Skip to content

Commit ce17c5f

Browse files
authored
Adding dependent tabs
1 parent ef8820d commit ce17c5f

File tree

1 file changed

+16
-18
lines changed

1 file changed

+16
-18
lines changed

articles/app-service/configure-ssl-certificate.md

Lines changed: 16 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -136,30 +136,13 @@ If you use Azure Key Vault to manage your certificates, you can import a PKCS12
136136

137137
By default, the App Service resource provider doesn't have access to your key vault. To use a key vault for a certificate deployment, you must authorize read access for the resource provider (App Service) to the key vault. You can grant access either with access policy or RBAC.
138138

139-
### [RBAC permissions](#tab/RBAC)
139+
### [RBAC permissions](#tab/rbac)
140140
| Resource provider | Service principal app ID / assignee | Key vault RBAC role |
141141
|--|--|--|
142142
| **Microsoft Azure App Service** or **Microsoft.Azure.WebSites** | - `abfa0a7c-a6b6-4736-8310-5855508787cd` for public Azure cloud environment <br><br>- `6a02c803-dafd-4136-b4c3-5a6f318b4714` for Azure Government cloud environment | Certificate User |
143143

144144
The service principal app ID or assignee value is the ID for the App Service resource provider. To learn how to authorize key vault permissions for the App Service resource provider using an access policy, see the [provide access to Key Vault keys, certificates, and secrets with an Azure role-based access control documentation](/azure/key-vault/general/rbac-guide?tabs=azure-portal#key-vault-scope-role-assignment).
145145

146-
#### [Azure CLI](#tab/RBAC-CLI)
147-
```azurecli-interactive
148-
az role assignment create --role "Key Vault Certificate User" --assignee "abfa0a7c-a6b6-4736-8310-5855508787cd" --scope "/subscriptions/{subscriptionid}/resourcegroups/{resource-group-name}/providers/Microsoft.KeyVault/vaults/{key-vault-name}"
149-
```
150-
151-
#### [Azure PowerShell](#tab/RBAC-PS)
152-
```azurepowershell
153-
#Assign by Service Principal ApplicationId
154-
New-AzRoleAssignment -RoleDefinitionName "Key Vault Certificate User" -ApplicationId "abfa0a7c-a6b6-4736-8310-5855508787cd" -Scope "/subscriptions/{subscriptionid}/resourcegroups/{resource-group-name}/providers/Microsoft.KeyVault/vaults/{key-vault-name}"
155-
```
156-
157-
> [!NOTE]
158-
> Do not delete these RBAC permissions from key vault. If you do, App Service will not be able to sync your web app with the latest key vault certificate version.
159-
160-
---
161-
162-
163146
### [Access policy permissions](#tab/accesspolicy)
164147

165148
| Resource provider | Service principal app ID | Key vault secret permissions | Key vault certificate permissions |
@@ -173,6 +156,21 @@ The service principal app ID or assignee value is the ID for the App Service res
173156
174157
---
175158

159+
#### [Azure CLI](#tab/azure-cli/rbac)
160+
```azurecli-interactive
161+
az role assignment create --role "Key Vault Certificate User" --assignee "abfa0a7c-a6b6-4736-8310-5855508787cd" --scope "/subscriptions/{subscriptionid}/resourcegroups/{resource-group-name}/providers/Microsoft.KeyVault/vaults/{key-vault-name}"
162+
```
163+
164+
#### [Azure PowerShell](#tab/azure-powershell/rbac)
165+
```azurepowershell
166+
#Assign by Service Principal ApplicationId
167+
New-AzRoleAssignment -RoleDefinitionName "Key Vault Certificate User" -ApplicationId "abfa0a7c-a6b6-4736-8310-5855508787cd" -Scope "/subscriptions/{subscriptionid}/resourcegroups/{resource-group-name}/providers/Microsoft.KeyVault/vaults/{key-vault-name}"
168+
```
169+
170+
> [!NOTE]
171+
> Do not delete these RBAC permissions from key vault. If you do, App Service will not be able to sync your web app with the latest key vault certificate version.
172+
173+
---
176174

177175

178176
### Import a certificate from your vault to your app

0 commit comments

Comments
 (0)