Skip to content

Commit d3ccd67

Browse files
committed
fix errors
1 parent 3abd192 commit d3ccd67

File tree

1 file changed

+6
-4
lines changed

1 file changed

+6
-4
lines changed

articles/playwright-testing/quickstart-automate-end-to-end-testing.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -170,9 +170,9 @@ The service offers two authentication methods: Microsoft Entra ID and Access Tok
170170

171171
If you're using GitHub Actions, you can connect to the service using GitHub OpenID Connect. Follow the steps to set up the integration:
172172

173-
**Prerequisites**
173+
##### Prerequisites
174174

175-
*Option 1: Microsoft Entra application*
175+
**Option 1: Microsoft Entra application**
176176

177177
- Create a Microsoft Entra application with a service principal by [Azure portal](/entra/identity-platform/howto-create-service-principal-portal#register-an-application-with-microsoft-entra-id-and-create-a-service-principal), [Azure CLI](/cli/azure/azure-cli-sp-tutorial-1#create-a-service-principal), or [Azure PowerShell](/powershell/azure/create-azure-service-principal-azureps#create-a-service-principal).
178178

@@ -182,7 +182,7 @@ The service offers two authentication methods: Microsoft Entra ID and Access Tok
182182

183183
- [Configure a federated identity credential on a Microsoft Entra application](/entra/workload-id/workload-identity-federation-create-trust) to trust tokens issued by GitHub Actions to your GitHub repository.
184184

185-
*Option 2: User-assigned managed identity*
185+
**Option 2: User-assigned managed identity**
186186

187187
- [Create a user-assigned managed identity](/entra/identity/managed-identities-azure-resources/how-manage-user-assigned-managed-identities#create-a-user-assigned-managed-identity).
188188

@@ -192,7 +192,7 @@ The service offers two authentication methods: Microsoft Entra ID and Access Tok
192192

193193
- [Configure a federated identity credential on a user-assigned managed identity](/entra/workload-id/workload-identity-federation-create-trust-user-assigned-managed-identity) to trust tokens issued by GitHub Actions to your GitHub repository.
194194

195-
**Create GitHub secrets**
195+
##### Create GitHub secrets
196196

197197
- Add the values you got in the previous step as secrets to your GitHub repository. See [set up GitHub Action Secret](/azure/developer/github/connect-from-azure-openid-connect?branch=main#create-github-secrets). These variables are used in the GitHub Action workflow in subsequent steps.
198198

@@ -213,6 +213,8 @@ The service offers two authentication methods: Microsoft Entra ID and Access Tok
213213

214214
- Use this service connection in Azure Pipeline yaml file as shown in subsequent steps.
215215

216+
---
217+
216218
#### Set up authentication using access tokens
217219

218220
> [!CAUTION]

0 commit comments

Comments
 (0)