Skip to content

Commit 87c728e

Browse files
Merge pull request #265143 from greg-lindsay/appgw-upd
roll back note
2 parents ff464a8 + 905f326 commit 87c728e

File tree

1 file changed

+1
-4
lines changed

1 file changed

+1
-4
lines changed

articles/application-gateway/key-vault-certs.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: application-gateway
55
author: greg-lindsay
66
ms.service: application-gateway
77
ms.topic: conceptual
8-
ms.date: 02/01/2024
8+
ms.date: 02/02/2024
99
ms.author: greglin
1010
---
1111

@@ -71,9 +71,6 @@ Define access policies to use the user-assigned managed identity with your Key V
7171

7272
If you're using **Azure role-based access control** follow the article [Assign a managed identity access to a resource](../active-directory/managed-identities-azure-resources/howto-assign-access-portal.md) and assign the user-assigned managed identity the **Key Vault Secrets User** role to the Azure Key Vault.
7373

74-
> [!NOTE]
75-
> If you have Key Vaults for your HTTPS listener that use different identities, creating or updating the listener requires checking the certificates associated with each identity. In order for the operation to be successful, you must [grant permission](../key-vault/general/rbac-guide.md) to all identities.
76-
7774
### Verify Firewall Permissions to Key Vault
7875

7976
As of March 15, 2021, Key Vault recognizes Application Gateway as a trusted service by leveraging User Managed Identities for authentication to Azure Key Vault. With the use of service endpoints and enabling the trusted services option for Key Vault's firewall, you can build a secure network boundary in Azure. You can deny access to traffic from all networks (including internet traffic) to Key Vault but still make Key Vault accessible for an Application Gateway resource under your subscription.

0 commit comments

Comments
 (0)