From 25864d9dea9b24cb617bbb0b88c4ea13a6dd3bb5 Mon Sep 17 00:00:00 2001 From: Rick Anderson Date: Mon, 24 Sep 2018 05:32:29 -1000 Subject: [PATCH] Update app-secrets.md (#8662) Need this for a doc in aspnet and it was too awful to copy. --- aspnetcore/security/app-secrets.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/aspnetcore/security/app-secrets.md b/aspnetcore/security/app-secrets.md index 9a23d3c59e..3ba5ce42b5 100644 --- a/aspnetcore/security/app-secrets.md +++ b/aspnetcore/security/app-secrets.md @@ -4,7 +4,7 @@ author: rick-anderson description: Learn how to store and retrieve sensitive information as app secrets during the development of an ASP.NET Core app. ms.author: scaddie ms.custom: mvc -ms.date: 08/16/2018 +ms.date: 09/24/2018 uid: security/app-secrets --- # Safe storage of app secrets in development in ASP.NET Core @@ -13,7 +13,7 @@ By [Rick Anderson](https://twitter.com/RickAndMSFT), [Daniel Roth](https://githu [View or download sample code](https://github.com/aspnet/Docs/tree/master/aspnetcore/security/app-secrets/samples) ([how to download](xref:tutorials/index#how-to-download-a-sample)) -This document explains techniques for storing and retrieving sensitive data during the development of an ASP.NET Core app. You should never store passwords or other sensitive data in source code, and you shouldn't use production secrets in development or test mode. You can store and protect Azure test and production secrets with the [Azure Key Vault configuration provider](xref:security/key-vault-configuration). +This document explains techniques for storing and retrieving sensitive data during the development of an ASP.NET Core app. Never store passwords or other sensitive data in source code. Production secrets shouldn't be used for development or test. You can store and protect Azure test and production secrets with the [Azure Key Vault configuration provider](xref:security/key-vault-configuration). ## Environment variables