Skip to content

Commit d1a709b

Browse files
committed
fix
1 parent 4b7f8cd commit d1a709b

File tree

2 files changed

+26
-11
lines changed

2 files changed

+26
-11
lines changed

articles/app-service/deploy-configure-credentials.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Configure Deployment Credentials
2+
title: Manage Deployment Credentials
33
description: Learn about the types of deployment credentials for deploying local apps to Azure App Service and how to configure and use them.
44
author: cephalin
55
ms.author: cephalin
@@ -9,22 +9,22 @@ ms.date: 06/27/2025
99

1010
---
1111

12-
# Configure deployment credentials for Azure App Service
12+
# Manage deployment credentials for Azure App Service
1313

1414
You can deploy local apps to [Azure App Service](overview.md) by using [local Git deployment](deploy-local-git.md) or [FTP/S deployment](deploy-ftp.md). App Service supports two types of credentials for secure local app deployment, *user-scope* and *app-scope* credentials. These credentials are different from your Azure subscription credentials.
1515

16-
- **User-scope credentials** provide a user with one set of deployment credentials for their entire Azure account. A user who is granted app access via role-based access control (RBAC) or coadministrator permissions can use their user-level credentials until access is revoked.
16+
[!INCLUDE [app-service-deploy-credentials](../../includes/app-service-deploy-credentials.md)]
1717

18-
You can use your user-scope credentials to deploy any app to App Service via local Git or FTP/S in any subscription that your Azure account has permission to access. Don't share these credentials with other Azure users.
18+
## Prerequisites
1919

20-
- **App-scope credentials** provide one set of credentials per app, which can be used to deploy that app only. The app-scope credentials for each app are generated automatically during app creation and can't be configured manually, but they can be reset anytime.
20+
To access, set, or reset deployment user credentials, you must have contributor-level permissions on an Azure App Service app that you want to deploy by using local Git or FTP/S.
2121

22-
A user must have at least **Contributor** level permissions on an app, including the built-in **Website Contributor** role, to be granted access to app-level credentials via RBAC. **Reader** role can't publish and can't access these credentials.
22+
<a name="disable-basic-authentication"></a>
23+
### Basic authentication requirement
2324

24-
>[!IMPORTANT]
25-
>Basic authentication must be enabled to publish via local Git or FTP/S. Basic authentication is less secure than other authentication methods and is disabled by default for new apps. When [basic authentication is disabled](configure-basic-auth-disable.md), you can't view or set deployment credentials in the app's **Deployment Center**.
26-
>
27-
>To enable or disable basic authentication, go to the app's **Configuration** page in the Azure portal.
25+
Basic authentication must be enabled to publish App Service apps via local Git or FTP/S. Both **SCM Basic Auth Publishing Credentials** and **FTP Basic Auth Publishing Credentials** must be set to **On** on the app's **Configuration** page in the Azure portal.
26+
27+
Basic authentication is less secure than other authentication methods and is disabled by default for new apps. When basic authentication is disabled, you can't view or set deployment credentials in the app's **Deployment Center** or use these credentials for publishing. For more information, see [Disable basic authentication in Azure App Service deployments](configure-basic-auth-disable.md).
2828

2929
<a name="userscope"></a>
3030
## Set user-scope credentials
@@ -56,7 +56,7 @@ To configure deployment credentials:
5656
1. Select **Deployment Center** under **Deployment** in the left navigation menu of an app.
5757
1. If **Local Git** is configured as the build source, select the **Local Git/FTPS credentials** tab. Otherwise, select the **FTPS credentials** tab.
5858
1. In the **User-scope** section, add a **Username**. For local Git deployments, the user name can't contain the `@` character.
59-
1. For FTP/S deployments, add and confirm a **Password**. The password must be at least eight characters and contain contain capital letters, lowercase letters, numbers, and symbols.
59+
1. For FTP/S deployments, add and confirm a **Password**. The password must be at least eight characters and contain capital letters, lowercase letters, numbers, and symbols.
6060
1. Select **Save**.
6161

6262
After you set the credentials, you can see your deployment user name on your app's **Overview** page. If local Git deployment is configured, the label is **Git/deployment username**. Otherwise, the label is **FTP/deployment username**. The page doesn't show the password.
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
---
2+
author: cephalin
3+
ms.service: azure-app-service
4+
ms.topic: include
5+
ms.date: 04/20/2020
6+
ms.author: cephalin
7+
---
8+
9+
- **User-scope credentials** provide a user with one set of deployment credentials for their entire Azure account. A user who is granted app access via role-based access control (RBAC) or coadministrator permissions can use their user-level credentials until access is revoked.
10+
11+
You can use your user-scope credentials to deploy any app to App Service via local Git or FTP/S in any subscription that your Azure account has permission to access. Don't share these credentials with other Azure users.
12+
13+
- **App-scope credentials** provide one set of credentials per app, which can be used to deploy that app only. The app-scope credentials for each app are generated automatically during app creation and can't be configured manually, but they can be reset anytime.
14+
15+
A user must have at least **Contributor** level permissions on an app, including the built-in **Website Contributor** role, to be granted access to app-level credentials via RBAC. **Reader** role can't publish and can't access these credentials.

0 commit comments

Comments
 (0)