Skip to content

Commit 6b92691

Browse files
committed
update
1 parent 443498e commit 6b92691

38 files changed

+24
-689
lines changed

articles/key-vault/certificates/quick-create-cli.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,10 @@ In this quickstart, you create a key vault in Azure Key Vault with Azure CLI. Az
2828

2929
[!INCLUDE [Create a key vault](../includes/key-vault-creation-cli.md)]
3030

31+
## Give your user account permissions to manage secrets in Key Vault
32+
33+
[!INCLUDE [Using RBAC to provide access to a key vault](../includes/rbac/upn-certificate-officer-cli.md)]
34+
3135
## Add a certificate to Key Vault
3236

3337
To add a certificate to the vault, you just need to take a couple of additional steps. This certificate could be used by an application.

articles/key-vault/certificates/quick-create-powershell.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,9 +34,9 @@ Connect-AzAccount
3434

3535
[!INCLUDE [Create a key vault](../includes/key-vault-creation-powershell.md)]
3636

37-
### Grant access to your key vault
37+
## Give your user account permissions to manage secrets in Key Vault
3838

39-
[!INCLUDE [Using RBAC to provide access to a key vault](../includes/key-vault-quickstart-rbac-powershell.md)]
39+
[!INCLUDE [Using RBAC to provide access to a key vault](../includes/rbac/upn-certificate-officer-powershell.md)]
4040

4141
## Add a certificate to Key Vault
4242

includes/key-vault/rbac/upn-secrets-officer-cli.md renamed to articles/key-vault/includes/rbac/upn-certificate-officer-cli.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.author: msmbaldwin
1212
To gain permissions to your key vault through [Role-Based Access Control (RBAC)](/azure/key-vault/general/rbac-guide.md), assign a role to your "User Principal Name" (UPN) using the Azure CLI command [az role assignment create](/cli/azure/role/assignment#az-role-assignment-create).
1313

1414
```azurecli
15-
az role assignment create --role "Key Vault Secrets Officer" --assignee "<upn>" --scope "/subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.KeyVault/vaults/<your-unique-keyvault-name>"
15+
az role assignment create --role "Key Vault Certificate Officer" --assignee "<upn>" --scope "/subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.KeyVault/vaults/<your-unique-keyvault-name>"
1616
```
1717

1818
Replace \<upn\>, \<subscription-id\>, \<resource-group-name\> and \<your-unique-keyvault-name\> with your actual values. Your UPN will typically be in the format of an email address (e.g., [email protected]).

includes/key-vault/rbac/upn-crypto-user-pivot.md renamed to articles/key-vault/includes/rbac/upn-certificate-officer-pivot.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,10 +11,10 @@ ms.author: msmbaldwin
1111

1212
### [Azure CLI](#tab/azure-cli)
1313

14-
[!INCLUDE [Using RBAC to provide access to a key vault - CLI](./upn-crypto-user-cli.md)]
14+
[!INCLUDE [Using RBAC to provide access to a key vault - CLI](./upn-certificate-officer-cli.md)]
1515

1616
### [Azure PowerShell](#tab/azure-powershell)
1717

18-
[!INCLUDE [Using RBAC to provide access to a key vault - PowerShell](./upn-crypto-user-powershell.md)]
18+
[!INCLUDE [Using RBAC to provide access to a key vault - PowerShell](./upn-certificate-officer-powershell.md)]
1919

2020
---

includes/key-vault/rbac/upn-crypto-officer-powershell.md renamed to articles/key-vault/includes/rbac/upn-certificate-officer-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.author: msmbaldwin
1212
To gain permissions to your key vault through [Role-Based Access Control (RBAC)](/azure/key-vault/general/rbac-guide.md), assign a role to your "User Principal Name" (UPN) using the Azure PowerShell cmdlet [New-AzRoleAssignment](/powershell/module/az.resources/new-azroleassignment).
1313

1414
```azurepowershell
15-
New-AzRoleAssignment -SignInName "<upn>" -RoleDefinitionName "Key Vault Crypto Officer" -Scope "/subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.KeyVault/vaults/<your-unique-keyvault-name>"
15+
New-AzRoleAssignment -SignInName "<upn>" -RoleDefinitionName "Key Vault Certificate Officer" -Scope "/subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.KeyVault/vaults/<your-unique-keyvault-name>"
1616
```
1717

1818
Replace \<upn\>, \<subscription-id\>, \<resource-group-name\> and \<your-unique-keyvault-name\> with your actual values. Your UPN will typically be in the format of an email address (e.g., [email protected]).

includes/key-vault/rbac/upn-crypto-officer-cli.md renamed to articles/key-vault/includes/rbac/upn-certificate-user-cli.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.author: msmbaldwin
1212
To gain permissions to your key vault through [Role-Based Access Control (RBAC)](/azure/key-vault/general/rbac-guide.md), assign a role to your "User Principal Name" (UPN) using the Azure CLI command [az role assignment create](/cli/azure/role/assignment#az-role-assignment-create).
1313

1414
```azurecli
15-
az role assignment create --role "Key Vault Crypto Officer" --assignee "<upn>" --scope "/subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.KeyVault/vaults/<your-unique-keyvault-name>"
15+
az role assignment create --role "Key Vault Certificate User" --assignee "<upn>" --scope "/subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.KeyVault/vaults/<your-unique-keyvault-name>"
1616
```
1717

1818
Replace \<upn\>, \<subscription-id\>, \<resource-group-name\> and \<your-unique-keyvault-name\> with your actual values. Your UPN will typically be in the format of an email address (e.g., [email protected]).

includes/key-vault/rbac/upn-crypto-officer-pivot.md renamed to articles/key-vault/includes/rbac/upn-certificate-user-pivot.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,10 +11,10 @@ ms.author: msmbaldwin
1111

1212
### [Azure CLI](#tab/azure-cli)
1313

14-
[!INCLUDE [Using RBAC to provide access to a key vault - CLI](./upn-crypto-officer-cli.md)]
14+
[!INCLUDE [Using RBAC to provide access to a key vault - CLI](./upn-certificate-user-cli.md)]
1515

1616
### [Azure PowerShell](#tab/azure-powershell)
1717

18-
[!INCLUDE [Using RBAC to provide access to a key vault - PowerShell](./upn-crypto-officer-powershell.md)]
18+
[!INCLUDE [Using RBAC to provide access to a key vault - PowerShell](./upn-certificate-user-powershell.md)]
1919

2020
---

includes/key-vault/rbac/upn-secrets-officer-powershell.md renamed to articles/key-vault/includes/rbac/upn-certificate-user-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.author: msmbaldwin
1212
To gain permissions to your key vault through [Role-Based Access Control (RBAC)](/azure/key-vault/general/rbac-guide.md), assign a role to your "User Principal Name" (UPN) using the Azure PowerShell cmdlet [New-AzRoleAssignment](/powershell/module/az.resources/new-azroleassignment).
1313

1414
```azurepowershell
15-
New-AzRoleAssignment -SignInName "<upn>" -RoleDefinitionName "Key Vault Secrets Officer" -Scope "/subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.KeyVault/vaults/<your-unique-keyvault-name>"
15+
New-AzRoleAssignment -SignInName "<upn>" -RoleDefinitionName "Key Vault Certificate User" -Scope "/subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.KeyVault/vaults/<your-unique-keyvault-name>"
1616
```
1717

1818
Replace \<upn\>, \<subscription-id\>, \<resource-group-name\> and \<your-unique-keyvault-name\> with your actual values. Your UPN will typically be in the format of an email address (e.g., [email protected]).

articles/key-vault/keys/quick-create-cli.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,10 @@ In this quickstart, you create a key vault in Azure Key Vault with Azure CLI. Az
2828

2929
[!INCLUDE [Create a key vault](../includes/key-vault-creation-cli.md)]
3030

31+
## Give your user account permissions to manage secrets in Key Vault
32+
33+
[!INCLUDE [Using RBAC to provide access to a key vault](../includes/rbac/upn-crypto-officer-cli.md)]
34+
3135
## Add a key to Key Vault
3236

3337
To add a key to the vault, you just need to take a couple of additional steps. This key could be used by an application.

articles/key-vault/keys/quick-create-powershell.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,10 @@ Connect-AzAccount
3333

3434
[!INCLUDE [Create a key vault](../includes/key-vault-creation-powershell.md)]
3535

36+
## Give your user account permissions to manage secrets in Key Vault
37+
38+
[!INCLUDE [Using RBAC to provide access to a key vault](../includes/rbac/upn-crypto-officer-powershell.md)]
39+
3640
## Add a key to Key Vault
3741

3842
To add a key to the vault, you just need to take a couple of additional steps. This key could be used by an application.

0 commit comments

Comments
 (0)