Skip to content

Commit aa71b5c

Browse files
Merge pull request #223719 from jlichwa/patch-47
Update about-keys-details.md
2 parents 0600b8d + eb8a16b commit aa71b5c

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/key-vault/keys/about-keys-details.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -144,9 +144,9 @@ You can specify additional application-specific metadata in the form of tags. Ke
144144
145145
## Key access control
146146

147-
Access control for keys managed by Key Vault is provided at the level of a Key Vault that acts as the container of keys. The access control policy for keys is distinct from the access control policy for secrets in the same Key Vault. Users may create one or more vaults to hold keys, and are required to maintain scenario appropriate segmentation and management of keys. Access control for keys is independent of access control for secrets.
147+
Access control for keys managed by Key Vault is provided at the level of a Key Vault that acts as the container of keys. You can control access to keys using Key Vault [role-based access control](../general/rbac-guide.md) (recommended) or old [vault access policy](../general/assign-access-policy.md) permssion model. Role-based permission model has three predefined roles to manage keys: 'Key Vault Crypto Officer', 'Key Vault Crypto User', 'Key Vault Service Encryption User' and can be scoped to subscription, resource group or vault level.
148148

149-
The following permissions can be granted, on a per user / service principal basis, in the keys access control entry on a vault. These permissions closely mirror the operations allowed on a key object. Granting access to a service principal in key vault is a onetime operation, and it will remain same for all Azure subscriptions. You can use it to deploy as many certificates as you want.
149+
Vault access policy permssion model permissions:
150150

151151
- Permissions for key management operations
152152
- *get*: Read the public part of a key, plus its attributes
@@ -176,7 +176,7 @@ The following permissions can be granted, on a per user / service principal basi
176176
- *get rotation policy*: Retrieve rotation policy configuration
177177
- *set rotation policy*: Set rotation policy configuration
178178

179-
For more information on working with keys, see [Key operations in the Key Vault REST API reference](/rest/api/keyvault). For information on establishing permissions, see [Vaults - Create or Update](/rest/api/keyvault/keyvault/vaults/create-or-update) and [Vaults - Update Access Policy](/rest/api/keyvault/keyvault/vaults/update-access-policy).
179+
For more information on working with keys, see [Key operations in the Key Vault REST API reference](/rest/api/keyvault).
180180

181181
## Next steps
182182
- [About Key Vault](../general/overview.md)

0 commit comments

Comments
 (0)