Skip to content

Commit ced723d

Browse files
committed
ADE | Updates to attach catalog workflow
1 parent 511380f commit ced723d

File tree

4 files changed

+32
-28
lines changed

4 files changed

+32
-28
lines changed

articles/deployment-environments/how-to-configure-catalog.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -54,13 +54,13 @@ You can choose from two types of repositories:
5454

5555
1. Go to the home page of the GitHub repository that contains the template definitions.
5656
1. [Get the clone URL](/azure/devops/repos/git/clone#get-the-clone-url-of-a-github-repo).
57-
1. Copy and save the URL. You'll use it later.
57+
1. Copy and save the URL. You use it later.
5858

5959
#### Get the clone URL of an Azure DevOps repository
6060

6161
1. Go to the home page of your team collection (for example, `https://contoso-web-team.visualstudio.com`), and then select your project.
6262
1. [Get the clone URL](/azure/devops/repos/git/clone#get-the-clone-url-of-an-azure-repos-git-repo).
63-
1. Copy and save the URL. You'll use it later.
63+
1. Copy and save the URL. You use it later.
6464

6565
### Create a personal access token
6666

@@ -77,17 +77,17 @@ Next, create a personal access token. Depending on the type of repository you us
7777
1. In the **Expiration** dropdown, select an expiration for your token.
7878
1. For a private repository, under **Select scopes**, select the **repo** scope.
7979
1. Select **Generate token**.
80-
1. Save the generated token. You'll use the token later.
80+
1. Save the generated token. You use the token later.
8181

8282
#### Create a personal access token in Azure DevOps
8383

8484
1. Go to the home page of your team collection (for example, `https://contoso-web-team.visualstudio.com`), and then select your project.
8585
1. Create a [personal access token](/azure/devops/organizations/accounts/use-personal-access-tokens-to-authenticate#create-a-pat).
86-
1. Save the generated token. You'll use the token later.
86+
1. Save the generated token. You use the token later.
8787

8888
### Store the personal access token as a key vault secret
8989

90-
To store the personal access token you generated as a [key vault secret](../key-vault/secrets/about-secrets.md) and copy the secret identifier:
90+
To store the personal access token, you generated as a [key vault secret](../key-vault/secrets/about-secrets.md) and copy the secret identifier:
9191

9292
1. Create a [key vault](../key-vault/general/quick-create-portal.md#create-a-vault).
9393
1. Add the personal access token as a [secret to the key vault](../key-vault/secrets/quick-create-portal.md#add-a-secret-to-key-vault).
@@ -105,8 +105,8 @@ To store the personal access token you generated as a [key vault secret](../key-
105105
| **Name** | Enter a name for the catalog. |
106106
| **Git clone URI** | Enter or paste the [clone URL](#get-the-clone-url-for-your-repository) for either your GitHub repository or your Azure DevOps repository.<br/>*Sample Catalog Example:* https://github.com/Azure/deployment-environments.git |
107107
| **Branch** | Enter the repository branch to connect to.<br/>*Sample Catalog Example:* main|
108-
| **Folder path** | Enter the folder path relative to the clone URI that contains subfolders with your catalog items. </br> This folder path should be the path to the folder that contains the subfolders with the catalog item manifests, and not the path to the folder with the catalog item manifest itself.<br/>*Sample Catalog Example:* /Environments|
109-
| **Secret identifier**| Enter the [secret identifier](#create-a-personal-access-token) that contains your personal access token for the repository.|
108+
| **Folder path** | Enter the folder path relative to the clone URI that contains subfolders with your catalog items. </br> This folder path should be the path to the folder that contains the subfolders with the catalog item manifests, and not the path to the folder with the catalog item manifest itself.<br/>*Sample Catalog Example:* /Environments</br> The folder path can begin with or without a '/'.|
109+
| **Secret identifier**| Enter the [secret identifier](#create-a-personal-access-token) that contains your personal access token for the repository.</br>When you copy a Secret Identifier, the connection string includes a version identifier at the end, like this: https://contoso-kv.vault.azure.net/secrets/GitHub-repo-pat/9376b432b72441a1b9e795695708ea5a. </br>Removing the version identifier ensures that Deployment Environments fetches the latest version of the secret from the key vault. If your PAT expires, only the key vault needs to be updated. </br> *Example secret identifier: https://contoso-kv.vault.azure.net/secrets/GitHub-repo-pat*|
110110

111111
:::image type="content" source="media/how-to-configure-catalog/add-catalog-form-inline.png" alt-text="Screenshot that shows how to add a catalog to a dev center." lightbox="media/how-to-configure-catalog/add-catalog-form-expanded.png":::
112112

@@ -123,7 +123,7 @@ To sync an updated catalog:
123123

124124
## Delete a catalog
125125

126-
You can delete a catalog to remove it from the dev center. Any templates in a deleted catalog won't be available to development teams when they deploy new environments. Update the catalog item reference for any existing environments that were created by using the catalog items in the deleted catalog. If the reference isn't updated and the environment is redeployed, the deployment fails.
126+
You can delete a catalog to remove it from the dev center. Templates in a deleted catalog are not available to development teams when they deploy new environments. Update the catalog item reference for any existing environments that were created by using the catalog items in the deleted catalog. If the reference isn't updated and the environment is redeployed, the deployment fails.
127127

128128
To delete a catalog:
129129

articles/deployment-environments/how-to-configure-managed-identity.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Configure a managed identity
33
titleSuffix: Azure Deployment Environments
4-
description: Learn how to configure a managed identity that will be used to deploy environments in your Azure Deployment Environments Preview dev center.
4+
description: Learn how to configure a managed identity to deploy environments in your Azure Deployment Environments Preview dev center.
55
ms.service: deployment-environments
66
ms.custom: ignite-2022
77
author: RoseHJM
@@ -34,6 +34,8 @@ In Azure Deployment Environments, you can choose between two types of managed id
3434

3535
- **System-assigned identity**: A system-assigned identity is tied either to your dev center or to the project environment type. A system-assigned identity is deleted when the attached resource is deleted. A dev center or a project environment type can have only one system-assigned identity.
3636
- **User-assigned identity**: A user-assigned identity is a standalone Azure resource that you can assign to your dev center or to a project environment type. For Azure Deployment Environments Preview, a dev center or a project environment type can have only one user-assigned identity.
37+
38+
As a security best practice, if you choose to use user-assigned identities, use different identities for your project and your dev center. Project identities should have more limited access to resources compared to a dev center.
3739

3840
> [!NOTE]
3941
> In Azure Deployment Environments Preview, if you add both a system-assigned identity and a user-assigned identity, only the user-assigned identity is used.
@@ -66,7 +68,7 @@ In Azure Deployment Environments, you can choose between two types of managed id
6668

6769
## Assign a subscription role assignment to the managed identity
6870

69-
The identity that's attached to the dev center should be assigned the Owner role for all the deployment subscriptions and the Reader role for all subscriptions that contain the relevant project. When a user creates or deploys an environment, the service grants appropriate access to the deployment identity that's attached to a project environment type. The deployment identity uses the access to perform deployments on behalf of the user. You can use the managed identity to empower developers to create environments without granting them access to the subscription.
71+
The identity that's attached to the dev center should be assigned the Owner role for all the deployment subscriptions and the Reader role for all subscriptions that contain the relevant project. When a user creates or deploys an environment, the service grants appropriate access to the deployment identity that's attached to the project environment type. The deployment identity uses the access to perform deployments on behalf of the user. You can use the managed identity to empower developers to create environments without granting them access to the subscription.
7072

7173
### Add a role assignment to a system-assigned managed identity
7274

articles/deployment-environments/quickstart-create-and-configure-devcenter.md

Lines changed: 16 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.author: rosemalcolm
77
ms.topic: quickstart
88
ms.service: deployment-environments
99
ms.custom: ignite-2022
10-
ms.date: 12/20/2022
10+
ms.date: 02/08/2023
1111
---
1212

1313
# Quickstart: Create and configure a dev center
@@ -47,16 +47,18 @@ To create and configure a Dev center in Azure Deployment Environments by using t
4747

4848
:::image type="content" source="media/quickstart-create-and-configure-devcenter/create-devcenter-review.png" alt-text="Screenshot that shows the Review tab of a dev center to validate the deployment details.":::
4949

50-
1. Confirm that the dev center was successfully created by checking your Azure portal notifications. Then, select **Go to resource**.
50+
1. You can check the progress of the deployment in your Azure portal notifications.
5151

5252
:::image type="content" source="media/quickstart-create-and-configure-devcenter/azure-notifications.png" alt-text="Screenshot that shows portal notifications to confirm the creation of a dev center.":::
5353

54+
1. When the creation of the dev center is complete, select **Go to resource**.
55+
5456
1. In **Dev centers**, verify that the dev center appears.
5557

5658
:::image type="content" source="media/quickstart-create-and-configure-devcenter/deployment-environments-devcenter-created.png" alt-text="Screenshot that shows the Dev centers overview, to confirm that the dev center is created.":::
5759

5860
## Create a Key Vault
59-
You'll need an Azure Key Vault to store the GitHub personal access token (PAT) that is used to grant Azure access to your GitHub repository.
61+
You need an Azure Key Vault to store the GitHub personal access token (PAT) that is used to grant Azure access to your GitHub repository.
6062
If you don't have an existing key vault, use the following steps to create one:
6163

6264
1. Sign in to the [Azure portal](https://portal.azure.com).
@@ -89,7 +91,7 @@ Using an authentication token like a GitHub personal access token (PAT) enables
8991

9092
:::image type="content" source="media/quickstart-create-and-configure-devcenter/github-pat.png" alt-text="Screenshot that shows the GitHub Tokens (classic) option.":::
9193

92-
Fine grained and classic tokens work with Azure Deployment Environments.
94+
Fine-grained and classic tokens work with Azure Deployment Environments. Fine-grained tokens give you more granular control over the repos to which you're allowing access.
9395

9496
1. On the New personal access token (classic) page:
9597
- In the **Note** box, add a note describing the token’s intended use.
@@ -118,13 +120,13 @@ Using an authentication token like a GitHub personal access token (PAT) enables
118120
:::image type="content" source="media/quickstart-create-and-configure-devcenter/create-secret-in-key-vault.png" alt-text="Screenshot that shows the Create a secret page with the Name and Secret value text boxes highlighted.":::
119121

120122
- Select **Create**.
121-
1. Leave this tab open, you’ll need to come back to the Key Vault later.
123+
1. Leave this tab open, you need to come back to the Key Vault later.
122124

123125
## Attach an identity to the dev center
124126

125127
After you create a dev center, attach an [identity](concept-environments-key-concepts.md#identities) to the dev center. You can attach either a system-assigned managed identity or a user-assigned managed identity. Learn about the two [types of identities](how-to-configure-managed-identity.md#add-a-managed-identity).
126128

127-
In this quickstart, you'll configure a system-assigned managed identity for your dev center.
129+
In this quickstart, you configure a system-assigned managed identity for your dev center.
128130

129131
## Attach a system-assigned managed identity
130132

@@ -139,23 +141,23 @@ To attach a system-assigned managed identity to your dev center:
139141
1. In the **Enable system assigned managed identity** dialog, select **Yes**.
140142

141143
### Assign the system-assigned managed identity access to the key vault secret
142-
Make sure that the identity has access to the key vault secret that contains the personal access token to access your repository.
144+
Make sure that the identity has access to the key vault secret that contains the personal access token to access your repository. Key Vaults support two methods of access; Azure role-based access control or Vault access policy. In this quickstart, you use a vault access policy.
143145

144-
Configure a key vault access policy:
146+
Configure a vault access policy:
145147
1. In the Azure portal, go to the key vault that contains the secret with the personal access token.
146148
2. In the left menu, select **Access policies**, and then select **Create**.
147149
3. In Create an access policy, enter or select the following information:
148-
- On the Permissions tab, under **Secret permissions**, select **Select all**, and then select **Next**.
150+
- On the Permissions tab, under **Secret permissions**, select **Get**, and then select **Next**.
149151
- On the Principal tab, select the identity that's attached to the dev center, and then select **Next**.
150152
- Select **Review + create**, and then select **Create**.
151153

152154

153155
## Add a catalog to the dev center
154156
Azure Deployment Environments Preview supports attaching Azure DevOps repositories and GitHub repositories. You can store a set of curated IaC templates in a repository. Attaching the repository to a dev center as a catalog gives your development teams access to the templates and enables them to quickly create consistent environments.
155157

156-
In this quickstart, you'll attach a GitHub repository that contains samples created and maintained by the Azure Deployment Environments team.
158+
In this quickstart, you attach a GitHub repository that contains samples created and maintained by the Azure Deployment Environments team.
157159

158-
To add a catalog to your dev center, you'll first need to gather some information.
160+
To add a catalog to your dev center, you first need to gather some information.
159161

160162
### Gather GitHub repo information
161163
To add a catalog, you must specify the GitHub repo URL, the branch, and the folder that contains your catalog items. You can gather this information before you begin the process of adding the catalog to the dev center, and paste it somewhere accessible, like notepad.
@@ -170,7 +172,7 @@ To add a catalog, you must specify the GitHub repo URL, the branch, and the fold
170172
:::image type="content" source="media/quickstart-create-and-configure-devcenter/github-info.png" alt-text="Screenshot that shows the GitHub repo with Code, branch, and folder highlighted.":::
171173

172174
### Gather the secret identifier
173-
You'll also need the path to the secret you created in the key vault.
175+
You also need the path to the secret you created in the key vault.
174176

175177
1. In the Azure portal, navigate to your key vault.
176178
1. On the key vault page, from the left menu, select **Secrets**.
@@ -199,8 +201,8 @@ You'll also need the path to the secret you created in the key vault.
199201
| **Name** | Enter a name for the catalog. |
200202
| **Git clone URI** | Enter or paste the clone URL for either your GitHub repository or your Azure DevOps repository.<br/>*Sample Catalog Example:* https://github.com/Azure/deployment-environments.git |
201203
| **Branch** | Enter the repository branch to connect to.<br/>*Sample Catalog Example:* main|
202-
| **Folder path** | Enter the folder path relative to the clone URI that contains subfolders with your catalog items. </br>This folder path should be the path to the folder that contains the subfolders with the catalog item manifests, and not the path to the folder with the catalog item manifest itself.<br/>*Sample Catalog Example:* /Environments|
203-
| **Secret identifier**| Enter the secret identifier that contains your personal access token for the repository.|
204+
| **Folder path** | Enter the folder path relative to the clone URI that contains subfolders with your catalog items. </br>This folder path should be the path to the folder that contains the subfolders with the catalog item manifests, and not the path to the folder with the catalog item manifest itself.<br/>*Sample Catalog Example:* /Environments </br> The folder path can begin with or without a '/'.|
205+
| **Secret identifier**| Enter the secret identifier that contains your personal access token for the repository. When you copy a Secret Identifier, the connection string includes a version identifier at the end, like this: https://contoso-kv.vault.azure.net/secrets/GitHub-repo-pat/9376b432b72441a1b9e795695708ea5a. </br>Removing the version identifier ensures that Deployment Environments fetches the latest version of the secret from the key vault. If your PAT expires, only the key vault needs to be updated. </br> *Example secret identifier: https://contoso-kv.vault.azure.net/secrets/GitHub-repo-pat*|
204206

205207
:::image type="content" source="media/how-to-configure-catalog/add-catalog-form-inline.png" alt-text="Screenshot that shows how to add a catalog to a dev center." lightbox="media/how-to-configure-catalog/add-catalog-form-expanded.png":::
206208

articles/deployment-environments/quickstart-create-and-configure-projects.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.author: rosemalcolm
77
ms.service: deployment-environments
88
ms.custom: ignite-2022
99
ms.topic: quickstart
10-
ms.date: 10/26/2022
10+
ms.date: 02/08/2023
1111
---
1212

1313
# Quickstart: Create and configure a project
@@ -40,7 +40,7 @@ To create a project in your dev center:
4040
|----------|-----------|
4141
|**Subscription** |Select the subscription in which you want to create the project. |
4242
|**Resource group**|Either use an existing resource group or select **Create new** and enter a name for the resource group. |
43-
|**Dev center**|Select a dev center to associate with this project. All settings for the dev center will apply to the project. |
43+
|**Dev center**|Select a dev center to associate with this project. All settings for the dev center apply to the project. |
4444
|**Name**|Enter a name for the project. |
4545
|**Description** (Optional) |Enter any project-related details. |
4646

@@ -55,9 +55,9 @@ To create a project in your dev center:
5555
:::image type="content" source="media/quickstart-create-configure-projects/created-project.png" alt-text="Screenshot that shows the project overview pane.":::
5656

5757
### Assign a managed identity the owner role to the subscription
58-
Before you can create environment types, you must give the managed identity that represents your dev center access to the subscriptions where you'll configure the [project environment types](concept-environments-key-concepts.md#project-environment-types).
58+
Before you can create environment types, you must give the managed identity that represents your dev center access to the subscriptions where you configure the [project environment types](concept-environments-key-concepts.md#project-environment-types).
5959

60-
In this quickstart you'll assign the Owner role to the system-assigned managed identity that you configured previously: [Attach a system-assigned managed identity](quickstart-create-and-configure-devcenter.md#attach-a-system-assigned-managed-identity).
60+
In this quickstart you assign the Owner role to the system-assigned managed identity that you configured previously: [Attach a system-assigned managed identity](quickstart-create-and-configure-devcenter.md#attach-a-system-assigned-managed-identity).
6161

6262
1. Navigate to your dev center.
6363
1. On the left menu under Settings, select **Identity**.

0 commit comments

Comments
 (0)