You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/service-fabric/concepts-managed-identity.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,9 +8,9 @@ ms.custom: sfrev
8
8
9
9
# Using Managed identities for Azure with Service Fabric (Preview)
10
10
11
-
A common challenge when building cloud applications is how to securely manage the credentials in your code for authenticating to cloud services (without saving them locally on developer workstations or in source control). *Managed identities for Azure*solves this problem for all your resources in Azure Active Directory (Azure AD) by providing them with automatically managed identities within Azure AD. You can use a service's identity to authenticate to any service that supports Azure AD authentication, including Key Vault, without any credentials stored in your code.
11
+
A common challenge when building cloud applications is how to securely manage the credentials in your code for authenticating to various services without saving them locally on a developer workstation or in source control. *Managed identities for Azure*solve this problem for all your resources in Azure Active Directory (Azure AD) by providing them with automatically managed identities within Azure AD. You can use a service's identity to authenticate to any service that supports Azure AD authentication, including Key Vault, without any credentials stored in your code.
12
12
13
-
The *Managed identities* feature for Azure resources is free with Azure AD for Azure subscriptions. There is no additional cost.
13
+
*Managed identitiesfor Azure resources* are free with Azure AD for Azure subscriptions. There's no additional cost.
14
14
15
15
> [!NOTE]
16
16
> *Managed identities for Azure* is the new name for the service formerly known as Managed Service Identity (MSI).
@@ -30,11 +30,11 @@ The are two types of managed identities:
30
30
- A **System-assigned managed identity** is enabled directly on an Azure service instance. The lifecycle of a system-assigned identity is unique to the Azure service instance that it's enabled on.
31
31
- A **user-assigned managed identity** is created as a standalone Azure resource. The identity can be assigned to one or more Azure service instances and is managed separately from the lifecycles of those instances.
32
32
33
-
To further understand the difference between managed identity types, see [How do managed identities for Azure resources work?](../active-directory/managed-identities-azure-resources/overview#how-does-the-managed-identities-for-azure-resources-work.)
33
+
To further understand the difference between managed identity types, see [How do managed identities for Azure resources work?](../active-directory/managed-identities-azure-resources/overview.md#how-does-the-managed-identities-for-azure-resources-work)
34
34
35
35
## Supported scenarios for Service Fabric applications
36
36
37
-
Managed identities for Service Fabric is only supported in Azure-deployed Service Fabric clusters, and only for applications deployed as Azure resources; an application which is not deployed as an Azure resource cannot be assigned an identity. Conceptually speaking, support for managed identities in Azure Service Fabric cluster consists of two phases:
37
+
Managed identities for Service Fabric are only supported in Azure-deployed Service Fabric clusters, and only for applications deployed as Azure resources; an application that is not deployed as an Azure resource cannot be assigned an identity. Conceptually speaking, support for managed identities in Azure Service Fabric cluster consists of two phases:
38
38
39
39
1. Assign one or more managed identities to the application resource; an application may be assigned a single system-assigned identity, and/or up to 32 user-assigned identities, respectively.
Copy file name to clipboardExpand all lines: articles/service-fabric/configure-container-repository-credentials.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -86,7 +86,7 @@ Here is an example of what can be added inside the `Hosting` section in the Clus
86
86
87
87
## Use tokens as registry credentials
88
88
89
-
Service Fabric supports using tokens as credentials to download images for your containers. This feature leverages the *managed identity* of the underlying virtual machine scale set to authenticate to the registry, eliminating the need for managing user credentials. See [Managed identities for Azure resources](../active-directory/managed-identities-azure-resources/overview) for more info. Using this feature requires the follows steps:
89
+
Service Fabric supports using tokens as credentials to download images for your containers. This feature leverages the *managed identity* of the underlying virtual machine scale set to authenticate to the registry, eliminating the need for managing user credentials. See [Managed identities for Azure resources](../active-directory/managed-identities-azure-resources/overview.md) for more info. Using this feature requires the follows steps:
90
90
91
91
1. Ensure that *System Assigned Managed Identity* is enabled for the VM.
92
92
@@ -115,4 +115,4 @@ Service Fabric supports using tokens as credentials to download images for your
115
115
116
116
## Next steps
117
117
118
-
* See more about [Container registry authentication](../container-registry/container-registry-authentication).
118
+
* See more about [Container registry authentication](../container-registry/container-registry-authentication.md).
Copy file name to clipboardExpand all lines: articles/service-fabric/configure-existing-cluster-enable-managed-identity-token-service.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.custom: sfrev
8
8
9
9
# Configure managed identity support in an existing Service Fabric cluster (preview)
10
10
11
-
To use [Managed identities for Azure resources](../active-directory/managed-identities-azure-resources/overview) in your Service Fabric applications, first enable the *Managed Identity Token Service* on the cluster. This service is responsible for the authentication of Service Fabric applications using their managed identities, and for obtaining access tokens on their behalf. Once the service is enabled, you can see it in Service Fabric Explorer under the **System** section in the left pane, running under the name **fabric:/System/ManagedIdentityTokenService**.
11
+
To use [Managed identities for Azure resources](../active-directory/managed-identities-azure-resources/overview.md) in your Service Fabric applications, first enable the *Managed Identity Token Service* on the cluster. This service is responsible for the authentication of Service Fabric applications using their managed identities, and for obtaining access tokens on their behalf. Once the service is enabled, you can see it in Service Fabric Explorer under the **System** section in the left pane, running under the name **fabric:/System/ManagedIdentityTokenService**.
12
12
13
13
> [!NOTE]
14
14
> Service Fabric runtime version 6.5.658.9590 or higher is required to enable the **Managed Identity Token Service**.
Copy file name to clipboardExpand all lines: articles/service-fabric/configure-new-azure-service-fabric-enable-managed-identity.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.custom: sfrev
8
8
9
9
# Configure managed identity support for a new Service Fabric cluster (preview)
10
10
11
-
To use [Managed identities for Azure resources](../active-directory/managed-identities-azure-resources/overview) in your Service Fabric applications, first enable the *Managed Identity Token Service* on the cluster. This service is responsible for the authentication of Service Fabric applications using their managed identities, and for obtaining access tokens on their behalf. Once the service is enabled, you can see it in Service Fabric Explorer under the **System** section in the left pane, running under the name **fabric:/System/ManagedIdentityTokenService** next to other system services.
11
+
To use [Managed identities for Azure resources](../active-directory/managed-identities-azure-resources/overview.md) in your Service Fabric applications, first enable the *Managed Identity Token Service* on the cluster. This service is responsible for the authentication of Service Fabric applications using their managed identities, and for obtaining access tokens on their behalf. Once the service is enabled, you can see it in Service Fabric Explorer under the **System** section in the left pane, running under the name **fabric:/System/ManagedIdentityTokenService** next to other system services.
12
12
13
13
> [!NOTE]
14
14
> Service Fabric runtime version 6.5.658.9590 or higher is required to enable the **Managed Identity Token Service**.
0 commit comments