Skip to content

Commit a9f414c

Browse files
committed
Fixes as requested
1 parent 562e3a3 commit a9f414c

File tree

6 files changed

+44
-13
lines changed

6 files changed

+44
-13
lines changed

articles/app-service/includes/tutorial-connect-msi-key-vault/cleanup.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,11 @@
1+
---
2+
ms.topic: include
3+
ms.date: 10/26/2021
4+
5+
ms.reviewer: madsd
6+
ms.custom: devx-track-azurecli
7+
---
8+
19
1. Configure the Cognitive Services secrets as app settings `CS_ACCOUNT_NAME` and `CS_ACCOUNT_KEY`.
210

311
```azurecli-interactive

articles/app-service/includes/tutorial-connect-msi-key-vault/introduction.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,11 @@
1+
---
2+
ms.topic: include
3+
ms.date: 10/26/2021
4+
5+
ms.reviewer: madsd
6+
ms.custom: devx-track-azurecli
7+
---
8+
19
[Azure App Service](../../overview.md) can use [managed identities](../../overview-managed-identity.md) to connect to back-end services without a connection string, which eliminates connection secrets to manage and keeps your back-end connectivity secure in a production environment. For back-end services that don't support managed identities and still requires connection secrets, you can use Key Vault to manage connection secrets. This tutorial uses Cognitive Services as an example to show you how it's done in practice. When you're finished, you have an app that makes programmatic calls to Cognitive Services, without storing any connection secrets inside App Service.
210

311
* [Sample application](https://github.com/Azure-Samples/app-service-language-detector)

articles/app-service/includes/tutorial-microsoft-graph-as-app/cleanup.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,12 @@
1+
---
2+
author: rwike77
3+
manager: CelesteDG
4+
ms.date: 01/21/2022
5+
ms.author: ryanwi
6+
ms.reviewer: stsoneff
7+
ms.topic: include
8+
#Customer intent: As an application developer, I want to learn how to access data in Microsoft Graph by using managed identities.
9+
---
110

211
## Next steps
312

articles/app-service/includes/tutorial-microsoft-graph-as-app/introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@ When accessing the Microsoft Graph, the managed identity needs to have proper pe
101101
az rest --method post --uri $uri --body $body --headers "Content-Type=application/json"
102102
```
103103
104-
---
104+
---
105105
106106
1. After executing the script, you can verify in the [Azure portal](https://portal.azure.com) that the requested API permissions are assigned to the managed identity.
107107

articles/app-service/tutorial-connect-msi-key-vault-php.md

Lines changed: 15 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -14,21 +14,24 @@ ms.custom: devx-track-azurecli
1414

1515
[!INCLUDE [tutorial-content-above-code](./includes/tutorial-connect-msi-key-vault/introduction.md)]
1616

17+
## Configure PHP app
18+
1719
1. Clone the sample repository locally and deploy the sample application to App Service. Replace *\<app-name>* with a unique name.
1820

21+
```azurecli-interactive
22+
# Clone and prepare sample application
23+
git clone https://github.com/Azure-Samples/app-service-language-detector.git
24+
cd app-service-language-detector/php
25+
zip default.zip index.php
26+
27+
# Save app name as variable for convenience
28+
appName=<app-name>
1929
20-
```azurecli-interactive
21-
# Clone and prepare sample application
22-
git clone https://github.com/Azure-Samples/app-service-language-detector.git
23-
cd app-service-language-detector/php
24-
zip default.zip index.php
25-
26-
# Save app name as variable for convenience
27-
appName=<app-name>
30+
az appservice plan create --resource-group $groupName --name $appName --sku FREE --location $region
31+
az webapp create --resource-group $groupName --plan $appName --name $appName
32+
az webapp deployment source config-zip --resource-group $groupName --name $appName --src ./default.zip
33+
```
2834

29-
az appservice plan create --resource-group $groupName --name $appName --sku FREE --location $region
30-
az webapp create --resource-group $groupName --plan $appName --name $appName
31-
az webapp deployment source config-zip --resource-group $groupName --name $appName --src ./default.zip
32-
```
35+
## Configure secrets as app settings
3336

3437
[!INCLUDE [tutorial-content-below-code](./includes/tutorial-connect-msi-key-vault/cleanup.md)]

articles/app-service/tutorial-connect-msi-key-vault.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,8 @@ ms.custom: devx-track-azurecli
1414

1515
[!INCLUDE [tutorial-content-above-code](./includes/tutorial-connect-msi-key-vault/introduction.md)]
1616

17+
## Configure .NET app
18+
1719
1. Clone the sample repository locally and deploy the sample application to App Service. Replace *\<app-name>* with a unique name.
1820

1921
```azurecli-interactive
@@ -27,5 +29,6 @@ ms.custom: devx-track-azurecli
2729
az webapp up --sku F1 --resource-group $groupName --name $appName --plan $appName --location $region
2830
```
2931
32+
## Configure secrets as app settings
3033
3134
[!INCLUDE [tutorial-content-below-code](./includes/tutorial-connect-msi-key-vault/cleanup.md)]

0 commit comments

Comments
 (0)