Deploying to Azure using GitHub Actions

In this guide, I’ll walk you through deploying a .NET application to Azure App Service on Linux using GitHub Actions. We’ll run through all the set up necessary in Azure. After that, we’ll create a pipeline so that you can deploy to Azure straight from GitHub with one click of a button.

Step by step video guide of deploying to Azure using GitHub Actions

1. Create Azure Resources via Portal

1.1 Create a Resource Group

A resource group is a container within Azure that holds related resources for a solution. Using a Resource Group helps organize and manage your Azure assets by grouping them together logically. All resources in a group can share a lifecycle, allowing you to easily deploy, update, or delete them together.

  1. Go to the Azure Portal and sign in.
  2. In the left-hand menu, select Resource groups.
  3. Click + Create.
  4. Provide:
    • Subscription: Choose your subscription.
    • Resource group name: e.g., MyDotNet9RG.
    • Region: e.g., East US.
  5. Click Review + create, then Create.

1.2 Create an App Service Plan (Linux)

An App Service Plan defines the compute resources that your Web App runs on. It determines the pricing tier, scalability options, and more. You need an App Service Plan to host your Web App on Azure.

  1. In the Portal, click Create a resource.
  2. Search for App Service Plan and select Create.
  3. On the Basics tab:
    • Subscription: Same as above.
    • Resource group: MyDotNet9RG.
    • Name: e.g., MyDotNet9Plan.
    • Operating System: Linux.
    • Region: e.g., East US (same region as resource group).
    • SKU and size: e.g., Standard (S1).
  4. Click Review + create, then Create.
  5. Note: If you see a quota error (e.g., “This region has quota of 0 instances”), try a different region, SKU (like Basic/Free), or request a quota increase.

1.3 Create the Web App (Linux)

A Web App is a managed Azure service for hosting your .NET (or other) application. By deploying to a Web App, you benefit from Azure’s scaling, monitoring, and runtime management without having to manage your own servers.

  1. In the Portal, click Create a resource again.
  2. Search for Web App and click Create.
  3. On the Basics tab:
    • Subscription: Same as before.
    • Resource group: MyDotNet9RG.
    • Name: e.g., MyDotNet9LinuxApp (must be unique).
    • Publish: Code.
    • Runtime stack: .NET 9 (or the nearest available version).
    • Operating System: Linux.
    • Region: e.g., East US.
    • Linux Plan: Select MyDotNet9Plan.
  4. Review + create, then Create.

At this point you should have a:

  1. A Resource Group: MyDotNet9RG
  2. An App Service Plan: MyDotNet9Plan
  3. A Web App (Linux): MyDotNet9LinuxApp

2.1 Register an App in Microsoft Entra ID

Microsoft Entra ID (formerly Azure Active Directory) is a cloud-based identity and access management service from Microsoft. It provides features for authentication, authorization, and centralized identity management across your applications and services. In the context of this deployment scenario, we use Microsoft Entra ID to issue secure, short-lived OpenID Connect (OIDC) tokens to GitHub Actions instead of relying on static credentials. This approach minimizes the security risk by avoiding long-lived secrets and ensures that your Azure resources are accessed only as needed, on a per-workflow basis.

  1. In the Azure Portal, search for Microsoft Entra ID (formerly Azure Active Directory).
  2. Click App registrations in the left menu.
  3. Click New registration.
  4. Provide:
    • Name: e.g., MyDotNet9AppOIDC.
    • Supported account types: Typically “Accounts in this organizational directory only”.
    • Redirect URI: leave blank (not needed for GitHub Actions).
  5. Click Register.

2.2 Add a Federated Credential for GitHub

A Federated Credential is an identity link that allows GitHub Actions (from a specific repo/branch) to authenticate against Microsoft Entra ID without a static secret. It relies on short-lived OpenID Connect tokens, enhancing security by avoiding permanent credentials.

  1. In your newly created App Registration, go to Certificates & secrets.
  2. Under Federated credentials, click Add credential.
  3. Select GitHub as the identity provider.
  4. Provide:
    • Organization: Your GitHub org or username.
    • Repository: e.g., YourUsername/dotnet9-sample.
    • Branch: e.g., main.
    • Identifier: e.g., “All workflows” (or your chosen identifier).
  5. Click Add.

This step allows GitHub Actions for that repo + branch to request a short-lived OIDC token from Microsoft Entra ID.

2.3 Assign a Role to the Service Principal

By default, a newly registered app (service principal) has no access to your Azure subscription. You need to grant at least Contributor role:

  1. Go to Subscriptions in the portal’s left menu.
  2. Select your subscription.
  3. Click Access control (IAM)+ AddAdd role assignment.
  4. Role: Choose Contributor (or Owner, if you need full control).
  5. Assign access to: “User, group, or service principal.”
  6. Select your app name (e.g., MyDotNet9AppOIDC), then Review + assign.

Alternatively, you can do this at the Resource Group level if you only want to grant access to resources in MyDotNet9RG.

3. Prepare GitHub Repository

3.1 Add Repo Variables/Secrets for Client/Tenant/Subscription IDs

  1. In your GitHub repository, go to SettingsSecrets and variablesActions.
  2. Create a new repository variable (or secret) for:
    • AZURE_CLIENT_ID = (Application (client) ID)
    • AZURE_TENANT_ID = (Directory (tenant) ID)
    • AZURE_SUBSCRIPTION_ID = (the GUID of your subscription)
  3. Click Add after each.
    • (If you use secrets instead of variables, adjust the workflow syntax accordingly.)

3.2 Create the GitHub Actions Workflow (OIDC)

Add a file in your repo, e.g.: .github/workflows/deploy-azure-oidc.yml:

name: Deploy to Linux

on:
  push:
    branches:
      - main
  workflow_dispatch:

permissions:
  id-token: write
  contents: read

jobs:
  build-and-deploy:
    runs-on: ubuntu-latest
    steps:
      - name: Checkout code
        uses: actions/checkout@v4

      - name: Setup .NET
        uses: actions/setup-dotnet@v4
        with:
          dotnet-version: '9.x'

      - name: Publish
        run: dotnet publish ./src/GamingSeeds/GamingSeeds.csproj -c Release -o build-output

      - name: Azure Login
        uses: azure/login@v2
        with:
          client-id: ${{ vars.AZURE_CLIENT_ID }}
          tenant-id: ${{ vars.AZURE_TENANT_ID }}
          subscription-id: ${{ vars.AZURE_SUBSCRIPTION_ID }}

      - name: Deploy to Azure
        uses: azure/webapps-deploy@v3
        with:
          app-name: 'YTDemoWebApp'
          slot-name: 'production'
          package: './build-output'

Key Points:

  • permissions: id-token: write is essential so GitHub can issue the OIDC token.
  • No client-secret is included. That triggers the OIDC auth flow.
  • The azure/login@v2 action automatically retrieves a token from Microsoft Entra ID, if the Federated Credential matches the repo name/branch.
  • If your repository uses secrets instead of vars, replace vars.AZURE_... with secrets.AZURE_....

Now whenever you merge into main, this pipeline will be triggered and your code will be deployed to Azure.

Comments are closed