Skip to content

Commit 94fe6b6

Browse files
update readme with the right role access name (#28)
1 parent 23277ff commit 94fe6b6

File tree

1 file changed

+4
-11
lines changed

1 file changed

+4
-11
lines changed

kafka/README.md

Lines changed: 4 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -133,9 +133,7 @@ az eventhubs eventhub create --name $EVENTHUB --resource-group $RESOURCE_GROUP -
133133

134134
#### Setup role access for the managed identity
135135

136-
Assign the managed identity you created `USER_ASSIGNED_IDENTITY_NAME` in "Deploy and configure workload identity" step with the correct access permissions.
137-
138-
The managed identity needs Key Vault Crypto Officer and Key Vault Crypto User roles if using AKV key vault or Managed HSM Crypto Officer and Managed HSM Crypto User roles for /keys if using AKV managed HSM.
136+
Assign the managed identity you created `USER_ASSIGNED_IDENTITY_NAME` in "Deploy and configure workload identity" step with the correct access permissions to the keyvault: Key Vault Crypto Service Release User role (previously Key Vault Crypto Officer and Key Vault Crypto User) if using AKV key vault or Managed HSM Crypto Service Release User role (previously Managed HSM Crypto Officer and Managed HSM Crypto User) for keys if using AKV managed HSM.
139137
The managed identity you created will be used for accessing the key vault during workload runtime.
140138
Thus, this step is for granting key vault access to the managed identity you created.
141139

@@ -149,19 +147,14 @@ This demo depends on users running [setup-key.sh](setup-key.sh) script to setup
149147

150148
```bash
151149
# using mHSM
152-
az keyvault role assignment create --hsm-name mhsm-name --assignee alias@microsoft.com --role "Managed HSM Crypto User" --scope /keys --subscription 85c****bdf8
153-
az keyvault role assignment create --hsm-name mhsm-name --assignee alias@microsoft.com --role "Managed HSM Crypto Officer" --scope /keys --subscription 85c****bdf8
154-
155-
# using AKV. Replace <alias> with your own alias.
156-
AKV_SCOPE=`az keyvault show --name <AZURE_AKV_RESOURCE_NAME> --query id --output tsv`
157-
az role assignment create --role "Key Vault Crypto Officer" --assignee <alias>@microsoft.com --scope $AKV_SCOPE
158-
az role assignment create --role "Key Vault Crypto User" --assignee <alias>@microsoft.com --scope $AKV_SCOPE
150+
az keyvault role assignment create --hsm-name mhsm-name --assignee alias@microsoft.com --role "Managed HSM Crypto Service Release User" --scope /keys --subscription 85c****bdf8
159151

152+
# using AKV
153+
az role assignment create --role "Key Vault Crypto Service Release User" --assignee <alias>@microsoft.com --scope /keys --subscription 85c****bdf8
160154
```
161155

162156
NOTE: Only the subscription owner can setup role access for AKV/mHSM, so if you are seeing authorization related error messages during role access setup steps, please seek out the proper personel to setup role access.
163157

164-
165158
#### Generate Consumer Pod YAML Files (Only If Using Azure Event Hub Resource)
166159

167160
```bash

0 commit comments

Comments
 (0)