Skip to content

Commit cb0aa84

Browse files
author
BobbySchmidt2
committed
use-key-vault-references-dotnet-core
1 parent 30593c4 commit cb0aa84

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/azure-app-configuration/use-key-vault-references-dotnet-core.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ In this tutorial, you learn how to use the Azure App Configuration service toget
2424

2525
App Configuration helps you use the services together by creating keys that reference values stored in Key Vault. When App Configuration creates such keys, it stores the URIs of Key Vault values rather than the values themselves.
2626

27-
Your application uses the App Configuration client provider to retrieve values from Key Vault, just as it does for any other keys stored in App Configuration. In this case, the values stored in App Configuration are URIs that reference the values in the Key Vault. They are not Key Vault values or credentials. Because the client provider recognizes the keys as Key Vault references, it uses Key Vault to retrieve their values.
27+
Your application uses the App Configuration client provider to retrieve Key Vault references, just as it does for any other keys stored in App Configuration. In this case, the values stored in App Configuration are URIs that reference the values in the Key Vault. They are not Key Vault values or credentials. Because the client provider recognizes the keys as Key Vault references, it uses Key Vault to retrieve their values.
2828

2929
Your application is responsible for authenticating properly to both App Configuration and Key Vault. The two services don't communicate directly.
3030

@@ -51,12 +51,12 @@ Before you start this tutorial, install the [.NET Core SDK](https://dotnet.micro
5151
![Output after key vault creation is complete](./media/quickstarts/search-services.png)
5252
1. In the search box, enter **Key Vault**.
5353
1. From the results list, select **Key vaults** on the left.
54-
1.In **Key vaults**, select **Create**.
54+
1. In **Key vaults**, select **Add**.
5555
1. On the right in **Create key vault**, provide the following information:
56-
- In **Key vault name**, a unique name is required. For this tutorial, enter **Contoso-vault2**.
57-
- In **Subscription**, choose a subscription.
56+
- Select **Subscription** to choose a subscription.
5857
- In **Resource Group**, select **Create new** and enter a resource group name.
59-
- In the **Region** drop-down menu, choose a location.
58+
- In **Key vault name**, a unique name is required. For this tutorial, enter **Contoso-vault2**.
59+
- In the **Region** drop-down list, choose a location.
6060
1. Leave the other **Create key vault** options with their default values.
6161
1. Select **Create**.
6262

@@ -213,4 +213,4 @@ To add a secret to the vault, you need to take just a few additional steps. In t
213213
In this tutorial, you created an App Configuration key that references a value stored in Key Vault. To learn how to add an Azure-managed service identity that streamlines access to App Configuration and Key Vault, continue to the next tutorial.
214214
215215
> [!div class="nextstepaction"]
216-
> [CLI samples](./cli-samples.md)
216+
> [Managed identity integration](./howto-integrate-azure-managed-service-identity.md)

0 commit comments

Comments
 (0)