You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-app-configuration/use-key-vault-references-dotnet-core.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,7 @@ In this tutorial, you learn how to use the Azure App Configuration service toget
24
24
25
25
App Configuration helps you use the services together by creating keys that reference values stored in Key Vault. When App Configuration creates such keys, it stores the URIs of Key Vault values rather than the values themselves.
26
26
27
-
Your application uses the App Configuration client provider to retrieve values from Key Vault, just as it does for any other keys stored in App Configuration. In this case, the values stored in App Configuration are URIs that reference the values in the Key Vault. They are not Key Vault values or credentials. Because the client provider recognizes the keys as Key Vault references, it uses Key Vault to retrieve their values.
27
+
Your application uses the App Configuration client provider to retrieve Key Vault references, just as it does for any other keys stored in App Configuration. In this case, the values stored in App Configuration are URIs that reference the values in the Key Vault. They are not Key Vault values or credentials. Because the client provider recognizes the keys as Key Vault references, it uses Key Vault to retrieve their values.
28
28
29
29
Your application is responsible for authenticating properly to both App Configuration and Key Vault. The two services don't communicate directly.
30
30
@@ -51,12 +51,12 @@ Before you start this tutorial, install the [.NET Core SDK](https://dotnet.micro
51
51

52
52
1. In the search box, enter **Key Vault**.
53
53
1. From the results list, select **Key vaults** on the left.
54
-
1.In **Key vaults**, select **Create**.
54
+
1.In **Key vaults**, select **Add**.
55
55
1. On the right in **Create key vault**, provide the following information:
56
-
- In **Key vault name**, a unique name is required. For this tutorial, enter **Contoso-vault2**.
57
-
- In **Subscription**, choose a subscription.
56
+
- Select **Subscription** to choose a subscription.
58
57
- In **Resource Group**, select **Create new** and enter a resource group name.
59
-
- In the **Region** drop-down menu, choose a location.
58
+
- In **Key vault name**, a unique name is required. For this tutorial, enter **Contoso-vault2**.
59
+
- In the **Region** drop-down list, choose a location.
60
60
1. Leave the other **Create key vault** options with their default values.
61
61
1. Select **Create**.
62
62
@@ -213,4 +213,4 @@ To add a secret to the vault, you need to take just a few additional steps. In t
213
213
In this tutorial, you created an App Configuration key that references a value stored in Key Vault. To learn how to add an Azure-managed service identity that streamlines access to App Configuration and Key Vault, continue to the next tutorial.
0 commit comments