You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Assign the managed identity you created `USER_ASSIGNED_IDENTITY_NAME` in "Deploy and configure workload identity" step with the correct access permissions.
137
-
138
-
The managed identity needs Key Vault Crypto Officer and Key Vault Crypto User roles if using AKV key vault or Managed HSM Crypto Officer and Managed HSM Crypto User roles for /keys if using AKV managed HSM.
136
+
Assign the managed identity you created `USER_ASSIGNED_IDENTITY_NAME` in "Deploy and configure workload identity" step with the correct access permissions to the keyvault: Key Vault Crypto Service Release User role (previously Key Vault Crypto Officer and Key Vault Crypto User) if using AKV key vault or Managed HSM Crypto Service Release User role (previously Managed HSM Crypto Officer and Managed HSM Crypto User) for keys if using AKV managed HSM.
139
137
The managed identity you created will be used for accessing the key vault during workload runtime.
140
138
Thus, this step is for granting key vault access to the managed identity you created.
141
139
@@ -149,19 +147,14 @@ This demo depends on users running [setup-key.sh](setup-key.sh) script to setup
149
147
150
148
```bash
151
149
# using mHSM
152
-
az keyvault role assignment create --hsm-name mhsm-name --assignee alias@microsoft.com --role "Managed HSM Crypto User" --scope /keys --subscription 85c****bdf8
153
-
az keyvault role assignment create --hsm-name mhsm-name --assignee alias@microsoft.com --role "Managed HSM Crypto Officer" --scope /keys --subscription 85c****bdf8
154
-
155
-
# using AKV. Replace <alias> with your own alias.
156
-
AKV_SCOPE=`az keyvault show --name <AZURE_AKV_RESOURCE_NAME> --query id --output tsv`
157
-
az role assignment create --role "Key Vault Crypto Officer" --assignee <alias>@microsoft.com --scope $AKV_SCOPE
158
-
az role assignment create --role "Key Vault Crypto User" --assignee <alias>@microsoft.com --scope $AKV_SCOPE
150
+
az keyvault role assignment create --hsm-name mhsm-name --assignee alias@microsoft.com --role "Managed HSM Crypto Service Release User" --scope /keys --subscription 85c****bdf8
159
151
152
+
# using AKV
153
+
az role assignment create --role "Key Vault Crypto Service Release User" --assignee <alias>@microsoft.com --scope /keys --subscription 85c****bdf8
160
154
```
161
155
162
156
NOTE: Only the subscription owner can setup role access for AKV/mHSM, so if you are seeing authorization related error messages during role access setup steps, please seek out the proper personel to setup role access.
163
157
164
-
165
158
#### Generate Consumer Pod YAML Files (Only If Using Azure Event Hub Resource)
0 commit comments