Skip to content

Commit d362130

Browse files
committed
Remove modified managed-identity.md
1 parent e94e787 commit d362130

File tree

1 file changed

+9
-6
lines changed

1 file changed

+9
-6
lines changed

articles/container-apps/managed-identity.md

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: container-apps
55
author: cebundy
66
ms.service: container-apps
77
ms.topic: how-to
8-
ms.date: 05/11/2022
8+
ms.date: 04/11/2022
99
ms.author: v-bcatherine
1010
---
1111

@@ -28,7 +28,6 @@ With managed identities:
2828
- You can use role-based access control to grant specific permissions to a managed identity.
2929
- System-assigned identities are automatically created and managed. They're deleted when your container app is deleted.
3030
- You can add and delete user-assigned identities and assign them to multiple resources. They're independent of your container app's life cycle.
31-
- You can use managed identity to [authenticate with a private Azure Container Registry](container.md#container-registries) without a username and password to pull containers for your Container App.
3231

3332
### Common use cases
3433

@@ -44,7 +43,11 @@ User-assigned identities are ideal for workloads that:
4443

4544
## Limitations
4645

47-
The identity is only available within a running container, which means you can't use a managed identity in scaling rules or Dapr configuration. To access resources that require a connection string or key, such as storage resources, you'll still need to include the connection string or key in the `secretRef` of the scaling rule.
46+
The identity is only available within a running container, which means you can't use a managed identity to:
47+
48+
- Pull an image from Azure Container Registry
49+
- Define scaling rules or Dapr configuration
50+
- To access resources that require a connection string or key, such as storage resources, you'll still need to include the connection string or key in the `secretRef` of the scaling rule.
4851

4952
## Configure managed identities
5053

@@ -265,11 +268,11 @@ A container app with a managed identity exposes the identity endpoint by definin
265268
- IDENTITY_ENDPOINT - local URL from which your container app can request tokens.
266269
- IDENTITY_HEADER - a header used to help mitigate server-side request forgery (SSRF) attacks. The value is rotated by the platform.
267270

268-
To get a token for a resource, make an HTTP GET request to the endpoint, including the following parameters:
271+
To get a token for a resource, make an HTTP GET request to this endpoint, including the following parameters:
269272

270273
| Parameter name | In | Description|
271274
|---------|---------|---------|
272-
| resource | Query | The Azure AD resource URI of the resource for which a token should be obtained. The resource could be one of the [Azure services that support Azure AD authentication](../active-directory/managed-identities-azure-resources/services-support-managed-identities.md#azure-services-that-support-azure-ad-authentication) or any other resource URI. |
275+
| resource | Query | The Azure AD resource URI of the resource for which a token should be obtained. This could be one of the [Azure services that support Azure AD authentication](../active-directory/managed-identities-azure-resources/services-support-managed-identities.md#azure-services-that-support-azure-ad-authentication) or any other resource URI. |
273276
| api-version | Query | The version of the token API to be used. Use "2019-08-01" or later. |
274277
| X-IDENTITY-HEADER | Header | The value of the `IDENTITY_HEADER` environment variable. This header mitigates server-side request forgery (SSRF) attacks. |
275278
| client_id | Query | (Optional) The client ID of the user-assigned identity to be used. Can't be used on a request that includes `principal_id`, `mi_res_id`, or `object_id`. If all ID parameters (`client_id`, `principal_id`, `object_id`, and `mi_res_id`) are omitted, the system-assigned identity is used.|
@@ -340,4 +343,4 @@ To remove all identities, set the `type` of the container app's identity to `Non
340343
## Next steps
341344

342345
> [!div class="nextstepaction"]
343-
> [Monitor an app](monitor.md)
346+
> [Monitor an app](monitor.md)

0 commit comments

Comments
 (0)