Skip to content

Commit 7640cbc

Browse files
committed
SignalR: Add key vault RBAC content
1 parent 038cb56 commit 7640cbc

File tree

6 files changed

+32
-0
lines changed

6 files changed

+32
-0
lines changed

articles/azure-signalr/howto-custom-domain.md

Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,14 @@ Azure SignalR Service uses Managed Identity to access your Key Vault. In order t
3333

3434
:::image type="content" alt-text="Screenshot of enabling managed identity." source="media\howto-custom-domain\portal-identity.png" :::
3535

36+
Depending on how you configure your Key Vault permission model, you may need to grant permissions at different places.
37+
38+
#### [Vault access policy](#tab/vault-access-policy)
39+
40+
If you're using Key Vault built-in access policy as Key Vault permission model as follows:
41+
42+
:::image type="content" alt-text="Screenshot of Key Vault IAM." source="media\howto-custom-domain\portal-key-vault-perm-model-access-policy.png" :::
43+
3644
1. Go to your Key Vault resource.
3745
1. In the menu pane, select **Access configuration**. Click **Go to access policies**.
3846
1. Click **Create**. Select **Secret Get** permission and **Certificate Get** permission. Click **Next**.
@@ -46,6 +54,30 @@ Azure SignalR Service uses Managed Identity to access your Key Vault. In order t
4654
1. Skip **Application (optional)**. Click **Next**.
4755
1. In **Review + create**, click **Create**.
4856

57+
#### [Azure role-based access control](#tab/azure-rbac)
58+
59+
If you're using Azure role-based access control as Key Vault permission model:
60+
61+
:::image type="content" alt-text="Screenshot of Key Vault IAM." source="media\howto-custom-domain\portal-key-vault-perm-model-rbac.png" :::
62+
63+
1. Go to your Key Vault resource.
64+
1. In the menu pane, select **Access control (IAM) **.
65+
1. Click **Add**. Select **Add role assignment**.
66+
67+
:::image type="content" alt-text="Screenshot of Key Vault IAM." source="media\howto-custom-domain\portal-key-vault-iam.png" :::
68+
69+
1. Under the **Role** tab, select **Key Vault Secrets User**. Click **Next**.
70+
71+
:::image type="content" alt-text="Screenshot of Key Vault IAM." source="media\howto-custom-domain\portal-key-vault-role.png" :::
72+
73+
1. Under the **Members** tab, select **Managed identity**. 1. Search for the Azure SignalR Service resource name or the user assigned identity name. Click **Next**.
74+
75+
:::image type="content" alt-text="Screenshot of Key Vault IAM." source="media\howto-custom-domain\portal-key-vault-members.png" :::
76+
77+
1. Click **Review + assign**.
78+
79+
-----
80+
4981
### Step 2: Create a custom certificate
5082

5183
1. In the Azure portal, go to your Azure SignalR Service resource.
85.2 KB
Loading
36.5 KB
Loading
35.2 KB
Loading
41.6 KB
Loading
53.2 KB
Loading

0 commit comments

Comments
 (0)