Skip to content

Commit 700c647

Browse files
committed
Freshness Edit: Azure Dev Compute - Container Apps
1 parent 8c6c428 commit 700c647

1 file changed

Lines changed: 8 additions & 8 deletions

File tree

articles/container-apps/manage-secrets.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: container-apps
55
author: craigshoemaker
66
ms.service: azure-container-apps
77
ms.topic: how-to
8-
ms.date: 02/28/2025
8+
ms.date: 03/30/2026
99
ms.author: cshoe
1010
ms.custom:
1111
- devx-track-azurecli
@@ -45,7 +45,7 @@ When you define secrets through the portal, or via different command line option
4545

4646
1. Go to your container app in the [Azure portal](https://portal.azure.com).
4747

48-
1. Under the *Settings* section, select **Secrets**.
48+
1. Under the *Security* section, select **Secrets**.
4949

5050
1. Select **Add**.
5151

@@ -122,7 +122,7 @@ Here, a connection string to a queue storage account is declared. The value for
122122

123123
---
124124

125-
### <a name="reference-secret-from-key-vault"></a>Reference secret from Key Vault
125+
## <a name="reference-secret-from-key-vault"></a>Reference secret from Key Vault
126126

127127
When you define a secret, you create a reference to a secret stored in Azure Key Vault. Container Apps automatically retrieves the secret value from Key Vault and makes it available as a secret in your container app.
128128

@@ -136,7 +136,7 @@ To grant access to Key Vault secrets, grant the Azure RBAC role [Key Vault Secre
136136

137137
1. Go to your container app in the [Azure portal](https://portal.azure.com).
138138

139-
1. Under the *Settings* section, select **Identity**.
139+
1. Under the *Security* section, select **Identity**.
140140

141141
1. In the *System assigned* tab, set the *Status* to **On**.
142142

@@ -147,7 +147,7 @@ To grant access to Key Vault secrets, grant the Azure RBAC role [Key Vault Secre
147147

148148
1. A popup appears to confirm that you want to enable system assigned managed identity and register your container app with Microsoft Entra ID. Select **Yes**.
149149

150-
1. Under the *Settings* section, select **Secrets**.
150+
1. Under the *Security* section, select **Secrets**.
151151

152152
1. Select **Add**.
153153

@@ -216,14 +216,14 @@ Secrets Key Vault references aren't supported in PowerShell.
216216
---
217217

218218
> [!NOTE]
219-
> If you're using [UDR With Azure Firewall](user-defined-routes.md), you will need to add the `AzureKeyVault` service tag and the *login.microsoft.com* FQDN to the allow list for your firewall. Refer to [configuring UDR with Azure Firewall](use-azure-firewall.md) to decide which additional service tags you need.
219+
> If you're using [UDR With Azure Firewall](user-defined-routes.md), you'll need to add the `AzureKeyVault` service tag and the *login.microsoft.com* FQDN to the allow list for your firewall. Refer to [configuring UDR with Azure Firewall](use-azure-firewall.md) to decide which additional service tags you need.
220220
221221
#### Key Vault secret URI and secret rotation
222222

223223
The Key Vault secret URI must be in one of the following formats:
224224

225-
* `https://myvault.vault.azure.net/secrets/mysecret/ec96f02080254f109c51a1f14cdb1931`: Reference a specific version of a secret.
226-
* `https://myvault.vault.azure.net/secrets/mysecret`: Reference the latest version of a secret.
225+
- `https://myvault.vault.azure.net/secrets/mysecret/ec96f02080254f109c51a1f14cdb1931`: Reference a specific version of a secret.
226+
- `https://myvault.vault.azure.net/secrets/mysecret`: Reference the latest version of a secret.
227227

228228
If a version isn't specified in the URI, then the app uses the latest version that exists in the key vault. When newer versions become available, the app automatically retrieves the latest version within 30 minutes. Any active revisions that reference the secret in an environment variable is automatically restarted to pick up the new value.
229229

0 commit comments

Comments
 (0)