File tree Expand file tree Collapse file tree
articles/operator-service-manager Expand file tree Collapse file tree Original file line number Diff line number Diff line change @@ -114,6 +114,7 @@ This example shows how to define an object parameter `secretCgvContent`.
114114
115115> [ !NOTE]
116116> * Don't hydrate ` secretCgvContent ` using the bicep loadJsonContent() function.
117+ > * Don't include a ` SecureObject ` parameter in a variable definition.
117118
118119* Under CGV resource properties, use ` configurationType: 'Secret' ` and ` "secretConfigurationValue": "[string(parameters('secretCgvContent'))]" ` .
119120 * This configuration prevents displaying the secret data via most Azure user interfaces.
@@ -154,10 +155,10 @@ This example shows how to define a parameter `secretPassword1` contained within
154155}
155156```
156157
157- * Use a template reference to AKV in place of the plain-text secret.
158+ * For parameter input, Use a template reference to AKV in place of the plain-text secret.
158159 * This configuration obscures the display of the secrets as template variables.
159160
160- This example shows how to hydrate the secret ` secretPassword1 ` using AKV secret and key.
161+ This example shows how to define the secret ` secretPassword1 ` using AKV secret and key.
161162
162163``` json
163164 "secretPassword1" : {
@@ -214,6 +215,7 @@ Consider the following ARM template requirements to properly obscure secret valu
214215
215216> [!NOTE]
216217> * Don't hydrate `secretValues` using the bicep loadJsonContent() function.
218+ > * Don't include a `SecureObject` parameter in a variable definition.
217219
218220* Under networkFunctions resource properties, use `configurationType: 'Secret'` and `"secretDeploymentValues": "[string(parameters('config'))]"`.
219221 * Once a network function is deployed, this configuration prevents displaying the secret data via most Azure user interfaces.
You can’t perform that action at this time.
0 commit comments