You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
If you're using Key Vault built-in access policy as Key Vault permission model as follows:
40
+
If you're using Key Vault built-in access policy as Key Vault permission model:
41
41
42
-
:::image type="content" alt-text="Screenshot of Key Vault IAM." source="media\howto-custom-domain\portal-key-vault-perm-model-access-policy.png" :::
42
+
:::image type="content" alt-text="Screenshot of built-in access policy selected as Key Vault permission model." source="media\howto-custom-domain\portal-key-vault-perm-model-access-policy.png" :::
43
43
44
44
1. Go to your Key Vault resource.
45
45
1. In the menu pane, select **Access configuration**. Click **Go to access policies**.
@@ -58,7 +58,7 @@ If you're using Key Vault built-in access policy as Key Vault permission model a
58
58
59
59
If you're using Azure role-based access control as Key Vault permission model:
60
60
61
-
:::image type="content" alt-text="Screenshot of Key Vault IAM." source="media\howto-custom-domain\portal-key-vault-perm-model-rbac.png" :::
61
+
:::image type="content" alt-text="Screenshot of Azure RBAC selected as Key Vault permission model." source="media\howto-custom-domain\portal-key-vault-perm-model-rbac.png" :::
62
62
63
63
1. Go to your Key Vault resource.
64
64
1. In the menu pane, select **Access control (IAM)**.
@@ -68,11 +68,11 @@ If you're using Azure role-based access control as Key Vault permission model:
68
68
69
69
1. Under the **Role** tab, select **Key Vault Secrets User**. Click **Next**.
70
70
71
-
:::image type="content" alt-text="Screenshot of Key Vault IAM." source="media\howto-custom-domain\portal-key-vault-role.png" :::
71
+
:::image type="content" alt-text="Screenshot of role tab when adding role assignment to Key Vault." source="media\howto-custom-domain\portal-key-vault-role.png" :::
72
72
73
73
1. Under the **Members** tab, select **Managed identity**. 1. Search for the Azure SignalR Service resource name or the user assigned identity name. Click **Next**.
74
74
75
-
:::image type="content" alt-text="Screenshot of Key Vault IAM." source="media\howto-custom-domain\portal-key-vault-members.png" :::
75
+
:::image type="content" alt-text="Screenshot of members tab when adding role assignment to Key Vault." source="media\howto-custom-domain\portal-key-vault-members.png" :::
If you're using Key Vault built-in access policy as Key Vault permission model as follows:
39
+
If you're using Key Vault built-in access policy as Key Vault permission model:
40
40
41
-
:::image type="content" alt-text="Screenshot of Key Vault IAM." source="media\howto-custom-domain\portal-key-vault-perm-model-access-policy.png" :::
41
+
:::image type="content" alt-text="Screenshot of built-in access policy selected as Key Vault permission model." source="media\howto-custom-domain\portal-key-vault-perm-model-access-policy.png" :::
42
42
43
43
1. Go to your Key Vault resource.
44
44
1. In the menu pane, select **Access configuration**. Click **Go to access policies**.
@@ -57,7 +57,7 @@ If you're using Key Vault built-in access policy as Key Vault permission model a
57
57
58
58
If you're using Azure role-based access control as Key Vault permission model:
59
59
60
-
:::image type="content" alt-text="Screenshot of Key Vault IAM." source="media\howto-custom-domain\portal-key-vault-perm-model-rbac.png" :::
60
+
:::image type="content" alt-text="Screenshot of Azure RBAC selected as Key Vault permission model." source="media\howto-custom-domain\portal-key-vault-perm-model-rbac.png" :::
61
61
62
62
1. Go to your Key Vault resource.
63
63
1. In the menu pane, select **Access control (IAM)**.
@@ -67,11 +67,11 @@ If you're using Azure role-based access control as Key Vault permission model:
67
67
68
68
1. Under the **Role** tab, select **Key Vault Secrets User**. Click **Next**.
69
69
70
-
:::image type="content" alt-text="Screenshot of Key Vault IAM." source="media\howto-custom-domain\portal-key-vault-role.png" :::
70
+
:::image type="content" alt-text="Screenshot of role tab when adding role assignment to Key Vault." source="media\howto-custom-domain\portal-key-vault-role.png" :::
71
71
72
72
1. Under the **Members** tab, select **Managed identity**. 1. Search for the Azure Web PubSub Service resource name or the user assigned identity name. Click **Next**.
73
73
74
-
:::image type="content" alt-text="Screenshot of Key Vault IAM." source="media\howto-custom-domain\portal-key-vault-members.png" :::
74
+
:::image type="content" alt-text="Screenshot of members tab when adding role assignment to Key Vault." source="media\howto-custom-domain\portal-key-vault-members.png" :::
0 commit comments