You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/operator-nexus/how-to-credential-manager-key-vault.md
+61-20Lines changed: 61 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,36 +22,43 @@ Azure Operator Nexus utilizes secrets and certificates to manage component secur
22
22
> [!NOTE]
23
23
> A single Key Vault can be used for any number of clusters.
24
24
25
-
## Writing Credential Updates to a Customer Key Vault on Nexus Cluster
25
+
## Configure Managed Identity for Cluster Manager
26
26
27
-
- Ensure that the *Microsoft.NetworkCloud* resource provider is registered with the customer subscription.
27
+
Beginning with the 2024-06-01 public preview API, managed identities are used in the Cluster Manager for write access to rotated credentials to a key vault. The Cluster Manager identity can be system-assigned or [user-assigned](/entra/identity/managed-identities-azure-resources/how-manage-user-assigned-managed-identities), and can be managed directly via APIs or via CLI.
28
28
29
-
```console
30
-
az provider register --namespace 'Microsoft.NetworkCloud' --subscription <Subscription ID>
31
-
```
32
-
33
-
- Assign the *Operator Nexus Key Vault Writer Service Role*. Ensure that *Azure role-based access control* is selected as the permission model for the key vault on the *Access configuration* view. Then from the *Access control (IAM)* view, select to add a role assignment.
29
+
The examples below describe how to configure a managed identity for a Cluster Manager if one is not already configured.
--resource-group <Resource Group Name> --mi-user-assigned "/subscriptions/subscriptionId/resourceGroups/resourceGroupName/providers/Microsoft.ManagedIdentity/userAssignedIdentities/myUAI
46
+
```
45
47
46
-
```console
47
-
az role assignment create --assignee 05cf5e27-931d-47ad-826d-cb9028d8bd7a --role 44f0a1a8-6fea-4b35-980a-8ff50c487c97 --scope /subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.KeyVault/vaults/<Key Vault Name>
48
+
- Add system assigned identity to Cluster Manager
49
+
```
50
+
az networkcloud clustermanager update --name <Cluster Manager Name> --resource-group <Resource Group Name> --mi-system-assigned
51
+
```
48
52
49
-
az role assignment create --assignee 3365d4ea-bb16-4bc9-86dd-f2c8cf6f1f56 --role 44f0a1a8-6fea-4b35-980a-8ff50c487c97 --scope /subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.KeyVault/vaults/<Key Vault Name>
53
+
- Add user assigned identity to Cluster Manager
54
+
```
55
+
az networkcloud clustermanager update --name <Cluster Manager Name> --resource-group <Resource Group Name> \
> Use of App IDs for Customer Key Vault access is deprecated and support will be removed in a future version. It is recommended to use managed identity principals.
95
+
96
+
Instead of managed identities, the following application IDs may be granted access to the Key Vault.
97
+
98
+
- Ensure that the *Microsoft.NetworkCloud* resource provider is registered with the customer subscription.
99
+
100
+
```console
101
+
az provider register --namespace 'Microsoft.NetworkCloud' --subscription <Subscription ID>
102
+
```
103
+
104
+
- When assigned role access to the key vault, use the following App IDs as principal IDs.
| Production | AFOI-NC-RP-PME-PROD | 05cf5e27-931d-47ad-826d-cb9028d8bd7a |
109
+
| Production | AFOI-NC-MGMT-PME-PROD | 3365d4ea-bb16-4bc9-86dd-f2c8cf6f1f56 |
110
+
111
+
## Writing Credential Updates to a Customer Key Vault on Nexus Cluster
112
+
113
+
- Assign the *Operator Nexus Key Vault Writer Service Role*. Ensure that *Azure role-based access control* is selected as the permission model for the key vault on the *Access configuration* view. Then from the *Access control (IAM)* view, select to add a role assignment.
| Operator Nexus Key Vault Writer Service Role (Preview) | 44f0a1a8-6fea-4b35-980a-8ff50c487c97 |
118
+
119
+
Example:
120
+
121
+
```console
122
+
az role assignment create --assignee <Managed Identity Principal Id> --role 44f0a1a8-6fea-4b35-980a-8ff50c487c97 --scope /subscriptions/<Subscription ID>/resourceGroups/<Resource Group Name>/providers/Microsoft.KeyVault/vaults/<Key Vault Name>
123
+
```
124
+
84
125
- User associates the Customer Key Vault with the Operator Nexus cluster. The key vault resource ID must be configured in the cluster and enabled to store the secrets of the cluster.
0 commit comments