Skip to content

Commit 1fbe580

Browse files
authored
Merge pull request #163755 from MarileeTurscak-MSFT/patch-670
Fixed several errors
2 parents 6a555ff + 714806c commit 1fbe580

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

articles/key-vault/general/rbac-migration.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -12,20 +12,20 @@ ms.author: mbaldwin
1212
---
1313
# Migrate from vault access policy to an Azure role-based access control permission model
1414

15-
Vault access policy model is an existing authorization system built in Key Vault to provide access to keys, secrets, and certificates. You can control access by assigning individual permissions to security principal(user, group, service principal, managed identity) at Key Vault scope.
15+
The vault access policy model is an existing authorization system built in Key Vault to provide access to keys, secrets, and certificates. You can control access by assigning individual permissions to security principals (user, group, service principal, managed identity) at Key Vault scope.
1616

17-
Azure role-based access control (Azure RBAC) is an authorization system built on [Azure Resource Manager](../../azure-resource-manager/management/overview.md) that provides fine-grained access management of Azure resources. With Azure RBAC you control access to resources by creating roles assignments, which consists of three elements: security principal, role definition (predefined set of permissions), and scope (group of resources or individual resource). For more information, see [Azure role-based access control (Azure RBAC)](../../role-based-access-control/overview.md).
17+
Azure role-based access control (Azure RBAC) is an authorization system built on [Azure Resource Manager](../../azure-resource-manager/management/overview.md) that provides fine-grained access management of Azure resources. With Azure RBAC you control access to resources by creating role assignments, which consist of three elements: a security principal, a role definition (predefined set of permissions), and a scope (group of resources or individual resource). For more information, see [Azure role-based access control (Azure RBAC)](../../role-based-access-control/overview.md).
1818

1919
Before migrating to Azure RBAC, it's important to understand its benefits and limitations.
2020

2121
Azure RBAC key benefits over vault access policies:
22-
- Provides unified access control model for Azure resources - same API across Azure services
22+
- Provides a unified access control model for Azure resources by using the same API across Azure services
2323
- Centralized access management for administrators - manage all Azure resources in one view
2424
- Integrated with [Privileged Identity Management](../../active-directory/privileged-identity-management/pim-configure.md) for time-based access control
25-
- Deny assignments - ability to exclude security principal at particular scope. For information, see [Understand Azure Deny Assignments](../../role-based-access-control/deny-assignments.md)
25+
- Deny assignments - ability to exclude security principals at a particular scope. For information, see [Understand Azure Deny Assignments](../../role-based-access-control/deny-assignments.md)
2626

2727
Azure RBAC disadvantages:
28-
- Latency for role assignments - it can take several minutes for role assignment to be applied. Vault access policies are assigned instantly.
28+
- Latency for role assignments - it can take several minutes for role assignments to be applied. Vault access policies are assigned instantly.
2929
- Limited number of role assignments - 2000 roles assignments per subscription versus 1024 access policies per Key Vault
3030

3131
## Access policies to Azure roles mapping
@@ -46,7 +46,7 @@ For more information about existing built-in roles, see [Azure built-in roles](.
4646

4747
Vault access policies can be assigned with individually selected permissions or with predefined permission templates.
4848

49-
Access policies predefined permission templates:
49+
Access policy predefined permission templates:
5050
- Key, Secret, Certificate Management
5151
- Key & Secret Management
5252
- Secret & Certificate Management
@@ -60,7 +60,7 @@ Access policies predefined permission templates:
6060
- SharePoint Online Customer Key
6161
- Azure Information BYOK
6262

63-
### Access policies templates to Azure roles mapping
63+
### Access policy templates to Azure roles mapping
6464
| Access policy template | Operations | Azure role |
6565
| --- | --- | --- |
6666
| Key, Secret, Certificate Management | Keys: all operations <br>Certificates: all operations<br>Secrets: all operations | Key Vault Administrator |
@@ -86,7 +86,7 @@ Azure RBAC for Key Vault allows roles assignment at following scopes:
8686
- Key Vault resource
8787
- Individual key, secret, and certificate
8888

89-
Vault access policy permission model is limited to assign policy only at Key Vault resource level, which
89+
The vault access policy permission model is limited to assigning policies only at Key Vault resource level.
9090

9191
In general, it's best practice to have one key vault per application and manage access at key vault level. There are scenarios when managing access at other scopes can simplify access management.
9292

@@ -116,4 +116,4 @@ There are many differences between Azure RBAC and vault access policy permission
116116

117117
- [Azure RBAC Overview](../../role-based-access-control/overview.md)
118118
- [Custom Roles Tutorial](../../role-based-access-control/tutorial-custom-role-cli.md)
119-
- [Privileged Identity Management](../../active-directory/privileged-identity-management/pim-configure.md)
119+
- [Privileged Identity Management](../../active-directory/privileged-identity-management/pim-configure.md)

0 commit comments

Comments
 (0)