You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -134,9 +134,11 @@ To grant access to Key Vault secrets, [create an access policy](/azure/key-vault
134
134
135
135
1. Under the *Settings* section, select **Identity**.
136
136
137
-
1. In the *System assigned* tab, select**On**.
137
+
1. In the *System assigned* tab, set the *Status* to**On**.
138
138
139
-
1. Select **Save** to enable system-assigned managed identity.
139
+
1. Select **Save** to enable system assigned managed identity.
140
+
141
+
1. A popup appears to confirm that you want to enable system assigned managed identity and register your container app with Microsoft Entra ID. Select **Yes**.
140
142
141
143
1. Under the *Settings* section, select **Secrets**.
142
144
@@ -146,8 +148,9 @@ To grant access to Key Vault secrets, [create an access policy](/azure/key-vault
146
148
147
149
-**Name**: The name of the secret.
148
150
-**Type**: Select **Key Vault reference**.
149
-
-**Key Vault secret URL**: The URI of your secret in Key Vault.
150
-
-**Identity**: The identity to use to retrieve the secret from Key Vault.
151
+
-**Key Vault secret URL**: The URI of your secret in Key Vault. This URI has the following form:
@@ -164,7 +167,7 @@ Secrets are defined at the application level in the `resources.properties.config
164
167
"secrets": [
165
168
{
166
169
"name": "queue-connection-string",
167
-
"keyVaultUrl": "<KEY-VAULT-SECRET-URI>",
170
+
"keyVaultUrl": "<KEY_VAULT_SECRET_URI>",
168
171
"identity": "system"
169
172
}],
170
173
}
@@ -174,7 +177,7 @@ Secrets are defined at the application level in the `resources.properties.config
174
177
175
178
Here, a connection string to a queue storage account is declared in the `secrets` array. Its value is automatically retrieved from Key Vault using the specified identity. To use a user managed identity, replace `system` with the identity's resource ID.
176
179
177
-
Replace `<KEY-VAULT-SECRET-URI>` with the URI of your secret in Key Vault.
180
+
Replace `<KEY_VAULT_SECRET_URI>` with the URI of your secret in Key Vault.
178
181
179
182
# [Azure CLI](#tab/azure-cli)
180
183
@@ -233,23 +236,27 @@ After you've [defined a secret](#defining-secrets) in your container app, you ca
233
236
234
237
1. Go to your container app in the [Azure portal](https://portal.azure.com).
235
238
236
-
1. Open the *Revision management* page.
239
+
1. Under the *Application* section, select **Revisions and replicas**.
240
+
241
+
1. In the *Revisions and replicas* page, select **Create new revision**.
237
242
238
-
1.Select **Create new revision**.
243
+
1.In the *Create and deploy new revision* page, in the *Container* tab, under the *Container image* section, select a container.
239
244
240
-
1.In the *Create and deploy new revision* page, select a container.
245
+
1.Select **Edit**.
241
246
242
-
1. In the *Environment variables* section, select **Add**.
247
+
1. In the *Edit a container* context pane, select the **Environment variables** tab.
248
+
249
+
1. Select **Add**.
243
250
244
251
1. Enter the following information:
245
252
246
253
-**Name**: The name of the environment variable.
247
254
-**Source**: Select **Reference a secret**.
248
-
-**Value**: Select the secret you want to reference.
255
+
-**Value**: Select the secret you defined previously.
249
256
250
257
1. Select **Save**.
251
258
252
-
1.Select**Create** to create the new revision.
259
+
1.In the *Create and deploy new revision* page, select**Create** to create the new revision.
253
260
254
261
# [ARM template](#tab/arm-template)
255
262
@@ -320,35 +327,36 @@ After you've [defined a secret](#defining-secrets) in your container app, you ca
320
327
321
328
1. Go to your container app in the [Azure portal](https://portal.azure.com).
322
329
323
-
1.Open the *Revision management* page.
330
+
1.Under the *Application* section, select **Revisions and replicas**.
324
331
325
-
1.Select**Create new revision**.
332
+
1.In the *Revisions and replicas* page, select**Create new revision**.
326
333
327
-
1. In the *Create and deploy new revision* page.
334
+
1. In the *Create and deploy new revision* page, in the *Container* tab, under the *Container image* section, select a container.
328
335
329
-
1. Select a container and select **Edit**.
336
+
1. Select **Edit**.
330
337
331
-
1. In the *Volume mounts* section, expand the **Secrets**section.
338
+
1. In the *Edit a container* context pane, select the **Volume mounts**tab.
332
339
333
340
1. Select **Create new volume**.
334
341
335
-
1.Enter the following information:
342
+
1.In the *Add volume* context pane, enter the following information:
336
343
337
-
-**Name**: mysecrets
344
+
-**Volume type**: Select `Secret`.
345
+
-**Name**: `mysecrets`
338
346
-**Mount all secrets**: enabled
339
347
340
348
> [!NOTE]
341
349
> If you want to load specific secrets, disable **Mount all secrets** and select the secrets you want to load.
342
350
343
351
1. Select **Add**.
344
352
345
-
1.Under*Volume name*, select **mysecrets**.
353
+
1.In the *Edit a container* context pane, under*Volume name*, select **mysecrets**.
346
354
347
-
1. Under *Mount path*, enter **/mnt/secrets**.
355
+
1. Under *Mount path*, enter `/mnt/secrets`.
348
356
349
357
1. Select **Save**.
350
358
351
-
1.Select**Create** to create the new revision with the volume mount.
359
+
1.In the *Create and deploy new revision* page, select**Create** to create the new revision with the volume mount.
0 commit comments