You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/sap/deploy-data-connector-agent-container.md
+4-68Lines changed: 4 additions & 68 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -154,76 +154,12 @@ This procedure describes how to create a key vault to store your agent configura
154
154
155
155
### Assign key vault access permissions
156
156
157
-
1. In your key vault, assign the following Azure role-based access control or vault access policy permissions on the secrets scope to the [identity that you created and copied earlier](#create-a-virtual-machine-and-configure-access-to-your-credentials).
157
+
1. In your key vault, assign the Azure **Key Vault Secrets Reader** role to the [identity that you created and copied earlier](#create-a-virtual-machine-and-configure-access-to-your-credentials).
158
158
159
-
|Permission model |Permissions required |
160
-
|---------|---------|
161
-
|**Azure role-based access control** | Key Vault Secrets User |
162
-
|**Vault access policy** | `get`, `list` |
163
-
164
-
Use the options in the portal to assign the permissions, or run one of the following commands to assign key vault secrets permissions to your identity, substituting actual names for the `<placeholder>` values. Select the tab for the type of identity you created.
165
-
166
-
The policy specified in the commands allows the VM to list and read secrets from the key vault.
167
-
168
-
- **Azure role-based access control permission model**:
169
-
170
-
#### [Managed identity](#tab/managed-identity)
171
-
172
-
```Azure CLI
173
-
az role assignment create --assignee-object-id <ManagedIdentityId> --role "Key Vault Secrets User" --scope /subscriptions/<KeyVaultSubscriptionId>/resourceGroups/<KeyVaultResourceGroupName> /providers/Microsoft.KeyVault/vaults/<KeyVaultName>
az role assignment create --assignee-object-id <ServicePrincipalObjectId> --role "Key Vault Secrets User" --scope /subscriptions/<KeyVaultSubscriptionId>/resourceGroups/<KeyVaultResourceGroupName>/providers/Microsoft.KeyVault/vaults/<KeyVaultName>
180
-
```
181
-
182
-
To find the object ID of the app registration’s service principal, go to the Microsoft Entra ID portal's **Enterprise applications** page. Search for the name of the app registration there, and copy the **Object ID** value.
183
-
184
-
> [!IMPORTANT]
185
-
> Do not confuse the object ID from the **Enterprise Applications** page with the app registration's object ID found on the **App registrations** page. Only the object ID from the **Enterprise applications** page will work.
186
-
187
-
---
188
-
189
-
- **Vault access policy permission model**:
190
-
191
-
#### [Managed identity](#tab/managed-identity)
192
-
193
-
```Azure CLI
194
-
az keyvault set-policy -n <KeyVaultName> -g <KeyVaultResourceGroupName> --object-id <ManagedIdentityId> --secret-permissions get list
az keyvault set-policy -n <KeyVaultName> -g <KeyVaultResourceGroupName> --spn <ApplicationId> --secret-permissions get list
201
-
```
202
-
203
-
To find the object ID of the app registration, go to the Microsoft Entra ID portal's **App registrations** page. Search for name of the app registration and copy the **Application (client) ID** value.
204
-
205
-
---
206
-
207
-
1. In the same key vault, assign the following Azure role-based access control or vault access policy permissions on the secrets scope to the user configuring the data connector agent:
Use the options in the portal to assign the permissions, or run one of the following commands to assign key vault secrets permissions to the user, substituting actual names for the `<placeholder>` values:
215
-
216
-
- **Azure role-based access control permission model**:
217
-
218
-
```Azure CLI
219
-
az role assignment create --role "Key Vault Secrets Officer" --assignee <UserPrincipalName> --scope /subscriptions/<KeyVaultSubscriptionId>/resourceGroups/<KeyVaultResourceGroupName>/providers/Microsoft.KeyVault/vaults/<KeyVaultName>
220
-
```
221
-
222
-
- **Vault access policy permission model**:
159
+
1. In the same key vault, assign the following Azure roles to the user configuring the data connector agent:
223
160
224
-
```Azure CLI
225
-
az keyvault set-policy -n <KeyVaultName> -g <KeyVaultResourceGroupName> --upn <UserPrincipalName>--secret-permissions get list set delete
226
-
```
161
+
- **Key Vault Contributor**, to deploy the agent
162
+
- **Key Vault Secrets Officer**, to add new systems
227
163
228
164
## Deploy the data connector agent from the portal (Preview)
0 commit comments