Skip to content

Commit

Permalink
Switch APIScan to use a managed identity
Browse files Browse the repository at this point in the history
  • Loading branch information
sharwell committed Mar 19, 2024
1 parent 531f93f commit 6a95996
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 2 deletions.
2 changes: 1 addition & 1 deletion azure-pipelines/build.yml
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ jobs:
variables:
- ${{ if eq(variables['system.collectionId'], '011b8bdf-6d56-4f87-be0d-0092136884d9') }}:
# https://dev.azure.com/devdiv/DevDiv/_wiki/wikis/DevDiv.wiki/25351/APIScan-step-by-step-guide-to-setting-up-a-Pipeline
- group: VSCloudServices-APIScan # Expected to provide ApiScanClientId, ApiScanSecret, ApiScanTenant
- group: VSEng sponsored APIScan # Expected to provide ApiScanClientId
steps:
- checkout: self
fetchDepth: 0 # avoid shallow clone so nbgv can do its work.
Expand Down
2 changes: 1 addition & 1 deletion azure-pipelines/secure-development-tools.yml
Original file line number Diff line number Diff line change
Expand Up @@ -47,7 +47,7 @@ steps:
toolVersion: Latest
condition: and(succeeded(), ${{ parameters.EnableAPIScan }}, ne(variables.ApiScanClientId, ''))
env:
AzureServicesAuthConnectionString: runAs=App;AppId=$(ApiScanClientId);TenantId=$(ApiScanTenant);AppKey=$(ApiScanSecret)
AzureServicesAuthConnectionString: runAs=App;AppId=$(ApiScanClientId)

- task: SdtReport@2
displayName: 📃 Create Security Analysis Report
Expand Down

0 comments on commit 6a95996

Please sign in to comment.