You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/operator-service-manager/configuration-guide.md
+67-13Lines changed: 67 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -95,9 +95,23 @@ This example shows the rendered CGV resource created after the CGV deployment co
95
95
Other than separating secrets into a unique CGS, no special requirements exist for CGS secret support.
96
96
97
97
## CGV with secrets
98
-
Consider the following Azure Resource Manager (ARM) template requirements to properly obscure secret values throughout the entire CGV resource lifecycle.
98
+
Consider the following Azure Resource Manager (ARM) template requirements when creating a CGV to properly obscure secret values throughout the entire CGV resource lifecycle.
99
99
100
-
* Use `configurationType: 'Secret'` in the template under resource properties.
100
+
* Use `"type": "secureObject"` in the template for type of the `secretCgvContent` parameter
101
+
* This configuration obscures the CGV play of the secrets as template parameters.
102
+
103
+
```json
104
+
"parameters": {
105
+
"secretCgvContent": {
106
+
"type": "SecureObject"
107
+
}
108
+
}
109
+
```
110
+
111
+
> [!NOTE]
112
+
> * Do not hydrate `secretCgvContent` using the loadJsonContent() function in bicep as this will expose the data using insecure variables.
113
+
114
+
* Use `configurationType: 'Secret'` and `"secretDeploymentValues": "[string(parameters('secretCgvContent'))]"` in the template under CGV resource properties.
101
115
* Once a CGV is deployed, this configuration prevents displaying the secret data via most Azure methods.
102
116
103
117
```json
@@ -110,17 +124,6 @@ Consider the following Azure Resource Manager (ARM) template requirements to pro
110
124
}
111
125
```
112
126
113
-
* Use `"type": "secureObject"` in the template under parameter type
114
-
* This configuration obscures the display of the secrets as template parameters.
115
-
116
-
```json
117
-
"parameters": {
118
-
"secretCgvContent": {
119
-
"type": "SecureObject"
120
-
}
121
-
}
122
-
```
123
-
124
127
* Use a template reference to Azure Key Vault (AKV) in place of the plain-text secret.
125
128
* This configuration obscures the display of the secrets as template variables.
126
129
@@ -136,6 +139,57 @@ This example shows how to include an AKV reference to a secret named `secretName
136
139
}
137
140
```
138
141
142
+
## NF with secrets
143
+
Consider the following Azure Resource Manager (ARM) template requirements when creating a NF to properly obscure secret values throughout the entire NF resource lifecycle.
144
+
145
+
* Use `"type": "secureObject"` in the template for type of the `secretValues` and `config` parameter
146
+
* This configuration obscures the display of the secrets as template parameters.
* Use `configurationType: 'Secret'` and `"secretDeploymentValues": "[string(parameters('secretCgvContent'))]"` in the template under CGV resource properties.
167
+
* Once a CGV is deployed, this configuration prevents displaying the secret data via most Azure methods.
> * Do not hydrate `secretCgvContent` using the loadJsonContent() function in bicep as this will expose the data using insecure variables.
178
+
179
+
* Use `configurationType: 'Secret'` and `"secretDeploymentValues": "[string(parameters('secretCgvContent'))]"` in the template under CGV resource properties.
180
+
* Once a CGV is deployed, this configuration prevents displaying the secret data via most Azure methods.
> * ARM templates only support Azure Key Vault for secret reference substitution.
141
195
> * Consider restricting access to the role based access control (RBAC) scope `Microsoft.Resources/deployments/exportTemplate/action` to only admin roles.
0 commit comments