinations, add secrets for the destinations to the production key vault. The config file doesn't contain any actual secrets for your destination, the secrets are stored in your key vault.
241243
1. Update the secrets in the config file with the name of the secret in your key vault.
242244
243245
| Destination type | Property to change |

0 commit comments

Comments
 (0)