You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/operator-nexus/how-to-credential-manager-key-vault.md
+82-9Lines changed: 82 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,31 +22,104 @@ Azure Operator Nexus utilizes secrets and certificates to manage component secur
22
22
> [!NOTE]
23
23
> A single Key Vault can be used for any number of clusters.
24
24
25
-
## Writing Credential Updates to a Customer Key Vault on Nexus Cluster
25
+
## Configure Managed Identity for Cluster Manager
26
+
27
+
Beginning with the 2024-06-01-public-preview API, managed identities are used in the Cluster Manager for write access to rotated credentials to a key vault. The Cluster Manager identity can be system-assigned or [user-assigned](/entra/identity/managed-identities-azure-resources/how-manage-user-assigned-managed-identities), and can be managed directly via APIs or via CLI.
28
+
29
+
These examples describe how to configure a managed identity for a Cluster Manager.
30
+
31
+
- Create or update Cluster Manager with system-assigned identity
32
+
```
33
+
az networkcloud clustermanager create --name "clusterManagerName" --location "location" \
Once a managed identity is configured, use the CLI to view the identity and the associated principal ID data within the cluster manager.
62
+
63
+
Example:
64
+
65
+
```console
66
+
az networkcloud clustermanager show --ids /subscriptions/<Subscription ID>/resourceGroups/<Cluster Manager Resource Group Name>/providers/Microsoft.NetworkCloud/clusterManagers/<Cluster Manager Name>
> Use of App IDs for Customer Key Vault access is deprecated and support will be removed in a future version. It is recommended to use managed identity principals.
95
+
96
+
Instead of managed identities, the following application IDs grant access to the Key Vault.
26
97
27
98
- Ensure that the *Microsoft.NetworkCloud* resource provider is registered with the customer subscription.
28
99
29
100
```console
30
101
az provider register --namespace 'Microsoft.NetworkCloud' --subscription <Subscription ID>
31
102
```
32
103
33
-
- Assign the *Operator Nexus Key Vault Writer Service Role*. Ensure that *Azure role-based access control* is selected as the permission model for the key vault on the *Access configuration* view. Then from the *Access control (IAM)* view, select to add a role assignment.
| Production | AFOI-NC-RP-PME-PROD | 05cf5e27-931d-47ad-826d-cb9028d8bd7a |
42
109
| Production | AFOI-NC-MGMT-PME-PROD | 3365d4ea-bb16-4bc9-86dd-f2c8cf6f1f56 |
43
110
111
+
## Writing Credential Updates to a Customer Key Vault on Nexus Cluster
112
+
113
+
- Assign the *Operator Nexus Key Vault Writer Service Role*. Ensure that *Azure role-based access control* is selected as the permission model for the key vault on the *Access configuration* view. Then from the *Access Control* view, select to add a role assignment.
| Operator Nexus Key Vault Writer Service Role (Preview) | 44f0a1a8-6fea-4b35-980a-8ff50c487c97 |
118
+
44
119
Example:
45
120
46
121
```console
47
-
az role assignment create --assignee 05cf5e27-931d-47ad-826d-cb9028d8bd7a --role 44f0a1a8-6fea-4b35-980a-8ff50c487c97 --scope /subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.KeyVault/vaults/<Key Vault Name>
48
-
49
-
az role assignment create --assignee 3365d4ea-bb16-4bc9-86dd-f2c8cf6f1f56 --role 44f0a1a8-6fea-4b35-980a-8ff50c487c97 --scope /subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.KeyVault/vaults/<Key Vault Name>
122
+
az role assignment create --assignee <Managed Identity Principal Id> --role 44f0a1a8-6fea-4b35-980a-8ff50c487c97 --scope /subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.KeyVault/vaults/<Key Vault Name>
50
123
```
51
124
52
125
- User associates the Customer Key Vault with the Operator Nexus cluster. The key vault resource ID must be configured in the cluster and enabled to store the secrets of the cluster.
0 commit comments