Skip to content

Commit c7dea75

Browse files
authored
Merge pull request #49580 from BryanLa/patch-33
Clarify app identity
2 parents f5726fc + 9a9fd98 commit c7dea75

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/key-vault/key-vault-ovw-storage-keys.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: key-vault
88
author: bryanla
99
ms.author: bryanla
1010
manager: mbaldwin
11-
ms.date: 10/12/2017
11+
ms.date: 08/21/2017
1212
---
1313
# Azure Key Vault Storage Account Keys
1414

@@ -103,18 +103,18 @@ accountSasCredential.UpdateSASToken(sasToken);
103103

104104
## Getting started
105105

106-
### Setup for role-based access control (RBAC) permissions
106+
### Give Key Vault access to your Storage Account
107107

108-
The Azure Key Vault application identity needs permissions to *list* and
109-
*regenerate* keys for a storage account. Set up these permissions using the
110-
following steps:
108+
Like many applications, Key Vault is registered with Azure AD in order to use OAuth to access other services. During registration, [a service principal](/azure/active-directory/develop/app-objects-and-service-principals) object is created, which is used to represent the application's identity at run time. The service principal is also used to authorize the application's identity to access another resource, through role-based access control (RBAC).
109+
110+
The Azure Key Vault application identity needs permissions to *list* and *regenerate* keys for your storage account. Set up these permissions using the following steps:
111111

112112
```powershell
113113
# Get the resource ID of the Azure Storage Account you want to manage.
114114
# Below, we are fetching a storage account using Azure Resource Manager
115115
$storage = Get-AzureRmStorageAccount -ResourceGroupName "mystorageResourceGroup" -StorageAccountName "mystorage"
116116
117-
# Get ObjectId of Azure Key Vault Identity
117+
# Get Application ID of Azure Key Vault's service principal
118118
$servicePrincipal = Get-AzureRmADServicePrincipal -ServicePrincipalName cfa8b339-82a2-471a-a3c9-0fc0be7a4093
119119
120120
# Assign Storage Key Operator role to Azure Key Vault Identity

0 commit comments

Comments
 (0)