Skip to content

docs: Use Azure RBAC role to fetch secrets from Key Vault #127488

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

FlorentATo
Copy link
Contributor

@FlorentATo FlorentATo commented Aug 7, 2025

I have updated the documentation in accordance with Azure Key Vault best-practices to use Azure RBAC instead of Key Vault access policies.

Moreover, the current link ("create an access policy") aims at a legacy document.

References:

Copy link
Contributor

@FlorentATo : Thanks for your contribution! The author(s) and reviewer(s) have been notified to review your proposed change.

Copy link
Contributor

Learn Build status updates of commit 183e4e0:

✅ Validation status: passed

File Status Preview URL Details
articles/container-apps/manage-secrets.md ✅Succeeded

For more details, please refer to the build report.

@v-dirichards
Copy link
Contributor

@craigshoemaker

Can you review the proposed changes?

Important: When the changes are ready for publication, adding a #sign-off comment is the best way to signal that the PR is ready for the review team to merge.

#label:"aq-pr-triaged"
@MicrosoftDocs/public-repo-pr-review-team

@prmerger-automator prmerger-automator bot added the aq-pr-triaged tracking label for the PR review team label Aug 7, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants