Skip to content

Commit b55db5e

Browse files
committed
Swapped order of access config steps
1 parent 0ca81b8 commit b55db5e

File tree

1 file changed

+11
-13
lines changed

1 file changed

+11
-13
lines changed

includes/api-management-key-vault-access.md

Lines changed: 11 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -2,31 +2,29 @@
22
author: dlepow
33
ms.service: api-management
44
ms.topic: include
5-
ms.date: 01/04/2023
5+
ms.date: 01/11/2023
66
ms.author: danlep
77
---
88

99
### Configure access to key vault
1010
1. In the portal, navigate to your key vault.
1111
1. In the left menu, select **Access configuration**, and note the **Permission model** that is configured.
12-
1. Depending on the permission model, configure either [Azure RBAC access](../articles/key-vault/general/rbac-guide.md) or a [key vault access policy](../articles/key-vault/general/assign-access-policy.md) for an API Management managed identity.
13-
14-
**To configure Azure RBAC access:<br/>**
15-
16-
17-
1. In the left menu, select **Access control (IAM)**.
18-
1. On the **Access control (IAM)** page, select **Add role assignment**.
19-
1. On the **Role** tab, select **Key Vault Secrets User**.
20-
1. On the **Members** tab, select **Managed identity** > **+ Select members**.
21-
1. On the **Select managed identity** page, select a managed identity associated with your API Management instance, and then select **Select**.
22-
1. Select **Review + assign**.
12+
1. Depending on the permission model, configure either a [key vault access policy](../articles/key-vault/general/assign-access-policy.md) or [Azure RBAC access](../articles/key-vault/general/rbac-guide.md) for an API Management managed identity.
2313

2414
**To add a key vault access policy:<br/>**
2515

26-
2716
1. In the left menu, select **Access policies**.
2817
1. On the **Access policies** page,select **+ Create**.
2918
1. On the **Permissions** tab, under **Secret permissions**, select **Get** and **List**, then select **Next**.
3019
1. On the **Principal** tab, **Select principal**, search for the resource name of your managed identity, and then select **Next**.
3120
If you're using a system-assigned identity, the principal is the name of your API Management instance.
3221
1. Select **Next** again. On the **Review + create** tab, select **Create**.
22+
23+
**To configure Azure RBAC access:<br/>**
24+
25+
1. In the left menu, select **Access control (IAM)**.
26+
1. On the **Access control (IAM)** page, select **Add role assignment**.
27+
1. On the **Role** tab, select **Key Vault Secrets User**.
28+
1. On the **Members** tab, select **Managed identity** > **+ Select members**.
29+
1. On the **Select managed identity** page, select the system-assigned managed identity or a user-assigned managed identity associated with your API Management instance, and then select **Select**.
30+
1. Select **Review + assign**.

0 commit comments

Comments
 (0)