You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Once a managed identity is assigned to the Automation account, you configure access to the Key Vault storing customer managed Keys. Azure Automation requires **get**, **recover**, **wrapKey**, **UnwrapKey** on the customer managed keys.
94
93
95
94
Such an access policy can be set using the following REST API call.
96
95
97
-
``http
96
+
```http
98
97
PUT https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/sample-group/providers/Microsoft.KeyVault/vaults/sample-vault/accessPolicies/add?api-version=2018-02-14
99
-
``
98
+
```
100
99
Request body
101
100
102
-
``json
101
+
```json
103
102
{
104
103
"properties": {
105
104
"accessPolicies": [
@@ -120,21 +119,21 @@ Request body
120
119
]
121
120
}
122
121
}
123
-
``
122
+
```
124
123
125
-
[!NOTE]
126
-
The tenantId and objectId fields must be provided with values of identity.tenantId and identity.principalId from the response of managed identity for the automation account.
124
+
> [!NOTE]
125
+
> The tenantId and objectId fields must be provided with values of identity.tenantId and identity.principalId from the response of managed identity for the automation account.
127
126
128
127
### Change the configuration of automation account to use customer managed key
129
128
130
129
Finally, you can switch your automation account from Microsft-managed keys to customer-managed keys, using the following REST API call.
0 commit comments