You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
If you're using Azure role-based access control as Key Vault permission model:
59
+
60
+
:::image type="content" alt-text="Screenshot of Key Vault IAM." source="media\howto-custom-domain\portal-key-vault-perm-model-rbac.png" :::
61
+
62
+
1. Go to your Key Vault resource.
63
+
1. In the menu pane, select **Access control (IAM)**.
64
+
1. Click **Add**. Select **Add role assignment**.
65
+
66
+
:::image type="content" alt-text="Screenshot of Key Vault IAM." source="media\howto-custom-domain\portal-key-vault-iam.png" :::
67
+
68
+
1. Under the **Role** tab, select **Key Vault Secrets User**. Click **Next**.
69
+
70
+
:::image type="content" alt-text="Screenshot of Key Vault IAM." source="media\howto-custom-domain\portal-key-vault-role.png" :::
71
+
72
+
1. Under the **Members** tab, select **Managed identity**. 1. Search for the Azure Web PubSub Service resource name or the user assigned identity name. Click **Next**.
73
+
74
+
:::image type="content" alt-text="Screenshot of Key Vault IAM." source="media\howto-custom-domain\portal-key-vault-members.png" :::
75
+
76
+
1. Click **Review + assign**.
77
+
78
+
-----
79
+
48
80
### Step 2: Create a custom certificate
49
81
50
82
1. In the Azure portal, go to your Azure Web PubSub Service resource.
0 commit comments