Skip to content

Commit dbdc1c8

Browse files
committed
edits
1 parent 274d7ff commit dbdc1c8

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/iot-operations/deploy-iot-ops/howto-manage-secrets.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ az keyvault show --name "<your unique key vault name>" --resource-group "<the na
107107

108108
The newly created service principal needs **Secret** `list` and `get` access policy for the Azure IoT Operations to work with the secret store.
109109

110-
To assign these permissions, the service principal logged in to the CLI needs an access policy with at least permissions to `get` secrets.
110+
To manage key vault access policies, the principal logged in to the CLI needs sufficient Azure permissions. In the Role Based Access Control (RBAC) model, this permission is included in key vault contributor or higher roles.
111111

112112
>[!TIP]
113113
>If you used the logged-in CLI principal to create the Key Vault, then you probably already have the right permissions. However, if you're pointing to a different or existing Key Vault then you should check that you have sufficient permissions to set access policies.

0 commit comments

Comments
 (0)