Skip to content

Commit 44ab7c3

Browse files
committed
Address some scorecard items
1 parent c033c30 commit 44ab7c3

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/operator-nexus/how-to-credential-manager-key-vault.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.custom: template-how-to, devx-track-azurecli
1111

1212
# Set up Key Vault for Managed Credential Rotation in Operator Nexus
1313

14-
Azure Operator Nexus utilizes secrets and certificates to manage component security across the platform. The Operator Nexus platform handles the rotation of these secrets and certificates. By default, Operator Nexus stores the credentials in a managed Key Vault. To keep the rotated credentials in their own Key Vault, the user has the option to configure their own Key Vault to receive rotated credentials. This requires the user to set up the Key Vault for the Azure Operator Nexus instance. Once created, the user needs to add a role assignment on the Customer Key Vault to allow the Operator Nexus Platform to write updated credentials, and additionally link the Customer Key Vault to the Nexus Cluster Resource.
14+
Azure Operator Nexus utilizes secrets and certificates to manage component security across the platform. The Operator Nexus platform handles the rotation of these secrets and certificates. By default, Operator Nexus stores the credentials in a managed Key Vault. To keep the rotated credentials in their own Key Vault, the user must configure their own Key Vault to receive rotated credentials. This configuration requires the user to set up the Key Vault for the Azure Operator Nexus instance. Once created, the user needs to add a role assignment on the Customer Key Vault to allow the Operator Nexus Platform to write updated credentials, and additionally link the Customer Key Vault to the Nexus Cluster Resource.
1515

1616
## Prerequisites
1717

@@ -122,7 +122,7 @@ Beginning with the 2024-10-01-preview API, managed identities in the Nexus Clust
122122
123123
### Configure Nexus Cluster Secret Archive Settings
124124

125-
The Nexus Cluster _secret-archive-settings_ specify the Azure Key Vault URI where rotated credentials will be stored and the managed identity which will be used to access it.
125+
The Nexus Cluster _secret-archive-settings_ specify the Azure Key Vault URI where rotated credentials are stored and the managed identity which is used to access it.
126126

127127
These examples describe how to configure a managed identity for a Nexus Cluster and configure it as part of _secret-archive-settings_.
128128

@@ -223,10 +223,10 @@ If using a user-assigned managed identity, proceed to [add permission to user-as
223223

224224
## Add a permission to User-assigned identity
225225

226-
When using a user-assigned managed identity, a customer is required to provision access to that identity for the Nexus platform.
227-
Specifically, `Microsoft.ManagedIdentity/userAssignedIdentities/assign/action` permission needs to be added to the User-assigned identity for `AFOI-NC-MGMT-PME-PROD` Microsoft Entra ID. It is a known limitation of the platform that will be addressed in the future.
226+
When using a user-assigned managed identity to access a Key Vault, a customer is required to provision access to that identity for the Nexus platform.
227+
Specifically, `Microsoft.ManagedIdentity/userAssignedIdentities/assign/action` permission needs to be added to the User-assigned identity for `AFOI-NC-MGMT-PME-PROD` Microsoft Entra ID. It's a known limitation of the platform that will be addressed in the future.
228228

229-
1. Open the Azure Portal and locate the User-assigned identity in question.
229+
1. Open the Azure portal and locate the User-assigned identity in question.
230230
2. Under **Access control (IAM)**, click **Add role assignment**.
231231
3. Select **Role**: Managed Identity Operator. (See the permissions that the role provides [managed-identity-operator](/azure/role-based-access-control/built-in-roles/identity#managed-identity-operator)).
232232
4. Assign access to: **User, group, or service principal**.

0 commit comments

Comments
 (0)