You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/key-vault/general/assign-access-policy.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,27 +26,27 @@ A Key Vault access policy determines whether a given security principal, namely
26
26
27
27
1. In the [Azure portal](https://portal.azure.com), navigate to the Key Vault resource.
28
28
29
-
1. Under**Settings**, select **Access policies**, then select **Add Access Policy**:
29
+
1. Select**Access policies**, then select **Create**:
30
30
31
-

31
+

32
32
33
-
1. Select the permissions you want under **Certificate permissions**, **Key permissions**, and **Secret permissions**. You can also select a template that contains common permission combinations:
33
+
1. Select the permissions you want under **Key permissions**, **Secret permissions**, and **Certificate permissions**.
1. Under **Select principal**, choose the **None selected** link to open the **Principal** selection pane. Enter the name of the user, app or service principal in the search field, select the appropriate result, then choose **Select**.
37
+
1. Under the **Principal** selection pane, enter the name of the user, app or service principal in the search field and select the appropriate result.
38
38
39
-

39
+

40
40
41
41
If you're using a managed identity for the app, search for and select the name of the app itself. (For more information on security principals, see [Key Vault authentication](authentication.md).
42
42
43
-
1. Back in the **Add access policy** pane, select **Add** to save the access policy.
43
+
1. Review the access policy changes and select **Create** to save the access policy.
44
44
45
-

45
+

46
46
47
-
1. Back on the **Access policies** page, verify that your access policy is listed under **Current Access Policies**, then select **Save**. Access policies aren't applied until you save them.
47
+
1. Back on the **Access policies** page, verify that your access policy is listed.
48
48
49
-

49
+

Copy file name to clipboardExpand all lines: articles/key-vault/general/network-security.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -70,6 +70,10 @@ To understand how to configure a private link connection on your key vault, plea
70
70
> * IP network rules are only allowed for public IP addresses. IP address ranges reserved for private networks (as defined in RFC 1918) are not allowed in IP rules. Private networks include addresses that start with **10.**, **172.16-31**, and **192.168.**.
71
71
> * Only IPv4 addresses are supported at this time.
72
72
73
+
### Public Access Disabled (Private Endpoint Only)
74
+
75
+
To enhance network security, you can configure your vault to disable public access. This will deny all public configurations and allow only connections through private endpoints.
76
+
73
77
## References
74
78
* ARM Template Reference: [Azure Key Vault ARM Template Reference](/azure/templates/Microsoft.KeyVault/vaults)
0 commit comments