Skip to content

Commit a2a991b

Browse files
Merge pull request #227531 from jlichwa/patch-50
Update rbac-migration.md
2 parents 8b93325 + 4384e0c commit a2a991b

File tree

1 file changed

+8
-1
lines changed

1 file changed

+8
-1
lines changed

articles/key-vault/general/rbac-migration.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -131,9 +131,16 @@ Once the built-in policy is assigned, it can take up to 24 hours to complete the
131131
:::image type="content" source="../media/rbac/migration-policy.png" alt-text="RBAC policy compliance":::
132132

133133
For more information, see
134-
- [Implement a new custom policy](../../governance/policy/tutorials/create-and-manage.md#implement-a-new-custom-policy)
135134
- [Integrate Azure Key Vault with Azure Policy](azure-policy.md)
136135

136+
## Access Policy to Azure RBAC Comparison Tool
137+
138+
> [!IMPORTANT]
139+
> This tool is build and maintained by Microsoft Community members and without formal Customer Support Services support.
140+
> The tool is provided AS IS without warranty of any kind.
141+
142+
[PowerShell tool](https://github.com/Azure/KeyVault-AccessPolicyToRBAC-CompareTool) to compare Key Vault access policies to assigned RBAC roles to help with Access Policy to RBAC Permission Model migration. The tool intent is to provide sanity check when migrating existing Key Vault to RBAC permission model to ensure that assigned roles with underlying data actions cover existing Access Policies.
143+
137144
## Troubleshooting
138145
- Role assignment not working after several minutes - there are situations when role assignments can take longer. It's important to write retry logic in code to cover those cases.
139146
- Role assignments disappeared when Key Vault was deleted (soft-delete) and recovered - it's currently a limitation of soft-delete feature across all Azure services. It's required to recreate all role assignments after recovery.

0 commit comments

Comments
 (0)