Skip to content

Commit b76a161

Browse files
Merge pull request #221210 from hhunter-ms/hh-50904
[Dapr/ACA] Small note about azureClientID requirement
2 parents a680b06 + b3d00c5 commit b76a161

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/container-apps/dapr-overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -189,7 +189,7 @@ When creating a secret store component in container apps, you can provide sensit
189189
- For an **Azure Key Vault secret store**, use managed identity to establish the connection.
190190
- For **non-Azure secret stores**, use platform-managed Kubernetes secrets that are defined directly as part of the component manifest.
191191

192-
The following component showcases the simplest possible secret store configuration. This example publisher and subscriber applications configured to both have a system or user-assigned managed identity with appropriate permissions on the Azure Key Vault instance.
192+
The following component showcases the simplest possible secret store configuration. In this example, publisher and subscriber applications are configured to both have a system or user-assigned managed identity with appropriate permissions on the Azure Key Vault instance.
193193

194194
```yaml
195195
componentType: secretstores.azure.keyvault
@@ -199,7 +199,7 @@ metadata:
199199
value: [your_keyvault_name]
200200
- name: azureEnvironment
201201
value: "AZUREPUBLICCLOUD"
202-
- name: azureClientId
202+
- name: azureClientId # Only required if using user-assigned managed identity
203203
value: [your_managed_identity_client_id]
204204
scopes:
205205
- publisher-app
@@ -223,7 +223,7 @@ metadata:
223223
value: "AZUREPUBLICCLOUD"
224224
- name: azureTenantId
225225
value: "[your_tenant_id]"
226-
- name: azureClientId
226+
- name: azureClientId
227227
value: "[your_client_id]"
228228
- name: azureClientSecret
229229
secretRef: azClientSecret

0 commit comments

Comments
 (0)