Skip to content

Commit fcad70c

Browse files
Merge pull request #277339 from schaffererin/userstory257016
Added service connector links into AKS docs
2 parents 9a15e0f + 7d01bcd commit fcad70c

File tree

2 files changed

+5
-3
lines changed

2 files changed

+5
-3
lines changed

articles/aks/csi-secrets-store-identity-access.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -347,10 +347,10 @@ A key vault certificate also contains public x509 certificate metadata. The key
347347
348348
## Next steps
349349
350-
In this article, you learned how to create and provide an identity to access your Azure Key Vault. If you want to configure extra configuration options or perform troubleshooting, continue to the next article.
350+
In this article, you learned how to create and provide an identity to access your Azure Key Vault. The [Service Connector](../service-connector/overview.md) integration helps simplify the connection configuration for AKS workloads and Azure backing services. It securely handles authentication and network configurations and follows best practices for connecting to Azure services. For more information, see [Use the Azure Key Vault provider for Secrets Store CSI Driver in an AKS cluster](../service-connector/tutorial-python-aks-keyvault-csi-driver.md) and the [Service Connector introduction](https://azure.github.io/AKS/2024/05/23/service-connector-intro).
351+
352+
If you want to configure extra configuration options or perform troubleshooting, see [Configuration options and troubleshooting resources for Azure Key Vault provider with Secrets Store CSI Driver in AKS](./csi-secrets-store-configuration-options.md).
351353
352-
> [!div class="nextstepaction"]
353-
> [Configuration options and troubleshooting resources for Azure Key Vault provider with Secrets Store CSI Driver in AKS](./csi-secrets-store-configuration-options.md)
354354
355355
<!-- LINKS INTERNAL -->
356356

articles/aks/workload-identity-deploy-cluster.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -361,6 +361,8 @@ az aks update \
361361

362362
In this article, you deployed a Kubernetes cluster and configured it to use a workload identity in preparation for application workloads to authenticate with that credential. Now you're ready to deploy your application and configure it to use the workload identity with the latest version of the [Azure Identity][azure-identity-libraries] client library. If you can't rewrite your application to use the latest client library version, you can [set up your application pod][workload-identity-migration] to authenticate using managed identity with workload identity as a short-term migration solution.
363363

364+
The [Service Connector](../service-connector/overview.md) integration helps simplify the connection configuration for AKS workloads and Azure backing services. It securely handles authentication and network configurations and follows best practices for connecting to Azure services. For more information, see [Connect to Azure OpenAI Service in AKS using Workload Identity](../service-connector/tutorial-python-aks-openai-workload-identity.md) and the [Service Connector introduction](https://azure.github.io/AKS/2024/05/23/service-connector-intro).
365+
364366
<!-- EXTERNAL LINKS -->
365367
[kubectl-describe]: https://kubernetes.io/docs/reference/generated/kubectl/kubectl-commands#describe
366368

0 commit comments

Comments
 (0)