Skip to content

Commit 0a1d1df

Browse files
Merge pull request #289587 from lb4368/remove-1st-party-doc
Remove deprecated AppId documentation for customer key vault setup
2 parents a97fac3 + d7e16a3 commit 0a1d1df

File tree

1 file changed

+6
-27
lines changed

1 file changed

+6
-27
lines changed

articles/operator-nexus/how-to-credential-manager-key-vault.md

Lines changed: 6 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -88,26 +88,6 @@ User-assigned identity example:
8888
},
8989
```
9090

91-
## Using App IDs for Key Vault Access
92-
93-
> [!IMPORTANT]
94-
> Use of App IDs for Customer Key Vault access is deprecated and support will be removed in a future version. It is recommended to use managed identity principals.
95-
96-
Instead of managed identities, the following application IDs grant access to the Key Vault.
97-
98-
- Ensure that the *Microsoft.NetworkCloud* resource provider is registered with the customer subscription.
99-
100-
```console
101-
az provider register --namespace 'Microsoft.NetworkCloud' --subscription <Subscription ID>
102-
```
103-
104-
- When assigned role access to the key vault, use the following App IDs as principal IDs.
105-
106-
| Environment | App Name | App ID |
107-
|:------------|:----------------------|:-------------------------------------|
108-
| Production | AFOI-NC-RP-PME-PROD | 05cf5e27-931d-47ad-826d-cb9028d8bd7a |
109-
| Production | AFOI-NC-MGMT-PME-PROD | 3365d4ea-bb16-4bc9-86dd-f2c8cf6f1f56 |
110-
11191
## Writing Credential Updates to a Customer Key Vault on Nexus Cluster
11292

11393
- Assign the *Operator Nexus Key Vault Writer Service Role*. Ensure that *Azure role-based access control* is selected as the permission model for the key vault on the *Access configuration* view. Then from the *Access Control* view, select to add a role assignment.
@@ -134,6 +114,12 @@ az networkcloud cluster update --ids /subscriptions/<subscription ID>/resourceGr
134114
az networkcloud cluster show --ids /subscriptions/<subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.NetworkCloud/clusters/<Nexus Cluster Name> --query secretArchive
135115
```
136116

117+
For more help:
118+
119+
```console
120+
az networkcloud cluster update --secret-archive ?? --help
121+
```
122+
137123
## Add a permission to User-assigned identity
138124

139125
When using a User-assigned identity, add the following role assignment to the UAI resource:
@@ -144,10 +130,3 @@ When using a User-assigned identity, add the following role assignment to the UA
144130
4. Assign access to: **User, group, or service principal**.
145131
5. Select **Member**: AFOI-NC-MGMT-PME-PROD application.
146132
6. Review and assign.
147-
148-
149-
For more help:
150-
151-
```console
152-
az networkcloud cluster update --secret-archive ?? --help
153-
```

0 commit comments

Comments
 (0)