ms.topic | ms.technology | ms.manager | ms.author | author | ms.date |
---|---|---|---|---|---|
include |
devops-cicd |
mijacobs |
jukullam |
juliakm |
10/25/2022 |
-
In GitHub, go to your repository.
-
Select Security > Secrets and variables > Actions.
:::image type="content" source="../media/github-select-actions.png" alt-text="Screenshot of adding a secret":::
-
Select New repository secret.
-
Paste the entire JSON output from the Azure CLI command into the secret's value field. Give the secret the name
AZURE_CREDENTIALS
. -
Select Add secret.
You need to provide your application's Client ID, Tenant ID, and Subscription ID to the login action. These values can either be provided directly in the workflow or can be stored in GitHub secrets and referenced in your workflow. Saving the values as GitHub secrets is the more secure option.
-
In GitHub, go to your repository.
-
Select Security > Secrets and variables > Actions.
:::image type="content" source="../media/github-select-actions.png" alt-text="Screenshot of adding a secret":::
-
Select New repository secret.
-
Create secrets for
AZURE_CLIENT_ID
,AZURE_TENANT_ID
, andAZURE_SUBSCRIPTION_ID
. Use these values from your Active Directory application for your GitHub secrets:GitHub Secret Active Directory Application AZURE_CLIENT_ID Application (client) ID AZURE_TENANT_ID Directory (tenant) ID AZURE_SUBSCRIPTION_ID Subscription ID -
Save each secret by selecting Add secret.