Skip to content

Commit 8151862

Browse files
author
Frank Li (Wicresoft North America Ltd)
committed
README Updates.
1 parent 7e70751 commit 8151862

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -104,12 +104,12 @@ This command shows the secret information including the URI. After completing th
104104
Open Program.cs file and update the placeholder <YourKeyVaultName> with the name of your Key Vault that you created in Step 3
105105

106106

107-
#### 8) Run the app
107+
#### 7) Run the app
108108
From the main menu of Visual Studio 2017, choose
109109
Debug > Start without Debugging.
110110
When the browser appears, navigate to the About page. The value for the AppSecret is displayed.
111111

112-
#### 9) Publish the web application to Azure
112+
#### 8) Publish the web application to Azure
113113

114114
1. In Visual Studio, select **key-vault-dotnet-core-quickstart** Project.
115115
2. Select **Publish** then **Start**.
@@ -118,7 +118,7 @@ This command shows the secret information including the URI. After completing th
118118
5. Select **Create**.
119119
![Publish](./media/PublishToAzure.gif)
120120

121-
#### 10) Enable Managed Service Identity
121+
#### 9) Enable Managed Service Identity
122122
Azure Key Vault provides a way to securely store credentials and other keys and secrets, but your code needs to authenticate to Key Vault to retrieve them. Managed Service Identity (MSI) makes solving this problem simpler by giving Azure services an automatically managed identity in Azure Active Directory (Azure AD). You can use this identity to authenticate to any service that supports Azure AD authentication, including Key Vault, without having any credentials in your code.
123123

124124
1. Return to the Azure CLI
@@ -131,7 +131,7 @@ az webapp identity assign --name "keyvaultdotnetcorequickstart" --resource-group
131131
>[!NOTE]
132132
>This command is the equivalent of going to the portal and switching **Managed service identity** to **On** in the web application properties.
133133
134-
#### 11) Assign permissions to your application to read secrets from Key Vault
134+
#### 10) Assign permissions to your application to read secrets from Key Vault
135135
1. Return to the Azure CLI
136136
2. Run the following commands by replacing the placeholders
137137
```

0 commit comments

Comments
 (0)