Skip to content

Commit 2261079

Browse files
authored
Merge pull request #226563 from gandresr/patch-2
Update docs about policy for RBAC migration
2 parents 9991038 + ba960b0 commit 2261079

File tree

1 file changed

+7
-60
lines changed

1 file changed

+7
-60
lines changed

articles/key-vault/general/rbac-migration.md

Lines changed: 7 additions & 60 deletions
Original file line numberDiff line numberDiff line change
@@ -116,70 +116,17 @@ Using the Azure Policy service, you can govern RBAC permission model migration a
116116

117117
### Create and assign policy definition for Key Vault Azure RBAC permission model
118118
1. Navigate to Policy resource
119-
1. Select **Definitions** under **Authoring** in the left side of the Azure Policy page.
120-
1. Select **+ Policy definition** at the top of the page. This button opens to the Policy definition page.
119+
1. Select **Assignments** under **Authoring** on the left side of the Azure Policy page.
120+
1. Select **Assign policy** at the top of the page. This button opens to the Policy assignment page.
121121
1. Enter the following information:
122-
- The management group or subscription in which the policy definition is saved. Select by using the ellipsis on **Definition location**.
123-
- The name of the policy definition, e.g., "Key Vault should use Role-Based Access Control (RBAC) permission model"
124-
- Select **Use existing** and choose **Key Vault** category
125-
- Paste the following JSON code in **POLICY RULE**
126-
```json
127-
{
128-
"mode": "Indexed",
129-
"policyRule": {
130-
"if": {
131-
"allOf": [
132-
{
133-
"field": "type",
134-
"equals": "Microsoft.KeyVault/vaults"
135-
},
136-
{
137-
"not": {
138-
"field": "Microsoft.KeyVault/vaults/createMode",
139-
"equals": "recover"
140-
}
141-
},
142-
{
143-
"anyOf": [
144-
{
145-
"field": "Microsoft.KeyVault/vaults/enableRbacAuthorization",
146-
"exists": "false"
147-
},
148-
{
149-
"field": "Microsoft.KeyVault/vaults/enableRbacAuthorization",
150-
"equals": "false"
151-
}
152-
]
153-
}
154-
]
155-
},
156-
"then": {
157-
"effect": "[parameters('effect')]"
158-
}
159-
},
160-
"parameters": {
161-
"effect": {
162-
"type": "String",
163-
"metadata": {
164-
"displayName": "Effect",
165-
"description": "Enable or disable the execution of the policy"
166-
},
167-
"allowedValues": [
168-
"Audit",
169-
"Deny",
170-
"Disabled"
171-
],
172-
"defaultValue": "Audit"
173-
}
174-
}
175-
}
176-
```
177-
1. Select **Save**
178-
1. Select **Assign**
122+
- Define the scope of the policy by choosing the subscription and resource group over which the policy will be enforced. Select by clicking the three-dot button at on **Scope** field.
123+
- Select the name of the policy definition: "[[Preview]: Azure Key Vault should use RBAC permission model](https://portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F12d4fa5e-1f9f-4c21-97a9-b99b3c6611b5)"
124+
- Go to the **Parameters** tab at the top of the page and define the desired effect of the policy (Audit, Deny, or Disabled).
125+
1. Fill out any additional fields. Navigate the tabs clicking on **Previous** and **Next** buttons at the bottom of the page.
179126
1. Select **Review + create**
180127
1. Select **Create**
181128

182-
Once a new policy is assigned, it can take up to 24 hours to complete the scan. After the scan is completed, you can see compliance results like below.
129+
Once the built-in policy is assigned, it can take up to 24 hours to complete the scan. After the scan is completed, you can see compliance results like below.
183130

184131
:::image type="content" source="../media/rbac/migration-policy.png" alt-text="RBAC policy compliance":::
185132

0 commit comments

Comments
 (0)