Skip to content

Commit 47e8c15

Browse files
authored
Merge pull request #85873 from Nickomang/master
added preview to MI h1s, updated ToC
2 parents 1fd4b1f + ef1f372 commit 47e8c15

7 files changed

+10
-9
lines changed

articles/service-fabric/configure-existing-cluster-enable-managed-identity-token-service.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.date: 07/25/2019
1010
ms.author: atsenthi
1111
---
1212

13-
# Configure an existing Azure Service Fabric cluster to enable Managed Identity support
13+
# Configure an existing Azure Service Fabric cluster to enable Managed Identity support (preview)
1414
In order to access the managed identity feature for Azure Service Fabric applications, you must first enable the **Managed Identity Token Service** on the cluster. This service is responsible for the authentication of Service Fabric applications using their managed identities, and for obtaining access tokens on their behalf. Once the service is enabled, you can see it in Service Fabric Explorer under the **System** section in the left pane, running under the name **fabric:/System/ManagedIdentityTokenService**.
1515

1616
> [!NOTE]

articles/service-fabric/configure-new-azure-service-fabric-enable-managed-identity.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.date: 07/25/2019
1010
ms.author: atsenthi
1111
---
1212

13-
# Create a new Azure Service Fabric cluster with Managed Identity support
13+
# Create a new Azure Service Fabric cluster with Managed Identity support (preview)
1414

1515
In order to access the managed identity feature for Azure Service Fabric applications, you must first enable the Managed Identity Token Service on the cluster. This service is responsible for the authentication of Service Fabric applications using their managed identities, and for obtaining access tokens on their behalf. Once the service is enabled, you can see it in Service Fabric Explorer under the **System** section in the left pane, running under the name **fabric:/System/ManagedIdentityTokenService** next to other system services.
1616

articles/service-fabric/how-to-deploy-service-fabric-application-system-assigned-managed-identity.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.date: 07/25/2019
1010
ms.author: atsenthi
1111
---
1212

13-
# Deploy Service Fabric application with system-assigned managed identity
13+
# Deploy Service Fabric application with system-assigned managed identity (preview)
1414

1515
In order to access the managed identity feature for Azure Service Fabric applications, you must first enable the Managed Identity Token Service on the cluster. This service is responsible for the authentication of Service Fabric applications using their managed identities, and for obtaining access tokens on their behalf. Once the service is enabled, you can see it in Service Fabric Explorer under the **System** section in the left pane, running under the name **fabric:/System/ManagedIdentityTokenService** next to other system services.
1616

articles/service-fabric/how-to-deploy-service-fabric-application-user-assigned-managed-identity.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.topic: article
99
ms.date: 08/09/2019
1010
ms.author: atsenthi
1111
---
12-
# Deploy Service Fabric application with a User-Assigned Managed Identity
12+
# Deploy Service Fabric application with a User-Assigned Managed Identity (preview)
1313

1414
To deploy a Service Fabric application with managed identity, the application needs to be deployed through Azure Resource Manager, typically with an Azure Resource Manager template. For more information on how to deploy Service Fabric application through Azure Resource Manager, see [Manage applications and services as Azure Resource Manager resources](service-fabric-application-arm-resource.md).
1515

articles/service-fabric/how-to-grant-access-other-resources.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.date: 08/08/2019
1111
ms.author: atsenthi
1212
---
1313

14-
# Granting a Service Fabric application's managed identity access to Azure resources
14+
# Granting a Service Fabric application's managed identity access to Azure resources (preview)
1515

1616
Before the application can use its managed identity to access other resources, permissions must be granted to that identity on the protected Azure resource being accessed. Granting permissions is typically a management action on the 'control plane' of the Azure service owning the protected resource routed via Azure Resource Manager, which will enforce any applicable role-based access checking.
1717

articles/service-fabric/how-to-managed-identity-service-fabric-app-code.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.date: 7/25/2019
1111
ms.author: atsenthi
1212
---
1313

14-
# How to leverage a Service Fabric application's managed identity to access Azure services
14+
# How to leverage a Service Fabric application's managed identity to access Azure services (preview)
1515

1616
Service Fabric applications can leverage managed identities to access other Azure resources which support Azure Active Directory-based authentication. An application can obtain an [access token](../active-directory/develop/developer-glossary.md#access-token) representing its identity, which may be system-assigned or user-assigned, and use it as a 'bearer' token to authenticate itself to another service - also known as a [protected resource server](../active-directory/develop/developer-glossary.md#resource-server). The token represents the identity assigned to the Service Fabric application, and will only be issued to Azure resources (including SF applications) which share that identity. Refer to the [managed identity overview](../active-directory/managed-identities-azure-resources/overview.md) documentation for a detailed description of managed identities, as well as the distinction between system-assigned and user-assigned identities. We will refer to a managed-identity-enabled Service Fabric application as the [client application](../active-directory/develop/developer-glossary.md#client-application) throughout this article.
1717

articles/service-fabric/toc.yml

+4-3
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,8 @@
108108
- name: Samples
109109
items:
110110
- name: Code samples
111-
href: https://azure.microsoft.com/resources/samples/?service=service-fabric
111+
href: https://docs.microsoft.com/samples/browse/
112+
112113
- name: Azure PowerShell
113114
href: service-fabric-powershell-samples.md
114115
- name: Service Fabric CLI
@@ -354,7 +355,7 @@
354355
href: service-fabric-api-management-overview.md
355356
- name: App Resource model
356357
href: service-fabric-concept-resource-model.md
357-
- name: Managed Identity
358+
- name: Managed Identity (preview)
358359
href: concepts-managed-identity.md
359360

360361
- name: How-to guides
@@ -748,7 +749,7 @@
748749
href: service-fabric-reverse-proxy-diagnostics.md
749750
- name: Troubleshoot your local cluster
750751
href: service-fabric-troubleshoot-local-cluster-setup.md
751-
- name: Use Managed Identity for Service Fabric apps
752+
- name: Use Managed Identity for Service Fabric apps (preview)
752753
items:
753754
- name: Cluster setup
754755
items:

0 commit comments

Comments
 (0)