Skip to content

Commit e954045

Browse files
committed
tweak wording
1 parent 60c9863 commit e954045

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

aspnetcore/security/app-secrets/includes/app-secrets-3-5.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -176,10 +176,10 @@ The `Movies:ConnectionString` and `Movies:ServiceApiKey` secrets are mapped to t
176176
Storing passwords in plain text is insecure. For example, a database connection string stored in `appsettings.json` should not include a password. Instead, store the password as a secret, and include the password in the connection string at runtime. For example:
177177

178178
```dotnetcli
179-
dotnet user-secrets set "DbPassword" "<CREDENTIAL_PLACEHOLDER>"
179+
dotnet user-secrets set "DbPassword" "<secret value>"
180180
```
181181

182-
Replace the placeholder in the preceding example with the password value. Set the secret's value on a <xref:System.Data.SqlClient.SqlConnectionStringBuilder> object's <xref:System.Data.SqlClient.SqlConnectionStringBuilder.Password%2A> property to include it as the password value in the connection string:
182+
Replace the `<secret value>` placeholder in the preceding example with the password value. Set the secret's value on a <xref:System.Data.SqlClient.SqlConnectionStringBuilder> object's <xref:System.Data.SqlClient.SqlConnectionStringBuilder.Password%2A> property to include it as the password value in the connection string:
183183

184184
[!code-csharp[](~/security/app-secrets/samples/6.x/UserSecrets/Program.cs?name=snippet_sql&highlight=5-8)]
185185

0 commit comments

Comments
 (0)