Skip to content

Commit 1e649a8

Browse files
committed
acrolinx
1 parent 6063787 commit 1e649a8

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

articles/azure-resource-manager/bicep/linter-rule-outputs-should-not-contain-secrets.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ The following example fails because the output name contains 'password', indicat
5050
output accountPassword string = '...'
5151
```
5252

53-
To fix it, you need to remove the secret data from the output. The recommended practice is to output the resourceId of the resource containing the secret and retrieve the secret when the resource needing the information is created or updated. Secrets may also be stored in KeyVault for more complex deployment scenarios.
53+
To fix it, you need to remove the secret data from the output. The recommended practice is to output the resourceId of the resource containing the secret and retrieve the secret when the resource needing the information is created or updated. Secrets may also be stored in KeyVault for more complex deployment scenarios.
5454

5555
The following example shows a secure pattern for retrieving a storageAccount key from a module.
5656

0 commit comments

Comments
 (0)