Skip to content

Commit db89dc3

Browse files
committed
acrolinx
1 parent 30d414c commit db89dc3

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

articles/app-service/overview-managed-identity.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
title: Managed identities
3-
description: Learn how managed identities work in Azure App Service and Azure Functions, how to configure a managed identity and generate a token for a back end resource.
3+
description: Learn how managed identities work in Azure App Service and Azure Functions, how to configure a managed identity and generate a token for a back-end resource.
44
author: mattchenderson
55

66
ms.topic: article
7-
ms.date: 10/30/2019
7+
ms.date: 03/04/2020
88
ms.author: mahender
99
ms.reviewer: yevbronsh
1010

@@ -19,7 +19,7 @@ This topic shows you how to create a managed identity for App Service and Azure
1919

2020
Your application can be granted two types of identities:
2121
- A **system-assigned identity** is tied to your application and is deleted if your app is deleted. An app can only have one system-assigned identity.
22-
- A **user-assigned identity** is a standalone Azure resource which can be assigned to your app. An app can have multiple user-assigned identities.
22+
- A **user-assigned identity** is a standalone Azure resource that can be assigned to your app. An app can have multiple user-assigned identities.
2323

2424
## Add a system-assigned identity
2525

@@ -44,12 +44,12 @@ To set up a managed identity in the portal, you will first create an application
4444
To set up a managed identity using the Azure CLI, you will need to use the `az webapp identity assign` command against an existing application. You have three options for running the examples in this section:
4545

4646
- Use [Azure Cloud Shell](../cloud-shell/overview.md) from the Azure portal.
47-
- Use the embedded Azure Cloud Shell via the "Try It" button, located in the top right corner of each code block below.
47+
- Use the embedded Azure Cloud Shell via the "Try It" button, located in the top-right corner of each code block below.
4848
- [Install the latest version of Azure CLI](https://docs.microsoft.com/cli/azure/install-azure-cli) (2.0.31 or later) if you prefer to use a local CLI console.
4949

5050
The following steps will walk you through creating a web app and assigning it an identity using the CLI:
5151

52-
1. If you're using the Azure CLI in a local console, first sign in to Azure using [az login](/cli/azure/reference-index#az-login). Use an account that is associated with the Azure subscription under which you would like to deploy the application:
52+
1. If you're using the Azure CLI in a local console, first sign in to Azure using [az login](/cli/azure/reference-index#az-login). Use an account that's associated with the Azure subscription under which you would like to deploy the application:
5353

5454
```azurecli-interactive
5555
az login
@@ -143,7 +143,7 @@ When the site is created, it has the following additional properties:
143143
}
144144
```
145145

146-
Where `<TENANTID>` and `<PRINCIPALID>` are replaced with GUIDs. The tenantId property identifies what AAD tenant the identity belongs to. The principalId is a unique identifier for the application's new identity. Within AAD, the service principal has the same name that you gave to your App Service or Azure Functions instance.
146+
The tenantId property identifies what AAD tenant the identity belongs to. The principalId is a unique identifier for the application's new identity. Within AAD, the service principal has the same name that you gave to your App Service or Azure Functions instance.
147147

148148

149149
## Add a user-assigned identity
@@ -227,7 +227,7 @@ When the site is created, it has the following additional properties:
227227
}
228228
```
229229

230-
Where `<PRINCIPALID>` and `<CLIENTID>` are replaced with GUIDs. The principalId is a unique identifier for the identity which is used for AAD administration. The clientId is a unique identifier for the application's new identity that is used for specifying which identity to use during runtime calls.
230+
The principalId is a unique identifier for the identity that's used for AAD administration. The clientId is a unique identifier for the application's new identity that's used for specifying which identity to use during runtime calls.
231231

232232

233233
## Obtain tokens for Azure resources
@@ -412,7 +412,7 @@ For Java applications and functions, the simplest way to work with a managed ide
412412

413413
## <a name="remove"></a>Remove an identity
414414

415-
A system-assigned identity can be removed by disabling the feature using the portal, PowerShell, or CLI in the same way that it was created. User-assigned identities can be removed individually. To remove all identities, in the REST/ARM template protocol, this is done by setting the type to "None":
415+
A system-assigned identity can be removed by disabling the feature using the portal, PowerShell, or CLI in the same way that it was created. User-assigned identities can be removed individually. To remove all identities, set the type to "None" in the [ARM template](#using-an-azure-resource-manager-template):
416416

417417
```json
418418
"identity": {

0 commit comments

Comments
 (0)