Skip to content

Commit ab42f07

Browse files
Merge pull request #313801 from v-thpra/tjp-fresh-azcontapps-009
Q&M Freshness - Azure Container Apps - TJP009
2 parents 97fc11c + 1648a5d commit ab42f07

3 files changed

Lines changed: 15 additions & 16 deletions

File tree

articles/container-apps/dapr-authentication-token.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: greenie-msft
77
ms.service: azure-container-apps
88
ms.subservice: dapr
99
ms.topic: how-to
10-
ms.date: 02/03/2026
10+
ms.date: 03/27/2026
1111
---
1212

1313
# Enable token authentication for Dapr requests
@@ -30,17 +30,17 @@ You can use this token to authenticate that calls coming into your application a
3030

3131
## Authenticate requests from Dapr
3232

33-
# [With Dapr SDKs](#tab/sdk)
33+
# [With a Dapr SDK](#tab/sdk)
3434

35-
If you're using a [Dapr SDK](https://docs.dapr.io/developing-applications/sdks/), you can use the Dapr authentication methods provided in the open-source SDK repositories.
35+
If you're using a [Dapr Software Development Kit (SDK)](https://docs.dapr.io/developing-applications/sdks/), you can use the Dapr authentication methods provided in the open-source SDK repositories.
3636

37-
Once added to your project, the Dapr SDKs validates the token in all incoming requests from Dapr, rejecting calls that don't include the correct token. You don't need to perform any other action.
37+
Once added to your project, the Dapr SDK validates the token in all incoming requests from Dapr, rejecting calls that don't include the correct token. You don't need to perform any other action.
3838

3939
Incoming requests that don't include the token, or include an incorrect token, are rejected automatically.
4040

4141
# [Without an SDK](#tab/nosdk)
4242

43-
If you're not using a Dapr SDK, you need to check the HTTP header or gRPC metadata property in all incoming requests in order to validate that they're created by the Dapr sidecar.
43+
If you're not using a Dapr SDK, you need to check the HTTP header or gRPC metadata property in all incoming requests and validate that the Dapr sidecar created the request.
4444

4545
### HTTP
4646

articles/container-apps/dapr-component-connect-services.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: azure-container-apps
88
ms.subservice: dapr
99
ms.custom: build-2023
1010
ms.topic: concept-article
11-
ms.date: 02/03/2026
11+
ms.date: 03/27/2026
1212
---
1313

1414
# Connect to other Azure or partner services by using Dapr components
@@ -19,15 +19,14 @@ Before getting started, learn more about the [offered support for Dapr component
1919

2020
## Recommendations
2121

22-
Whenever possible, it's recommended that you use Azure components that provide managed identity support for the most secure connection. Use Azure Key Vault secret stores *only* when managed identity authentication isn't supported.
22+
For the most secure connection, we recommended that you use Azure components that provide managed identity support whenever possible. Use Azure Key Vault secret stores *only* when managed identity authentication isn't supported.
2323

2424
| Service type | Recommendation |
2525
| ------------ | -------------- |
2626
| Azure component with managed identity support | [Use the managed identity flow (recommended)](#use-managed-identity-recommended) |
2727
| Azure component without managed identity support | [Use an Azure Key Vault secret store](#azure-key-vault-secret-stores) |
2828
| Non-Azure components | [Use an Azure Key Vault secret store](#azure-key-vault-secret-stores) |
2929

30-
3130
## Use managed identity (recommended)
3231

3332
For Azure-hosted services, Dapr can use the [managed identity of the scoped container apps][aca-managed-id] to authenticate to the backend service provider. When using managed identity, you don't need to include secret information in a component manifest. *Using managed identity is recommended* as it eliminates storage of sensitive input in components and doesn't require managing a secret store.
@@ -72,7 +71,7 @@ scopes:
7271
7372
#### Platform-managed Kubernetes secrets
7473
75-
As an alternative to Kubernetes secrets, local environment variables, and local file Dapr secret stores, Azure Container Apps provides a platform-managed approach for creating and using Kubernetes secrets. This approach can be used to connect to non-Azure services or in dev/test scenarios for quickly deploying components via the CLI without setting up a secret store or managed identity.
74+
As an alternative to Kubernetes secrets, local environment variables, and local file Dapr secret stores, Azure Container Apps provides a platform-managed approach for creating and using Kubernetes secrets. This approach can be used to connect to non-Azure services. Or, in dev/test scenarios it can be used for quickly deploying components via the CLI without setting up a secret store or managed identity.
7675
7776
This component configuration defines the sensitive value as a secret parameter that can be referenced from the metadata section.
7877

articles/container-apps/dapr-component-resiliency.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: greenie-msft
77
ms.service: azure-container-apps
88
ms.subservice: dapr
99
ms.topic: concept-article
10-
ms.date: 02/02/2026
10+
ms.date: 03/27/2026
1111
ms.author: nigreenf
1212
ms.reviewer: hannahhunter
1313
ms.custom:
@@ -20,7 +20,7 @@ ms.custom:
2020

2121
# Dapr component resiliency (preview)
2222

23-
Resiliency policies proactively prevent, detect, and recover from your container app failures. In this article, you learn how to apply resiliency policies for applications that use Dapr to integrate with different cloud services, like state stores, pub/sub message brokers, secret stores, and more.
23+
Resiliency policies proactively prevent, detect, and recover from your container app failures. In this article, you learn how to apply resiliency policies for applications that use Dapr to integrate with different cloud services. Such as, state stores, pub/sub message brokers, secret stores, and more.
2424

2525
You can configure resiliency policies like retries, timeouts, and circuit breakers for the following outbound and inbound operation directions by using a Dapr component:
2626

@@ -317,12 +317,12 @@ properties: {
317317
Specifying `consecutiveErrors` (the circuit trip condition as `consecutiveFailures > $(consecutiveErrors)-1`) sets the number of errors allowed to occur before the circuit trips and opens halfway.
318318

319319
The circuit waits half-open for the `timeoutInSeconds` amount of time, during which the `consecutiveErrors` number of requests must consecutively succeed.
320-
- _If the requests succeed,_ the circuit closes.
321-
- _If the requests fail,_ the circuit remains in a half-opened state.
320+
- *If the requests succeed*, the circuit closes.
321+
- *If the requests fail*, the circuit remains in a half-opened state.
322322

323323
If you didn't set any `intervalInSeconds` value, the circuit resets to a closed state after the amount of time you set for `timeoutInSeconds`, regardless of consecutive request success or failure. If you set `intervalInSeconds` to *0*, the circuit never automatically resets, only moving from half-open to closed state by successfully completing `consecutiveErrors` requests in a row.
324324

325-
If you did set an `intervalInSeconds` value, that determines the amount of time before the circuit is reset to closed state, independent of whether the requests sent in half-opened state succeeded or not.
325+
If you did set an `intervalInSeconds` value, it determines the amount of time before the circuit is reset to closed state, independent of whether the requests sent in half-opened state succeeded or not.
326326

327327
## Resiliency logs
328328

@@ -342,13 +342,13 @@ ContainerAppConsoleLogs_CL
342342

343343
Select **Run** to run the query and view the result with the log message indicating the policy is loading.
344344

345-
:::image type="content" source="media/dapr-component-resiliency/dapr-resiliency-query-results-loading.png" alt-text="Screenshot showing resiliency query results based on provided query example for checking if resiliency policy has loaded." lightbox="media/dapr-component-resiliency/dapr-resiliency-query-results-loading.png":::
345+
:::image type="content" source="media/dapr-component-resiliency/dapr-resiliency-query-results-loading.png" alt-text="Screenshot showing resiliency query results based on the provided query example for checking if the resiliency policy is loaded." lightbox="media/dapr-component-resiliency/dapr-resiliency-query-results-loading.png":::
346346

347347
You can also find the actual resiliency policy by enabling debug logs on your container app and querying to see if a resiliency resource is loaded.
348348

349349
:::image type="content" source="media/dapr-component-resiliency/dapr-debug-logs.png" alt-text="Screenshot demonstrating how to enable debug logs on your container app via the portal." lightbox="media/dapr-component-resiliency/dapr-debug-logs.png":::
350350

351-
Once debug logs are enabled, use a query similar to the following:
351+
Once debug logs are enabled, use a query similar to the following example:
352352

353353
```
354354
ContainerAppConsoleLogs_CL

0 commit comments

Comments
 (0)