|
2 | 2 | author: dlepow
|
3 | 3 | ms.service: api-management
|
4 | 4 | ms.topic: include
|
5 |
| -ms.date: 01/04/2023 |
| 5 | +ms.date: 01/11/2023 |
6 | 6 | ms.author: danlep
|
7 | 7 | ---
|
8 | 8 |
|
9 | 9 | ### Configure access to key vault
|
10 | 10 | 1. In the portal, navigate to your key vault.
|
11 | 11 | 1. In the left menu, select **Access configuration**, and note the **Permission model** that is configured.
|
12 |
| -1. Depending on the permission model, configure either [Azure RBAC access](../articles/key-vault/general/rbac-guide.md) or a [key vault access policy](../articles/key-vault/general/assign-access-policy.md) for an API Management managed identity. |
13 |
| - |
14 |
| - **To configure Azure RBAC access:<br/>** |
15 |
| - |
16 |
| - |
17 |
| - 1. In the left menu, select **Access control (IAM)**. |
18 |
| - 1. On the **Access control (IAM)** page, select **Add role assignment**. |
19 |
| - 1. On the **Role** tab, select **Key Vault Secrets User**. |
20 |
| - 1. On the **Members** tab, select **Managed identity** > **+ Select members**. |
21 |
| - 1. On the **Select managed identity** page, select a managed identity associated with your API Management instance, and then select **Select**. |
22 |
| - 1. Select **Review + assign**. |
| 12 | +1. Depending on the permission model, configure either a [key vault access policy](../articles/key-vault/general/assign-access-policy.md) or [Azure RBAC access](../articles/key-vault/general/rbac-guide.md) for an API Management managed identity. |
23 | 13 |
|
24 | 14 | **To add a key vault access policy:<br/>**
|
25 | 15 |
|
26 |
| - |
27 | 16 | 1. In the left menu, select **Access policies**.
|
28 | 17 | 1. On the **Access policies** page,select **+ Create**.
|
29 | 18 | 1. On the **Permissions** tab, under **Secret permissions**, select **Get** and **List**, then select **Next**.
|
30 | 19 | 1. On the **Principal** tab, **Select principal**, search for the resource name of your managed identity, and then select **Next**.
|
31 | 20 | If you're using a system-assigned identity, the principal is the name of your API Management instance.
|
32 | 21 | 1. Select **Next** again. On the **Review + create** tab, select **Create**.
|
| 22 | + |
| 23 | + **To configure Azure RBAC access:<br/>** |
| 24 | + |
| 25 | + 1. In the left menu, select **Access control (IAM)**. |
| 26 | + 1. On the **Access control (IAM)** page, select **Add role assignment**. |
| 27 | + 1. On the **Role** tab, select **Key Vault Secrets User**. |
| 28 | + 1. On the **Members** tab, select **Managed identity** > **+ Select members**. |
| 29 | + 1. On the **Select managed identity** page, select the system-assigned managed identity or a user-assigned managed identity associated with your API Management instance, and then select **Select**. |
| 30 | + 1. Select **Review + assign**. |
0 commit comments