Skip to content

Commit e6095eb

Browse files
authored
Merge pull request #126251 from davidxw/main
Add note regarding expected failed SecretGet audit event in KV backed config for network protected vaults
2 parents 5f52283 + 68c5d28 commit e6095eb

File tree

1 file changed

+2
-0
lines changed

1 file changed

+2
-0
lines changed

articles/app-service/app-service-key-vault-references.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -56,6 +56,8 @@ If your vault is configured with [network restrictions](/azure/key-vault/general
5656
5757
2. Make sure that the vault's configuration allows the network or subnet that your app uses to access it.
5858
59+
Note that even if you have correctly configured the vault to accept traffic from your virtual network the vault's audit logs may still show a failed (403 - Forbidden) SecretGet event from the app's public outbound IP. This will be followed by a successful SecretGet event from the app's private IP, and is by design.
60+
5961
### Access vaults with a user-assigned identity
6062
6163
Some apps need to reference secrets at creation time, when a system-assigned identity isn't available yet. In these cases, you can create a user-assigned identity and give it access to the vault in advance.

0 commit comments

Comments
 (0)