You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/container-apps/manage-secrets.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: container-apps
5
5
author: craigshoemaker
6
6
ms.service: azure-container-apps
7
7
ms.topic: how-to
8
-
ms.date: 02/28/2025
8
+
ms.date: 03/30/2026
9
9
ms.author: cshoe
10
10
ms.custom:
11
11
- devx-track-azurecli
@@ -45,7 +45,7 @@ When you define secrets through the portal, or via different command line option
45
45
46
46
1. Go to your container app in the [Azure portal](https://portal.azure.com).
47
47
48
-
1. Under the *Settings* section, select **Secrets**.
48
+
1. Under the *Security* section, select **Secrets**.
49
49
50
50
1. Select **Add**.
51
51
@@ -122,7 +122,7 @@ Here, a connection string to a queue storage account is declared. The value for
122
122
123
123
---
124
124
125
-
###<aname="reference-secret-from-key-vault"></a>Reference secret from Key Vault
125
+
## <aname="reference-secret-from-key-vault"></a>Reference secret from Key Vault
126
126
127
127
When you define a secret, you create a reference to a secret stored in Azure Key Vault. Container Apps automatically retrieves the secret value from Key Vault and makes it available as a secret in your container app.
128
128
@@ -136,7 +136,7 @@ To grant access to Key Vault secrets, grant the Azure RBAC role [Key Vault Secre
136
136
137
137
1. Go to your container app in the [Azure portal](https://portal.azure.com).
138
138
139
-
1. Under the *Settings* section, select **Identity**.
139
+
1. Under the *Security* section, select **Identity**.
140
140
141
141
1. In the *System assigned* tab, set the *Status* to **On**.
142
142
@@ -147,7 +147,7 @@ To grant access to Key Vault secrets, grant the Azure RBAC role [Key Vault Secre
147
147
148
148
1. A popup appears to confirm that you want to enable system assigned managed identity and register your container app with Microsoft Entra ID. Select **Yes**.
149
149
150
-
1. Under the *Settings* section, select **Secrets**.
150
+
1. Under the *Security* section, select **Secrets**.
> If you're using [UDR With Azure Firewall](user-defined-routes.md), you will need to add the `AzureKeyVault` service tag and the *login.microsoft.com* FQDN to the allow list for your firewall. Refer to [configuring UDR with Azure Firewall](use-azure-firewall.md) to decide which additional service tags you need.
219
+
> If you're using [UDR With Azure Firewall](user-defined-routes.md), you'll need to add the `AzureKeyVault` service tag and the *login.microsoft.com* FQDN to the allow list for your firewall. Refer to [configuring UDR with Azure Firewall](use-azure-firewall.md) to decide which additional service tags you need.
220
220
221
221
#### Key Vault secret URI and secret rotation
222
222
223
223
The Key Vault secret URI must be in one of the following formats:
224
224
225
-
*`https://myvault.vault.azure.net/secrets/mysecret/ec96f02080254f109c51a1f14cdb1931`: Reference a specific version of a secret.
226
-
*`https://myvault.vault.azure.net/secrets/mysecret`: Reference the latest version of a secret.
225
+
-`https://myvault.vault.azure.net/secrets/mysecret/ec96f02080254f109c51a1f14cdb1931`: Reference a specific version of a secret.
226
+
-`https://myvault.vault.azure.net/secrets/mysecret`: Reference the latest version of a secret.
227
227
228
228
If a version isn't specified in the URI, then the app uses the latest version that exists in the key vault. When newer versions become available, the app automatically retrieves the latest version within 30 minutes. Any active revisions that reference the secret in an environment variable is automatically restarted to pick up the new value.
0 commit comments