Skip to content

Commit 1f3accc

Browse files
author
Keyfactor
committed
Update generated README
1 parent 0881981 commit 1f3accc

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

README.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -132,6 +132,9 @@ Navigate to Certificate Locations =\> Certificate Stores within Keyfactor Comman
132132
2. Click on Access Policies
133133
3. Click add new
134134
4. Ensure it has the proper permissions
135+
136+
<img src="Images/vault-perms.png" alt="Vault Perms" style="width:500px;"/>
137+
135138
5. Select the application registered in (3) as the principal
136139
6. Click Ok
137140
7. Click Save
@@ -148,7 +151,6 @@ Navigate to Certificate Locations =\> Certificate Stores within Keyfactor Comman
148151
- While Azure Key Vault will automatically renew certs from DigiCert, GlobalSign, and D-Trust, they only send emails for certificates from other certificate providers
149152
- You have the option to specify that the key pair be generated as non-exportable and generated inside an HSM. If you do this then you cannot distribute your certificate and private key to your app nodes as illustrated in the end-to-end flow example above.
150153
- The Azure App Services platform periodically polls your key vault to check if there is an updated certificate. If it finds one it reads the new one and rebinds SSL/TLS for your app.
151-
- There are
152154
***
153155

154156
### License

0 commit comments

Comments
 (0)