You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-resource-manager/managed-applications/key-vault-access.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Use Azure Key Vault when deploying Managed Applications
3
3
description: Shows how to access secrets in Azure Key Vault when deploying Managed Applications.
4
4
ms.custom: subject-rbac-steps
5
5
ms.topic: conceptual
6
-
ms.date: 10/04/2022
6
+
ms.date: 04/14/2023
7
7
---
8
8
9
9
# Access Key Vault secret when deploying Azure Managed Applications
@@ -19,19 +19,19 @@ This article describes how to configure the Key Vault to work with Managed Appli
19
19
20
20
:::image type="content" source="./media/key-vault-access/open-key-vault.png" alt-text="Screenshot of the Azure home page to open a key vault using search or by selecting key vault.":::
21
21
22
-
1. Select **Access policies**.
22
+
1. Select **Access configuration**.
23
23
24
-
:::image type="content" source="./media/key-vault-access/select-access-policies.png" alt-text="Screenshot of the key vault setting to select access policies.":::
24
+
:::image type="content" source="./media/key-vault-access/select-access-configuration.png" alt-text="Screenshot of the key vault setting to select access configuration.":::
:::image type="content" source="./media/key-vault-access/enable-template.png" alt-text="Screenshot of the key vault's access policies that enable Azure Resource Manager for template deployment.":::
28
+
:::image type="content" source="./media/key-vault-access/enable-template.png" alt-text="Screenshot of the key vault's access configuration that enables Azure Resource Manager for template deployment.":::
29
29
30
30
## Add service as contributor
31
31
32
-
Assign the **Contributor** role to the **Appliance Resource Provider** user at the key vault scope. For detailed steps, see[Assign Azure roles using the Azure portal](../../role-based-access-control/role-assignments-portal.md).
32
+
Assign the **Contributor** role to the **Appliance Resource Provider** user at the key vault scope. For detailed steps, go to[Assign Azure roles using the Azure portal](../../role-based-access-control/role-assignments-portal.md).
33
33
34
-
The **Appliance Resource Provider** is a service principal in your Azure Active Directory's tenant. From the Azure portal, you can see if it's registered by going to **Azure Active Directory** > **Enterprise applications** and change the search filter to **Microsoft Applications**. Search for _Appliance Resource Provider_. If it's not found, [register](../troubleshooting/error-register-resource-provider.md) the `Microsoft.Solutions` resource provider.
34
+
The **Appliance Resource Provider** is a service principal in your Azure Active Directory's tenant. From the Azure portal, you can verify if it's registered by going to **Azure Active Directory** > **Enterprise applications** and change the search filter to **Microsoft Applications**. Search for _Appliance Resource Provider_. If it's not found, [register](../troubleshooting/error-register-resource-provider.md) the `Microsoft.Solutions` resource provider.
35
35
36
36
## Reference Key Vault secret
37
37
@@ -78,7 +78,7 @@ To pass a secret from a Key Vault to a template in your Managed Application, you
78
78
"resources": [
79
79
{
80
80
"type": "Microsoft.Resources/deployments",
81
-
"apiVersion": "2021-04-01",
81
+
"apiVersion": "2022-09-01",
82
82
"name": "dynamicSecret",
83
83
"properties": {
84
84
"mode": "Incremental",
@@ -105,7 +105,7 @@ To pass a secret from a Key Vault to a template in your Managed Application, you
105
105
"resources": [
106
106
{
107
107
"type": "Microsoft.Sql/servers",
108
-
"apiVersion": "2022-02-01-preview",
108
+
"apiVersion": "2022-05-01-preview",
109
109
"name": "[variables('sqlServerName')]",
110
110
"location": "[parameters('location')]",
111
111
"properties": {
@@ -149,7 +149,7 @@ To pass a secret from a Key Vault to a template in your Managed Application, you
149
149
150
150
You've configured your Key Vault to be accessible during deployment of a Managed Application.
151
151
152
-
- For information about passing a value from a Key Vault as a template parameter, see[Use Azure Key Vault to pass secure parameter value during deployment](../templates/key-vault-parameter.md).
153
-
- To learn more about key vault security, see[Azure Key Vault security](../../key-vault/general/security-features.md) and [Authentication in Azure Key Vault](../../key-vault/general/authentication.md).
154
-
- For managed application examples, see[Sample projects for Azure managed applications](sample-projects.md).
155
-
- To learn how to create a UI definition file for a managed application, see[Get started with CreateUiDefinition](create-uidefinition-overview.md).
152
+
- For information about passing a value from a Key Vault as a template parameter, go to[Use Azure Key Vault to pass secure parameter value during deployment](../templates/key-vault-parameter.md).
153
+
- To learn more about key vault security, go to[Azure Key Vault security](../../key-vault/general/security-features.md) and [Authentication in Azure Key Vault](../../key-vault/general/authentication.md).
154
+
- For managed application examples, go to[Sample projects for Azure managed applications](sample-projects.md).
155
+
- To learn how to create a UI definition file for a managed application, go to[Get started with CreateUiDefinition](create-uidefinition-overview.md).
Azure Cosmos DB allows you to isolate and restrict the restore permissions for continuous backup account to a specific role or a principal. The owner of the account can trigger a restore and assign a role to other principals to perform the restore operation. These permissions can be applied at the subscription scope or more granularly at the source account scope as shown in the following image:
16
+
Azure Cosmos DB allows you to isolate and restrict the restore permissions for continuous backup account to a specific role or a principal. These permissions can be applied at the subscription scope or more granularly at the source account scope as shown in the following image:
17
17
18
18
:::image type="content" source="./media/continuous-backup-restore-permissions/restore-roles-permissions.svg" alt-text="List of roles required to perform restore operation." border="false":::
19
19
20
20
Scope is a set of resources that have access, to learn more on scopes, see the [Azure RBAC](../role-based-access-control/scope-overview.md) documentation. In Azure Cosmos DB, applicable scopes are the source subscription and database account for most of the use cases. The principal performing the restore actions should have write permissions to the destination resource group.
21
21
22
22
## Assign roles for restore using the Azure portal
23
23
24
-
To perform a restore, a user or a principal need the permission to restore (that is *restore/action* permission), and permission to provision a new account (that is *write* permission). To grant these permissions, the owner can assign the `CosmosRestoreOperator` and `Cosmos DB Operator` built in roles to a principal.
24
+
To perform a restore, a user or a principal need the permission to restore (that is *restore/action* permission), and permission to provision a new account (that is *write* permission). To grant these permissions, the owner of the subscription can assign the `CosmosRestoreOperator` and `Cosmos DB Operator` built in roles to a principal.
25
25
26
26
1. Sign into the [Azure portal](https://portal.azure.com/) and navigate to your subscription. The `CosmosRestoreOperator` role is available at subscription level.
27
27
@@ -83,17 +83,20 @@ Following permissions are required to perform the different activities pertainin
83
83
Roles with permission can be assigned to different scopes to achieve granular control on who can perform the restore operation within a subscription or a given account.
84
84
85
85
### Assign capability to restore from any restorable account in a subscription
86
-
- Assign a user write action on the specific resource group. This action is required to create a new account in the resource group.
87
-
- Assign the `CosmosRestoreOperator` built in role to the specific restorable database account that needs to be restored. In the following command, the scope for the `RestorableDatabaseAccount` is extracted from the `ID` property of result of execution of `az cosmosdb restorable-database-account list`(if using CLI) or `Get-AzCosmosDBRestorableDatabaseAccount`(if using the PowerShell)
88
86
89
-
Assign the `CosmosRestoreOperator` built-in role at subscription level
87
+
-Assign the `CosmosRestoreOperator` builtin role to the specific subscription level
90
88
91
89
```azurecli-interactive
92
90
az role assignment create --role "CosmosRestoreOperator" --assignee <email> --scope /subscriptions/<subscriptionId>
93
91
```
94
92
95
-
### Assign capability to restore from a specific account
96
-
This operation is currently not supported.
93
+
### Assign capability to restore from a specific account
94
+
- Assign a user write action on the specific resource group. This action is required to create a new account in the resource group.
95
+
- Assign the `CosmosRestoreOperator` built in role to the specific restorable database account that needs to be restored. In the following command, the scope for the `RestorableDatabaseAccount` is extracted from the `ID` property of result of execution of `az cosmosdb restorable-database-account list`(if using CLI) or `Get-AzCosmosDBRestorableDatabaseAccount`(if using the PowerShell)
96
+
97
+
```azurecli-interactive
98
+
az role assignment create --role "CosmosRestoreOperator" --assignee <email> --scope <RestorableDatabaseAccount>
99
+
```
97
100
98
101
### Assign capability to restore from any source account in a resource group.
> This article was partially generated using Azure OpenAI Service. Before publishing, an author reviewed and revised the content as needed. See [Our principles for using AI-generated content in Microsoft Learn](https://aka.ms/ai-content-principles).
10
+
> This article was partially created with the help of artificial intelligence. Before publishing, an author reviewed and revised the content as needed. See [Our principles for using AI-generated content in Microsoft Learn](https://aka.ms/ai-content-principles).
0 commit comments