You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -69,12 +69,12 @@ In this step you'll configure OIDC in your Azure tenant.
69
69
### :keyboard: Activity: Configure OIDC in Azure
70
70
71
71
1. Open a new browser tab, and work on the steps in your second tab while you read the instructions in this tab
72
-
1.[Create a Microsoft Entra application with a service principal]([https://learn.microsoft.com/en-us/azure/developer/github/connect-from-azure?tabs=azure-portal%2Cwindows#create-an-azure-active-directory-application-and-service-principal](https://learn.microsoft.com/en-us/azure/developer/github/connect-from-azure-openid-connect?WT.mc_id=MVP_344197#prerequisites)) by following the steps under Option 1
72
+
1.[Create a Microsoft Entra application with a service principal](https://learn.microsoft.com/en-us/azure/developer/github/connect-from-azure-openid-connect?WT.mc_id=MVP_344197#prerequisites) by following the steps under Option 1
73
73
- Assign role `Contributor` with scope subscription (on subscription level) to the application (for a detailed step-by-step manual, see [here](https://learn.microsoft.com/en-us/azure/role-based-access-control/role-assignments-portal?tabs=delegate-condition#step-1-identify-the-needed-scope))
74
-
1.[Add federated credentials]([https://learn.microsoft.com/en-us/azure/developer/github/connect-from-azure?tabs=azure-portal%2Cwindows#add-federated-credentials](https://learn.microsoft.com/en-us/entra/workload-id/workload-identity-federation-create-trust?pivots=identity-wif-apps-methods-azp#github-actions)) by following the steps under the link
74
+
1.[Add federated credentials](https://learn.microsoft.com/en-us/entra/workload-id/workload-identity-federation-create-trust?pivots=identity-wif-apps-methods-azp#github-actions) by following the steps under the link
75
75
-`Entity type`: `Branch`
76
76
- GitHub branch name: `deploy-resource-group`
77
-
1.[Create GitHub secrets]([https://learn.microsoft.com/en-us/azure/developer/github/connect-from-azure?tabs=azure-portal%2Cwindows#create-github-secrets](https://learn.microsoft.com/en-us/azure/developer/github/connect-from-azure-openid-connect?WT.mc_id=MVP_344197#create-github-secrets)) by following the steps under the link
77
+
1.[Create GitHub secrets](https://learn.microsoft.com/en-us/azure/developer/github/connect-from-azure-openid-connect?WT.mc_id=MVP_344197#create-github-secrets) by following the steps under the link
78
78
1. If you are done, create a new branch with name `deploy-resource-group`
79
79
1. Wait about 20 seconds then refresh this page for the next step
0 commit comments