You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/spring-apps/tutorial-managed-identities-functions.md
+16-16Lines changed: 16 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -67,7 +67,7 @@ az functionapp create \
67
67
68
68
Make a note of the returned `hostNames` value, which is in the format *https://\<your-functionapp-name>.azurewebsites.net*. Use this value in the Function app's root URL for testing the Function app.
69
69
70
-
## Enable Azure Active Directory Authentication
70
+
## Enable Azure Active Directory authentication
71
71
72
72
Use the following steps to enable Azure Active Directory authentication to access your Function app.
73
73
@@ -87,16 +87,16 @@ Use the following steps to enable Azure Active Directory authentication to acces
87
87
88
88
After you add the settings, the Function app restarts and all subsequent requests are prompted to sign in through Azure AD. You can test that unauthenticated requests are currently being rejected with the Function app's root URL (returned in the `hostNames` output of the `az functionapp create` command). You should then be redirected to your organization's Azure Active Directory sign-in screen.
89
89
90
-
## Create an HTTP Triggered Function
90
+
## Create an HTTP triggered function
91
91
92
-
In an empty local directory, use the following commands to create a new function and add an HTTP triggered function.
92
+
In an empty local directory, use the following commands to create a new function app and add an HTTP triggered function.
93
93
94
94
```console
95
95
func init --worker-runtime node
96
96
func new --template HttpTrigger --name HttpTrigger
97
97
```
98
98
99
-
By default, Functions use key-based authentication to secure HTTP endpoints. To enable Azure AD authentication to secure access to the Functions, set the `authLevel` key to `anonymous`in the *function.json* file.
99
+
By default, functions use key-based authentication to secure HTTP endpoints. To enable Azure AD authentication to secure access to the functions, set the `authLevel` key to `anonymous`in the *function.json* file as shown in the following code:
100
100
101
101
```json
102
102
{
@@ -115,32 +115,32 @@ For more information, see the [Secure an HTTP endpoint in production](../azure-f
115
115
Use the following command to publish the app to the instance created in the previous step:
## Create an Azure Spring Apps service instance and application
132
132
133
133
Use the following commands to add the spring extension and to create a new instance of Azure Spring Apps.
134
134
135
135
```azurecli
136
136
az extension add --upgrade --name spring
137
137
az spring create \
138
138
--resource-group <resource-group-name> \
139
-
--name <Azure-Spring-Instance-name> \
139
+
--name <Azure-Spring-Apps-instance-name> \
140
140
--location <location>
141
141
```
142
142
143
-
Use the following command to create an app named `msiapp` with a system-assigned managed identity, as requested by the `--assign-identity` parameter.
143
+
Use the following command to create an application named `msiapp` with a system-assigned managed identity, as requested by the `--assign-identity` parameter.
144
144
145
145
```azurecli
146
146
az spring app create \
@@ -153,7 +153,7 @@ az spring app create \
153
153
154
154
## Build sample Spring Boot app to invoke the Function
155
155
156
-
This sample invokes the HTTP triggered function by first requesting an access token from the [MSI endpoint](../active-directory/managed-identities-azure-resources/how-to-use-vm-token.md#get-a-token-using-http)and using that token to authenticate the Function http request.
156
+
This sample invokes the HTTP triggered function by first requesting an access token from the MSI endpoint and using that token to authenticate the function HTTP request. For more information, see the [Get a token using HTTP](../active-directory/managed-identities-azure-resources/how-to-use-vm-token.md#get-a-token-using-http)section of [How to use managed identities for Azure resources on an Azure VM to acquire an access token](../active-directory/managed-identities-azure-resources/how-to-use-vm-token.md).
157
157
158
158
1. Use the following command clone the sample project.
159
159
@@ -168,7 +168,7 @@ This sample invokes the HTTP triggered function by first requesting an access to
168
168
vim src/main/resources/application.properties
169
169
```
170
170
171
-
To use managed identity for Azure Spring Apps apps, add properties with the following content to *src/main/resources/application.properties*.
171
+
To use managed identity for Azure Spring Apps apps, add the following properties with these values to *src/main/resources/application.properties*.
0 commit comments