You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
If you're using Azure role-based access control as Key Vault permission model:
60
+
61
+
:::image type="content" alt-text="Screenshot of Azure RBAC selected as Key Vault permission model." source="media\howto-custom-domain\portal-key-vault-perm-model-rbac.png" :::
62
+
63
+
1. Go to your Key Vault resource.
64
+
1. In the menu pane, select **Access control (IAM)**.
65
+
1. Click **Add**. Select **Add role assignment**.
66
+
67
+
:::image type="content" alt-text="Screenshot of Key Vault IAM." source="media\howto-custom-domain\portal-key-vault-iam.png" :::
68
+
69
+
1. Under the **Role** tab, select **Key Vault Secrets User**. Click **Next**.
70
+
71
+
:::image type="content" alt-text="Screenshot of role tab when adding role assignment to Key Vault." source="media\howto-custom-domain\portal-key-vault-role.png" :::
72
+
73
+
1. Under the **Members** tab, select **Managed identity**. 1. Search for the Azure SignalR Service resource name or the user assigned identity name. Click **Next**.
74
+
75
+
:::image type="content" alt-text="Screenshot of members tab when adding role assignment to Key Vault." source="media\howto-custom-domain\portal-key-vault-members.png" :::
76
+
77
+
1. Click **Review + assign**.
78
+
79
+
-----
80
+
49
81
### Step 2: Create a custom certificate
50
82
51
83
1. In the Azure portal, go to your Azure SignalR Service resource.
If you're using Azure role-based access control as Key Vault permission model:
59
+
60
+
:::image type="content" alt-text="Screenshot of Azure RBAC selected as Key Vault permission model." source="media\howto-custom-domain\portal-key-vault-perm-model-rbac.png" :::
61
+
62
+
1. Go to your Key Vault resource.
63
+
1. In the menu pane, select **Access control (IAM)**.
64
+
1. Click **Add**. Select **Add role assignment**.
65
+
66
+
:::image type="content" alt-text="Screenshot of Key Vault IAM." source="media\howto-custom-domain\portal-key-vault-iam.png" :::
67
+
68
+
1. Under the **Role** tab, select **Key Vault Secrets User**. Click **Next**.
69
+
70
+
:::image type="content" alt-text="Screenshot of role tab when adding role assignment to Key Vault." source="media\howto-custom-domain\portal-key-vault-role.png" :::
71
+
72
+
1. Under the **Members** tab, select **Managed identity**. 1. Search for the Azure Web PubSub Service resource name or the user assigned identity name. Click **Next**.
73
+
74
+
:::image type="content" alt-text="Screenshot of members tab when adding role assignment to Key Vault." source="media\howto-custom-domain\portal-key-vault-members.png" :::
75
+
76
+
1. Click **Review + assign**.
77
+
78
+
-----
79
+
48
80
### Step 2: Create a custom certificate
49
81
50
82
1. In the Azure portal, go to your Azure Web PubSub Service resource.
0 commit comments