Skip to content

Commit 842141f

Browse files
committed
update
1 parent e5ce1c6 commit 842141f

File tree

1 file changed

+18
-0
lines changed

1 file changed

+18
-0
lines changed
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
---
2+
author: msmbaldwin
3+
ms.service: key-vault
4+
ms.topic: include
5+
ms.date: 04/04/2024
6+
ms.author: msmbaldwin
7+
8+
# Used by articles that show how to assign a Key Vault access policy
9+
10+
---
11+
12+
To grant your user account permissions to your key vault through Role-Based Access Control (RBAC), assign a role using the Azure CLI command [az role assignment create](/cli/azure/role/assignment#az-role-assignment-create).
13+
14+
```azurecli
15+
az role assignment create --role "Key Vault Secrets User" --assignee "<your-email-address>" --scope "/subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.KeyVault/vaults/<your-unique-keyvault-name>"
16+
```
17+
18+
Replace \<your-email-address\>, \<subscription-id\>, \<resource-group-name\> and \<your-unique-keyvault-name\> with your actual values. \<your-email-address\> is your sign-in name.

0 commit comments

Comments
 (0)