Skip to content

Commit cd176ad

Browse files
committed
Update the title of the access key doc
1 parent bde3098 commit cd176ad

File tree

2 files changed

+6
-6
lines changed

2 files changed

+6
-6
lines changed

articles/azure-app-configuration/TOC.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -212,11 +212,11 @@
212212
href: concept-private-endpoint.md
213213
- name: Disable public network access
214214
href: howto-disable-public-access.md
215-
- name: Encrypt your data using customer-managed keys
215+
- name: Encrypt data using customer-managed keys
216216
href: concept-customer-managed-keys.md
217-
- name: Add a Managed Identity to your store
217+
- name: Add Managed Identities to your store
218218
href: overview-managed-identity.md
219-
- name: Enforce security controls using Azure Policies
219+
- name: Enforce security controls by Azure Policies
220220
href: ./security-controls-policy.md
221221
- name: Understand the security baselines
222222
href: /security/benchmark/azure/baselines/azure-app-configuration-security-baseline?toc=/azure/azure-app-configuration/TOC.json

articles/azure-app-configuration/howto-disable-access-key-authentication.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,15 @@
11
---
2-
title: Manage access key authentication for an Azure App Configuration instance
2+
title: Access Azure App Configuration using access keys
33
titleSuffix: Azure App Configuration
44
description: Learn how to manage access key authentication for an Azure App Configuration instance.
55
ms.service: azure-app-configuration
66
author: maud-lv
77
ms.author: malev
88
ms.topic: how-to
9-
ms.date: 04/05/2024
9+
ms.date: 10/05/2024
1010
---
1111

12-
# Manage access key authentication for an Azure App Configuration instance
12+
# Access Azure App Configuration using access keys
1313

1414
Every request to an Azure App Configuration resource must be authenticated. By default, requests can be authenticated with either Microsoft Entra credentials, or by using an access key. Of these two types of authentication schemes, Microsoft Entra ID provides superior security and ease of use over access keys, and is recommended by Microsoft. To require clients to use Microsoft Entra ID to authenticate requests, you can disable the usage of access keys for an Azure App Configuration resource. If you want to use access keys to authenticate the request, it's recommended to rotate access keys periodically to enhance security. See [recommendations for protecting application secrets](/azure/well-architected/security/application-secrets) to learn more.
1515

0 commit comments

Comments
 (0)