Skip to content

Commit f97fb46

Browse files
author
Jill Grant
authored
Merge pull request #278326 from Ratulac-Azure/Ratulac-delete-image-aad
Ratulac-delete-image-aad
2 parents bb3473e + 4d49c71 commit f97fb46

File tree

10 files changed

+0
-14
lines changed

10 files changed

+0
-14
lines changed

articles/spring-apps/enterprise/how-to-enable-system-assigned-managed-identity.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -55,8 +55,6 @@ To set up a managed identity in the portal, first create an app, and then enable
5555
3. Select **Identity**.
5656
4. Within the **System assigned** tab, switch **Status** to *On*. Select **Save**.
5757

58-
:::image type="content" source="media/how-to-enable-system-assigned-managed-identity/msi-enable.png" alt-text="Screenshot of Azure portal showing the Identity screen for an application." lightbox="media/how-to-enable-system-assigned-managed-identity/msi-enable.png":::
59-
6058
### [Azure CLI](#tab/azure-cli)
6159

6260
You can enable system-assigned managed identity during app creation or on an existing app.
@@ -107,8 +105,6 @@ Use the following steps to remove system-assigned managed identity from an app t
107105
1. Navigate to the desired application and select **Identity**.
108106
1. Under **System assigned**/**Status**, select **Off** and then select **Save**:
109107

110-
:::image type="content" source="media/how-to-enable-system-assigned-managed-identity/msi-disable.png" alt-text="Screenshot of Azure portal showing the Identity screen for an application, with the Status switch set to Off." lightbox="media/how-to-enable-system-assigned-managed-identity/msi-disable.png":::
111-
112108
### [Azure CLI](#tab/azure-cli)
113109

114110
To remove system-assigned managed identity from an app that no longer needs it, use the following command:

articles/spring-apps/enterprise/how-to-set-up-sso-with-azure-ad.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -53,8 +53,6 @@ Register your application to establish a trust relationship between your app and
5353
1. In *Redirect URI (optional)* select **Web**, then enter the URL from the above section in the text box. The redirect URI is the location where Microsoft Entra ID redirects your client and sends security tokens after authentication.
5454
1. Select **Register** to finish registering the application.
5555

56-
:::image type="content" source="media/how-to-set-up-sso-with-azure-ad/sso-create-app-registration.png" alt-text="Screenshot of how to fill out the Add App Registration screen." lightbox="media/how-to-set-up-sso-with-azure-ad/sso-create-app-registration.png":::
57-
5856
When registration finishes, you'll see the *Application (client) ID* on the **Overview** screen of the *App registrations** page.
5957

6058
## Add a redirect URI after app registration

articles/spring-apps/enterprise/includes/quickstart-deploy-web-app/provision-postgresql.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,8 +32,6 @@ Use the following steps to create an Azure Database for PostgreSQL server:
3232
- **Admin username**: *myadmin*
3333
- **Password** and **Confirm password**: Enter a password.
3434

35-
:::image type="content" source="../../media/quickstart-deploy-web-app/postgresql-create-server-basics.png" alt-text="Screenshot of the Azure portal that shows the Server details page." lightbox="../../media/quickstart-deploy-web-app/postgresql-create-server-basics.png":::
36-
3735
1. Configure the **Networking** tab using the following information:
3836

3937
- **Connectivity method**: **Public access (allowed IP addresses)**

articles/spring-apps/enterprise/tutorial-managed-identities-functions.md

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -79,15 +79,9 @@ Use the following steps to enable Microsoft Entra authentication to access your
7979
1. In the Azure portal, navigate to your resource group and then open the Function app you created.
8080
1. In the navigation pane, select **Authentication** and then select **Add identity provider** on the main pane.
8181
1. On the **Add an identity provider** page, select **Microsoft** from the **Identity provider** dropdown menu.
82-
83-
:::image type="content" source="media/tutorial-managed-identities-functions/add-identity-provider.png" alt-text="Screenshot of the Azure portal showing the Add an identity provider page with Microsoft highlighted in the identity provider dropdown menu." lightbox="media/tutorial-managed-identities-functions/add-identity-provider.png":::
84-
8582
1. Select **Add**.
8683
1. For the **Basics** settings on the **Add an identity provider** page, set **Supported account types** to **Any Microsoft Entra directory - Multi-tenant**.
8784
1. Set **Unauthenticated requests** to **HTTP 401 Unauthorized: recommended for APIs**. This setting ensures that all unauthenticated requests are denied (401 response).
88-
89-
:::image type="content" source="media/tutorial-managed-identities-functions/identity-provider-settings.png" alt-text="Screenshot of the Azure portal showing the Add an identity provider page with Support account types and Unauthenticated requests highlighted." lightbox="media/tutorial-managed-identities-functions/identity-provider-settings.png":::
90-
9185
1. Select **Add**.
9286

9387
After you add the settings, the Function app restarts and all subsequent requests are prompted to sign in through Microsoft Entra ID. You can test that unauthenticated requests are currently being rejected with the Function app's root URL (returned in the `hostNames` output of the `az functionapp create` command). You should then be redirected to your organization's Microsoft Entra sign-in screen.

0 commit comments

Comments
 (0)