You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: key-vault/README.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -69,23 +69,23 @@ Our Spring app will be able to access these secrets when deployed on App Service
69
69
1. Add the following to the Azure App Service plugin section of the `pom.xml`. Adding this configuration will create Application Settings with the given name and value. The value of each setting should be a Key Vault reference with the corresponding `id` from the previous step.
A Key Vault reference is of the form `@Microsoft.KeyVault(SecretURI)`, where `SecretURI` is data-plane URI of a secret in Key Vault, including a version. There is an alternate syntax [documented here](https://docs.microsoft.com/en-us/azure/app-service/app-service-key-vault-references#reference-syntax).
88
+
A Key Vault reference is of the form `@Microsoft.KeyVault(SecretUri=<SecretURI>)`, where `<SecretURI>` is data-plane URI of a secret in Key Vault, including a version. There is an alternate syntax [documented here](https://docs.microsoft.com/en-us/azure/app-service/app-service-key-vault-references#reference-syntax).
89
89
90
90
### Environment Configuration
91
91
@@ -175,17 +175,17 @@ The Key Vault references will be replaced with the actual secrets when our App S
175
175
<!-- This profile will configure Spring to use an in-memory database for local development and testing. -->
0 commit comments