Skip to content

Commit cd557ef

Browse files
committed
refactor
1 parent 491043b commit cd557ef

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

articles/storage/common/migrate-azure-credentials.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -19,11 +19,11 @@ Application requests to Azure Storage must be authenticated using either account
1919

2020
The following tutorial explains how to migrate an existing application to connect to Azure Storage to use passwordless connections instead of a key-based solution. These same migration steps should apply whether you're using access keys directly, or through connection strings.
2121

22-
### Configure roles and users for local development authentication
22+
## Configure roles and users for local development authentication
2323

2424
[!INCLUDE [assign-roles](../../../includes/assign-roles.md)]
2525

26-
### Sign-in and migrate the app code to use passwordless connections
26+
## Sign-in and migrate the app code to use passwordless connections
2727

2828
For local development, make sure you're authenticated with the same Azure AD account you assigned the role to on your Blob Storage account. You can authenticate via the Azure CLI, Visual Studio, Azure PowerShell, or other tools such as IntelliJ.
2929

@@ -56,15 +56,15 @@ Next you need to update your code to use passwordless connections.
5656

5757
:::image type="content" source="../blobs/media/storage-quickstart-blobs-dotnet/storage-account-name.png" alt-text="Screenshot showing how to find the storage account name.":::
5858

59-
#### Run the app locally
59+
### Run the app locally
6060

6161
After making these code changes, run your application locally. The new configuration should pick up your local credentials, such as the Azure CLI, Visual Studio, or IntelliJ. The roles you assigned to your local dev user in Azure allows your app to connect to the Azure service locally.
6262

63-
### Configure the Azure hosting environment
63+
## Configure the Azure hosting environment
6464

6565
Once your application is configured to use passwordless connections and runs locally, the same code can authenticate to Azure services after it's deployed to Azure. The sections that follow explain how to configure a deployed application to connect to Azure Blob Storage using a managed identity.
6666

67-
#### Create the managed identity
67+
### Create the managed identity
6868

6969
[!INCLUDE [create-managed-identity](../../../includes/passwordless/migration-guide/create-user-assigned-managed-identity.md)]
7070

@@ -101,7 +101,7 @@ Complete the following steps in the Azure portal to associate an identity with y
101101

102102
---
103103

104-
#### Assign roles to the managed identity
104+
### Assign roles to the managed identity
105105

106106
Next, you need to grant permissions to the managed identity you created to access your storage account. Grant permissions by assigning a role to the managed identity, just like you did with your local development user.
107107

@@ -149,7 +149,7 @@ If you connected your services using Service Connector you don't need to complet
149149

150150
---
151151

152-
#### Update the application code
152+
### Update the application code
153153

154154
You need to configure your application code to look for the specific managed identity you created when it is deployed to Azure. In some scenarios, explicitly setting the managed identity for the app also prevents other environment identities from accidentally being detected and used automatically.
155155

@@ -169,7 +169,7 @@ You need to configure your application code to look for the specific managed ide
169169

170170
3. Redeploy your code to Azure after making this change in order for the configuration updates to be applied.
171171

172-
#### Test the app
172+
### Test the app
173173

174174
After deploying the updated code, browse to your hosted application in the browser. Your app should be able to connect to the storage account successfully. Keep in mind that it may take several minutes for the role assignments to propagate through your Azure environment. Your application is now configured to run both locally and in a production environment without the developers having to manage secrets in the application itself.
175175

0 commit comments

Comments
 (0)