Skip to content

Commit f88dfa2

Browse files
committed
Fix acrolinx, build warnings
1 parent ca2ef34 commit f88dfa2

4 files changed

+8
-8
lines changed

articles/service-fabric/concepts-managed-identity.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,9 @@ ms.custom: sfrev
88

99
# Using Managed identities for Azure with Service Fabric (Preview)
1010

11-
A common challenge when building cloud applications is how to securely manage the credentials in your code for authenticating to cloud services (without saving them locally on developer workstations or in source control). *Managed identities for Azure* solves this problem for all your resources in Azure Active Directory (Azure AD) by providing them with automatically managed identities within Azure AD. You can use a service's identity to authenticate to any service that supports Azure AD authentication, including Key Vault, without any credentials stored in your code.
11+
A common challenge when building cloud applications is how to securely manage the credentials in your code for authenticating to various services without saving them locally on a developer workstation or in source control. *Managed identities for Azure* solve this problem for all your resources in Azure Active Directory (Azure AD) by providing them with automatically managed identities within Azure AD. You can use a service's identity to authenticate to any service that supports Azure AD authentication, including Key Vault, without any credentials stored in your code.
1212

13-
The *Managed identities* feature for Azure resources is free with Azure AD for Azure subscriptions. There is no additional cost.
13+
*Managed identities for Azure resources* are free with Azure AD for Azure subscriptions. There's no additional cost.
1414

1515
> [!NOTE]
1616
> *Managed identities for Azure* is the new name for the service formerly known as Managed Service Identity (MSI).
@@ -30,11 +30,11 @@ The are two types of managed identities:
3030
- A **System-assigned managed identity** is enabled directly on an Azure service instance. The lifecycle of a system-assigned identity is unique to the Azure service instance that it's enabled on.
3131
- A **user-assigned managed identity** is created as a standalone Azure resource. The identity can be assigned to one or more Azure service instances and is managed separately from the lifecycles of those instances.
3232

33-
To further understand the difference between managed identity types, see [How do managed identities for Azure resources work?](../active-directory/managed-identities-azure-resources/overview#how-does-the-managed-identities-for-azure-resources-work.)
33+
To further understand the difference between managed identity types, see [How do managed identities for Azure resources work?](../active-directory/managed-identities-azure-resources/overview.md#how-does-the-managed-identities-for-azure-resources-work)
3434

3535
## Supported scenarios for Service Fabric applications
3636

37-
Managed identities for Service Fabric is only supported in Azure-deployed Service Fabric clusters, and only for applications deployed as Azure resources; an application which is not deployed as an Azure resource cannot be assigned an identity. Conceptually speaking, support for managed identities in Azure Service Fabric cluster consists of two phases:
37+
Managed identities for Service Fabric are only supported in Azure-deployed Service Fabric clusters, and only for applications deployed as Azure resources; an application that is not deployed as an Azure resource cannot be assigned an identity. Conceptually speaking, support for managed identities in Azure Service Fabric cluster consists of two phases:
3838

3939
1. Assign one or more managed identities to the application resource; an application may be assigned a single system-assigned identity, and/or up to 32 user-assigned identities, respectively.
4040

articles/service-fabric/configure-container-repository-credentials.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ Here is an example of what can be added inside the `Hosting` section in the Clus
8686

8787
## Use tokens as registry credentials
8888

89-
Service Fabric supports using tokens as credentials to download images for your containers. This feature leverages the *managed identity* of the underlying virtual machine scale set to authenticate to the registry, eliminating the need for managing user credentials. See [Managed identities for Azure resources](../active-directory/managed-identities-azure-resources/overview) for more info. Using this feature requires the follows steps:
89+
Service Fabric supports using tokens as credentials to download images for your containers. This feature leverages the *managed identity* of the underlying virtual machine scale set to authenticate to the registry, eliminating the need for managing user credentials. See [Managed identities for Azure resources](../active-directory/managed-identities-azure-resources/overview.md) for more info. Using this feature requires the follows steps:
9090

9191
1. Ensure that *System Assigned Managed Identity* is enabled for the VM.
9292

@@ -115,4 +115,4 @@ Service Fabric supports using tokens as credentials to download images for your
115115

116116
## Next steps
117117

118-
* See more about [Container registry authentication](../container-registry/container-registry-authentication).
118+
* See more about [Container registry authentication](../container-registry/container-registry-authentication.md).

articles/service-fabric/configure-existing-cluster-enable-managed-identity-token-service.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.custom: sfrev
88

99
# Configure managed identity support in an existing Service Fabric cluster (preview)
1010

11-
To use [Managed identities for Azure resources](../active-directory/managed-identities-azure-resources/overview) in your Service Fabric applications, first enable the *Managed Identity Token Service* on the cluster. This service is responsible for the authentication of Service Fabric applications using their managed identities, and for obtaining access tokens on their behalf. Once the service is enabled, you can see it in Service Fabric Explorer under the **System** section in the left pane, running under the name **fabric:/System/ManagedIdentityTokenService**.
11+
To use [Managed identities for Azure resources](../active-directory/managed-identities-azure-resources/overview.md) in your Service Fabric applications, first enable the *Managed Identity Token Service* on the cluster. This service is responsible for the authentication of Service Fabric applications using their managed identities, and for obtaining access tokens on their behalf. Once the service is enabled, you can see it in Service Fabric Explorer under the **System** section in the left pane, running under the name **fabric:/System/ManagedIdentityTokenService**.
1212

1313
> [!NOTE]
1414
> Service Fabric runtime version 6.5.658.9590 or higher is required to enable the **Managed Identity Token Service**.

articles/service-fabric/configure-new-azure-service-fabric-enable-managed-identity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.custom: sfrev
88

99
# Configure managed identity support for a new Service Fabric cluster (preview)
1010

11-
To use [Managed identities for Azure resources](../active-directory/managed-identities-azure-resources/overview) in your Service Fabric applications, first enable the *Managed Identity Token Service* on the cluster. This service is responsible for the authentication of Service Fabric applications using their managed identities, and for obtaining access tokens on their behalf. Once the service is enabled, you can see it in Service Fabric Explorer under the **System** section in the left pane, running under the name **fabric:/System/ManagedIdentityTokenService** next to other system services.
11+
To use [Managed identities for Azure resources](../active-directory/managed-identities-azure-resources/overview.md) in your Service Fabric applications, first enable the *Managed Identity Token Service* on the cluster. This service is responsible for the authentication of Service Fabric applications using their managed identities, and for obtaining access tokens on their behalf. Once the service is enabled, you can see it in Service Fabric Explorer under the **System** section in the left pane, running under the name **fabric:/System/ManagedIdentityTokenService** next to other system services.
1212

1313
> [!NOTE]
1414
> Service Fabric runtime version 6.5.658.9590 or higher is required to enable the **Managed Identity Token Service**.

0 commit comments

Comments
 (0)