Skip to content

Commit ce2911a

Browse files
author
Nicolas Oman
committed
cleanup
1 parent b46db77 commit ce2911a

File tree

1 file changed

+0
-5
lines changed

1 file changed

+0
-5
lines changed

articles/service-fabric/how-to-managed-identity-service-fabric-app-code.md

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,12 +5,7 @@ description: How to use managed identities in Azure Service Fabric application c
55
ms.topic: article
66
ms.date: 10/09/2019
77
---
8-
9-
<<<<<<< HEAD
108
# How to leverage a Service Fabric application's managed identity to access Azure services
11-
=======
12-
# How to leverage a Service Fabric application's managed identity to access Azure services
13-
>>>>>>> 25ee262de0469ac7f82e6ed288e380295fa705da
149

1510
Service Fabric applications can leverage managed identities to access other Azure resources which support Azure Active Directory-based authentication. An application can obtain an [access token](../active-directory/develop/developer-glossary.md#access-token) representing its identity, which may be system-assigned or user-assigned, and use it as a 'bearer' token to authenticate itself to another service - also known as a [protected resource server](../active-directory/develop/developer-glossary.md#resource-server). The token represents the identity assigned to the Service Fabric application, and will only be issued to Azure resources (including SF applications) which share that identity. Refer to the [managed identity overview](../active-directory/managed-identities-azure-resources/overview.md) documentation for a detailed description of managed identities, as well as the distinction between system-assigned and user-assigned identities. We will refer to a managed-identity-enabled Service Fabric application as the [client application](../active-directory/develop/developer-glossary.md#client-application) throughout this article.
1611

0 commit comments

Comments
 (0)