You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -104,12 +104,12 @@ This command shows the secret information including the URI. After completing th
104
104
Open Program.cs file and update the placeholder <YourKeyVaultName> with the name of your Key Vault that you created in Step 3
105
105
106
106
107
-
#### 8) Run the app
107
+
#### 7) Run the app
108
108
From the main menu of Visual Studio 2017, choose
109
109
Debug > Start without Debugging.
110
110
When the browser appears, navigate to the About page. The value for the AppSecret is displayed.
111
111
112
-
#### 9) Publish the web application to Azure
112
+
#### 8) Publish the web application to Azure
113
113
114
114
1. In Visual Studio, select **key-vault-dotnet-core-quickstart** Project.
115
115
2. Select **Publish** then **Start**.
@@ -118,7 +118,7 @@ This command shows the secret information including the URI. After completing th
118
118
5. Select **Create**.
119
119

120
120
121
-
#### 10) Enable Managed Service Identity
121
+
#### 9) Enable Managed Service Identity
122
122
Azure Key Vault provides a way to securely store credentials and other keys and secrets, but your code needs to authenticate to Key Vault to retrieve them. Managed Service Identity (MSI) makes solving this problem simpler by giving Azure services an automatically managed identity in Azure Active Directory (Azure AD). You can use this identity to authenticate to any service that supports Azure AD authentication, including Key Vault, without having any credentials in your code.
0 commit comments