Skip to content

Commit bb8b70b

Browse files
committed
Updated doc based on PR feedback
1 parent 492e669 commit bb8b70b

File tree

1 file changed

+5
-4
lines changed

1 file changed

+5
-4
lines changed

articles/aks/csi-secrets-store-identity-access.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -208,20 +208,21 @@ In this security model, you can grant access to your cluster's resources to team
208208
az identity show -g <resource-group> --name <identity-name> --query 'clientId' -o tsv
209209
```
210210
211-
2. Create a role assignment that grants the workload identity permission to access the key vault secrets, access keys, and certificates using the [`az role assignment create`][az-role-assignment-create] command.
211+
2. Create a role assignment that grants the identity permission to access the key vault secrets, access keys, and certificates using the [`az role assignment create`][az-role-assignment-create] command.
212212
213213
> [!IMPORTANT]
214214
>
215-
> * If your key vault is set with `--enable-rbac-authorization` and you're using `key` or `certificate` type, assign the `Key Vault Certificate User` role to give permissions.
216-
> * If your key vault is set with `--enable-rbac-authorization` and you're using `secret` type, assign the `Key Vault Secrets User` role.
215+
> * If your key vault is set with `--enable-rbac-authorization` and you're using `key` or `certificate` type, assign the [`Key Vault Certificate User`](../key-vault/general/rbac-guide.md#azure-built-in-roles-for-key-vault-data-plane-operations) role.
216+
> * If your key vault is set with `--enable-rbac-authorization` and you're using `secret` type, assign the [`Key Vault Secrets User`](../key-vault/general/rbac-guide.md#azure-built-in-roles-for-key-vault-data-plane-operations) role.
217217
> * If your key vault isn't set with `--enable-rbac-authorization`, you can use the [`az keyvault set-policy`][az-keyvault-set-policy] command with the `--key-permissions get`, `--certificate-permissions get`, or `--secret-permissions get` parameter to create a key vault policy to grant access for keys, certificates, or secrets. For example:
218218
>
219219
> ```azurecli-interactive
220220
> az keyvault set-policy --name $KEYVAULT_NAME --key-permissions get --object-id $IDENTITY_OBJECT_ID
221221
> ```
222222
223223
```azurecli-interactive
224-
export KEYVAULT_SCOPE=$(az keyvault show --name $KEYVAULT_NAME --query id -o tsv)
224+
export IDENTITY_OBJECT_ID="$(az identity show -g <resource-group> --name <identity-name> --query 'principalId' -o tsv)"
225+
export KEYVAULT_SCOPE=$(az keyvault show --name <key-vault-name> --query id -o tsv)
225226
226227
# Example command for key vault with RBAC enabled using `key` type
227228
az role assignment create --role "Key Vault Certificate User" --assignee $USER_ASSIGNED_CLIENT_ID --scope $KEYVAULT_SCOPE

0 commit comments

Comments
 (0)