Skip to content

Commit 79e0688

Browse files
Merge pull request #291718 from batamig/patch-461614
Update deploy-data-connector-agent-container.md
2 parents 41528cf + bb41da0 commit 79e0688

File tree

1 file changed

+4
-68
lines changed

1 file changed

+4
-68
lines changed

articles/sentinel/sap/deploy-data-connector-agent-container.md

Lines changed: 4 additions & 68 deletions
Original file line numberDiff line numberDiff line change
@@ -154,76 +154,12 @@ This procedure describes how to create a key vault to store your agent configura
154154
155155
### Assign key vault access permissions
156156
157-
1. In your key vault, assign the following Azure role-based access control or vault access policy permissions on the secrets scope to the [identity that you created and copied earlier](#create-a-virtual-machine-and-configure-access-to-your-credentials).
157+
1. In your key vault, assign the Azure **Key Vault Secrets Reader** role to the [identity that you created and copied earlier](#create-a-virtual-machine-and-configure-access-to-your-credentials).
158158
159-
|Permission model |Permissions required |
160-
|---------|---------|
161-
|**Azure role-based access control** | Key Vault Secrets User |
162-
|**Vault access policy** | `get`, `list` |
163-
164-
Use the options in the portal to assign the permissions, or run one of the following commands to assign key vault secrets permissions to your identity, substituting actual names for the `<placeholder>` values. Select the tab for the type of identity you created.
165-
166-
The policy specified in the commands allows the VM to list and read secrets from the key vault.
167-
168-
- **Azure role-based access control permission model**:
169-
170-
#### [Managed identity](#tab/managed-identity)
171-
172-
```Azure CLI
173-
az role assignment create --assignee-object-id <ManagedIdentityId> --role "Key Vault Secrets User" --scope /subscriptions/<KeyVaultSubscriptionId>/resourceGroups/<KeyVaultResourceGroupName> /providers/Microsoft.KeyVault/vaults/<KeyVaultName>
174-
```
175-
176-
#### [Registered application](#tab/registered-application)
177-
178-
```Azure CLI
179-
az role assignment create --assignee-object-id <ServicePrincipalObjectId> --role "Key Vault Secrets User" --scope /subscriptions/<KeyVaultSubscriptionId>/resourceGroups/<KeyVaultResourceGroupName>/providers/Microsoft.KeyVault/vaults/<KeyVaultName>
180-
```
181-
182-
To find the object ID of the app registration’s service principal, go to the Microsoft Entra ID portal's **Enterprise applications** page. Search for the name of the app registration there, and copy the **Object ID** value.
183-
184-
> [!IMPORTANT]
185-
> Do not confuse the object ID from the **Enterprise Applications** page with the app registration's object ID found on the **App registrations** page. Only the object ID from the **Enterprise applications** page will work.
186-
187-
---
188-
189-
- **Vault access policy permission model**:
190-
191-
#### [Managed identity](#tab/managed-identity)
192-
193-
```Azure CLI
194-
az keyvault set-policy -n <KeyVaultName> -g <KeyVaultResourceGroupName> --object-id <ManagedIdentityId> --secret-permissions get list
195-
```
196-
197-
#### [Registered application](#tab/registered-application)
198-
199-
```Azure CLI
200-
az keyvault set-policy -n <KeyVaultName> -g <KeyVaultResourceGroupName> --spn <ApplicationId> --secret-permissions get list
201-
```
202-
203-
To find the object ID of the app registration, go to the Microsoft Entra ID portal's **App registrations** page. Search for name of the app registration and copy the **Application (client) ID** value.
204-
205-
---
206-
207-
1. In the same key vault, assign the following Azure role-based access control or vault access policy permissions on the secrets scope to the user configuring the data connector agent:
208-
209-
|Permission model |Permissions required |
210-
|---------|---------|
211-
|**Azure role-based access control** | Key Vault Secrets Officer |
212-
|**Vault access policy** | `get`, `list`, `set`, `delete` |
213-
214-
Use the options in the portal to assign the permissions, or run one of the following commands to assign key vault secrets permissions to the user, substituting actual names for the `<placeholder>` values:
215-
216-
- **Azure role-based access control permission model**:
217-
218-
```Azure CLI
219-
az role assignment create --role "Key Vault Secrets Officer" --assignee <UserPrincipalName> --scope /subscriptions/<KeyVaultSubscriptionId>/resourceGroups/<KeyVaultResourceGroupName>/providers/Microsoft.KeyVault/vaults/<KeyVaultName>
220-
```
221-
222-
- **Vault access policy permission model**:
159+
1. In the same key vault, assign the following Azure roles to the user configuring the data connector agent:
223160
224-
```Azure CLI
225-
az keyvault set-policy -n <KeyVaultName> -g <KeyVaultResourceGroupName> --upn <UserPrincipalName>--secret-permissions get list set delete
226-
```
161+
- **Key Vault Contributor**, to deploy the agent
162+
- **Key Vault Secrets Officer**, to add new systems
227163
228164
## Deploy the data connector agent from the portal (Preview)
229165

0 commit comments

Comments
 (0)