You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: powerapps-docs/maker/data-platform/EnvironmentVariables.md
+6-5Lines changed: 6 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -158,13 +158,14 @@ To use Azure Key Vault secrets with Power Platform, the Azure subscription that
158
158
159
159
### Create a new environment variable for the Key Vault secret
160
160
161
-
Once Azure Key Vault is configured and you have a secret registered in your vault, you can now go back to reference it within Power Apps using an environment variable.
161
+
Once Azure Key Vault is configured and you have a secret registered in your vault, you can now reference it within Power Apps using an environment variable.
162
162
163
-
1. In the **Solutions** area in Power Apps (make.powerapps.com), open your unmanaged solution you're using for development and select **New** > **Environment variable**.
163
+
1. Sign on to [Power Apps](https://make.powerapps.com/?utm_source=padocs&utm_medium=linkinadoc&utm_campaign=referralsfromdoc), and in the **Solutions** area, open the unmanaged solution you're using for development.
164
+
1. Select **New** > **Environment variable**.
164
165
1. Enter a **Display name** and optionally, a **Description** for the environment variable.
165
166
1. Select the **Data Type** as **Secret** and **Secret Store** as **Azure Key Vault**.
166
167
1. Choose from the following options:
167
-
- Leave all additional fields blank and select **Save** to save only an environment variable *definition* record that doesn't include any secret reference or default demarcation values.
168
+
- Leave all additional fields blank and select **Save** to save only an environment variable *definition* record that doesn't include any secret reference or default demarcation values. When you select this option you don't need to continue to the next steps.
168
169
- Select **New Azure Key Vault value reference**. After the information is added in the next step and saved, an environment variable *value* record is created.
169
170
- Expand **Show default value**, to display the fields to create a **Default Azure Key Vault secret**. After the information is added in the next step and saved, the default value demarcation is added to the environment variable *definition* record.
170
171
1. Enter the following information:
@@ -181,7 +182,7 @@ Once Azure Key Vault is configured and you have a secret registered in your vaul
181
182
> [!NOTE]
182
183
> User access validation for the secret is performed in the background. If the user doesn’t have at least read permission, this validation error is displayed.
183
184
>
184
-
> **This variable didn't save properly. User is not authorized to read secrets from 'Azure Key Vault path'.**
185
+
> **This variable didn't save properly. User is not authorized to read secrets from 'Azure Key Vault path'.**
185
186
>
186
187
> Currently, Azure Key Vault is the only secret store that is supported with environment variables.
187
188
@@ -198,7 +199,7 @@ A simple scenario to demonstrate how to use a secret obtained from Azure Key Vau
198
199
1. Select **New step**, select the **Microsoft Dataverse** connector, and then on the **Actions** tab select **Perform an unbound action**.
199
200
1. Select the action named **RetrieveEnvironmentVariableSecretValue** from the dropdown list.
200
201
1. Provide the environment variable unique name (not the display name) added in the previous section, for this example *new_TestSecret* is used.
201
-
1. Select **...** > **Rename** to rename the action so that it can be more easily referred in subsequent actions. In the below screenshot, it has been renamed to **GetSecret**.
202
+
1. Select **...** > **Rename** to rename the action so that it can be more easily referenced in the next action. In the below screenshot, it has been renamed to **GetSecret**.
202
203
203
204
:::image type="content" source="media/env-var-secret4.png" alt-text="Instant flow configuration for testing an environment variable secret":::
204
205
1. Select **...** > **Settings** to display the **GetSecret** action settings.
0 commit comments