Skip to content

Commit

Permalink
Updated documentation.
Browse files Browse the repository at this point in the history
  • Loading branch information
danielscholl committed Aug 28, 2024
1 parent 1e9f044 commit 3ee2887
Show file tree
Hide file tree
Showing 2 changed files with 20 additions and 3 deletions.
12 changes: 9 additions & 3 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -61,17 +61,23 @@ Deploying the resources via CLI is the recommended approach. This method allows

Follow this [tutorial](https://azure.github.io/osdu-developer/tutorial_cli/) for a quick overview of doing this from the Azure Cloud Shell.

> **NOTE:** If you are using a pre-existing Entra App, you will need to set the feature flag `AZURE_CLIENT_ID` and `AZURE_CLIENT_SECRET` with the values from your app (See [Feature Flags](https://azure.github.io/osdu-developer/feature_flags/#custom-infrastructure) for more information on feature flags).
```bash
# Authentication
az login
az login --scope https://graph.microsoft.com//.default
az account set --subscription <your_subscription_id>
azd auth login

# Prepare Environment
azd init -e dev # This if first environment
azd env new dev # This if adding a new environment
azd env set <feature_flag> <value> # Set any necessary feature flags

# Provisioning
azd init -e dev
azd provision

# Settings
# Configure Settings for Integrations
azd env set AUTH_CODE <your_auth_code>
azd hooks run settings

Expand Down
11 changes: 11 additions & 0 deletions docs/src/feature_flags.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,17 @@

Feature flags can be set prior to running provision with the command `azd env set <FLAG> <VALUE>`

## Reusable Entra App

Entra App configurations are by default automatically created but one can be reused or created manually as well.

| Feature Flag | Description |
|---------------------------|-----------------------------------------------------------------------------|
| AZURE_CLIENT_ID | Use an existing Azure AD App Client ID |
| AZURE_CLIENT_SECRET | Use an existing Azure AD Client Secret and don't reset it. |
| AZURE_CLIENT_PRINCIPAL_OID| Skip Principal ID lookup and use provided. |
| AZURE_TENANT_ID | Skip Tenant ID lookup and use provided. |

## Custom Infrastructure

Infrastructure customizations can be managed and modified using the following feature flags.
Expand Down

0 comments on commit 3ee2887

Please sign in to comment.