You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/container-apps/dapr-authentication-token.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ author: greenie-msft
7
7
ms.service: azure-container-apps
8
8
ms.subservice: dapr
9
9
ms.topic: how-to
10
-
ms.date: 02/03/2026
10
+
ms.date: 03/27/2026
11
11
---
12
12
13
13
# Enable token authentication for Dapr requests
@@ -30,17 +30,17 @@ You can use this token to authenticate that calls coming into your application a
30
30
31
31
## Authenticate requests from Dapr
32
32
33
-
# [With Dapr SDKs](#tab/sdk)
33
+
# [With a Dapr SDK](#tab/sdk)
34
34
35
-
If you're using a [Dapr SDK](https://docs.dapr.io/developing-applications/sdks/), you can use the Dapr authentication methods provided in the open-source SDK repositories.
35
+
If you're using a [Dapr Software Development Kit (SDK)](https://docs.dapr.io/developing-applications/sdks/), you can use the Dapr authentication methods provided in the open-source SDK repositories.
36
36
37
-
Once added to your project, the Dapr SDKs validates the token in all incoming requests from Dapr, rejecting calls that don't include the correct token. You don't need to perform any other action.
37
+
Once added to your project, the Dapr SDK validates the token in all incoming requests from Dapr, rejecting calls that don't include the correct token. You don't need to perform any other action.
38
38
39
39
Incoming requests that don't include the token, or include an incorrect token, are rejected automatically.
40
40
41
41
# [Without an SDK](#tab/nosdk)
42
42
43
-
If you're not using a Dapr SDK, you need to check the HTTP header or gRPC metadata property in all incoming requests in order to validate that they're created by the Dapr sidecar.
43
+
If you're not using a Dapr SDK, you need to check the HTTP header or gRPC metadata property in all incoming requests and validate that the Dapr sidecar created the request.
Copy file name to clipboardExpand all lines: articles/container-apps/dapr-component-connect-services.md
+3-4Lines changed: 3 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: azure-container-apps
8
8
ms.subservice: dapr
9
9
ms.custom: build-2023
10
10
ms.topic: concept-article
11
-
ms.date: 02/03/2026
11
+
ms.date: 03/27/2026
12
12
---
13
13
14
14
# Connect to other Azure or partner services by using Dapr components
@@ -19,15 +19,14 @@ Before getting started, learn more about the [offered support for Dapr component
19
19
20
20
## Recommendations
21
21
22
-
Whenever possible, it's recommended that you use Azure components that provide managed identity support for the most secure connection. Use Azure Key Vault secret stores *only* when managed identity authentication isn't supported.
22
+
For the most secure connection, we recommended that you use Azure components that provide managed identity support whenever possible. Use Azure Key Vault secret stores *only* when managed identity authentication isn't supported.
23
23
24
24
| Service type | Recommendation |
25
25
| ------------ | -------------- |
26
26
| Azure component with managed identity support |[Use the managed identity flow (recommended)](#use-managed-identity-recommended)|
27
27
| Azure component without managed identity support |[Use an Azure Key Vault secret store](#azure-key-vault-secret-stores)|
28
28
| Non-Azure components |[Use an Azure Key Vault secret store](#azure-key-vault-secret-stores)|
29
29
30
-
31
30
## Use managed identity (recommended)
32
31
33
32
For Azure-hosted services, Dapr can use the [managed identity of the scoped container apps][aca-managed-id] to authenticate to the backend service provider. When using managed identity, you don't need to include secret information in a component manifest. *Using managed identity is recommended* as it eliminates storage of sensitive input in components and doesn't require managing a secret store.
@@ -72,7 +71,7 @@ scopes:
72
71
73
72
#### Platform-managed Kubernetes secrets
74
73
75
-
As an alternative to Kubernetes secrets, local environment variables, and local file Dapr secret stores, Azure Container Apps provides a platform-managed approach for creating and using Kubernetes secrets. This approach can be used to connect to non-Azure services or in dev/test scenarios for quickly deploying components via the CLI without setting up a secret store or managed identity.
74
+
As an alternative to Kubernetes secrets, local environment variables, and local file Dapr secret stores, Azure Container Apps provides a platform-managed approach for creating and using Kubernetes secrets. This approach can be used to connect to non-Azure services. Or, in dev/test scenarios it can be used for quickly deploying components via the CLI without setting up a secret store or managed identity.
76
75
77
76
This component configuration defines the sensitive value as a secret parameter that can be referenced from the metadata section.
Copy file name to clipboardExpand all lines: articles/container-apps/dapr-component-resiliency.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ author: greenie-msft
7
7
ms.service: azure-container-apps
8
8
ms.subservice: dapr
9
9
ms.topic: concept-article
10
-
ms.date: 02/02/2026
10
+
ms.date: 03/27/2026
11
11
ms.author: nigreenf
12
12
ms.reviewer: hannahhunter
13
13
ms.custom:
@@ -20,7 +20,7 @@ ms.custom:
20
20
21
21
# Dapr component resiliency (preview)
22
22
23
-
Resiliency policies proactively prevent, detect, and recover from your container app failures. In this article, you learn how to apply resiliency policies for applications that use Dapr to integrate with different cloud services, like state stores, pub/sub message brokers, secret stores, and more.
23
+
Resiliency policies proactively prevent, detect, and recover from your container app failures. In this article, you learn how to apply resiliency policies for applications that use Dapr to integrate with different cloud services. Such as, state stores, pub/sub message brokers, secret stores, and more.
24
24
25
25
You can configure resiliency policies like retries, timeouts, and circuit breakers for the following outbound and inbound operation directions by using a Dapr component:
26
26
@@ -317,12 +317,12 @@ properties: {
317
317
Specifying `consecutiveErrors` (the circuit trip condition as `consecutiveFailures > $(consecutiveErrors)-1`) sets the number of errors allowed to occur before the circuit trips and opens halfway.
318
318
319
319
The circuit waits half-open for the `timeoutInSeconds` amount of time, during which the `consecutiveErrors` number of requests must consecutively succeed.
320
-
- _If the requests succeed,_ the circuit closes.
321
-
- _If the requests fail,_ the circuit remains in a half-opened state.
320
+
- *If the requests succeed*, the circuit closes.
321
+
- *If the requests fail*, the circuit remains in a half-opened state.
322
322
323
323
If you didn't set any `intervalInSeconds` value, the circuit resets to a closed state after the amount of time you set for `timeoutInSeconds`, regardless of consecutive request success or failure. If you set `intervalInSeconds` to *0*, the circuit never automatically resets, only moving from half-open to closed state by successfully completing `consecutiveErrors` requests in a row.
324
324
325
-
If you did set an `intervalInSeconds` value, that determines the amount of time before the circuit is reset to closed state, independent of whether the requests sent in half-opened state succeeded or not.
325
+
If you did set an `intervalInSeconds` value, it determines the amount of time before the circuit is reset to closed state, independent of whether the requests sent in half-opened state succeeded or not.
326
326
327
327
## Resiliency logs
328
328
@@ -342,13 +342,13 @@ ContainerAppConsoleLogs_CL
342
342
343
343
Select **Run** to run the query and view the result with the log message indicating the policy is loading.
344
344
345
-
:::image type="content" source="media/dapr-component-resiliency/dapr-resiliency-query-results-loading.png" alt-text="Screenshot showing resiliency query results based on provided query example for checking if resiliency policy has loaded." lightbox="media/dapr-component-resiliency/dapr-resiliency-query-results-loading.png":::
345
+
:::image type="content" source="media/dapr-component-resiliency/dapr-resiliency-query-results-loading.png" alt-text="Screenshot showing resiliency query results based on the provided query example for checking if the resiliency policy is loaded." lightbox="media/dapr-component-resiliency/dapr-resiliency-query-results-loading.png":::
346
346
347
347
You can also find the actual resiliency policy by enabling debug logs on your container app and querying to see if a resiliency resource is loaded.
348
348
349
349
:::image type="content" source="media/dapr-component-resiliency/dapr-debug-logs.png" alt-text="Screenshot demonstrating how to enable debug logs on your container app via the portal." lightbox="media/dapr-component-resiliency/dapr-debug-logs.png":::
350
350
351
-
Once debug logs are enabled, use a query similar to the following:
351
+
Once debug logs are enabled, use a query similar to the following example:
0 commit comments